Category Archives: general

Who sets the security standards for lawful access systems like Hacking Team team?!

After what came out of the Hacking Team scandal, we should consider if the standards for such techs, crucial for society – that many governments want extended as mandatory to other IP communications – maybe we have a problem at their origina, i.e. with their international governance by NIST and ETSI, the non-binding bodies that set their standards (which are then mostly updaken by national governments).  If we know NIST has broken crucial crypto standards on pressure fom NSA, here is the formal governance of ETSI, which is then deeply participated in its process by industry players :

 

Screen Shot 2015-07-10 at 10.12.15

Why Hacking Team backdoor is old news from the late 80’s!

The just revealed Hacking Team RCS systems backdoor (for them and presumably for their state friends) was the very reason of existence of the first such systems from the early 80-90’s (!!), created by former NSA staff, and then taken over by former (?) Mossad senior agents, and sold to tens of governments worldwide.

Pushed around “presumably” with the key goal of giving Israeli intelligence full info on what other intelligence were up to. US made an illegal copy for itself and pushed that one around to other governments …

Here is the Wikipedia file a long detailed story of it, and Here excerpts from a relatively authoritative book on the history of Mossad “Gideon’s Spies” which I finished reading last Christmas:
https://en.wikipedia.org/wiki/Inslaw
http://cryptome.info/promis-mossad.htm

Adi Shamir: ” “In the Second World War if you had good crypto protecting your communication you were safe. Today with an APT sitting inside your most secure computer systems, using cryptography isn’t going to give you much protection.”

http://www.theregister.co.uk/2013/03/01/post_cryptography_security_shamir/

“In the Second World War if you had good crypto protecting your communication you were safe. Today with an APT sitting inside your most secure computer systems, using cryptography isn’t going to give you much protection.

“It’s very difficult to use cryptography in an effective way if you assume that an APT is watching over the computer system, watching everything that is being done, including the encryption and decryption process.”

Panopticon sounds very much like the post-Snoden world for all of us

http://en.wikipedia.org/wiki/Panopticon

The Panopticon is a type of institutional building designed by the English philosopher and social theorist Jeremy Bentham in the late 18th century. The concept of the design is to allow a single watchman to observe (-opticon) all (pan-) inmates of an institution without the inmates being able to tell whether or not they are being watched. Although it is physically impossible for the single watchman to observe all cells at once, the fact that the inmates cannot know when they are being watched means that all inmates must act as though they are watched at all times, effectively controlling their own behaviour constantly

What’s the use of ultra-privacy techs when mics are everywhere?

Since Snowden all hopes to retain a meaningful, albeit limited, personal privacy sphere have relied on the possibility of making devices resistant to advanced surveillance available to citizens, supplementary to ordinary commercial ones, and make so that they won’t be made illegal.

Eve if we succeeded, such devices may not serve their purpose or achieve wide adoption, if the average citizen will be constantly and increasingly surrounded by Net connected devices with a mic (mobile, Tv, Pc, Internet of Things), which may allow extremely low cost and scalable continuous surveillance. Schneier just made a fantastic analysis of the issue.

In fact, it would be inconvenient enough to have to place your ordinary phone in a purse, or under a thick pillow, before making a call with your (ultra-) private device, but it would be unbearable to most to have go in the garden because their TV or my fridge may be listening.

It is crucial, therefore, to press for national laws forbidding the sales of any Internet-connectible devices without a certified physical switch-off for mic, camera and power.

If one doesn’t come soon, we may be lead to a point where we might be better quitting on privacy altogether, and turn our efforts assessing the technical and political feasibility of making total surveillance as symmetrical as possible versus the powerful, somewhat in the vision of the Transparent Society paradigm of David Brin.

It is a major change in the existential nature of human life, but a large and increasing number of people (such as me) are already  living in such world, with constant awareness that any word I say near my mobile (i. e. always) or I type in an electronic device may very well be collected and archived, at extreme low cost, and accessible to who knows how many.

It’s bearable.

What I can’t bear is that a small group of powerful or rich people, state and non-state related, can increasingly enjoy ultra-privacy and/or huge access to the information of others. This creates a huge shift of unaccountable power towards them, with very dire consequences for human race prospects of survival, and avoidance of durable forms of inhumane global governance.

Selected Quotes and video from Sadhguru Jaggi Vasudev

Love is not something you do, love is what you are.

When it is no more about you, you can live your life and do your life in total abandon; because there is nothing to gain nothing to lose.

Death is a cosmic joke. If you get the joke, when you fall on the other side, it will be wonderful. If you don’t get the joke, when you are here you fear the other side, and when the other side comes, you just don’t know what it is about. If death becomes a laughing matter in your life, life becomes an utterly effortless process – there is no need to restrain yourself in the process of life; you can live your life absolutely, totally.

When your spiritual practice is based on hope and fear, you won’t attain to anything. Do your spiritual practice joyfully, not with the hope of making it or the fear of not making it. Just do it joyfully.

If you can bring love into your breath, into your step, into every act that you do, not towards anybody or anything; if you can just bring the longing to merge with everything around you, then creation will lead you on to the creator.

When your happiness is dependant upon what is happening outside of you, constantly you live as a slave to the external situation.

Do not try to live by morals, ethics, slogans. These are all very poor substitutes for awareness. Be counscious and aware, you will see life the way it is.

Whenever you are happy, the real source of happiness is within you. It bubbles up. It is just that you are looking for an external stimulus to make you happy.If you are rooted in reality there will be no fear.

The fear is simply because you are not living with life, You are living in your mind.

The greatest crime that you can do to humanity is to teach your children that suffering is a part of their life. You have taken away the possibility of them being joyous human beings.

Life is far beyond meaning, Life is beyond meaning and that’s why it is so beautiful.

Man needs  entertainment simply to hide his madness. If he was perfectly sane, he would not need entertainment. He could  just si  and watch this bamboo grow. He does not really need entertainment.

Once the stillness comes into your life, then the mind also becomes absolutely still. When your mind becomes still, your intelligence explodes.

If you are truly a seeker of Truth, Truth can not hide from you. It is in the Lap of truth that you have happened. Most people who claim to be seekers are only seeking security, solace, or the fulfillment of their desires.

The moment you make a conclusion, as to what should be at the other end, you are no more a seeker you are a vested interest.

A humanity which has done nothing for its inner well being – how can it create external well being? How do you expect it to work?

Because you do not know how to keep your systems in balance, because you can’t handle reality, you succumb to positive thinking. You want to skip the negative and just think positive. What you pursue will not be the strongest point in you. What you try to avoid becomes the basis of your consciousness. Positive thinking can have some psychological relevance, but no existential relevance whatsoever.

A genuine seeker, a person who develops an urge within, will always find his Guru. He may find it in a man, in a woman, or he may find it even in a rock. He will definitely find it somewhere, there is no doubt about it.

The world is trying to do so many things. We’re trying to go to the moon, to Mars, but, fundamentally, I feel the most important thing is human consciousness, the quality of life here. How happy we are here simply depends on how we are within ourselves.

Every human being is a unique human being.

You being too involved with your mind and emotion means you are too enamored with your own creation, you have no time for the creation of the creator.

If you look at the organization, capability and the certainty with which a simple ant is conducting its life, you will see you are quite stupid.

Wanting to be special is a sickness, it is taking a huge toll on life. In trying to be special, people are doing all kinds of ridiculous things.

In relinquishing the limited, the unlimited becomes yours, But the price is, what is YOU does not exist anymore.

When who you are and what you are is not decided by any external forces, then you are in dignity.

If you are not half hearted, if you are a full blooded involvement with everything that you are doing you will see every simple thing is a miracle.

When you become meditative, you will see, your intellectual capabilities will increase many times more than what it is right now. Not because meditation makes you intelligent, but because meditation clears up the mess, the muck that’s gathered on the glass of the flashlight. As your meditation deepens, it just clears up the muck more and more and the flashlight becomes more and more powerful. It shows you things more and more clearly.

Once you know how to be aware, once the neccessary awareness – to be away from your own body, to be away from your own mind – has come to you, don’t even bother about your karmas. Just see how to deepen this awareness.

Every human being is capable of living absolutely blissfully within himself. They have denied themselves this because they never looked at themselves.

What you can do and what you cannot do outside is always a question of capability. But when it comes to the inside it is just a question of willingness.

The past experience of life is ruling you from within. Unless you break this karmic grip there is no such thing as freedom in thought and action.

If you really pay attention to life, life will blossom within you. If you do not pay attention, you are somewhere else, then life could go wrong.

If you know that you are stupid, you wont attach too much importance to your thought. You will start looking at life and your intelligence will flower.

You claim that you love somebody, but if they dont fulfill your needs, you wont love them. I dont call this love, I call this mutual benefit scheme.

Without working on human consciousness, trying to change social or national or global realities means there is no serious intention.

In reality there is only Now. If you know how to handle this moment you know how to handle the whole eternity.

The Limits of software-only crypto, the feasibilty of meanigful privacy and a Plan B

The latest article by Julian Assange on the New York Times contains very true and insightful analysis, such as:

It is not, as we are asked to believe, that privacy is inherently valuable. It is not. The real reason lies in the calculus of power: the destruction of privacy widens the existing power imbalance between the ruling factions and everyone else,”

and

At their core, companies like Google and Facebook are in the same business as the U.S. government’s National Security Agency. They collect a vast amount of information about people, store it, integrate it and use it to predict individual and group behaviour, …

It contains however what I believe to be very wrong and dangerous representations of the level of privacy assurance that an individual expect by downloading the right software and buying a new cheap laptop. He says:

If there is a modern analogue to Orwell’s “simple” and “democratic weapon,” which “gives claws to the weak” it is cryptography, the basis for the mathematics behind Bitcoin and the best secure communications programs. It is cheap to produce: cryptographic software can be written on a home computer. It is even cheaper to spread: software can be copied in a way that physical objects cannot. But it is also insuperable — the mathematics at the heart of modern cryptography are sound, and can withstand the might of a superpower. The same technologies that allowed the Allies to encrypt their radio communications against Axis intercepts can now be downloaded over a dial-up Internet connection and deployed with a cheap laptop.

In fact, the best free software or proprietary (but verifiable) software crypto solutions have this shortfalls that prevent them to provide meaningful assurance:

  1. Are currently way too complex and non compartmentized enough,  relative to auditing effort,
  2. Do not protect from vulnerabilities in critical part, of both the laptop and USB keys used, that are introduced during design, fabrication or assembly. It is true that some low-cost low-volume laptops out running less common, low-volume and low-performance CPUs may be free from malicious backdoors, but it’s very hard to verify. And the user experience is terrible

Solving such 2 core problems needs extremely-resilient user-accountable organizational processes around certain fabrication and assembly phases, as well as critical server-side components, if any, but also for the standardization, update and auditing processes themselves. In this recent post Cyber-libertarianism vs. Rousseau’s Social Contract in cyberspace, I further argue on the failed assumption of Assange’s approach, that I define cyber-libertarianism, and why solutions can only be non-territorial group based.

Such organizational processes, in turn, have a high degree of geolocatization, and therefore can’t be manage “in the hide”, and so could effectively be made illegal in and/or compromised surreptitiously.

We have a plan to solve all of the above with the User Verified Social Telematics project.

What we propose, may still not deliver meaningful privacy. We expect however that, once it is realised, it’s assurance level will be estimate-able with sufficient precision.

If even UVST, or other similar attempts,  fails, then one possibility we would be bound to test, experiment and evaluate would – before it is too late for freedom and democracy – would be to “flip privacy on power” through sousveillance, by designing a new form of democracy that sacrifices privacy in order maintain freedom and democracy. We’d promote constitutional and legal changes in which instead (almost all) privacy protections would be replaced by mandatory and enforceable all on transparency for all, especially those in power.

After more in depth analysis, such possibility may not work at all. There are in fact many unanswered tech questions, however, about the organizational, policy and tech provisions that will give us sufficient assurance that the powerful are NOT communicating privately (steganography, “code speak”, etc.) while the weak are all naked out there.

To ensure transparency of the power, therefore, it would probably require much of the same extremely-resilient user-accountable organizational processes and techs, that are need to try to achieve meaningful privacy …

In 2009 NSA top execs dissenters proposed a “system to quickly send queries to the telephone companies as needed”

http://bigstory.ap.org/article/acc54fc0c64c4c3eae29b8ac380cc065/ap-exclusive-snowden-debate-inside-nsa
“To address their concerns, the former senior official and other NSA dissenters in 2009 came up with a plan that tracks closely with the Obama proposal that the Senate failed to advance on Tuesday. The officials wanted the NSA to stop collecting the records, and instead fashion a system for the agency to quickly send queries to the telephone companies as needed, letting the companies store the records as they are required to do under telecommunications rules.”

With CivicRoom of the User Verified Social Telematics project, we’ve devised a system that would allow for such needed, legal and constitution function for criminal and national security investigations but in such a way that its constitutional would be under the citizen-jury like bodies controlled by the users, through extremely accountable service providing organizations.

Why we won’t have ultra-private IoT without ultra-private ICT

(Originally published for Meet-IoT 2015)

A large segment of the booming Internet-of-Things market is made of solutions comprising devices with external sensors that are within the sensing reach of their users and/or other passerby citizens. These include wearables, home automation solutions, smart city solutions, airborne connected objects, etc.
Such IoT devices are in almost all cases currently designed, fabricated and assembled according to socio-technical standards that are very similar to those of other end-user computing devices like phones and PCs, which place performance, features and cost considerations way ahead of security, privacy or resiliency.
In almost all of these use case scenarios, a malfunction or breakdown will cause no or insignificant physical or economic harm to users or passerbies. Therefore, they are and can be discounted as a minor requirements. Privacy breach, on the other hand, appears at first to be a strong concern for users.
After Snowden, with a deluge of revelations, attacks and discovered vulnerabilities, it has become clear that businesses and citizens are hugely exposed to attacks, by massive as well as targeted, yet highly-scalable remote attacks beyond-point-of-encryption, by criminal actors and state security agencies, which seek access to industrial secrets and personal data.
While, in the case of smartphones and PCs, it can be expected that scalable targeted access may mostly be available to high-level attackers, and entities close to them. Whereas In fact, IoT solutions have currently less regulatory requirements, liabilities, secure technology standards involved, and are often offered by smaller newer companies that have less to loose, overall, from public discovery of critical security flaws in their products. It follows that IoT presents substantial additional assurance problems, that make it substantially more likely that such access is available to even mid- and low-level attacker.
However, any privacy concerns will soon have to face the fact that IoT users are surrounded at any given time by a smartphone, PC or connected TV which can very easily be listening and sensing everything. Privacy is already so compromised that users don’t, won’t and probably shouldn’t care if one additional devices listens in.
From these considerations, we can attempt a prediction for such IoT sub-market. It may be characterised in the near and mid future by 3 kind of solutions: (1) A “no privacy” kind of solutions which will completely ignore or just pay “lip service” to privacy, vulnerable to even scalable low- and mid-level attacks; (2) A smaller “privacy but not from government” kind – similar to the approach of Blackphone in smartphone market – where you have reasonable expectations of privacy from all, except from highly-scalable massive targeted high-level threats; (3) An even smaller “meaningful privacy” kind, for very privacy sensitive use cases or individuals, where assurance can be reasonably expected against such highly-scalable massive targeted high-level threats, but not against non scalable proximity-based surveillance techniques.
The creation of this last “meaningful privacy ” kind of IoT solutions, will need radical changes on the socio-technical paradigms for the design, fabrication, assembly and provisioning of all the software, hardware and processes critically involved in their life-cycle and provisioning. Such changes will need be adopted by a critical mass of actors, which may initially be small, but comprised the entire computing life-cycle.
But such solutions may never provide meaningful utility to a user if, as we said, at any given time by ICT devices, such as a smartphone, PC or connected TV are easily be listening and sensing everything the user’s doing. Almost all IoT solutions interface – for operation, configuration or update – with ICT components that can be turned into a critical point of failure of the IoT solution, if they do not also provide “meaningful privacy”. Such dependency also works the other way around. The market for “meaningful privacy” ICT devices may well be dependent on the availability of “meaningful privacy” IoT devices, or at the very least IoT devices that can reliably be turned off by the user. In fact, it would be inconvenient enough to have to place your ordinary phone in a purse, or under a thick pillow, before making a call with your (ultra-) private device, but it would be unbearable to most to have go in the garden because their TV or my fridge may be listening.
For “meaningful privacy” ICT devices to gain any wide consumer adoption, it is crucial, therefore, to press for national laws providing for a wide-market availability of any Internet-connectible home and office devices with a certified physical switch-off for mic, camera and power.
Given these interdependencies, and the huge costs of creating and sustaining a “meaningful privacy” computing platform supply-chain and ecosystems, it is worth considering if the socio-technical standards and technology platforms for “meaningful privacy” IoT, and those for ICT, may well be shared to a large extent. These may be possible if such initial shares platform define a relatively small form factor, low energy consumption, and most of all a low cost of production at scale.

Cyber-libertarianism vs. Rousseau’s Social Contract in cyberspace

In this post, I argue that the cyberlibertarian belief that we can individually protect our rights in cyberspace is incorrect, as it is impossible for an individual to provide him/herself meaningful assurance from hardware fabrication and assembly undetectable backdooring – even if supported by informal digital communities of trust. As for offline freedom, world citizens need to build international social contracts for cyberspace by deliberately and carefully building organizations to whom they will delegate part of the freedoms, in order to receive in return both protection of both their online civil liberties and their physical safety.

In its 1762 “Social Contract” (pdf) Rousseau wrote:

“‘Find a form of association that will bring the whole common force to bear on defending and protecting each associate’s person and goods, doing this in such a way that each of them, while uniting himself with all, still obeys only himself and remains as free as before.” There’s the basic problem that is solved by the social contract”.

Flash forward 250 years later and half our time is spent in cyberspace, where virtually all citizens have NO access to end-user devices nor cloud services with meaningful assurance that their privacy, identity and security is not completely and continuously compromised at extremely low marginal cost.

In fact, adequate protection is not required by the state – as it does for nuclear weapons, air planes or housing standards – nor is it offered by companies or traditional social organizations. Citizens are left alone to protect themselves.

In cyberspace, would citizens be better able to protect themselves alone or through adequate joint associations? Should we let users alone to protect themselves or is there a need for some forms of cyberspace social contracts? Would delegating part of one’s control of its computing to jointly-managed organizations produce more or less freedom overall?

Rousseau wen ton saying: “Each man in giving himself to everyone gives himself to no-one; and the right over himself that the others get is matched by the right that he gets over each of them. So he gains as much as he loses, and also gains extra force for the preservation of what he has“.

The current mainstream answer is that we can and should do it alone. Cyber-libertarianism has completely prevailed globally among activists and IT experts dedicated to freedom, democracy and human rights in and through cyberspace (arguably because of the nature of anarcho-libertarian geek political culture of the US west coast, especially north west).

But achieving meaningful protection is completely impossible by an individual – even if supported by informal digital communities of trust, shared values and joint action, more or less hidden in cyberspace.

