Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Assange ally Ola Bini charged in Ecuador following airport arrest
The Washington Times ^ | Saturday, April 13, 2019 | Andrew Blake

Posted on 04/13/2019 8:01:09 PM PDT by palmer

Ecuador on Saturday revealed criminal hacking charges against Ola Bini, a computer programmer with ties to recently arrested WikiLeaks founder Julian Assange.

“The State Prosecutor General’s Office filed charges against a Swedish citizen, aged 36, for his alleged participation in the crime of assault on the integrity of computer systems,” the agency said in a statement. The announcement did not mention Mr. Bini by name, but it followed reports that he was ordered held for investigative purposes after being detained at a Quito airport Thursday within hours of Ecuador ejecting Mr. Assange from its London embassy.

“It’s up to the justice system to determine if he committed a crime,” Interior Minister Maria Paula Romo told Ecuadorian media Friday. “But we can’t allow Ecuador to become a center for piracy and spying. That period in our history is over.”

Mr. Bini had visited the WikiLeaks publisher at the embassy roughly a dozen times during the last few years, claimed Ms. Romo. She said that he was close to Mr. Assange and that Ecuador had “sufficient evidence that he was collaborating in attempts to destabilize the government.”

(Excerpt) Read more at washingtontimes.com ...


TOPICS: Crime/Corruption; Foreign Affairs
KEYWORDS: assange; bini; cybersecurity; ecuador; hackers; olabini; wikileaks
The guy sure had a lot of yubikeys
He could have also handed out data on USB drives. But the yubikey is a somewhat better way to hand out an "identity" to an ally in person (or through the physical mail). The person also needs to know some passwords to get to the accounts (the yubikey is the second factor).
1 posted on 04/13/2019 8:01:09 PM PDT by palmer
[ Post Reply | Private Reply | View Replies]

To: palmer

If you are hacking to let the American people know that the government is illegally spying on them like Bradley Manning did— WHO CARES?


2 posted on 04/13/2019 8:05:08 PM PDT by bingoplayer
[ Post Reply | Private Reply | To 1 | View Replies]

To: bingoplayer

Bradley Manning stole 750,000 files- among them files containing identifying information of people working with our forces in Afghanistan, and files sent in by soldiers in action on the ground, and gave [sold, according to some reports] this information to an unvetted FOREIGNER who then used them to build his organization and lure even more eople into sealing information that doesn’t belong to them.
Manning should have been tried and shot.


3 posted on 04/13/2019 8:49:35 PM PDT by piasa (Attitude adjustments offered here free of charge.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: palmer

What’s a “yubikey?”


4 posted on 04/13/2019 8:56:13 PM PDT by wastedyears (The left would kill every single one of us and our families if they knew they could get away with it)
[ Post Reply | Private Reply | To 1 | View Replies]

To: wastedyears
YubiKey A hardware authentication device.
5 posted on 04/13/2019 9:13:05 PM PDT by csvset (illegitimi non carborundum)
[ Post Reply | Private Reply | To 4 | View Replies]

To: bingoplayer
Not the words they're using "collaborating" and "Russian hackers"

Sounds like the coup d'etat against Trump and the farce they put on him. This guy is an individual he doesn't have the power of the president.

6 posted on 04/13/2019 9:29:14 PM PDT by Steve Van Doorn (*in my best Eric Cartman voice* 'I love you, guys')
[ Post Reply | Private Reply | To 2 | View Replies]

To: Steve Van Doorn

Not = Note


7 posted on 04/13/2019 9:29:52 PM PDT by Steve Van Doorn (*in my best Eric Cartman voice* 'I love you, guys')
[ Post Reply | Private Reply | To 6 | View Replies]

To: palmer
Ola Bini was developing this encrypted chat program:
Note what they're charging him with
"crime of assault on the integrity of computer systems"
Integrity of the basic operation of a computer is what encryption does.
https://coy.im/what-is-coyim/
8 posted on 04/13/2019 9:39:30 PM PDT by Steve Van Doorn (*in my best Eric Cartman voice* 'I love you, guys')
[ Post Reply | Private Reply | To 1 | View Replies]

To: Steve Van Doorn

So he was arrested so they could stop him from further developing an encrypted chat program that governments would have a problem hacking?


9 posted on 04/13/2019 11:48:14 PM PDT by wastedyears (The left would kill every single one of us and our families if they knew they could get away with it)
[ Post Reply | Private Reply | To 8 | View Replies]

To: wastedyears

I don’t have enough information yet. Though that is possible.


10 posted on 04/14/2019 3:30:44 AM PDT by Steve Van Doorn (*in my best Eric Cartman voice* 'I love you, guys')
[ Post Reply | Private Reply | To 9 | View Replies]

To: wastedyears
A yubikey is a very simple device programmed to verify that key is the same as the one that was "registered" earlier. Basically the owner of the key tells a website designed to accept the keys that he is Whoever123. Next the website sends a registration message to the key via the owner's browser. The browser/key sends back a reply. The website stores the reply.

The next time someone (same person or someone else) puts the key in their computer and tries to loing to that same website, the website will ask who they are. If the user says "Whoever123" then the website sends a message to the browser/key to ask for a specific response. If the response matches the one sent during registration, then the website is satisfied that the person with the key is Whoever123.

That description is using the key as a first (only) factor. More often the key is used as a second factor. Everything is the same in the registration step. But in the login step the user enters Whoever123 and their password. The remaining steps are the same, the website sends the message to the browser/key to see if it is the same key. In all cases, the website is keeping a database matching users to keys.

So very simply, the key is the first or second factor needed to login somewhere. It works very well for almost any type of online access e.g. a bank account.

What the wikileaks people could use them for (I'm not sure) is putting their secret material on a cloud server somewhere, e.g. an email account, and requiring the key to get to login. With a single factor, and a website designed for single factor, the key itself, and nothing else, enables access to the information. With most websites however the key is the second factor and the new user has to be told a username and password and given the key.

There are fancier yubikeys that do more such as encrypting and decrypting information without going to a website. For example I just glanced at their site and saw "Full Disk Encryption + YubiKey" which is certainly another possible use of the device. With my encrypted laptop, I have to know a passcode to unlock the disk encryption. If I used the yubikey, the bad guys can still try to beat a passcode out of me which would not be fun, but if someone else had the yubikey the bad guys would not get the data.

11 posted on 04/14/2019 4:40:12 AM PDT by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Steve Van Doorn
Thanks. Looks like an interesting project. Not just end-to-end security with OTR, but uses Tor for anonymity. OTR itself is an interesting project:

Encryption: No one else can read your instant messages.

Authentication: You are assured the correspondent is who you think it is.

Deniability: The messages you send do not have digital signatures that are checkable by a third party. Anyone can forge messages after a conversation to make them look like they came from you. However, during a conversation, your correspondent is assured the messages he sees are authentic and unmodified.

Perfect forward secrecy: If you lose control of your private keys, no previous conversation is compromised.

The deniability is the most interesting. Normally PKI is semi-permanent and everyone knows you by your signature, made with the private key that only you control. But here it looks like disposable private keys: https://otr.cypherpunks.ca/Protocol-v3-4.1.1.html My question is how does Alice know who Bob is? It seems as though they first need a traditional PKI solution to authenticate, then they can use this to send messages. Of course the traditional solution could use a yubikey (hardware private key) handed off in person.

12 posted on 04/14/2019 4:52:33 AM PDT by palmer (...if we do not have strong families and strong values, then we will be weak and we will not survive)
[ Post Reply | Private Reply | To 8 | View Replies]

To: piasa

Yes but Assange was a publisher like the New York times in the Pentagon Papers that endangered our men in the field. No one blamed the New York times!! Assange is a hero for exposing our government spying on you, Don’t you agree or are you down with that?
And the government employed Bradley Manning with top secret clearance knowing he was a mentally deranged homosexual who later mutilated his sex organs but he remains a male because he has an x and y chromosome and can’t change that but how could the government be so stupid ? Where is the recrimination for hiring that sick faggot? Assange is a national hero.


13 posted on 04/14/2019 6:56:47 AM PDT by bingoplayer
[ Post Reply | Private Reply | To 3 | View Replies]

To: piasa

I know people don’t often like National Review any more, but their yesterday’s article gave an important reminder of what Assange considers “transparency”.

“The idea that Assange is engaged in a campaign against the United States is supported by a 2008 leak that had little or no justification on the grounds of transparency in the public interest — of a classified 2004 report that included details of the workings of the U.S. Army’s Warlock system for jamming the homemade bombs called IEDs set off by cell phone or radio transmitter. The report concerned the problematic way the jammers interfered with regular military communications. But its publication ensured that anyone anywhere in the world who wanted to figure out how to defeat the Warlock now had the means to do so.”


14 posted on 04/14/2019 7:09:32 AM PDT by Krosan
[ Post Reply | Private Reply | To 3 | View Replies]

To: palmer

Thank you for that review.


15 posted on 04/14/2019 4:52:29 PM PDT by Steve Van Doorn (*in my best Eric Cartman voice* 'I love you, guys')
[ Post Reply | Private Reply | To 12 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson