[85attendees] Media without censorship - attend side meeting ?

Johan Pouwelse <peer2peer@gmail.com> Fri, 02 November 2012 22:55 UTC

Return-Path: <peer2peer@gmail.com>
X-Original-To: 85attendees@ietfa.amsl.com
Delivered-To: 85attendees@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D5C911E80F1 for <85attendees@ietfa.amsl.com>; Fri, 2 Nov 2012 15:55:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.683
X-Spam-Level:
X-Spam-Status: No, score=-2.683 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_45=0.6, RCVD_IN_DNSWL_LOW=-1, SARE_MILLIONSOF=0.315]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8XvYPzkfKvsr for <85attendees@ietfa.amsl.com>; Fri, 2 Nov 2012 15:55:26 -0700 (PDT)
Received: from mail-wi0-f178.google.com (mail-wi0-f178.google.com [209.85.212.178]) by ietfa.amsl.com (Postfix) with ESMTP id 600B121F977D for <85attendees@ietf.org>; Fri, 2 Nov 2012 15:55:26 -0700 (PDT)
Received: by mail-wi0-f178.google.com with SMTP id hr7so1400875wib.13 for <85attendees@ietf.org>; Fri, 02 Nov 2012 15:55:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:cc:content-type; bh=b05ICQgtUhlKYUOYSdul1MQjRFyI9K5tHsw7r3lOccY=; b=D3Zxt34fpIPPB8Oh9UtLswKlAv8iQPyMgIhsNEnVpD3ruBXRdsYKu0wurrGf1hfd6I EtJWDmJNZR2Y6oYO5GNrGRVOLxv8yaqmPexUGNbLfX4YXkr1dzJyq1gRQXHEMKMgCOKz 3ensJ7SHekPSEihuPdJs5eIDEdIZYF/0W0IfAZAxzROmJXXlGpEeQbfu3HTDTD322BW1 7D9UN1wghDI4Cac2ZzEtmn+mnA8t3Zhgvg2p4AOfZ9RxLij6agjphyIamhy5hxU/cqT3 Ydg60ZoV8NwXajeYpCBDtyy6exaY/6JYtfku0dmvacZ1osP3KcEIZkV+Swq5GnTUD5v3 lHYQ==
MIME-Version: 1.0
Received: by 10.216.210.223 with SMTP id u73mr1165397weo.132.1351896925214; Fri, 02 Nov 2012 15:55:25 -0700 (PDT)
Received: by 10.180.182.83 with HTTP; Fri, 2 Nov 2012 15:55:25 -0700 (PDT)
Received: by 10.180.182.83 with HTTP; Fri, 2 Nov 2012 15:55:25 -0700 (PDT)
Date: Fri, 02 Nov 2012 23:55:25 +0100
Message-ID: <CAJYQ-fSsnJMP2Yn2E1uq0LbuqVGobaipLA_nodf5FWW6eoESoQ@mail.gmail.com>
From: Johan Pouwelse <peer2peer@gmail.com>
To: 85attendees@ietf.org
Content-Type: multipart/alternative; boundary="001636c5b1940017c104cd8b0858"
Cc: Wesley Eddy <wes@mti-systems.com>, Martin Stiemerling <Martin.Stiemerling@neclab.eu>
Subject: [85attendees] Media without censorship - attend side meeting ?
X-BeenThere: 85attendees@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF 85 attendees mailing list <85attendees.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/85attendees>, <mailto:85attendees-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/85attendees>
List-Post: <mailto:85attendees@ietf.org>
List-Help: <mailto:85attendees-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/85attendees>, <mailto:85attendees-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Nov 2012 22:55:32 -0000

Dear All,
Anyone interested in attending a side meeting, to be organised in Atlanta?
Please reply with a "+1", we need sufficient replies or this planned event
will be cancelled.

Topic: privacy enhancing technology, focused on smartphones and
microblogging
Title: "Media without censorship"
Date: 20:30 Thursday, November 8, 2012 (after Bits&Bytes goes empty)
(tentative, pending room availability etc)
Goal: seek feedback, measure level of interest and see if a future BoF is
realistic

The IETF Journal has just published a 2-page description of this
initiative:
http://www.internetsociety.org/articles/moving-toward-censorship-free-internet

18-page writeup of motivation, overview&scenarios:
https://datatracker.ietf.org/doc/draft-pouwelse-censorfree-scenarios/?include_text=1

There was a prior Bar BoF on this topic held last August in Vancouver.
We had some press attention, like:
http://translate.google.com/translate?sl=auto&tl=en&u=http%3A%2F%2Fwww.heise.de%2Fnewsticker%2Fmeldung%2FIETF-diskutiert-Netz-Standards-gegen-Zensur-1660244.html
Martin Stiemerling was even quotes there as saying this was "Very
interesting" and very "constructive" :-)

Numerous groups work on this topic, little interaction exists,
documentation and common terminology is lacking.
If people are interested I would like to briefly demo the work of
others and our own running code in this proposed gathering.

Given the luxurious staffing of my university research team we now
have running code of several building blocks for privacy enhancement.
This allows discussion about desired architecture and approaches based
on real-world prototyping experience.
On Android market (
https://play.google.com/store/apps/developer?id=TUDelft:+Delft+University+of+Technology
):
- Transfer a video file between two Android phones, *without* the
receiver having any special app installed.
Uses NFC initiation of data transfer and Bluetooth handover
(enabled by default on V4.1 Android).
(scenario 3 building block:
http://tools.ietf.org/html/draft-pouwelse-censorfree-scenarios-02#section-4.3
)
- Live streaming with an Android app, stream phone camera feed to
other phones using IETF PPSP WG draft peer protocol, uses no central
server, pure P2P
(scenario 1 building block:
http://tools.ietf.org/html/draft-pouwelse-censorfree-scenarios-02#section-4.1
)
- Record a video on a smartphone and includes one-click playable URL
in a Twitter.com message, without requirement of any central server
Record a video from app, create hash check, seed content from
phone (PPSP compliant on-demand streaming)
(scenario 1 building block)
- Plus we now have M2Crypto experience on Android

Below are the meeting notes from the Last Aug Vancouver meet.

Looking forward to any feedback you might have on this or even
attending this suggested meeting.

Greetings from Holland, Johan.

######## side meeting notes by Johan Pouwelse ########
Participants present at bar BoF: 25+
People indicating willingness to participate, but had agenda conflicts: 5+

Overall there was a lively discussion going on for over an hour. The
diverse audience represented a wide range of backgrounds and
expertise. From security to networking, students to professors and
area director to decades-long IETF participants.

Numerous attendants had read the initial discussion I-D document.
Numerous questions and lack of clarity was ventilated. First,
essential need for improvement is making the implied threat models
explicit. It was unclear what the capability are of the adversaries.
The context and model of information transport was not clear.
A discussion emerged about the security of the physical layer. Nothing
can be accomplished if trust is absent even in the physical layer. A
common understanding was that news is created in a region without
freedom and then needs to travel to the outside world. No term was
defined during the discussion, for clarity, we will refer to this
simplistically as the freedom/non-freedom border. Different transport
protocols, dynamics and different solutions are needed on the two
sides of this border.

A second item was that the use cases (scenarios) need to be more
clearly defined. Specifying exactly what problem is to be solved.
Third, it was unclear why existing technology was not sufficient to
meet the described demands. The example proposed was the tor onion
network in combination with XMPP or the orbot smartphone app. After
much discussion the conclusion was that existing technologies, such as
tor facilitate protected point-to-point communication. However,
possible desired use cases focus more on current Twitter-like social
media practices, best typified as a "global conversation".
Furthermore, current social media revolves around video-rich,
real-time interaction with groups, hashtag-based discovery and social
networking. All of these aspects are not offered or are incompatible
with current-generation of privacy enhancing technology. A discussion
emerged on reputation models in news reporting and information flows.
In the current microblogging age, does the number of real-person
followers be seen as your reputation. The question publicly posed was
roughly: do several news sources of moderate reputation which report
the same news story yield together a different reputation score

At this point in the discussion, a summary was given (Lucy?)
introducing the "transmorf" principle. The identities used in Twitter
are highly identifiable labels, with a certain trust level. This hard
identity with millions of followers is a stark contrasts with
anonymity. It was concluded that lacking in current anti-censorship
technology is the ability to first have stealth encrypted transport of
news, cross the freedom/non-freedom border and then transmorf this
news into a public accessible form with a highly identifiable label.
This relates closely to 2nd stage verification of news.
Discussion arose around the lack of motivation for the smartphone app
focus in the scenario I-D. The requirements and solution space need to
be separated.
It was noted that the strong point of the IETF lies in describing
architectures and protocols.
Finally, a first stab needs to be done at defining various components.
What are the major chunks of functionality that need to be addressed.
Supporting area director Martin Stiemerling asked who would be willing
to help write documents. Several people responded. Next step was
forming a mailinglist. Given the nature of this problem, it was
discussed if either EITF or IRTF where appropriate for this activity.

Four documents to move forward:
Use cases and threat model
System components, definitions and system architecture
Current technology and gap
Detailed system design and protocol specification

Scenario: no control points, everything is capture proof.

########Notes by Ronald In 't Velt#######

Q: why isn't TOR + XMPP sufficient for what you want?

Q (R. Bush): What is the threat model?

Martin: ultimately, personal judgement

Kevin Fall: intermixing problems and solutions

use cases

Kevin Fall: responded because DTN was mentioned

?: multiple distribution modalities

separate into 2 problems: 1. transport 2. content

send out anonymously, identified as highly reliable and redistributed

KF: dynamic provenance

distributed reputation systems

multiple not-that-reliable sources adding up

Martin: too big for IETF? IRTF group?

scenarios, threat model, architecture, gap analysis

Lucy: related work going on in W3C