In fact, achieving meaningful assurance of one’s computing device requires meaningful trustworthiness of the oversight processes of fabrication and assembly of critical hardware components that can completely compromised such devices.  So therefore, even for a pure P2P solution we need anyway those in-person processes for the fabrication and assembly. Until a user will be able to 3D print a device in its basement, there will be a need for such geolocated complex organizational process, with which the NSA and others can completely compromise surreptitiously or outlaw it.

The necessity of such oversight organizational processes can be desumed from this 3 minute video except in which Bruce Schneier clearly explains how we must assume CPUs as untrustworthy and therefore we may need to develop intrinsically trustworthy organizational processes, similar to those that guarantee the integrity of election ballot boxes. (As we at UVST apply to the CivicRoom and the CivicFab).

In fact, since NSA and similar, after the 90s popularisation of high-grade software encryption and after the Clipper Chip failed, they were at risk of loosing their (legal sanctioned and constitutionally) authority of intercept, search and seizure. They therefore have had the excuse (and reason) to break all end-points at birth, surreptitiously or not, all the way down to the assembly or at the CPU or SoC foundry. They succeeded wildly and, even more importantly, succeeded in letting most criminals and dissenters think that some crytpo software or device where safe enough to share critical information. Recent Snowden tight-lipped revelations about intrusion NSA in Korean and China IT companies, show that things have not changed since 1969 when most governments of the world were using Swiss Crypto AG equipment thinking it secure, while they were undetectably spied upon by NSA.

Therefore, we must have some form of social contracts to have any chance of gaining and retaining any freedom in cyberspace.

The great news is that those social contracts – and related socio-technical systems – can be enacted among relatively-small number of individuals that share values, aims and trust, rather than the some territory, and they can be changed at will by the user, enabling much more decentralized and democratically resilient forms of democratic association.

Since we must have such social contracts in place for each such communities of trust to handle the oversight processes, we may as well extend those, in (redundant pairs of) democratic countries, to provide in-person processes controlled by effective citizen-jury-based processes to allow constitutional – no more no less – access to intercept, search and seizure, to discourage its use by criminals and avoid giving a reason & excuse for the state to outlaw it, or surreptitiously break it.

A sort of social contract for cyberspace was enacted in 2004 by the founders of the Debian GNU/Linux operating systems, through the Debian Social Contract. It eventually became a huge adoption success, as it developed the world leading free software OS, and originated much of the tech leaders of the leading free software privacy tools. But ultimately it did not deliver trustworthy computing, even to its most developers, no matter how much convenience and user-friendliness was sacrificed.

In addition to poor technical architecture choices – such as the belief in their ability to make huge software stacks adequately secure with limited resources – what ultimately caused their failure by the fact that the contract was for the users but not by the users, i.e. the users were not substantially involved in its governance. For this reason, it’s priorities were those of geek developers, i.e. the freedom of hack around and share, through barely functioning code, as opposed to freedom from abuse of core civil rights – through extreme engineering and auditing intensity relative to resources, extreme minimization, trustworthy critical hardware life-cycle and compartmentation, in order to deliver minimal functionality but meaningful assurance that your device is your instrument and not someone else’s.

The User Verified Social Telematics project proposes to extend on the organizational and technical, to enable effective autonomous cyberspace social contracts of the users, by the users and for the users.

UPDATED Nov 24th: Added an abstract.

“Officials have expressed alarm for several years about the expansion of online communication services that — unlike traditional and cellular telephone communications — lack intercept capabilities because they are not required by law to build them in.”

says a US official in this Washington Post article.

“I do think that more and more they’ll see less and less,” said Albert Gidari Jr., a partner at the law firm Perkins Coie who represents tech firms, referring to the government’s quandary. “But it’s their own fault,” he added. “No one now believes they were ever going dark. It’s just that they had the lights off so you couldn’t see what they were collecting.”

Court-mandated malware installation for “search and seizure” is coming in the US. Are safeguards possible?

From wired:

It’s clear that the Justice Department wants to scale up its use of the drive-by download. It’s now asking the Judicial Conference of the United States to, tweak the rules governing when and how federal judges issue search warrants. The revision would explicitly allow for warrants to “use remote access to search electronic storage media and to seize or copy electronically stored information” regardless of jurisdiction.

The revision, a conference committee concluded last May (.pdf), is the only way to confront the use of anonymization software like Tor, “because the target of the search has deliberately disguised the location of the media or information to be searched.”Is it possible to prevent abuse by state and other actors? What safeguards should requested?!

Can citizens self-provide proper safeguards without obstracting crime persecution and prevention?!

We believe so at the User Verified Social Telematics project…

If US and EU intelligence parliamentarians are ALL spied, how can we trust the best civilian privacy solutions out there?!

If computing devices of US Senate Intelligence Committee can be undetectably spied upon for unknown amount of time, and Snowden –  as he sweared – could read the emails of any member of the Eu Espionage parliamentary committee, then is anyone safe in the civilian world?

How many people and actors can have such access in illegal ways?

How likely is it for abuse to be discovered by external reviews?

How can we ever estimate that? Can such actors also undetectably tamper placing false evidence?

Blackphone “idea” of transparency, and media buy in

Blackphone CTO prides of their transparency while stating they will never “release” all their code for review, nor tell their customers when a critical bug may have been discovered. Also, they do not even mention firmware or hardware schematics, nor they clarify which code form third party they use that will not be available for review:

I welcome any and all discussion but the immutable constraint is this: we will do testing, we will publish a Transparency Report reflecting an honest view of the results, and we will use this data as evidence of due diligence in support of our objectives of security and privacy.

It doesn’t mean we can share absolutely everything, and it doesn’t mean we’ll release information the instant we receive it. For business or other reasons we may choose to hang onto certain things until after we’ve implemented fixes, but our Chief Security Officer’s team will be responsible for managing this line of communication and keeping the world informed of whatever we can share.

Blackphone and the IT security media

Months after its launch, and no code released (not to mention firmware or hardware schematics or fab oversight), the only people that question how in the world we can even assess it’s security are a few blog commenters, while everyone from Schneier down just cheers up for the secure phone or stay silent.
We clearly have a problem of competence and one of political correctness of long time it security experts not wanting to criticize head on their pal Zimmermann.

Here a few comments on Slashdot that point to the obvious:

Still Secret Source? (+4, Insightful)
bill_mcgonigle 2 days ago
Blackphone is the “you can’t look at it, but trust us” self-proclaimed “security” company, right? And it’s easily exploitable?
Dog-bites-man story.

Re: Still Secret Source? (+4, Insightful)
chihowa 2 days ago
It’s one reason why I can’t rally behind Phil Zimmerman, as much as I like PGP and appreciate much of what he’s done. His insistence on keeping security software secretive and closed source, while seeming to understand the concept of trust, is baffling.

Re: Still Secret Source?
Anonymous Coward 2 days ago
Indeed. If you are going to write software that can secure something it should be solid enough that be able to view the code doesn’t allow someone to just punch holes right through said security. Security through obscurity is something even Microsoft has learned doesn’t work so why is this champion of secure computing trying to push it

A case for UVST in my “The economics of meaningful assurance of computing services for civilian use” lecture slides

On Aug 8th 2014 in Trento, Italy, Open Media Cluster Director Dr. Rufo Guerreschi was invited and honored by Jovan Golic – the PEU EIT ICT LABS Privacy, Security and Trust Action Line Leader of the €3 billion EU R&D agency – to hold the (only) Concluding Guest Lecture to over 50 post-graduate students selected for their prestigious EU EIT ICT Labs “Security and Privacy in Digital Life” Summer School.

During the 90 minutes of the presentation, name “The economics of meaningful assurance of computing services for civilian use”, he argued the limited costs, public benefits and technical feasibility of the creation of computing services (and devices) with meaningfully-high security and privacy assurance for wide-scale civilian deployment, such as those we’ve been pursuing with our User Verified Social Telematics project, with over 15 Italian, EU and Brazilian partners.

Here a copy of the slides (odtpdf), or here in Slideshare: