Presented by:

Seth Schoen is a Senior Staff Technologist at the Electronic Frontier Foundation in San Francisco, where he has worked for over 17 years. As the first Staff Technologist at EFF, Seth has helped attorneys and the public understand technology as it relates to litigation and public policy. He has published research on computer forensics, exposed Internet service provider misbehavior, and developed privacy software. He has testified before three Federal regulatory agencies and in several courts, trained judges in Latin America, and spoken in more than 10 countries.

Seth has been a speaker at several previous editions of LinuxFest Northwest.

With the political conflict over encryption back in full swing, governments of several countries are pushing the idea that developers of communications apps should have to modify them, on government request, to include backdoors or various ways of getting around encryption. This poses a disturbing challenge for free software developers.

One recent suggestion from the British government calls for making developers support a "ghost user" who can join your encrypted conversations invisibly. While proponents argued that this would require only the most minimal of software changes, we were skeptical of how undetectable the ghost would really be. We've been exploring this question with a few reverse engineering tools and we think that the likeliest answer is that the most straightforward forms of the ghost concept may be quite detectable indeed.

I'll discuss the history and status of this issue, and a few ways that we think reverse engineering tools undermine the governments' suggestions.

Date:
2019 April 28 - 12:30
Duration:
45 min
Room:
G-103
Conference:
LinuxFest Northwest 2019
Language:
Track:
Security
Difficulty:
Medium

Happening at the same time:

  1. Your Herd of Elephants: PostgreSQL Replication
  2. Start Time:
    2019 April 28 12:30

    Room:
    HC-103 Postgres

  3. Live Coding Minesweeper in Clojurescript
  4. Start Time:
    2019 April 28 12:30

    Room:
    CC-115

  5. Deep Dive into firecracker-containerd
  6. Start Time:
    2019 April 28 12:30

    Room:
    CC-200

  7. Zero Knowledge Architecture, is it possible?
  8. Start Time:
    2019 April 28 12:30

    Room:
    CC-114

  9. When NoSQL isn't enough, but SQL is too much
  10. Start Time:
    2019 April 28 12:30

    Room:
    CC-208

  11. Ghostbusting
  12. Start Time:
    2019 April 28 12:30

    Room:
    G-103

  13. From Analog to Digital and Back
  14. Start Time:
    2019 April 28 12:30

    Room:
    CC-236

  15. Creating a Stronger Community by Poisoning Your Own Well
  16. Start Time:
    2019 April 28 12:30

    Room:
    HC-104 Jupiter

  17. Common licensing issues for free software projects
  18. Start Time:
    2019 April 28 12:30

    Room:
    HC-108

  19. Hugo: Making Building Websites Fun Again
  20. Start Time:
    2019 April 28 12:30

    Room:
    CC-201 Tutorials

  21. Snapcraft Workshop
  22. Start Time:
    2019 April 28 12:30

    Room:
    CC-202 Tutorials

  23. FreeBSD is Everywhere
  24. Start Time:
    2019 April 28 12:30

    Room:
    CC-235