Radio Free Redoubt: 2022 Young Partisan OTP Contest

Radio Free Redoubt recently announced this year’s OTP contest:

YOUNG PARTISANS!  (17 AND YOUNGER) GET READY!

WIN AN OFFICIAL CHRISTMAS STORY COLLECTOR EDITION, 200-SHOT, LEVER-ACTION, REPEATER AIR RIFLE, WITH A COMPASS IN THE STOCK, AND THIS THING WHICH TELLS TIME, FROM THE DAISY MUSEUM!

INCLUDING CUSTOM RADIO FREE REDOUBT LASER ENGRAVING!

We are gearing up for the annual Young Partisan Red Ryder BB Gun Giveaway! (17 yrs old & under) Be sure to listen to the John Jacob Schmidt Show this coming Sunday evening, Dec, 11th, at 8pm Pacific (or the uploaded podcast the following morning) for your chance to enter the drawing!

PLUS, PRIZES FOR 2ND AND 3RD PLACE RUNNER UPS!

===============================================

INSTRUCTIONS:

  1. PRACTICE USING OTPs (instructions and resources linked below in this posting)
  2. Listen to the weekly RFR podcast live, Sunday evening, December 11th, or the RFR Podcast on Podbean uploaded on Monday.   Write down the numbers read by Lady Liberty during the show.
  3. Use the ‘STAR‘ One Time Pad to decrypt the numbers read by Lady Liberty in the radio show.
  4. Use the Conversion Chart (below) to convert the decrypted numbers into letters, revealing the secret message.
  5. The secret message that you will decode IS the password to open the 2022 OTP Christmas Red Ryder Contest Page.  Follow the instructions!  You’ll have SIX WHOLE DAYS to work on decrypting the secret message and getting your entry submitted.  Entries must be received by Saturday, December 17th, midnight (Pacific Time).
  6.  Tune in to the John Jacob Schmidt show (Sunday, December 18th) on Radio Free Redoubt to see if you’re one of the winners!

======================================================

THIS YEAR’S CHRISTMAS ONE TIME PAD (OTP) CONTEST INVOLVES LETTERS AND AT LEAST ONE SPECIAL CHARACTER.

(Scroll down in this posting for practice exercises and One Time Pad encryption resources.)

The 2022 One Time Pad, titled ‘STAR‘, is required to decrypt this year’s secret message.  Save it in a secret place!

Remember, you have to ADD to decode the message.

CONVERSION TABLE YOU WILL NEED FOR THIS YEAR’S CONTEST

Once you correctly add the secret message numbers to the STAR One Time Pad, you will have a set of numbers that you will then need to convert into a message that you can read.  You will need the Conversion Table below to convert those numbers to readable characters.

(the conversion table is always the same)

========================

PRACTICE!  PRACTICE!  PRACTICE!

===== GREAT PRACTICE RESOURCES BELOW =====

The resources below are for practice only, and are separate from the specific 2021 contest instructions at the top of this posting.

Besides the practice exercise below, here is a link to the excellent 2019 practice page, so you can learn how to decode One Time Pad (OTP) encrypted messages:  https://radiofreeredoubt.com/2019/11/21/2019-young-partisan-otp-contest-primer/

=====================================

Here’s another practice exercise that should help you to get ready!

NOTE:  Numbers will not be used in this year’s decoded message, but this practice exercise shows how numbers have been included in previous contests.

Up until this point we have converted letters into numbers and then converted the numbers back to letters using the one time pads and conversion tables. There are times when you will need to send or receive numbers also. Exact numbers are important parts of the message. Times, weights, telephone numbers need to be exact. You can’t guess what the sender probably meant when it comes to numbers. Our conversion table doesn’t even have numbers on it. How do we send numbers accurately?

Numbers are sent by repeating them three times. For example if you wanted to send “123” you would send your message as “111222333” If you were to receive a message of “111222333” you would know that it was meant to be “123”.

In order to prevent confusion and errors, number strings are preceded and ended with the “figure” character which is the number 90 on the conversion table. If you wanted to encode “123” you would use the following: “9011122233390” The “90” alerts you to the fact that numbers/figures are next and when you see the other “90” you know that the numbers/figures are ending.

Let’s practice a short message by using the below One Time Pad Census and the Conversion Table. You receive the following encoded message:

93786 00207 57770 04719 08239 92214

Remember that you add to decode and you don’t carry to the next place. (6+7=3 not 13)

IntelTechniques Chart of Digital Communication Security

A section on Email application security from IntelTechniques

IntelTechniques has a chart they put out last month covering the security of voice, email, messaging, and video applications. Click here to view the page. Some explanations of the terminology used:

E2EE – end to end encryption. E2EE is good to have. If something is encrypted, but not end to end, then at some point in the data’s journey between two end points it is “in the clear” for anyone to view.

Country of ownership is there to indicate the likely laws governing privacy or to investigate how easily a company submits to subpoenas for access to their servers.

14-eyes association is another name for SIGINT Seniors Europe or SSEUR – an association of fourteen countries around the world who all share surveillance data with each other. For example, the US may have a law that makes it illegal to collect surveillance data on a US citizen without a warrant, but they can ask an ally from SSEUR to share that same data with them because it wasn’t collected by the US agency.

Open Source is the name for software where the program source code is available to the public to check (and even modify under conditions of the various open source licenses) for accuracy, security, or other reasons.

Third-party metadata – does the application allow metadata access (such as To, From, Subject, source IP, etc) to any third parties?

Third-party analystics – does the application allow any third party to analyze traffic that passes through the application system?

Ephemeral messages – An ephemeral message is one that can or will disappear from both the sender and receiver devices after some amount of time.

Third-party audit indicated whether the application source code has been audited by a neutral third party for security problems.

I believe that most of the other terms are more easily understood.

Mises Wire: The Government Wants Your Crypto Data. And Lots of It.

Bitcoin Manifesto author Allan Stevo has an article at the Mises Institute about how the government would like to track your crypto transactions, as well as ways that can help anonymize your cryptocurrency use – The Government Wants Your Crypto Data. And Lots of It. Don’t be scared off of cryptocurrency just because governments want to control them. It takes some time and effort to understand and take countermeasures. While governments would have you think otherwise, the money you have earned is yours not theirs.

he Venezuelan government recently announced that its Administrative Service for Identification, Migration and Foreigners (SAIME) is now accepting bitcoin as a payment method for passports.

The problem with that is that bitcoin is not anonymous but pseudonymous.

To interact with any government using bitcoin is to reveal to them the wallet you are paying from. The blockchain is public. When commentators like Caitlin Johnstone and Stefan Molyneux or organizations such as the Mises Institute or TOR Foundation ask for bitcoin contributions, one can follow the money with a blockchain explorer to see how much comes in and how it is spent. One can also see who gave it to them if a donor hasn’t exercised some caution in protecting their privacy.

I would never want the Venezuelan government, the US government, or anyone else who might misuse that information to be able to peek into my crypto finances, especially not through a transaction tied to my passport. Who’s to say that the next time I appear at an immigration checkpoint I won’t be flagged for having too fat of a bitcoin wallet or putting money toward some politically incorrect use?

Though the Venezuelan government dedicates a fraction of the resources to spying on its citizens that the US government does to spying on Americans, there is no need to carelessly provide any government with extra personal data. Knowledge in the hands of the state will be used as a weapon in the hands of the state.

There are plenty of lists of big bitcoin wallets and there are people who make a name for themselves by watching bitcoin move from one account to another. Among them is the US government.

On February 6, 2018, Commodity Futures Trading Commission (CFTC) chairman Chris Giancarlo before the US Senate Banking Committee revealed that the US government uses spot exchanges such as Bitstamp, Coinbase, itBit, and Kraken to glimpse into the industry.

Chainalysis, run by Kraken’s cofounder and former COO Michael Gronager, exists to tie personal identity to bitcoin transactions. Their business model is the reduction of other people’s personal privacy, data that they then monetize by selling it to their customers. Far more sinister than Google or Facebook, which at least anonymize data prior to selling it to advertisers, Chainalysis links real-life personal data, including legal name, to a specific wallet. Many blockchain analysis competitors exist.

Coinbase has recently come under fire for having a similar service, Coinbase Analytics, which has a contract with the US Department of Homeland Security. “Coinbase joins a crowded field of cryptocurrency analytics companies – Chainalysis, Elliptic, CipherTrace and others – vying for a piece of the federal pie. Agencies from all corners of the U.S. government regularly contract with crypto intel firms, inking deals for their tracing software worth millions, and sometimes stretching years,” reports Coindesk.

The bitcoin exchanges that KYC (know your customer) their customers are a perfect place for industry data collection to take place. Coinbase could monetize and simplify that data collection process, not only charging fees for their exchange services, but taking it a step further and monetizing their user data, making their users the product. This is especially pernicious in the privacy obsessed, smaller-government realm of cryptocurrency.

How much money did it take for this $8 billion company to sell out crypto consumers to the US government? Government disclosure shows that the contract has a current award amount of $49,000, with potential for another $134,750 total over the next four years.

Coinbase has reassured users that it is only collecting publicly available data about its users, nothing more, and packaging that for government use. Its CEO, Brian Armstrong, has encouraged users not to use bitcoin if they don’t want to be snooped on by Coinbase, but to use privacy coins instead.

Luckily, the marketplace is responding to privacy incursions like this:

  • There are decentralized exchanges like Bisq that can’t easily be subpoenaed because there is no central entity to subpoena.
  • Additional ways of anonymizing bitcoin purchases exist, such as with cash or through ATMs, which may or may not KYC customers.
  • We are now witnessing the introduction of “privacy coins.” These are designed to be far more difficult to trace—some might even say impossible—though I long ago learned that the word “impossible” is not really that accurate, as possibility or impossibility is merely a question of will and available resources.

This topic of maintaining privacy in bitcoin transactions is especially pertinent as personal privacy comes under attack.

  • US Senators Lindsey Graham (R-South Carolina), Tom Cotton (R-Arkansas), and Marsha Blackburn (R-Tennessee) have introduced the “Lawful Access to Encrypted Data Act,” an antiencryption bill that insists that all encryption without a government back door is illegal. To follow such an order would spell the death of encryption. Any encryption with a back door is not actually encryption.
  • The pseudonymous Scott Alexander of Slate Star Codex was under threat of doxxing by the New York Times and consequently deleted his popular blog out of privacy concerns. The New York Times defended itself by saying it has a policy to identify all people it writes about. Alexander, after a month of silence from the New York Times on the topic, believes the threat has subsided. The callous disregard for privacy remains.
  • Google and Apple are begging governments to let them use mobile phones to monitor the whereabouts of users in the name of the latest cause against liberty—public health.

As journalist Peter Chawaga has pointed out, “Privacy is becoming one of the most scarce resources in the world.”

If these attacks on privacy were without consequence, then perhaps one might feel better about them, but as the current spate of cancel culture demonstrates—from Central Park Karen to Seattle’s middle finger Karen—merely having a camera turned on a person when they’re showing disagreeable behavior can be enough to shatter the fragile lives that many live. There’s almost a sociopathic hunger to destroy a person intertwined in some of this behavior. How much worse would the impact of that mob of sociopaths be if they also had access to all of a person’s financial data?

It’s a great time for more encryption and more privacy, and an awful time for helping governments or any other organization populate databases that you can guarantee will one day be used heartlessly against you.

CSG: Welcome to the Panopticon

Combat Studies Group has a comprehensive article up about choosing a secure chat/messaging application in this time of increasing governmental and corporate excess. It’s a long read, but if you are interested in your privacy you should give it a read. If you don’t understand what he’s talking about, then this is a starting point for your electronic privacy/security education.

Welcome To The Panopticon, or “How I Learned To Stop Worrying And Love Information Warfare”

So it’s 2019……and so far we have:

– Twitter, Facebook, Youtube and the like, de-platforming or censoring any content that leans towards the right or conservative side.

– Amazon, Google, Apple, Microsoft, et al, doubling down on collection of people’s data.

– The US intelligence apparatus convincing major hotel chains (Marriot for one) to collect information and report on hotel guests (for the most trivial of “abnormalities”, if one can call them that).

– Amazon working with law enforcement to implement widespread facial recognition gathering.

– Those nifty DNA/ Heritage testing sites have been caught giving your DNA to Uncle Sam.

– Cellular providers selling your real-time location to anyone who wants to buy it.

– The proliferation of “smart” devices such as Alexa that is always listening.

– Web browsers screening the news you search for and only letting the “leftist” slanted news through.

I could go on for pages and pages, but you get the point. One needs to become aggressive to secure their privacy in this day and age….so with that in mind I thought it apropos to publish an updated breakdown of available options.

Lets establish some standards that should be adhered to when choosing a chat application.

1. It should be comprised of open-source code. Open source code can be audited by third parties for completeness, proper implementation and potential security vulnerabilities.

2. It should employ end to end encryption. In other words, the encryption happens on your device and the decryption happens on the recipient’s device versus a third party server. This removes the need to trust a third party with your keys.

3. It should utilize INFOSEC industry accepted standards for cipher primitives. It should use well studied ciphers, key exchanges and hashes such as: AES-256, RSA-4096, ChaCha20, ECC-512, Curve25519, Poly1305, secp256k1, Curve448, Twofish, SHA-3, Whirlpool, GPG.

4. It should utilize forward secrecy. This protects the user if they have a key that somehow gets compromised. In this setup the system renegotiates the key exchange at short, established time intervals. Diffie-Hellman  is a common implementation of this concept.

5. It should support the removal/destruction of messages on both ends of the conversation. This could be based on a timer, manual selection or a “destroy on read” protocol…

Click here to read the entire article at CSG.

Related:

Technology and Avoiding Censorship