Thursday, May 9. 2013
Posted by cane in Speaker's Corner at 17:24 | Comments (0)
Tracking services are using sophisticated methods to get first-party status for their tracking elements to avoid blocking. The tracking services above are only small examples. Yahoo! Web Analytics sets a one-year, first-party, persistent cookie that includes a unique visitor ID number and is able to track 99,9% of website visitors.
Tuesday, April 16. 2013
Posted by G. Koppen in Speaker's Corner at 09:39 | Comments (4)
In the future the JonDoBrowser shall replace the JonDoFox profile in order to allow an even better protection against tracking on the Web. As the development is already on its way since a while we would like to deliver a short status report every six weeks from now on. That would hopefully give users an idea about where we are now and what still remains to do:
The top 5 things we did during the last six weeks:
1) Worked on the update mechanism (full updates are working on Linux now)
Top 5 things for the coming weeks:
1) Releasing JonDoBrowser 0.7 (scheduled for May 20, 2013)
ToDo for the 1.0-Release:
1) Update mechanism for Windows, Mac OS X and Linux
Wednesday, March 20. 2013
Posted by cane in Speaker's Corner at 13:35 | Comments (0)
More than 80% of Internet user dislike the tracking of their online behavior. But tracking is expanding more and more. Popular Web sites are far more aggressive in their tracking practices.
More Elements on Popular Websites
The project Web Privacy Census of University of California is watching the state of internet tracking and privacy over years. An increasing usage of tracking features was documented. For an example we want to show only the usage of cookies by the 100 most popular websites:
The project observed statistically significant increases in the amount of usage of sophisticated HTML5 features like DOMstorage and other EverCookies for tracking. 38% of popular websites were using EverCookies techniques in Oct. 2012. EverCookies are not easy to manage and remove by users like third-party cookies.
Because it is easy to block third-party content with modern browser more third-party aggregators are working to hide their presence in a first-party site by serving content from what are or appear to be first party servers. This approach makes it very difficult to block tracking scripts by advertising blocker. For an example you may have a look at the easy to use tracking plug-ins offered by Webtrekk for blogs, content management systems and shops.
Some tracking services doesn't use markers like cookies or EverCookies but only browser fingerprinting for surfer recognition. The demonstration project Panopticlick featured out, that more than 80% of browser have a unique fingerprint. The recognition rate increases to 94% if Flash or Java plug-ins were enabled. (How Unique Is Your Web Browser PDF). Tracking services are using more sophisticated methods and achieve 30% higher recognition rates than cookies based approaches. Other tracking services are using browser information, screen size and other values additionally for user recognition.
An increasing number of websites is using more than one tracking service. An example is the webshop Zalando. It uses the following tracking and advertiesment services: 36YIELD, ADSCALE, APPNEXUS, ATDMT, ATEMDA, CRITED, DEMDEX, DOUBLECLICK, FACEBOOK, METRIGO, OPENX, PUBMATIC, ADSERVER, SOCIOMANTIC, YIELDLAB und YIELDMANAGER.
Decreasing number of independent tracking companies
A number of families of domains and tracking services have been created through acquisition of many companies by some global player. The families are sharing collected data and achieve a large coverage of popular websites.
The larges family is Google and associated companies. The earnings of these family are 44% of the world-wide online advertising market. During the last years Google bought the following companies:
Because of this acquisitions tracking features of the Google family are present on more and more popular websites:
Other tracking families are the Overture network, Microsoft and the Yahoo! family, each with a portion of 3-8% of the world-wide online advertising market. The new cooperation of Facebook with BlueKai and Epsilon is the start of a new large tracking family.
Using of Real World Data
The tracking of our online behavior offers only an incomplete view on our interests. First steps are taken by Facebook to include real world data in profiling for proper online advertisements. A cooperation with Axciom and Datalogix was announced in February. Both databrokers operate big databases with real wold data like creditcard payments, loyalty cards at supermarkets and product warranty cards and so on.
If the information flow increased in both direction, our online activities may get more influence of our real live. A year ago Sarah Downey warns:
The harms of online tracking are real and growing. This isn't about targeted advertising, like the ad industry wants everyone to believe. This is about the collection and use of your personal information in ways you can't even imagine.
Today our online activities may decide about getting a new job or may have an influence on assurance taxes. Personally I know 3 cases of including private online activities to check job applicants by personnel managers. In one case the result was positive. In two cases the applicants were rejected mainly (but not only) because of this data.
Wednesday, February 20. 2013
Posted by cane in Speaker's Corner at 21:13 | Comments (0)
Auf einem Polizeikongress finden die Teilnehmer ein dankbares Forum, um neue Überwachungsbefugnisse zu fordern. Zentrales Thema auf dem 16. Europäischen Polizeikongress war die Wiedereinführung der Vorratsdatenspeicherung (neudeutsch: Mindestspeicherdauer). Herausragende Gedanken äußerte BKA Vizepräsident J. Maurer: Jeder Bürger müsse eine neue Sicht auf das Internet verinnerlichen und eine Speicherung von IP-Adressen sei nicht problematisch, weil:
Wer im Internet ist, hat die Privatheit verlassen.
Diese pauschale Sichtweise würde eine Aufhebung des Post- und Fernmeldegeheimnis für E-Mails und sonstige private Kommunikation im Internet bedeuten. Das Post- und Fernmeldegeheimnis wurde nach den Erfahrungen mit der faschistischen Dikatur Mitte des letzten Jahrhunderts als Grundrecht in allen übergeordneten Normenkatalogen verankert (UN-Menschenrechtskonvention, EU-Grundrechtecharta, Grundgesetz), als Schutzrecht für Bürger gegen einen übermächtigen (Polizei-) Staat. Für mich stellt sich die Frage, ob Herr Maurer die geeignete Einstellung hat, um verantwortungsvoll die Führung einer Polizeibehörde mit weitreichenden geheimdienstlichen Kompetenzen zu übernehmen.
Ein weiteres Beispiel für den Geist des Kongresses war der starke Beifall für den nordrhein-westfälische Innenminister R. Jäger, als er die Haltung von Bundesjustizministerin Leutheusser-Schnarrenberger als "nah an einer Strafvereitelung" bezeichnete. Die Bundesjustizministerin hält eine Mindestspeicherdauer von sieben Tagen für IP-Adressen und Quick Freeze für Verbindungsdaten für ausreichend (siehe Eckpunktepapier des BJM zur VDS, PDF). Außerdem ist für Frau Leutheusser-Schnarrenberger Anonymität ein Grundprinzip des freien Internets.
Medial begleitet wurde der Polizeikongress mit Horrorgeschichten über drohende Terroranschläge per E-Mail oder die schlimmen Folgen fehlender Vorratsdatenspeicherung für die Aufklärung von Mordfällen (FAZ). Der Bundesdatenschutzbeauftragte bezeichnete den FAZ-Artikel als unredlich.
Kein Sprecher auf dem Polizeikongress konnte neue Fakten oder Studien präsentieren, welche die Notwendigkeit der Vorratsdatenspeicherung wissenschaftlich belegen. Zur Erinnerung:
Sicherheitspolitiker aller Ebenen sollten mehr Respekt vor Grundprinzipien unserer Gesellschaft zeigen, statt nicht-diskussionsfähige Maximalforderungen zu präsentieren.
Monday, January 28. 2013
Posted by cane in Speaker's Corner at 13:33 | Comments (11)
Hushmail.com enjoys a good reputation for privacy friendly e-mail services or years. The EFF.org recommended in the tutotial about anonymous e-mails accounts only Hushmail.org (Don't be a Petraeus) and the German Journalist P.Beuth wants to publish a tutorial for anonymous e-mail accounts by using Hushmail.com next days in the online newspaper ZEIT.de.
JonDos does NOT recommend Hushmail.com
The stored records are not deleted when you cancel your account.
Recommended e-mail provider
A small list of recommended e-mail provider you may find in our online help about anonymous e-mail accounts with Mozilla Thunderbird. You may send us your recommendations by using our contact form and we will add it after checking the service.
Wednesday, December 19. 2012
Posted by cane in Speaker's Corner at 17:18 | Comments (2)
In April 2012 the security scientist Pete Swire published a paper about trends in lawful surveillance. Intelligence services and law enforcement agencies are seeking access to stored data in the cloud and on private computers because wired interception of telecommunication is less effective.
With a new drafted law (BR-Drs. 664/12) the German government is taking a leading position in this development. For the future intelligence services and law enforcement agencies may have warrant-less access to passwords of e-mail accounts and cloud-stored data, PIN codes of smartphones and to the TR-069 interface of routers provided by Internet access provider for customers. Provider with more than 100,000 customers have to offer automated interfaces for lawful access. Smaller provider have to answer a request within 6 hours. All providers are not responsible in case of unauthorized access to user-related telecommunication data.
The German Pirate Party commented:
"This draft is not supported by constitution." (Patrick Breyer, MDL)
JonDonym storage grid
We are going for development of new services to keep your data private. For premium users we offer a storage grid, which does not have all the comfortable features of DropBox and is only accessible by webinterface (at the moment). But it implements some great security concepts:
Monday, December 10. 2012
Posted by cane in Speaker's Corner at 13:39 | Comments (3)
The project SSL Pulse tracks nearly 200,000 high profile web sites from the Alexa top one million site list and evaluates their SSL implementation. Only 10% of all sites are genuinely secure.
We want to give some small recommedations for webmaster to improve the security of HTTPS encryption. All sample configuration snippets are working for Apache2, but you may adapt it for other web servers too.
Create a SSL certificate
At first you have to create the SSL certificate and get a signature by a certification authority (CA). You may use checkdomain to get a signed certificate.
All CAs offer a comfortable webinterface to use your browser of all steps of the certificate creation process. We do NOT recommend the use of website wizards. You do not have full control over the creation of your private key. You may use the OpenSSL library to create at first the private key and a certificate signing request (CSR) afterwards on your computer:> openssl genrsa -out my.key 2048
> openssl req -new -key mein.key -out my.csr
Now you can send only the CSR to the CA and you will get the signed certificate (CRT) back.
Enable SSL encryption in your server configuration
To enable SSL encryption you have to load the module "ssl" and add the following lines to your virtual host configuration for port 443. The certificate chain file is only required time by time, please read the documentation of you preferred CA and download the bundle if required.SSLEngine On
Restart your web server and SSL encryption is working. But SSL is a complex standard and contains may insecure features.
Security is a process and not an one-time action. Check your server time by time with the SSL server test for new vulnerabilities and fix it as soon as possible.
Thursday, November 29. 2012
Posted by cane in Speaker's Corner at 20:51 | Comments (3)
The EFF.org evaluated the investigation of FBI in the personal lives of CIA Director David Petraeus, Paula Broadwell, Jill Kelly and General John Allen and published A Tutorial on Anonymous Email Accounts.
Friday, November 2. 2012
Posted by cane in Speaker's Corner at 15:28 | Comment (1)
On July 06, 2012 US-President Barack Obama signed the executive order Assignment of National Security and Emergency Preparedness Communications Functions. It empower certain governmental agencies with control over telecommunications and the Web during natural disasters and security emergencies and authorized the DHS to seize private facilities when necessary and effectively shutting down or limiting civilian communications. It may be possible to disconnect private-sector computers from the Internet to keep Federal Government communication running.
You can see the feeling of a regional internet "blackout" in North America this week. On October 26 some US-router went down. The consequences were significant trouble in internet traffic. Internet Traffic Report reports that Asian and North American packet loss has jumped to an average 30-35%, compared with 9% for Europe and 0% each for South America and Australia. The volume of traffic went down by 5-10% for North America at all (USA, Canada, Mexico). Many people are barely able to connect to the network.
Fife days later on November 01 the New York main router was back in service. The volume of traffic increases (but did not reaches normal values) and the value of "packet loss" went down on November 01, 2012.
On November 02 the first router in New Jersey was back in service. The volume of traffic and the value of "packet loss" reaches normal values.
May be in this case the US government is not responsible for the local blackout. The Content Delivery Network Akamai reports that internet-based attacks are up 50% over average on October 26, 2012. The US east coast was a highest volume region.
No independent analysis of this "blackout" was published at the moment in our knowledge. But it seems the losses arising from Sandy were mainly responsible for the local blackout.
Friday, October 26. 2012
Posted by cane in Speaker's Corner at 17:50 | Comments (2)
Telecommunications carriers and manufacturers of telecommunications equipment are required by law to conduct electronic surveillance for law enforcement and intelligence agencies. In United States the Communications Assistance for Law Enforcement Act (CALEA) wiretapping law passed in 1994. In Germany a similar law was adopted 1995 by German FEDs' initiative (it was replaced in 2002 with the Telekommunikations-Überwachungsverordnung (TKÜV)) and other countries adopted similar laws too.
Since 2005 CALEA applies to Internet access providers and providers of Voice-over-Internet-Protocol (VoIP) services with interconnections to the public switched telephone network like Skype.
Encrypted Voice-over-IP without backdoor
To answer the Total Information Awareness Project of the US administration's and other surveillance projects some nerds develop secure Voice-over-IP networks.
It is NOT possible to use JonDonym or Tor for anonymisation of Voice-over-IP calls.
Wednesday, October 3. 2012
Posted by cane in Speaker's Corner at 12:26
Tuesday, October 2. 2012
Posted by cane in Speaker's Corner at 15:14 | Comment (1)
Iran gouvernment censors many internet services like Youtube, Twitter, Facebook... for several years. Websites of anonymisation services like JonDonym and Tor are blocked too. But the censorship is not effective like the "Great Firewall", many people are using anti-censorship services, thousands of Irani people are using Facebook accounts...
Email services like GMail, Yahoo and others are not blocked in generally. But time by time the HTTPS encryption is attacked or blocked. In Februar 2012 Iran gouvernment blocks all HTTPS connections to avoid protests at the national holiday.
In the last days from 09/24 to 09/30 all HTTPS connections to Google services were blocked. Iran gouvernment asked Google to remove an anti-islamic video from Youtube. Such removel requests by governments are common. Google rejected and the Iran telecommunications ministry committee used it for a reason to block all Google services. After a few days Gmail access was restored.
"We wanted to block YouTube, and Gmail was also blocked, which was involuntary." (Iran's telecommunications ministry committee)
GMail is very popular in Iran (more than Yahoo and others) because of security reasons. A year ago it was possible to detect a high quality man-in-the-middle attack to Google services and other websites by Google users. Other webservices doesn't detect the attack.
The Iran censorship and surveillance infrastructure is discussed at all popular media. But very less attention is spent to the opposite, the blocking of Irani users by internet service like Google App Engine or the prohibition of Skype usage because of western sanctions. The US gouvernment spends $100 million for the project The Internet and Human Rights to develop an anti-censorship software exclusively for Irani people but it is blocking the usage of modern communication technologies in Iran by sanctions. What makes the difference?
Together with Iran censorship measures the plans of a "halal" internet (a separate internet only for Iran) are dicussed all times. At the moment in a first step gouvernment agencies and business companies cut of the connenction to the global internet. As far as we know it may take up to 1-2 years to prepare the "halal" internet for normal users. But the "halal" internet may not replace the internet at all. It may offer a secure and easy to use alternative. This may lead to a dilemma for Irani people. The gouvernment pretensions to seize communication surveillance are well known and easy to implement in a national internet. But the risks because of the internet based cyberwar against Iran are real too and used by the gouvernment to promote the "halal" internet. After Stuxnet, Flame and Duqu a new clone Gauss was discovered in August and now 3 new Stuxnet variants were discovered by Kasperky, CERT-Bund/BSI and Symantec, one of them "in the wild" in Iran and Sudan.
Update: The paper The Hidden Internet of Iran by C. Anderson documents the usage of the private IP addresse area 10.0.0.0/8 for domestic proposes to build an national "darknet" of Iran. Some services are running now like Iran.ir (National Webmail Service) with IP address 10.8.12.18.
Sunday, September 30. 2012
Posted by cane in Speaker's Corner at 12:23 | Comments (0)
The EU sponsored Clean IT project is supposed to develop ideas and recommendations which help banning "terroristic" content out of the Internet. EDRi has leaked an internal discussion paper which shows where the recommendations are heading to. For instance, the following actions are proposed together with an operating schedule:
According to the view of the members of the Clean It project anonymity on the Internet does first and foremost help terrorists. Using online services anonymously is not necessary for ordinary citizens:
Terrorists (and other criminals) profit from the anonymity that large parts of the Internet offer. Even though anonymity to other users is logical and desirable for some Internet services, for many it is not a necessity. (see: project website)
The 69th German Legal Associations's Meeting (Deutscher Jusristentag) in Munich (Germany) came to similar conclusions and is recommending appropriate measures to the German lawmakers disposing anonymity on the Internet.
We must not acknowledge a "right to use the Internet anonymously". While using the Internet actively producing own content a user must not stay anonymous but must at least be identifiable if pseudonyms ar deployed. (page 24)
Furthermore the Legal Association's Meeting recommends introducing the retention of telecommunication data (aka Vorratsdatenspeicherung) at least for 6 months and the federal trojan horse (Bundestrojaner) means of law enforcement.
Does anonymity protect "terrorists" only?
Data miner on the Internet compile comprehensive user profiles. In order to do so surfing habits, email communication, publications in social networks and the Web 2.0 are analyzed. These data collections can have a tremendous impact on the life of ordinary citizens.
Sarah Downey (Senior Privacy Strategist) is warning about the growing harm due to data collections. These data can decide whether you get a loan, a contract for your mobile phone or a job. Public health insurance companies are cutting benefits due to publications in social networks and identiy theft based on information found on the Internet is a rapidly growing delict.
The Federal Commissioner for Data Protection, Peter Schaar, commented the discussion regarding a need for real names on the Internet already half a year ago:
Given the very detailed data available on the Internet and the more and more effective mining capacities the option to use the Internet anonymously or pseudonymously today is more important than ever.
The significance of anonymity for basic human rights like freedom of expression or freedom of the press (protection of sources) has been emphasized many times and Federal Minister of Justice, Sabine Leutheusser-Schnarrenberger, said in her key note on the 7th International For..Net Symposium in Passau (Germany):
Banning anonymity and pseudonymity on the Internet would thus mean to silence exactly those minority opinions which constitute a liberal, plural societyin the first place---and were therefore in Germany under constitutional law highly problematic.
Thursday, August 23. 2012
Posted by cane in Speaker's Corner at 14:31 | Comment (1)
During the last month we implemented some new payment methods to buy JonDonym premium traffic in our webshop. Now it is possible to pay per Liberty Reserve, cashU, Pecunix and Bitcoin. Most payment methods are only available in our webshop and will be not supported by the JonDo build-in payment. Some other payment methods were rejected after evaluation (OKPAY, Dwolla and Stripe) because of a very small user base or the requirement of an US bank account.
Some user reported problems using Paysafecard for anonymous payments. We tried to become an accepted UKash merchant too. It was rejected by UKash without comments. A few weeks ago UKash published a new Merchant Acceptance Policy and the reasons are now clear:
Ukash will not under any circumstances knowingly approve Merchants associated directly or indirectly with the following products or services:
Anonymous payment for small amounts becomes more and more difficult. At first prepaid cards are affected at the moment:
We collected some hints for anonymous payment in our online help with advices for a smooth and anonymous deployment of paysafecard cash codes and anonymous using of Bitcoin.
In the long term running Bitcoin may offer a possibility for anonymous payment. But Bitcoin is not anonymous by default. Researchers published an analysis of Bitcoin anonymity at the 28C3. It was possible to connect Bitcoin accounts and discover the IP addresses of payments. Because the function of Bitcoin is based upon internet traffic you may stay anonymous by using services like JonDonym (see our online help). Understanding of the usage of Bitcoin may be a more and more useful investment for the future (in our opinion).
Friday, July 13. 2012
Posted by cane in Speaker's Corner at 19:06 | Comments (3)
Because of some confused discussions in our forum about e-mail usage we want to outline the recommendations of JonDos GmbH.
Webinterfaces of mail providers
Using a webinterfaces for e-mail communication is not the recommended way.
Use an email client
We only recommend Mozilla Thunderbird. There are some other nice e-mail clients available too. But because of limited resources we can not gather recommendations for other e-mail clients. A tutorial for a secure Thunderbird configuration you may find in our online help: Anonymous e-mail accounts with Thunderbird .
If you were using anonymisation services like JonDonym or Tor you have to set some more configuration values to hide your prefered language, your regional provenance, your local IP address and the software you are using. Do NOT use the account creation wizard! It will leak your real IP address because of a serios bug in Thunderbird. To create a new account you have to start Thunderbird with "Work offline".
We know, it is not easy for beginners to setup a secure Thunderbird configuration. Together with TorProject.org we are going for a simple to install Thunderbird-XPI called TorBirdy. At the moment only a very early pre-alpha release is available (for testing purposes only!). We want to invite developers to support TorBirdy to make it ready as soon as possible.
(Page 1 of 6, totaling 80 entries) » next page
Free Trial for Premium Services
Georg Koppen about JonDoBrowser 0.6 - Status Report
Mon, 29.04.2013 09:54
Ja, der Wartungsaufwand steigt , aber wir hoffen, der Support aufwand sinkt und die Si [...]
Georg Koppen about JonDoBrowser 0.6 - Status Report
Mon, 29.04.2013 09:43
Auf Java kann in absehbarer Ze it nicht verzichtet werden, le ider. Die Integration br [...]
basil about JonDoBrowser 0.6 - Status Report
Tue, 23.04.2013 18:55
Jondofox wird es, wenn der ers te Satz im ersten post umgeset zt ist, nicht mehr geben [...]