Archive for the ·

Privacy

· Category...

Another assault on privacy by GCHQ

Comments Off

Recently, it was revealed by IT Security Guru that the British intelligence agency GCHQ had demand a backdoor into the secure email service PrivateSky by CertiVox. At the end of 2012, GCHQ made the request, but CertiVox chose to close the service instead of betraying their customers. This is preceding the similar heavy-handed threats by NSA which caused US based Lavabit and Canadian based Silent Circle to shut down their secure email services.

It is clear then, that it is not possible to operate secure email or communication services within these countries. In that light, it’s interesting to see Swiss hosting companies picking up business. “Business for Switzerland’s 55 data centres is booming”, claims the article. It will be interesting to see how it plays out. Will they be pressured by US as was the case with the banks? Or will they also sell out, as was the case with the Swiss based Crypto AG and their machines?

As many have pointed out, the physical security of a data centre is often less of an issue than its network and system security. Furthermore, it’s a question of how it is used and what is offered. PrivateSky is for example still operational, but only for its owners. If somebody offered a secure communication service from within the Tor network, it would be both hard to detect, so it might fly under the radar for a while, and hard to take down if hosted in Switzerland. That’s a business idea right, up for grabs for anybody with a bit of spare time and money.

Comments Off

Trends: Snowden didn’t change public’s behaviour

Comments Off

For all the NSA documents revealed by Snowden, and for all the news headlines stressing the gravity of the situation, it seems the general public has not changed their behaviour much. At least that would be the conclusion if looking at the worldwide trends of a few Google search terms: As can be seen in the first chart, the terms Snowden and NSA quickly rose to prominence when the story broke in the second half of 2013. However, interest quickly declined. If we look at the two next charts, comparing terms privacy, surveillance, encryption there seem to be no correlation with the former terms at all. Maybe there is an ever so faint increase in the term encryption, but nothing of significance.

The two last charts compare the terms encryption, surveillance in Germany. Here there is a small blip for the former term, while interest in the later, surveillance, seems to have increased significantly. This is possibly driven by the news stories there about NSA spying on Chancellor Angela Merkel.

These trends are rather disappointing to see. One would have hoped for at least a blip on the radar when it comes to public awareness of these issues. Instead, the distraction campaigns by most of the mainstream media seems to have been successful: The headlines have been focusing on Snowden, his girlfriend, his father, and whether he is a hero or traitor. Masking and excusing the abuse of power by NSA, GCHQ and the politicians who support these organizations have been successful. In fact, in Britain the story has taken the bizarre turn where the government is investigating The Guardian and editor Alan Rusbridger for publishing the leaked documents. What other clue do you need to see that the so called democracies and free countries of the West is nothing but a mirage for a powerful and abusive elite?

Swedish politician Rickard Falkvinge put it nicely in his post about the coming of the Swedish police-state:

A key difference between a functioning democracy and a police state is, that in a functioning democracy, the Police don’t get everything they point at.

 
 
 

Comments Off

The list of shame

Comments Off

Over the last years, Wikileaks has collected and published a set of files detailing the companies involved in implementing and assisting mass surveillance. The “Spy Files” includes mostly public product sheets, sales brochures and company catalogues. Below is the list of all the company names mentioned in all the Wikileaks Spy Files.

There’s a lot of interesting reading there. From not so well known hardware companies across the world, to big names like HP, Ericsson, and Siemens. Some of them are selling “investigation platforms” for law enforcement, while others offer products for covert operations. There’s data sheets on network taps like those from NetOptics, and network traffic surveillance and retention from Packet Forensics, to give some examples. There’s marketing material, like Ernst & Young 2011 brochure with the title Biometrics: time to evangelise the benefits. (They want biometric identification pretty much everywhere: From border control to benefit payments, and Internet access).

In other words, these are the companies which implement the police and surveillance state. Employees from these companies do the dirty-work of the NSAs and GCHQs around the world. If you are working for or with one of these, now is a very good time to consider your stance on democracy, human rights, and privacy. If your set of values does not align with that of your company, it might be time to do something about that. “I was just doing my job and following orders” is not an excuse which will hold up in court when judgement comes.

AAPPRO
ABILITY
AcmePacket
ADAE
ADS
ADS UKTI Defence & Security Organisation
Agnitio
AGT International
AI Solve
ALCATEL-LUCENT
ALTRON
AMECS
Amesys
AQSACOM
Arpege
ATIS
ATIS Systems GmbH
Atis Uher
Autonomy
BEA
Berkeley Varitronics Systems
Bivio
BLUECOAT
BrightPlanet
Cambridge Consultants
Cassidian
Cassidian (EADS)
CCT Cecratech
CELLEBRITE
ClearTrail
Cobham
CommsAudit
CRFS
CRYPTON-M
Cyveillance
DATAKOM
DATONG
Delta SPA
DETICA
Dialogic
Digital Barriers
DigiTask
DREAMLAB
Dreamlab
Dreamlab Gamma
EBS Electronic
ELAMAN
ELAMAN GAMMA
Elektron
ELEXO
ELSAG
ELTA
Endace
Enterprise Europe Network
ERICSSON
Ernst & Young
Eskan
ETIgroup
ETSI
ETSI TC-LI
Evidence Talks Ltd.
EVIDIAN
Expert System
FCO Services
Forensic Telecommunications Services
FOXIT
Freightwatch Security Net
FROST & SULLIVAN UTIMACO
Gamma
Glimmerglass
Glimmerglass Networks
GRIFFCOMM
GROUP2000
GTEN
GUIDANCE
HackingTeam
Harris
HiddenTechnology Systems International Ltd.
HP
HP Defence and Security
Human Recognition Systems
i2 Group
INNOVA SPA
Innov Telek IZT
INVEATECH
IPOQUE
IPS
IPS Intelligence
ISS
Kapow Software
L3 ASA
LOQUENDO
Mantaro
Medav
MEDAV
Metronome
NeoSoft
NETI
NetOptics
NetQuest
Netronome
NETWORK Instruments
NEWPORT NETWORKS
NICE Systems
Nokia Siemens Networks
Ntrepid
NTREPID
OCKHAM
OCULUS
OnPath
OXYGEN
Packet Forensics
PAD
PALADION
PANOPTECH
Phonexia
Pine Digital Security
PLATH
Protei
PV labs
QCC Interscan
Qinetiq
QOSMOS
RETENTIA
RHEINMETALL DEFENCE
Roke Manor Research
Safran
Scan & Target
SEARTECH
Septier
Septier Communication Ltd.
Seqtor
SESP
SHOGI
SIEMENS
Silicom
Silicom Dreamlab
Siltec
Simena
Speech Technology Center
SPEI
Spektor Forensic Intelligence
SS8
STRATIGN
Tamara
telesoft
Telesoft Technologies
Thales
TRACESPAN
TRACIP
Trovicor
Utimaco
Utimaco Safeware AG
VAStech
Virtus
Visual Analytics Inc
VuPen
VUPEN Security

Comments Off

NSA’s Social Graph

Comments Off

NSA is creating a social graph of everybody. That is the latest NSA story based on Snowden’s documents. “The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data”

On Slashdot, user jbn-o has an insightful comment, regarding Eben Moglen’s warnings about exactly this scenario:

“I was talking to a senior government official of this government about that outcome and he said well you know we’ve come to realize that we need a robust social graph of the United States. That’s how we’re going to connect new information to old information. I said let’s just talk about the constitutional implications of this for a moment. You’re talking about taking us from the society we have always known, which we quaintly refer to as a free society, to a society in which the United States government keeps a list of everybody every American knows.” —Eben Moglen, “Innovation Under Austerity”

Eben Moglen gave a talk where he warned us about a conversation he had with an American government official who wanted a “robust social graph” of Americans. And again at Moglen’s re:publica talk as Nicole Brydson reminds us. Of course, I’d prefer to point to a copy of this talk in a format friendly to free software, but I don’t know of one.

Moglen reminds us in his talks about how right Richard Stallman (RMS) is, and how we need to do the work of sharing what RMS teaches to others. RMS was right (as per usual) we need software freedom more than ever. Social action based on an ethical grounding (not mere technical convenience or speedy development) is exactly what this situation calls for. I hope everyone will take the time to read or listen to Moglen’s insightful talks and take them seriously. They’re deeply engrossing and filled with interesting history, so much so that they reward repeated listening and social action.

Comments Off

Latest NSA round-up

Comments Off

Glenn Greenwald has the latest round-up of various NSA surveillance related stories around the world this week. From the British GCHQ spying on Belgium’s largest telecom, Belgacom, to Obama working hard to keep the controversial programs away from judicial and public scrutiny. And much more.

Also interesting is a new coalition of civil liberties organizations and other interest groups called “Stop Watching Us”. On October 26th they are planning a rally in Washington, D.C. It takes time, but somebody are waking up.

Comments Off

The mind of a megalomaniac: NSA chief Keith Alexander

Comments Off

Glenn Greenwald recently had a nice story in the Guardian which showed how completely out of touch with society and reality NSA’s surveillance operation has become. NSA chief Keith Alexander have built a command centre and war room modelled after Star Trek’s Enterprise bridge. The pictures below are from the Guardian article.

To add insult to injury, the room was dubbed “Information Dominance Center”. The arrogance of it all is astonishing. Add to that Alexander’s motto “Collect it All”, and it goes to show how totally out of control this whole operation and agency has spun. The revelations over the last months have made it crystal clear that he nor is organization can be trusted, and this small story just hammers home the point even further.

Comments Off

NSA survailance violations – a brief summary

Comments Off

A summary of the latest news and NSA revelations.

Thanks to Snowden, we now know the NSA:

  • Had James Clapper lie under oath to us – on camera – to Congress to hide the domestic spying programs Occured in March, revealed in June.
  • Warrantlessly accesses records of every phone call that routes through the US thousands of times a day JuneSeptember
  • Steals your private data from every major web company (Facebook, Google, Apple, Microsoft, et al) via PRISMJune and pays them millions for it August
  • Pays major US telecommunications providers (AT&T, Verizon, et al) between $278,000,000-$394,000,000 annually to provide secret access to all US fiber and cellular networks (in violation of the 4th amendment). August
  • Intentionally weakened the encryption standards we rely on, put backdoors into critical software, and break the crypto on our private communications September
  • NSA employees use these powers to spy on their US citizen lovers via “LOVEINT”, and only get caught if they self-confess. Though this is a felony, none were ever been charged with a crime. August
  • Lied to us again just ten days ago, claiming they never perform economic espionage (whoops!) before a new leak revealed that they do all the time. September
  • Made over fifteen thousand false certifications to the secret FISA court, leading a judge to rule they “frequently and systemically violated” court orders in a manner “directly contrary to the sworn attestations of several executive branch officials,” that 90% of their searches were unlawful, and that they “repeatedly misled the court.” September September
  • Has programs that collect data on US Supreme Court Justices and elected officials, and they secretly provide it to Israel regulated only by an honor system. September

Source

Comments Off

PRISM – The political repercussions

Comments Off

It has been about a month and half since the NSA and PRISM story broke, and we are now starting to see some of the political repercussions. As expected, they take longer to develop than news-headlines and knee-jerk Internet forum reactions, but the Snowden’s leaks will definitely have long term political effects.

Snowden

Up until now, very much of the media attention has been on Snowden himself, his whistle-blower status, and his escape from the US. Although not that interesting in themselves, his movements have drawn some very intriguing lines, more clearly showing who’s in bed with who, and which countries are willing to stand up against the US. Snowden was more or less escorted out of Hong Kong, China, and welcomed to Russia, or at least not kicked out yet. The problem is, even if he has been offered asylum from Bolivia, Nicaragua and Venezuela, he cannot travel there. First of all, because the US has cancelled his passport, but maybe more importantly, he risks being captured mid-flight. That was made clear when Bolivian president Morales’ flight was forced down in Vienna, because other European countries had blocked their airspace on suspicion that Snowden was on board the plane.

That incident very clearly showed which countries are aligned with the Americans, and is now confirmed by the fact they did apologize. The Bolivian Foreign Minister confirmed that they had received apologies from Italy, Portugal, Spain and France. However, he wants to get to the heart of the matter, even though it is blatantly obvious who was behind the request to force down the plane. Furthermore, as a reaction against these European countries, Bolivia, Brazil, Argentina, Venezuela, and Uruguay have resolved to withdraw their diplomatic missions. That is a pretty strong signal, even though it might be temporary.

Finally, on Snowden, it was interesting to note that he has been nominated for the Nobel peace prize by Swedish professor Stefan Svallfors who notes that “‘I was just following orders’ [can never be] claimed as an excuse for acts contrary to human rights and freedoms”. He continues; awarding the prize to Snowden would “help to save the Nobel Peace Prize from the disrepute incurred by the hasty and ill-conceived decision to award US President Barack Obama [the] 2009 award.” Ouch! That has to sting!

EU political effects

In addition to the four countries who closed their airspace for Morales’ flight, it is clear that more have been accomplices of the US and NSA. UK’s GCHQ (Government Communications Headquarters) have eagerly been collecting data from Internet fibre cables, and is now facing legal challenges from the UK charity Privacy International.

Signals have also been collected in Germany, although here it is less clear whether German intelligence organizations have been in on the game or not. Even the interior minister Hans-Peter Friedrich is not able to explain exactly what has been going on, and apparently he has a gag-order from the US. Chancellor Angela Merkel seems more ambiguous, on the one side urging people to wait for US’ investigation, but also calling for stronger EU data protection laws, and at the same time bringing sanity and common sense to the discussion with the quote: “Just because something is technically possible doesn’t mean you should do it”.

Meanwhile, on EU level, the European Parliament has voted for a resolution to 1) let their Civil Liberties Committee launch an inquiry into the PRISM scandal (with a report due towards the end of the year); 2) warn other member states, including UK, Sweden, the Netherlands, Germany and Poland, who have been running similar programs; 3) reconsider the data sharing of air-traffic passenger information and SWIFT banking transfer with the US; 4) and offer stronger protection for whistle-blowers like Snowden. Several of these points echo similar demands by the EU Pirate Parties about a month ago.

US political effects

On US side, we’ve also seen the start of some interesting cases: Several groups, including the Electronic Privacy Information Center, have filled legal actions which seek to stop the NSA mass surveillance. In addition to the EPIC case, Electronic Frontier Foundation (EFF) has filed a lawsuit, backed by an unusual coalition of rights activists, church leaders and drug and gun rights advocates. It will probably take a long time before we see any form of outcome, or even response to these cases, but they have at least made the required move. As an example of long it can take, EFF supported the filing of a class action lawsuit in 2008, and just recently did a federal court judge reject the U.S. government’s latest attempt to dismiss the case (so it is now finally allowed start).

Just as interesting was the recent US Congressional hearing and questioning of the NSA officials James Cole, Robert S Litt and John Inglis. They revealed that the PRISM program had the capability to analyse social graph relations as much as three hops away from every person. This is significant, first, because it was previously assumed that they only had data and capabilities to perform only one (your friends) or two hops (the friends of your friends). Secondly, in an massively networked “social” world, three hops will include a lot of people. When six degrees of separation was estimated to link any two people in the world some fifty years ago, they did not have Facebook where everybody had thousands of “friends”. Now, it is estimated that any Facebook user can be linked with less than five hops. In other words, within three hops, most of us will be linked to some “bad” people. If those links are to be used against us, we will all be found suspicious.

Also worth noticing from the hearing was the comment from congressman Frank James Sensenbrenner. He was the author of the controversial 2001 Patriot Act, which probably has enabled some parts of the PRISM program. He told the NSA officials that unless they rein in their spying efforts, they would risk losing the legal provisions which enabled it. Although it is hard to believe it will come to that, it is still a quote to take note of. (Or, depending on how cynical you feel, yet another proof that you can never trust a politician).

Comments Off

PRISM – the effect

Comments Off

Another week with NSA and PRISM news has gone by, and now the reactions and comments start to take on more substance and show that people have had to the time to reflect on the various issues, rather than just posting knee-jerk headlines.

John Naughton had an interesting comment in the Guardian, where he points out that you can check out, but never leave: We are simply too used to, too entangled with, maybe even addicted to the services provided by the big Internet actors. Between the companies mentioned in the NSA slide, pretty much everybody are somehow covered. (Maybe Richard Stallman has managed to escape, however, he is probably encrypting his e-mails, and thus is up for extra scrutiny).

Another interesting article, by James Risen and Nick Wingfield of New York Times, points out the revolving door between Silicon Valley tech companies and the surveillance industry. They give the example of Max Kelly, the chief security officer for Facebook, who got recruited by NSA, and also several Silicon Valley startups which are either funded by or selling to NSA/CIA.

Finally, and most welcome, is the Anti-PRISM campaign, a joint effort by the several European Pirate Parties. They clearly and concisely point out the dangers posed to privacy and democracy by government surveillance. The language and demands contain a certain irony towards the US, noting that Europe should be become “a worldwide beacon for digital rights and privacy protection, government transparency and whistleblower protection” (referencing America’s 19th century goal of becoming “a beacon to the world”).

Their demands are clear political and regulative goals. It’s a great opportunity for these parties to grow beyond the copyright infringement fight, show that they have a broader political agenda, and gain more mainstream support. I’m guessing the two main points to watch are: First the “uncovering of the facts”, which gives a concrete proposal to form a European Parliament committee to investigate the details of the PRISM program, and how it relates to EU states. Secondly, the point about repealing of the Data Retention Directive is interesting. It mentions that three countries have already rejected this 2006 directive in national courts. It will be interesting to see if the latest news and politics will have an effect on other EU countries as well.

Comments Off

Privacy – A great opertunity for Free software, and funny news

Comments Off

It has been an entertaining week in the privacy and security headlines. Since the NSA stories broke last week, protecting ourselves from state surveillance suddenly became mainstream. We’ll see if that lasts, but at the very least the topic is on the table now. Security and privacy is no longer the domain of conspiracy theorist, but one of many points in a cost/benefit analysis of which service or software to use.

Perhaps the best to come out of this story is the raised awareness of alternative software and services which put users Freedoms first. A critical part of that is Free software, which allows users to inspect the software which run on their device and control who is given access to what. Taking that to the Internet, there are many solutions which give users greater control, security and privacy than do central providers.

The site prism-break.org has been set up to list some of these alternatives. However, it seems it has become so popular, that it often fails to load. Other privacy centric services has also seen significant user increase, like the search engine DuckDuckGo, which promises not to track user’s search queries.

Other headlines have been more on the funny or cute side: As expected, somebody called for impeachment of Obama (at least he didn’t smoke cigars). Then there was the Mozilla letter which asks congress to “stop watching us”. It is of course a valid request, but it might have been taken a bit more seriously if it wasn’t for the teenage troll-board 4chan listing as its first signer (due to alphabetically listing the organizations, and numbers listing before letters). Finally, there’s the hero at the centre, a 29-year old with the cool name Snowden. He was the NSA contractor who revealed the awfully designed PowerPoint presentations, and has now fled to Hong Kong. As somebody pointed out: Never had I believed I would live to see that day when an American citizen would seek political asylum in China.

Comments Off

NSA surveillance – business as usual

1 comment

This week saw two interesting, and supposedly shocking, stories about the scale of the US government’s Internet surveillance. Starting Thursday with the news that the phone operator Verizon had been ordered to hand over all meta-data on its customers’ communications to the NSA. The following day, a different program was revealed, leaked by the means of a terribly amateurishly looking PowerPoint slide deck, which showed that the NSA had direct access to all customer data and content from all the major Internet service providers, including Google, Facebook, Microsoft, and more.

The reaction to the first story is interesting in that it involves only meta-data. The same type of data collection was enacted in law by the EU in the 2006 Data Retention Directive. This directive was no secret at the time, and the scrimmage in individual member countries which started to implement it a few years back was mostly around who would pay for it; the Internet and phone providers or the government. At any rate, by now any EU citizen should expect this kind of system to be in place. It is therefore somewhat ironic when the US press pretends that there are stronger privacy protections in place on their side. The last decade has for the most shown the opposite to be true.

The second story, around the full content access, should be no big surprise either. A similar story broke seven years ago, although it was and still is considered “warrantless”. Another example from the post-911 area is the Information Awareness Office, which despite heavy criticisms in 2002, still lives on. And even before that, it has always been speculated that the US government, through CIA, NSA, FBI or other TLAs, was listening in on phone and Internet communication. Take for example the ECHELON project, which probably has been around since the cold war area. It was investigated by a committee of the European Parliament, which amongst other things concluded: “the existence of a global system for intercepting communications, operating by means of cooperation proportionate to their capabilities among the USA, the UK, Canada, Australia and New Zealand under the UKUSA Agreement, is no longer in doubt”.

So why the outrage just now? We don’t have to look further than The Guardian’s summary: “Obama defends secret NSA surveillance programs – Insists surveillance is essential for national security.” In that light, it no longer seems like a coincidence that two completely separate NSA programs were leaked on two consecutive days. As a political cheap shot, it seems to have worked very well. What’s more, Obama took the bait, and swallowed it hook, line and sinker.

So even though these stories are akin to declaring water wet, from a privacy and security point of view, it is useful that more people are made aware of and start to ponder the risks of the information systems we surround ourselves with. We just have to make sure that the outrage is directed towards the right institutions, and that any change is implemented where users need it. Voting, joining a political party, and working for change within that system is definitely a noble goal, however, it will unfortunately not protect your data any time soon. Asking the various ISP and service providers to improve their security, encrypt our data, and not hand it over to the government is also appropriate. It’s just that they are required by law to hand over data, so we cannot trust that to not happen.

The only way to make sure your own data is secure from government hands, and be aware of any requests that might be made against it, is to store it yourself. If you are storing something they are after, that will of course not stop them from knocking on your door, but at the very least you will know.

The right response to these stories is not blind rage, resignation, or declaring defeat. Rather it should be to decentralize: Avoid large scale, single point of failure, services. Build and maintain your own systems, based on free and open source software, so you can be confident that no warrantless access is granted. Make sure data is encrypted, communication is encrypted and signed, and nothing flies in plain-text over the Internet. If you are dealing with sensitive information, maybe as a lawyer, as a doctor, or a secret business deal, anything else is simply incompetent, or possibly gross neglect.

USB Smart Card Reader

Comments Off

Just got another shipment from Deal Extreme. This time a USB Smart Card Reader. It’s for reading my soon to arrive Free Software Foundation Europe fellowship card. However, all I had to try out with so far were old redundant bank cards. And that seemed to work without problems.

The reader came with a cute mini-CD with Linux drivers, but they were not required to get it running. Following the page at FSFE, the reader was up in minutes. Confirm that these two are installed; in my case they were:

yum install libusb pcsc-lite

Add the udev rules and group as indicated by the FSF howto, and restart X if necessary.

I also installed yum installed pcsc-tools, and could detect cards by running

pscs_scan

Comments Off

The Right to Read

Comments Off

There is something depressing and chilling when the most dystopian prophecies come true. Especially, when those dystopian prophecies are written by Richard Stallman, who has spent the better part of his life trying to tell the world it’s going in the wrong direction. Yet, his writing is spot on, only 15 years before its time.

Last week, Joseph Henry Vogel was granted a US patent that aims to prevent students from sharing textbooks or copying pages. Of course all in the name of protecting the authors and publishers. It almost seems as if Vogel got the idea from Stallman’s 1997 essay, The Right to Read. He just didn’t understand that this was a cautionary tale. The patent itself is actually an interesting read, and touches on problems like universities and professors which “facilitate piracy by placing texts in the library reserve where they can be photocopied”. To avoid the loss of revenue from this, students will have to pay for access to a discussion forum, and participation here is part of the final grade. I believe Stallman could claim prior art here, and invalidate the patent. That would of course not help much, as the greed does not go away.

However, maybe not everything is lost. In Stallman’s story, the young has been indoctrinated to believe that “sharing books was nasty and wrong – something that only pirates would do“. At least the comment threads from Reddit and Torrent Freak show that somebody cares and calls out the emperor’s new clothes.

On a side note, the class identifiers for the patent gives further interesting patents. 705/51 – Usage protection of distributed data files, and the sub-class 705/57 – Copy protection or prevention. Some people just want to watch the world burn.

Comments Off

Cell phone privacy guide for Android

1 comment

The Pirate Party of Canada has a nice list of applications and add-ons for Android phones which enhance security and privacy. It boils down to

Anonymous, Decentralized and Uncensored File-Sharing

Comments Off

The file-sharing landscape is slowly adjusting in response to the continued push for more anti-piracy tools, the final Pirate Bay verdict, and the raids and arrests in the Megaupload case“, starts a recent TorrentFreak article. It goes on to introduce Tribler, and RetroShare, which “[creates] a private space on the Internet. A social collaboration network where you can share anything you want. A space that is free from the prying eyes of governments, corporations and advertisers. This is vitally important as our freedom on the Internet is under increasing threat. RetroShare is free from censorship: like Facebook banning ‘obscene’ breast-feeding photographs. A network that allows you to use any pseudonym, without insisting on knowing your real name. A network where you will not face the threat of jail, or being banned from entry into a country for an innocent tweet“.

For RetroShare, there are pre-compiled installs for several OSes and GNU/Linux distributions, however not for Fedora. So I downloaded the source, and tried to compile with a bit of help from this page. First, some dependencies:

yum install qt-devel gpgme-devel libgpg-error-devel libupnp-devel libssl-devel libgnome-keyring-devel openssl-devel glib2-devel libXScrnSaver-devel

It turns out there is an old, widly published bug in the glib-2.0 include path dependencies. To work around it, edit the file libretroshare/src/libretroshare.pro, find these lines, and add the third line, marked in blue:

# These two lines fixe compilation on ubuntu natty. Probably a ubuntu packaging error.
INCLUDEPATH *= /usr/lib/x86_64-linux-gnu/glib-2.0/include/
INCLUDEPATH *= /usr/lib/i386-linux-gnu/glib-2.0/include/
INCLUDEPATH *= /usr/lib64/glib-2.0/include

Furthermore, there are a couple of missing library dependencies:

Edit retroshare-gui/src/RetroShare.pro, find the “## Linux ##” section, and add the last three libraries marked in blue:

LIBS += ../../libretroshare/src/lib/libretroshare.a
LIBS += -lssl -lgpgme -lupnp -lixml -lXss -lgnome-keyring -lcrypto -ldl -lX11

Then the make steps should work fine:

cd libbitdht/src
qmake-qt4 && make
cd libretroshare/src
qmake-qt4 && make
cd retroshare-gui/src
qmake-qt4 && make

And to start up:
retroshare-gui/src/RetroShare

Comments Off