HOME

TheInfoList



OR:

The Winston Smith Project ( it, Progetto Winston Smith, or PWS) is an informational and operational project for the defence of
human rights Human rights are moral principles or normsJames Nickel, with assistance from Thomas Pogge, M.B.E. Smith, and Leif Wenar, 13 December 2013, Stanford Encyclopedia of PhilosophyHuman Rights Retrieved 14 August 2014 for certain standards of hu ...
on the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
and in the digital era. The project was started in 1999 as an anonymous association and it is characterised by the absence of a physical reference identity. It is named after the main character in
George Orwell Eric Arthur Blair (25 June 1903 – 21 January 1950), better known by his pen name George Orwell, was an English novelist, essayist, journalist, and critic. His work is characterised by lucid prose, social criticism, opposition to totalita ...
's novel "
Nineteen Eighty-Four ''Nineteen Eighty-Four'' (also stylised as ''1984'') is a dystopian social science fiction novel and cautionary tale written by the English writer George Orwell. It was published on 8 June 1949 by Secker & Warburg as Orwell's ninth and final ...
". The reference to Orwell's
dystopia A dystopia (from Ancient Greek δυσ- "bad, hard" and τόπος "place"; alternatively cacotopiaCacotopia (from κακός ''kakos'' "bad") was the term used by Jeremy Bentham in his 1818 Plan of Parliamentary Reform (Works, vol. 3, p. 493). ...
is embodied in the motto of PWS: "Unplug the
Big Brother Big Brother may refer to: * Big Brother (''Nineteen Eighty-Four''), a character from George Orwell's novel ''Nineteen Eighty-Four'' ** Authoritarian personality, any omnipresent figure representing oppressive control ** Big Brother Awards, a sat ...
" which is aligned with its more generalist motto "Paranoia is a virtue". PWS aims to make users aware of the risks of violation of
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
on the Internet and threats to freedom of speech. PWS is engaged in spreading the informational tools and counter-censorship technologies that allow users to maintain confidentiality in their communications, anonymity in the network and freedom of expression. PWS has generated and maintains the ''e-privacy'', '' Big Brother Awards Italy'', ''Privacy Box'' and ''Project 95%'' initiatives.


Objectives

PWS upholds the thesis that the Big Brother described in George Orwell's novel is gradually gaining form, passively and with silent acceptance by the people. It is gradually inserted into our lives through the
false statement A false statement is a statement that is not true. Although the word ''fallacy'' is sometimes used as a synonym for ''false statement'', that is not how the word is used in philosophy, mathematics, logic and most formal contexts. A false statement ...
: "it is right to sacrifice one's privacy in exchange for greater security". According to security experts such as
Bruce Schneier Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is a Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman Klein Ce ...
, following events such as the
SISMI-Telecom scandal The SISMI-Telecom scandal, uncovered in Italy in 2006, refers to a surveillance scandal believed to have begun in 1996, under which more than 5,000 persons' phones were tapped. First arrests As part of the judiciary investigation on the '' I ...
, official bodies which monitor telecommunications are acquiring a
de facto ''De facto'' ( ; , "in fact") describes practices that exist in reality, whether or not they are officially recognized by laws or other formal norms. It is commonly used to refer to what happens in practice, in contrast with '' de jure'' ("by l ...
totalitarian Totalitarianism is a form of government and a political system that prohibits all opposition parties, outlaws individual and group opposition to the state and its claims, and exercises an extremely high if not complete degree of control and regul ...
power, whatever the official political situation. If the target is really to increase public security, the mere presence of monitoring agencies constitutes an element of insecurity. Because of the ignorance of citizens regarding
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
, official agencies push for an ever increasing situation which damages human rights. PWS is engaged in spreading tools to protect users from such risk. Fortunately, those tools exist because the Internet is based upon open technologies. Individual security can be achieved only by using preventive protection tools on private computers. It cannot be delegated to others such as
Internet service provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privatel ...
s. PWS aims to increase the use of technologies such as data encryption and anonymity. This can be achieved by using programs written according to the guidelines of secure software, such as: * the software in use (including the operating system) must be an open system, allowing the user, if so inclined and capable, to verify its effective behaviour. * the
cryptographic Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
algorithms employed must be ''public''. Only thus can the community perform a mathematical analysis ( cryptanalysis) and a study of potential attacks, in order to achieve a continuous improvement. If either of these conditions is missing, the software cannot be considered secure, as it is then based upon the concept of
security through obscurity Security through obscurity (or security by obscurity) is the reliance in security engineering on design or implementation secrecy as the main method of providing security to a system or component. History An early opponent of security through ob ...
, which has never been proved a valid security paradigm. Events such as JAP, PGP 5.x and 6.x have shown the unreliability of this model. To be consistent with the proposed technologies, the PWS website is not available on the Internet, but through
Freenet Freenet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web ...
, with the following key:
USK@RU-C2q5kN7K62WO3seMMjSTUY8izF2vCFyVFOnLf~Q0,wxvGO2QMT6IN9c7dNUhHeHnXVVwhq8YLbQL~DlMA7YE,AQACAAE/pws/3
A
mirror A mirror or looking glass is an object that Reflection (physics), reflects an image. Light that bounces off a mirror will show an image of whatever is in front of it, when focused through the lens of the eye or a camera. Mirrors reverse the ...
is also available on the Internet to increase accessibility. To contact members of PWS conventional e-mail addresses are not used, but rather the nym alias ''[email protected]'', whose PGP key is published on a keyserver.


Project resources

Anonymity in the network is guaranteed by the
Mix-net Mix networks are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as ''mixes'' which take in messages from multiple senders, shuffle them, and send them back out in random order to the next dest ...
technology, first studied by David Chaum in 1981. This technology requires that user resources be employed and shared in collaboration. The reciprocal sharing of resources through secure algorithms ensures that an attacker able to monitor the network passively (reading all traffic in all segments) or actively (generating arbitrary traffic) would be unable to discover the identities of individuals. Software such as
anonymous remailer An anonymous remailer is a server that receives messages with embedded instructions on where to send them next, and that forwards them without revealing where they originally came from. There are cypherpunk anonymous remailers, mixmaster anonym ...
, Tor and
Freenet Freenet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web ...
are based on these advanced concepts, and have evolved through the years. The architecture of these networks is based on collaboration and availability of shared resources. As a start, groups of volunteers like PWS are making eight servers available, dedicated to the support of this network.


Law proposal

At the 2005 annual convention organized by Bileta, an association active since 1986 for the study of laws concerning the use of technology in Britain and Ireland, PWS presented a study concerning data retention.
Data retention Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998. The different ...
is the automatic collection of network data in support of investigative bodies and law enforcement. Before several reforms concerning security, it was necessary in some jurisdictions to possess a mandate by a judicial authority before collecting data to be used in investigations. With the
decentralization Decentralization or decentralisation is the process by which the activities of an organization, particularly those regarding planning and decision making, are distributed or delegated away from a central, authoritative location or group. Conce ...
of technologies due to the spread of Internet, many private bodies have been invested with the responsibility for data collection. Such automatic data collection of Internet traffic is possible using freely available software, such as Wireshark or tcpdump, originally conceived to aid network technicians in
debugging In computer programming and software development, debugging is the process of finding and resolving ''bugs'' (defects or problems that prevent correct operation) within computer programs, software, or systems. Debugging tactics can involve in ...
and maintenance. Collection of personal data is forbidden in the
European Union The European Union (EU) is a supranational political and economic union of member states that are located primarily in Europe. The union has a total area of and an estimated total population of about 447million. The EU has often been ...
according to the principle of freedom of secrecy of correspondence. For this reason a law proposal has been investigated to regulate the collection of log and backup data, which would define which data are to be considered sensitive, and allowing technicians to perform maintenance operations, but at the same time preventing the unauthorized access to personal data by external parties. This law proposal was presented to the Italian Parliament by deputy
Maurizio Turco Maurizio is an Italian masculine given name, derived from the Roman name Mauritius. Mauritius is a derivative of Maurus, meaning ''dark-skinned, Moorish''. List of people with the given name Maurizio Art and music * Maurizio Arcieri (born 194 ...
in 2006. This law proposal was not accepted. Instead, the validity of the current Italian Law Decree 144/2005, due to expire on 31 December 2007, has been extended in time, to continue allowing the collection of personal data with a view to combating international
terrorism Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violen ...
.


E-Privacy conference

PWS organizes the annual E-Privacy conference, which is the first such Italian conference concerning aspects of privacy in the network. Contributions are given by both technical and law experts. This conference has been held in the Palazzo Vecchio in
Florence Florence ( ; it, Firenze ) is a city in Central Italy and the capital city of the Tuscany region. It is the most populated city in Tuscany, with 383,083 inhabitants in 2016, and over 1,520,000 in its metropolitan area.Bilancio demografico ...
, with the exception of the 2002 edition, which was hosted at the University of Florence. Each edition has had a main theme: * 2002: ''E-privacy, confidentiality and individual rights in the network, opposing Big Brother in the third millennium'' Topics covered: Italian Law 675/1996, political trends to pass laws reducing freedom in the net, Freenet, PGP/ GPG, anonymous remailer and
steganography Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
. * 2003: ''Defending identity and freedom of expression against requests for more security'' Topics treated included: data retention, TCPA, analysing
threat model Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified and enumerated, and countermeasures prioritized. The purpose of threat modeling is to provide de ...
s to define a minimum personal security standard,
digital signatures A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very high confidence that the message was created b ...
,
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
as a basic user defence tool. * 2004: ''Data retention and the right to oblivion'' Topics included: data retention,
RFID Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electroma ...
, the right to delete sensitive data, surveillance as an answer to terrorism, anonymous
peer-to-peer Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer ...
(P2P) networking, abuses of video surveillance, decentralized technologies. * 2005: ''Data retention and privacy in the network'':
darknet A dark net or darknet is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol. Two typical darknet types are social ...
was considered, as well as presenting the P-Box project, then Free software, civil responsibilities and privacy violations, the
OpenPGP Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partiti ...
standard, a law proposal to regulate automatic data collection, Biometry. * 2006: The main theme was not set. Topics discussed were:
spyware Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privac ...
,
trusted computing Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning that is distinct from the field of Confidential Computing. The core id ...
, DRM, possible misuses of electronic voting, dangers to privacy caused by search engines. * 2007: ''Social control and technocontrol''. Topics included:
VOIP Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. The terms Interne ...
, personal identity and
digital identity A digital identity is information used by computer systems to represent an external agent – a person, organization, application, or device. Digital identities allow access to services provided with computers to be automated and make it possibl ...
, accessibility, the Tanga articles and IT incidents. The 2008 conference was hypothesized to be held on the 9th and 10 May in the
Palazzo Vecchio The Palazzo Vecchio ( "Old Palace") is the town hall of Florence, Italy. It overlooks the Piazza della Signoria, which holds a copy of Michelangelo's ''David'' statue, and the gallery of statues in the adjacent Loggia dei Lanzi. Originally c ...
located in
Florence Florence ( ; it, Firenze ) is a city in Central Italy and the capital city of the Tuscany region. It is the most populated city in Tuscany, with 383,083 inhabitants in 2016, and over 1,520,000 in its metropolitan area.Bilancio demografico ...
. "e-privacy" is also the name of a mailing list. Its e-mail address is [email protected], subscription is free and archives are publicly available online.


P-Box project

Anonymity technologies are based on collaborative groups of users who reciprocally choose to share their resources. These anonymous networks can be accessed even from devices with low computing power and low communications bandwidth. To help diffuse these technologies PWS has introduced P-Boxes (Privacy Boxes), which are small and simple devices to help protect privacy. Three models have been developed: * P-Box Model I: a modified
Xbox Xbox is a video gaming brand created and owned by Microsoft. The brand consists of five video game consoles, as well as applications (games), streaming services, an online service by the name of Xbox network, and the development arm by th ...
, with the
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which i ...
operating system, running standard services and the Mixminion remailer. * P-Box Model II: a PC Soekris 4501, with the Linux operating system, running Mixminion, TOR, Mixmaster and the Postfix mail server. * P-Box Model III: based on a Soekris 4801, it includes the same applications as model II. It can also be used as access point and includes the e-mail server protocols
IMAP In computing, the Internet Message Access Protocol (IMAP) is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. IMAP is defined by . IMAP was designed with the goal of pe ...
and
POP3 In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. POP version 3 (POP3) is the version in common use, and along with IMAP the most comm ...
.


Big Brother Awards (Italian section)

Big Brother Awards (BBA) is an initiative of
Privacy International Privacy International (PI) is a UK-based registered charity that defends and promotes the right to privacy across the world. First formed in 1990, registered as a non-profit company in 2002 and as a charity in 2012, PI is based in London. Its cu ...
with the motto "watching the watchman worldwide". PWS manages the polling and award assignation to the Italian bodies with the worst performance in the field of human rights. Several categories exist, according to the rights violation achieved: * Lifelong threat: the body or agency which has caused most damage to privacy throughout its existence. * Worst public agency: given to the public agency (government institution, public body, authority, etc.) which caused most damage to privacy in the current year. * Worst private enterprise: awarded to private or corporate institutions with the worst privacy record in the current year. * Most invasive technology: the technology with the worst impact on privacy. * Boot mouth: the "best" (most terrifying, ridiculous, erroneous, falsely tranquillizing) statement said or printed about privacy in the current year. * People's lament: who received most votes, also in different categories.


Project 95%

Project 95% (Ninety Five Percent – No False Privacy) is a project advocating awareness in Internet issues. The Internet was born as a free and decentralized network, but its most common use relies on a few centralized services. A blatant example is the number of users who are increasingly more dependent on webmail services such as
Gmail Gmail is a free email service provided by Google. As of 2019, it had 1.5 billion active user (computing), users worldwide. A user typically accesses Gmail in a web browser or the official mobile app. Google also supports the use of email clien ...
,
Hotmail Outlook.com is a webmail service that is part of the Microsoft 365 product family. It offers mail, calendaring, contacts, and tasks services. Founded in 1996 by Sabeer Bhatia and Jack Smith as Hotmail, it was acquired by Microsoft in 19 ...
and
Yahoo! Yahoo! (, styled yahoo''!'' in its logo) is an American web services provider. It is headquartered in Sunnyvale, California and operated by the namesake company Yahoo! Inc. (2017–present), Yahoo Inc., which is 90% owned by investment funds ma ...
Mail. Even though there is an understandable tendency favouring ease of use, as the customers can access their services from disparate locations, the downside is the vast usage of profiling instruments on the part of free service providers, with the view of providing more targeted web marketing. It is not PWS's intention to tag any specific commercial service as a danger to privacy, but to point out that a greater confidentiality can be achieved using individual mail servers, private webmail programs, privately owned domains. This is perfectly achievable using freely available software and their configuration can be automated even for non technically competent users. 95% is the percentage of reliability of a home based server, connected to the Internet through a flat ADSL line, to demonstrate that it is not necessary to employ the offerings of centralized enterprises to obtain good services. Hence the NFP project, which informs on the technical possibilities that a modern computer can offer, to connect to the Internet fully and without undue effort on the part of the user. The P-Box is an example of a technological answer to these necessities.


References

{{Reflist Digital rights organizations Privacy organizations Organizations established in 1999