Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

China's Conquest of Internet, ICANN + Quantum Encryption
FR research, please share w. others | Arthur March

Posted on 09/24/2016 9:40:29 AM PDT by Arthur Wildfire! March

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-118 next last
To: null and void; palmer

BBC experiments with holographic TV...
http://www.mirror.co.uk/news/uk-news/could-holographic-televisions-next-big-8897419

The brain drain begins to shift out of the USA.

Why bring cutting edge tech to the US when we keep getting hacked? It’s too hazardous for innovators.


61 posted on 09/25/2016 2:49:55 AM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 60 | View Replies]

To: Arthur Wildfire! March
Let me see if I have it right: currently any domain name owner can go to his TLD and get numerous IP addresses, a number sequence that works the same as his domain name.

So we punch in ‘39643’ [in the web address box] and go to china_dissident.com for example.

It's not quite that easy and not free. If I were going to run the web servers for some Chinese dissidents I would get a $5 / month virtual server at digital ocean, plus backups at other hosting sites. Those usually come with one "free" IPV4 address (you are paying $5 / month for disk space and bandwidth). The lowest tier server at $5 / month would have more than enough bandwidth and storage for the content. Then I would get that IPV4 address into the hands of the dissidents through some other channel.

There is also a free option provided I have a routable IPV6 address. In that case I could route the dissidents to a server at work with an IPV6 address. Wouldn't cost me anything. Some people can do that with their home service providers.

But there is a catch with both of those solutions, IPV4 or IPV6. We would probably quickly end up on a Chinese government blacklist of addresses. The Chinese government may disallow routing to IPV6 somehow (I have no idea) preferring to stay on IPV4 because it's easier for them to track and control. To counter the blacklisting I would have to not only obtain new addresses all the time (clunky at best) but get those addresses into the hands of the dissidents.

The solution for all of those problems is TOR. But TOR brings its own problem which is that it is full of illicit or illegal content and just plain old crap. The Chinese government is not stupid so they will create TOR sites and fill them with bait that might catch dissidents. There's no authentication with such sites, at least no central authentication. Here's a description of what one guy found within China: https://krypt3ia.wordpress.com/2015/06/17/the-chinese-darknet/ It gives you a flavor although it doesn't describe TOR itself.

If I ran a TOR relay on my $5 virtual server it would quickly max out my allocated bandwidth (and probably storage). I would have to configure it to greatly throttle it. Since I can't really know what is passing through I can't just throttle the crap and illegal stuff. Also I don't know enough about it to do that, not to mention I would get pinged with guilt by association and potentially tossed by my provider.

I guess I could also run a normal web server and try to get dissidents to access it via TOR thus circumventing the Great Firewall of China which banned by IP addresses. But I would have to figure out how to get that address out to the dissidents without interference by the Chinese govt within TOR. I definitely do not know how much they interfere or how, but I can't believe they do not do that.

All that said, the internet will gradually evolve to incorporate easy-to-use anonymity and encryption. Bitcoin is a good example. It doesn't have enough bandwidth to get much content to the dissidents but it could at least send tweets or short addresses (either as domain names or IP addresses) to dissidents who know that they are there and know how to decrypt them. I have a lot of experience with that particular tech so i could definitely vouch that it is doable with the caveats that you have to pay for every message via a bitcoin transaction and you have a limit of maybe 20-40 bytes of data per message.

62 posted on 09/25/2016 5:26:52 AM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 58 | View Replies]

To: Arthur Wildfire! March
I am AMAZED that China, being as advanced as it is with encyrption/decryption, still has that kind of thing going on.

Because everything I described in my previous comment can be done with 20 year old non-advanced encryption and cannot be thwarted by any advanced encryption (or quantum anything).

However, if ICANN subjects a TLD to a new “Registry Operator Code of Conduct” [due to a new globalist contract that favors China of course], that backdoor could be slammed shut.

Because things like TOR are independent of TLD operations. Like I said in my previous comment, I get my server and IP address from digital ocean, and they and I don't have to deal with any TLD operators. We are not subject to any ICANN rules except indirectly and if those rules were stupid we could ignore them (but that would turn the internet into a nameless mess, see below).

Otherwise, China has a cassis belli to escalate cyber-attacks.

They use that excuse already. They are constantly at war against tech like TOR because they say (correctly) that it is full of illegal content. The current and coming cyberwars use TOR already. They use illegal botnets set up on ordinary people's computers that got hacked. The entire dark web is a giant mess because it is not under anyone's control and the criminals like it that way.

When you think about your scenario, China taking over ICANN, think about it this way: Look up how people try to access the dark web and sift through all the crap to get what they want. Read the link in my previous comment. I can barely figure out what he is doing and how he is going about it and I am an internet geek. Imagine if everyone had to do that instead of typing "ford.com".

63 posted on 09/25/2016 5:36:40 AM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 58 | View Replies]

To: palmer

So basically, the IP addresses need above-board agreements, and if the TLD is in a totalitarian jurisdiction, that could be put to a stop.

[Thank you so much for the time!]


64 posted on 09/25/2016 5:41:29 AM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 62 | View Replies]

To: Arthur Wildfire! March; Gideon7; The Westerner
So when NSA got hacked, all legal US algorithms [required to register them] might have been copied by the hackers then.

Doubtful. Also anyone who develops their own encryption is stupid. No offense to you, AW!M, but your encryption is much much much easier to break than any known encryption algorithm,. The analysts would use information theory, entropy, and other concepts and quickly figure it out.

There is a truism with encryption that people need to realize. Against a determined and smart adversary it is much easier for them (in your case much much much easier) to figure out the algorithm than to reverse engineer a key with a legitimate know algorithm. In fact what most attackers do when faced with encryption is try to hack beneath it and find the plaintext before it gets encrypted.

Here's a simple example. You connect to your bank with HTTPS. My goal is to insert a new destination bank account into one of your transactions so I can get the money instead. I tap your connection. Can I break HTTPS and figure out the key? No way. Can I insert new content into that connection? Even more difficult.

Instead I would try to get you to connect to a fake version of your bank. Or even easier I would try to get you to connect to a "free stuff" website and install some malicious app on your computer and insert the account into the message right before it gets encrypted and sent to your bank.

People don't break encryption unless they are the NSA (and probably China) and they only would do that for extremely high value targets and even then it is going to take time and resources. If you were such a high value target and used the encryption you described, or even something 100 times better, your adversaries would thank their lucky stars that you did that instead of using AES256.

65 posted on 09/25/2016 5:47:22 AM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 59 | View Replies]

To: palmer

[Your posting about Tor made me reach. Thank you.]

[this was a 2013 report]

China DDoS attack shows not all TLD servers equally secure
http://www.csoonline.com/article/738803

The distributed denial of service (DDoS) attack that took down a portion of China’s Internet over the weekend demonstrates that the strength of the global network varies greatly across domains.

Servers running China’s “.cn” top level domain (TLD) came under attack Sunday starting at about 2 a.m. Eastern time. The China Internet Network Information Center, which runs the TLD servers, confirmed the attack and apologized to affected users.

The organization said it was working to “enhance the service capabilities” of the system, but did not provide any more details.

[snip — more on followup posts to all]


66 posted on 09/25/2016 5:47:28 AM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 63 | View Replies]

To: All

[more reg. above ...]

MORE ON CSO: How to spot a phishing email

CloudFlare, which provides security and performance services to more than 1 million websites, found that .cn suffered a limited outage that lasted between two and four hours. A drop in server performance by as much as 32 percent compared to 24 hours earlier caused the down time.

CloudFlare’s Chief Executive, Matthew Prince, said on Monday that the CINIC would likely have to make its infrastructure “substantially beefier.”

“Obviously, an attacker has shown that there is some bottleneck,” he said.

Arbor Networks, which also protects websites against DDoS attacks, said the .cn servers had to contend with traffic that was four times higher than average. The attack also appeared to go on into Sunday afternoon.

“A serious attack was carried out,” said Dan Holden, director of security research at Arbor.

During the bombardment, not everyone heading to a website using the .cn domain would have been shutout. That’s because Internet service providers temporarily hold website IP addresses in caches to avoid querying a TLD server for each website every time.

[In-depth: 7 essentials for defending againts DDoS attacks]

However, if the attack had gone on for 24 hours, then more websites would have been affected gradually, since caches are routinely purged after a number of hours.

“Had it gone on longer than 24 hours, then literally no .cn domain would likely have been able to be reached,” Prince said.

The fact that China’s TLD servers would take a hit in a DDoS attack is surprising, given the overall sophistication of the country’s Internet capabilities. The country has one of the most sophisticated Internet filtering systems in the world, and is credited with mounting some of the most advanced cyberespionage campaigns to steal corporate and government secrets from other countries.

If the CINIC stumbled against an attack, how would the many smaller TLDs expected to launch soon across the Internet stand up?

In 2011, the Internet Corporation for Assigned Names and Numbers (ICANN) ended most restrictions on generic top-level domains, such as .com, .net and .biz. As a result, companies and organizations will eventually be able to choose their own gTLDs.

The first batch of ICANN-approved generic domains is expected to be operational by next month. Experts expect as man as 1,000 new gTLDs over time, with most of them reflecting names of companies and products and cities. There will also be more generic names, such as “.bank” and “.sport.”

The attack on .cn is a reminder that if a country code TLD can be crippled, then users of generic TLDs should make it a point to check the infrastructure of the organizations running the domain name registry underneath.

“The more obscure the TLD, the more likely they have less infrastructure to protect themselves,” CloudFlare’s Prince said.


67 posted on 09/25/2016 5:48:57 AM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 66 | View Replies]

To: Arthur Wildfire! March

The IP addresses require peering agreements among all the interconnected service providers. The simplest case is that my Digital Ocean provider tells your internet provider how to route to my IPV4 on the server they provided to me. Then I type that IPV4 into a comment here. Then you type that address into your browser and we are done, and there’s no real TLD or ICANN involvement.


68 posted on 09/25/2016 5:52:13 AM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 64 | View Replies]

To: Arthur Wildfire! March
http://www.csoonline.com/article/738803

Great find, thanks. Even though that attack against them, that's a great example of what they try to do to the rest of us if they were able to undermine the TLD system and desired to attack.

69 posted on 09/25/2016 5:56:01 AM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 66 | View Replies]

To: The Westerner

“Didn’t Wikileaks hack their emails? “

Not aware of that, but if they did it was because they didn’t use proper protocols.

Hacking isn’t black magic whereby they can hack anything if someone just puts a gun to their head and gives them 30 seconds, like in the movies.

Hacking merely takes advantage of vulnerabilities built into a system or systems where users fail to follow proper protocols.


70 posted on 09/25/2016 8:30:21 AM PDT by CodeToad
[ Post Reply | Private Reply | To 52 | View Replies]

To: palmer

“Our algorithms are not secure because no one knows them. Heck, we could publish them and they would still be secure. We don’t publish them because we don’t want our enemies to use such good stuff.

That is completely incorrect. Here is AES, made 100% public

You actually supported my point, but missed my second point altogether.


71 posted on 09/25/2016 8:31:54 AM PDT by CodeToad
[ Post Reply | Private Reply | To 53 | View Replies]

To: palmer

Thank you for your patience. I’m really, really glad there are workarounds that can bypass TLDs.

Like you said, it would be chaos.

I’m just now loading info about ‘digital ocean’.

One thing — China is attracting a lot of unicorn companies ...

“Lin estimates that more unicorn firms are likely to appear in service fields including big data, cloud computing and mobile health.”

A total of 70 unicorns out of 173 [unless this is sheer propaganda from China]

http://www.chinadaily.com.cn/china/2016-03/02/content_23703670.htm

What makes this worse is that Chinese tech talent is not as eager to work for Western employers. As they learn on-the-job more and more of them would prefer to leave their Western employers and start working for a true Chinese employer instead.

[Brain drain pole flipping]


72 posted on 09/25/2016 8:35:46 AM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 63 | View Replies]

To: palmer

Well, I’m veering too far off my main political ressearch because you make it all so very intereting!

God bless you. Thank you for the time.

FRegards ....


73 posted on 09/25/2016 8:47:39 AM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 65 | View Replies]

To: palmer

But by all means, your posts are enriching this thread!

So if you want to post more here, that is outstanding!


74 posted on 09/25/2016 8:49:04 AM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 69 | View Replies]

To: CodeToad

I realized I must have missed something, like we are not talking about the same kinds of algorithms. Can you make your point again please?


75 posted on 09/25/2016 8:57:07 AM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 71 | View Replies]

To: Arthur Wildfire! March
Ultimately everything is political. The geeks who started and used to run the internet were apolitical, mostly libertarian. Now the internet is run by big companies run by liberals with a few exceptions like Peter Thiel. They are in bed with the liberal media. I know a pure liberal who has an important internet job and tries to influence elections. I last talked to him in 2012 and it was disgusting. They pretend they are just making the internet easier.

For example searching for Trump lies gets lots of dedicated anti-Trump sites. Searching for Hillary lies gets articles from the Washington Post, politifact and other liberal sources mixed with a few genuine anti-Hillary sites. This is all by design but they are clever enough to never have any algorithm directly biased against Trump or against conservatism. They do it all indirectly.

For example think about the characteristics of the old media (e.g. types of ads, incoming links, outgoing links, etc) versus the new media. If they can bias results to bring up more old media hits that will benefit Hillary.

76 posted on 09/25/2016 9:10:41 AM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 73 | View Replies]

To: palmer

Appreciate your giving an easy to understand example of how hackers work with easy targets.


77 posted on 09/25/2016 9:46:35 AM PDT by The Westerner (Will Free Republic exist when ICANN controls the web?)
[ Post Reply | Private Reply | To 65 | View Replies]

To: Arthur Wildfire! March

This is an excellent Thread! I think it should be sent to the Trump campaign...Mr. Trump is against the Internet transfer! He supports the PROTECTION OF INTERNET FREEDOM ACT and has many concerns about China’s dominance in various industries.


78 posted on 09/25/2016 9:59:59 AM PDT by Freedom56v2 (Election is about National Sovereignty, Liberty, and Freedom for future generations)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Arthur Wildfire! March

WAIT! You are saying CHINA IS BUILDING A COMPOUND TO HOUSE ICANN - even before Congress has voted???!?!?!
_______________________________________

From article:

And the Chinese already enjoy raw power. Their encryption is superior, their nuclear capability suffices, and they are now experienced at cyber warfare.

Compare that to the US — NSA recently got hacked. That was supposed to be the best encrypted, best protected agency in our nation. Imagine if all of our satellites got simultaneously hacked. We would be blind and appear weak in the eyes of the world.

International Law

The reason CHINA IS BUILDING A COMPOUND a compound to welcome ICANN is international legitimacy. Other tyrants seeking to censor online speech can seek a shiny new contract with Obama’s Free Range ICANN.

Bluntly stated: ICANN helps China build a large alliance to alienate the USA if it comes to a full-scale ‘cyber-war’.


79 posted on 09/25/2016 10:40:47 AM PDT by Freedom56v2 (Election is about National Sovereignty, Liberty, and Freedom for future generations)
[ Post Reply | Private Reply | To 1 | View Replies]

To: The Westerner

Brilliant, original thinking by our own Artthur Wildfire! March.


Indeed! This needs to go to Trump campaign...National Security interests at risk as well as commerce and freedom of speech!


80 posted on 09/25/2016 10:43:24 AM PDT by Freedom56v2 (Election is about National Sovereignty, Liberty, and Freedom for future generations)
[ Post Reply | Private Reply | To 7 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-118 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson