BitMessage Secure Station open-hardware project.

May 22 15:25

I am Stman, working on a Secure End-point open-hardware low cost project for BitMessage, solving many important privacy issues : Keyloggers, Keyescrow, screen dumpers, and rising the level of anonymity when using TOR or other IP maskerading technologies like VPN's. I have discussed with Peter Surda about the project. If some developpers on the BitMessage software are interested, feel free to contact me. The details on the project have been published on the Crypto-Anarchist Federation channel on BitMessage. Chan Name: Crypto-Anarchist Federation Chan address : BM-2cWdaAUTrGZ21RzCpsReCk8n86ghu2oY3v ------ Indeed, this project we are developping is aiming at solving the best as we can (Military grade) the issues Snowden perfectly described and reminded us about End-Points (Computers) weaknesses when connected to the internet, and we do it radicaly using the best state of the art known technics, consisting in using a double-computer architecture : The draft "BitMessage Secure Station" hardware is detailed here : As you will understand, this add-on project is not about, at least for the moment, doing any major change to the BitMessage software, but to create a dedicated hardware that solves security issues that cannot be solved with a "Mono-processor" architecture : In the architecture we are designing, we are using a 2 microprocessors + 1 microcontroller model : • A first computer (Low cost Raspberry Pi, accessible to everybody for 30$) connected to the internet, that must considered compromized. • A second computer fully air gapped from the internet, you will use this one to read/enter your messages securely. • Interconnectiong both with a serial port, but for added security, this serial port goes through a "firewall" (Made out of a PIC microcontroller) that checks no side channels exist by ensuring the protocol defined for transfering data between the 2 computers is strictly respect, fitering at the same time time-based side channels on the serial port. • The PIC Microcontroller handling two serial ports and relayings data between each port bidirectionnaly, with its software higly secured (coded in assembly language, with NO OS and NO Libraries). For future versions, more secure ones, this microcontroller will be replaced by a low cost FPGA (Xilinx Spartan 6 LX 9), and all what was implemented in assembly language on the PIC microcontroller will be implemented as wired states machines into the FPGA : No more processor, no more software, meaning the software atack surface of this little "firewall" on the SPI port will be garanteed to be zero. We are simply taking in account the best state of the art knowledge in defensive cyber security in order to build an "hardend end-point", that can resist "NSA & friends" or "competitors" grade military attacks, therefore truly and proovenly protecting you from : ► Keyloggers malware protection : It is achieved architecturaly by having a double processor system, with one computer being compromized and connected to the internet, and another one air-gapped and not connected to the internet : The messages in clear text are being entered on the computer not connected to the internet : Assuming that there is no side channel or hidden channel on the serial port connecting the two processors (Will be discussed below), even if there is a keylogger installer on the air gapped computer, it will not be able to transfer its data if we can ensure there is no side channel or hidden channels between the two computers. ► Keyescrow malware protection (Protection of KEYS.DAT and MESSAGES.DAT): Same as above. (Prevent the private keys used by BitMessage from being stolen by agencies/hackers) ► Hardware integrated circuits serial numbers fingerprinting identification technic protection when using TOR or VPNs : This problem is solved by dedicating a new hardware for the first computer, connected to the internet and that will be compromized, whose serial numbers where never associated to the user identity before : A brand new Raspberry Pi bought in cash in an electronic store is the perfect way to achieve this. It also mean dedicating this hardware exclusively for this usage, and never connect to it any device : Exemple : Never connect USB Flashdisc key to it, whose serial number, already associated to the user's identity, to it, because it would allow to extrapolate the identity to associate to the Raspbery serial number to the identity already associated with the USB Flashdisc key. Same thing for LCD screen : They transmit serial number (VGA, DVI, or HDMI) to the graphic card, and can have the same terrible effect as a USB flashdisc key. We will have to give the user a list I have already been working on for years, of all the parts or subsystems known in a computer to have serial numbers. Let's say this issue is a matter of respecting a strict security procedure. ► Hardware characteristics (Speed of each processor analysis) fingerprinting identification technic protection when using TOR or VPNs : Same as above. ► Keystroke timing fingerprinting identification technic protection when using TOR or VPNs : This problem is solved architecturaly exactly like the Keylogger protection above. ► Phrasing and wording fingerprinting identification technic protection when using TOR or VPNs : We can use a trick many hackers know, and implement a kind of wording and rephrasing system : Using a translator for exemple, from english to french, and back french to english.... But there are other programs that do exist and to the job, There are many ways to do it indeed. This issue is also solved architecturaly as the Keylogger protection mecanism described above. ► Side channel & hidden channels protection between the first and the second computers, interconnected through a serial port : This problem is solved by inserting a microcontroller having two serial ports, on the serial link between the two computers : If the technic of using two microprocessor conected with a serial port that offers the lowest attack surface possible, it can be improved greatly inserting a microcontroller that will do the following : • Check that the little protocol we will have to invent and implement (And design as much hidden channel proof as possible) is correctly implemented, and that no other unwanted data are transmitted on the serial link. • Fight the timing side channel attack surface on the serial port : Serial ports offer the lowest attack surface regarding side & hidden channels, but it is still vulnerable to timing-between-each-byte-sent-on-the-serial-port side channel. The microcontroller code can "filter" these timings by buffering and normalizing them. Time based side channels are well known, and must be & can be fighted.

[chan] general
May 22 21:37

It is good to see devs with a dream. Do you guys have a github repo? I would like to clone it and follow it if you have one.

[chan] general
Jun 17 15:03

If you go through the Snowden docs you will find that in most cases where systems are compromised it is because spooks had physical access to a machine, or an exploit of common software like shitty firefux or flash. Tor is another spyware that allows the owners of the directory servers to track you.

[chan] general

Subject Last Count
Google Project Loon Proves Flat Earth Oct 22 02:19 3
chan: CHANBOT Response Oct 22 01:27 6
oops: CHANBOT Response Oct 22 00:34 1
all your crypto are belong to us (private key from public key only) Oct 22 00:02 5
The Coming Age of Special War Oct 21 22:06 5
The Real Ed Snowden Is a Patsy, a Fraud and a Kremlin-Controlled Pawn Oct 21 21:57 5
Flat earth We didn't land on the Moon Former NASA Scientist admits Game over for NASA Oct 21 21:53 5
Scientist Shows Proof That Rockets Do Not Work In The Vacuum of Space Oct 21 21:47 3
Do You Believe In Magic? Apollo - Soyuz Oct 21 21:40 2
Active measures (Russian: активные мероприятия) is a Soviet term for the actions of political warfare conducted by the Soviet security services (Cheka, OGPU, NKVD, KGB) to influence Oct 21 21:36 1
Neil deGrasse Tyson Exposed - Hollywood Actor Oct 21 21:31 2
Richard Spencer and His Kook-Right Ilk Are Agents of Russian Influence Oct 21 21:29 3
This man is Johnny Cash reincarnated.. and he's a flat earther this time. Oct 21 21:25 2
British Subversion of the United States: The militias and Pentecostalism Oct 21 21:08 2
Interview w/ Former NASA Employee Turned Flat Earther Oct 21 20:56 3
Flat Earth Man sings a song to you - Photoshop Cartoon Earth Photos Oct 21 20:42 2
A Flat Earth Song: "Puppet Show" YOU HAVE TO HEAR THIS!! Oct 21 20:32 2
Former NASA Scientist Confirms the Flat Earth What he said will Amaze You Oct 21 20:13 2
NASA Insider Exposes the Flat Earth! Oct 21 20:04 2
Neil Disgrace Tyson is Falling Faster Than The Globe Oct 21 19:57 2
Stallman admits GPL flawed, proprietary licensing needed to pay for MySQL development Oct 21 19:25 3
Will bitcoin hit $100K? Oct 21 19:22 1
Jared Kushner is a beautiful wife to Ivanka Oct 21 17:59 2
Gravity is a mystical force invented by Freemasons. Oct 21 17:55 5
Are you Christian? Oct 21 16:57 23
The Blue whale Game Oct 21 15:31 61
interesting NSA allusions Oct 21 14:59 2
astl32 Oct 21 11:32 2
officer Oct 21 11:30 2
Flat earth We did'nt land on the Moon Former NASA Scientist admits Game over for NASA Oct 21 11:09 6
Sage of Quay Radio Hour: Sofia Smallstorm – Assange, WikiLeaks and Beyond AI Oct 21 08:54 2
Julian Assange and Pedophile Baby Farms Oct 21 08:49 8
The NSA gets a bad rap. The NSA is not spying on me or you. They were not even spying on WikiLeaks, a high visibility target for the fascists, until the traitor Snowden proved there was a viable link Oct 21 08:43 2
Outer Space Photos are Fake. Oct 21 07:50 6
The Moon Does Not Reflect Sunlight. Oct 21 07:49 2
band 1023MB Oct 21 07:48 4
Homosexual Glasses Make Remote Objects Look Spherical. Oct 21 07:47 2
Helios is the god worshipped by astro-physicists Oct 21 07:46 2
The earth is a flat plane, not a globe. Oct 21 07:43 2
The 9 Russian Words That Explain KremlinGate Oct 21 07:37 2
Ships and the Horizon - Proof of a Flat Earth. Oct 21 07:32 2
Does gawd Forgive Child Molesters? Oct 21 07:19 1
What is the best BM Channel? Oct 21 04:43 3
WikiLeaks Vault7 confirms CIA can effectively bypass Signal + Telegram + WhatsApp + Confide encryption Oct 21 04:20 45
Sattelite pirating Oct 21 03:17 16
Tesla on the Flat Earth Oct 21 03:16 2
gates & windows Oct 21 02:55 1
Free as in free beer. Oct 21 02:52 1
Hypocrisy alarm... Richard Stallman charging money for (restricting) speech: Oct 21 02:49 1
ILLUMINATI Melania Trump is a tranny man - Duration: 4:03. Michelle X 3,717 views. 4:03. Lucille Ball. Man. Hellywood SRA Satanic Tranny Cult. Oct 21 02:43 1
Flat Earth - Bible Truth in an Unstable World Oct 21 02:33 2
MADONNA IS A MAN: Anatomy of an Illuminati Tranny Oct 21 02:30 1
The Largest Cult in the world: GNU/GPL Oct 21 02:27 1
The Globe is DEADER than EVER Oct 21 02:24 1
Satellites Are Fake - Just Another NASA Hoax Oct 21 02:20 1
Police Change Vegas Shooting Story Again Oct 21 02:17 1
GNU software is simply subsidized software. Oct 21 02:13 1
FLAT EARTH!! Outside The Dome!! Waters Above!! The Firmament Above!! Oct 21 02:13 1
Free software makes millions for Richard Stallman's cult. Oct 21 02:12 1
Antarctica is NOT a continent Tiger Dan925 Jumped Ship Oct 21 01:59 1
Perspective Focus on the Horizon Causes the Sun to Set. Oct 21 01:53 1
look into my oven herr stallman. Oct 21 01:50 1
Dunderheads in an imaginary mathematical universe Oct 21 01:48 1
Does God Forgive Child Molesters? Oct 21 01:45 1
Stallmanism Oct 21 01:31 1
Hell: You've Got it All Wrong! Oct 21 01:24 1
The Sun Cult of the Globe Earther Freemasons. Oct 21 01:23 1
Beware! The 7 Trumpets are About to Blast! Oct 21 01:18 1
Einstein described the world's smartest man Oct 21 01:12 1
NASA Faked Footage of ISS Space Station using Augmented Virtual Reality Oct 21 01:11 2
Globe Earthers Spend More Effort Opposing the Flat Earth Than They Spend Opposing Child Molestors. Oct 21 01:08 2
3 types of people Oct 21 01:03 4
King of the North - Ottoman Empire Oct 21 01:00 2
All Aboard Trump’s Tranny Train! Oct 21 00:53 2
The Moon Is ONLY 70 Miles Wide! Oct 21 00:53 2
Snowden's clearly an anarchist and traitor. Those who endorse him are just as dangerous. Oct 21 00:49 1
PROOF GPS Satellites Do Not Exist Oct 21 00:46 3
Memorial Day and the Rising Gorge: More than I Can Take Oct 21 00:38 6
The Stallman Tax Oct 21 00:35 4
bm ad Oct 20 23:47 1
Poland Pushes Back Against Putin’s Special War Oct 20 21:05 2
MeinCoin: NOTICE OF ADDRESS CHANGE Oct 20 20:34 10
No. Really. No. Oct 20 20:27 9
man gave cigarettes to teenagers Oct 20 19:33 4
CypherSaber: academia says to avoid overkill with encryption Oct 20 11:54 2
political activism Oct 20 10:17 3
some people need to suffer Oct 20 09:30 2
50 ways Oct 20 07:07 1
Uncommon law Oct 19 23:44 1
The Bitmessage Primer for Patriots Oct 19 21:41 1
(no subject) Oct 19 17:12 5
LGBT Bullshit Oct 19 12:04 2
Wifi is totally insecure Oct 19 10:54 27
BURN THE WITCH! Oct 19 06:34 5
Hire a professional hacker Oct 19 05:38 2
The real purpose of homophobia Oct 18 20:58 1
Wikileaks - Made By The NSA Oct 18 19:19 1