Ever wanted to ditch big tech but had no idea how to? Grab your free Librem One account for social, chat and voice or a premium account with mail and VPN and get end-to-end encryption, no tracking, no ads and no data sharing https://librem.one #purism #libremone #opensource #deletefacebook
Yes, we know you're excited; Yes, you can see the anodized chassis we got into this Aspen batch; Yes, we are asking you to be patient as we incrementally ship through tens of thousands of Librem 5 phones over the next handful of months; Yes, you will get yours. Yes, you will be impressed. @purism #librem5
Aspen batch phones going out next will get an anodized chassis - look at those kill switches. Thank you for your patience as we incrementally ship through tens of thousands of Librem 5 phones over the coming months. Yes, we know you're excited, we are too and you will be impressed! #Purism #Librem5 #Linux
Facebook messaging app Threads wants continuous location and activity data - Business Insider
https://www.businessinsider.com/facebook-messaging-app-threads-location-fitness-activity-data-2019-10 #privacy #security #libremone
The World Just Had Another Month of Record Heat
https://earther.gizmodo.com/the-world-just-had-another-month-of-record-heat-1838771974 #climatechange #climatecrisis
DOJ will ask Facebook to halt end-to-end encryption plans
https://www.engadget.com/2019/10/03/doj-facebook-end-to-end-encryption-whatsapp-instagram-messenger/ #privacy #security #libremone #librem5
Carbon emissions soar as tourism reaches new heights
https://www.sciencedaily.com/releases/2019/10/191002121719.htm #climatechange #climatecrisis
Nice Librem 5 Specs video, @christitus !
@purism should def give you one ;)
Just wanted to add, the complainers totally miss that Purism is basically over-delivering on their promises. Check out
Promise Delivery Chart
https://forums.puri.sm/t/librem-5-promise-delivery-chart/6959
Chris' Spec video
https://www.youtube.com/watch?v=dUwneFZbBG0
Treaty would force Facebook to share encrypted chats with UK police
https://www.engadget.com/2019/09/28/us-uk-treaty-forces-sharing-of-encrypted-chats/ #privacy #security #libremone
Why Greta Thunberg Says We Have 8 Years To Stop Catastrophe
https://www.huffingtonpost.ca/entry/greta-thunberg-carbon-dioxide-numbers_ca_5d8e86b6e4b0ac3cdda8cd40 #climatechange #climatecrisis
"The Librem 5 is unlike anything else on the market. Not only is it one of the only smartphones on Earth that doesn't ship with Android, a fork of Android, or iOS—Purism's commitment to 100% open software, with no binary blobs..." https://arstechnica.com/gadgets/2019/09/purisms-librem-5-phone-starts-shipping-a-fully-open-gnulinux-phone/ #linux #opensource #librem5 #smartphone #pureos #gnome
"Selling a smartphone is a cutthroat business, and we've seen dozens of companies try and fail over the years. Purism didn't just survive long enough to ship a product—it survived in what is probably the hardest way possible, by building a non-Android phone with demands that all the hardware components use open code. Making it this far is an amazing accomplishment."
"The Librem 5 is, arguably, the first smartphone available that focuses on privacy and security because it does not exploit nor track the user’s digital footprint. The Librem 5 features, hardware kill switches, layered security protection, decentralized and IP-native communication, user-controlled sourced code, and hardware encryption." https://www.fosslinux.com/21079/long-anticipated-librem-5-linux-phones-start-shipping.htm #privacy #security #purism #librem5 #linux #smartphone
My run through of the Librem 5 privacy and security-focussed mobile phone... What a joy to finally have it in my hands! My congratulations to the extraordinary team at Purism.
https://invidio.us/watch?v=Gvnt78mK-Ac&hl=en-US&local=false&autoplay=0&subtitles=%2C%2C #privacy #security #librem5
Massive Climate Strikes Erupt Worldwide for the Second Week in a Row
https://earther.gizmodo.com/massive-climate-strikes-erupt-worldwide-for-the-second-1838521876 #climatechange #climatecrisis
Purism’s Librem 5 phone starts shipping—a fully open GNU/Linux phone
https://arstechnica.com/gadgets/2019/09/purisms-librem-5-phone-starts-shipping-a-fully-open-gnulinux-phone/ #privacy #security #librem5
Would you like to see more photos of the now shipping https://puri.sm/posts/first-librem-5-smartphones-are-shipping/ Librem 5 Aspen batch? Of course you would, here are some close-ups of the metal case #Purism #Librem5 #Librem5Aspen #Linux #GNOME #smartphone #privacy #security
Carnegie Experts Should Know: Defending Encryption Isn't an "Absolutist" Position
In the digital world, strong encryption is how private conversations stay private. It’s also what keeps our devices secure. Encryption is under a new set of attacks by law enforcement, who continue to seek a magic bullet—a technological backdoor that could circumvent encryption, but somehow not endanger privacy and security more broadly. But that circle can’t be squared, and at this point, the FBI and DOJ know that. That’s why as the government has pushed forward with this narrative, it’s been increasingly backed by false claims.
Now, a group of prominent academics and policy makers has signed on to a deeply misguided report that attempts to re-frame the debate along the lines that law enforcement agencies have long urged. The paper is the work of a small group convened by the Carnegie Institute for Peace, which claims to seek a more “pragmatic and constructive” debate about the “challenges” of encryption. Unfortunately, the report begins with the premise that the “problem” to be solved is that law enforcement agencies sometimes can’t access encrypted devices, then suggests those who disagree with the premise hold “absolutist” positions. It goes on to endorse a version of the discredited “key escrow” scheme that, as we have explained before, just won’t work.
It’s hard to search for “middle ground” in the debate when it is, by definition, a security flaw.
The Carnegie report seeks to differentiate itself from earlier discussions by narrowing areas of disagreement between law enforcement and privacy advocates, seeking to break down the issues into their “component parts.” That’s not a bad idea in itself. But in this case, the separation of the various components ends up just being a way to limit the areas of damage to encryption, focusing on data at rest on a mobile phone. And the report limits this intervention to the strategy it deems most palatable to those with privacy concerns: a system in which phones have a decryption key, specific to that phone. Once police fulfill proper legal process, such as getting a warrant, then they’ll get access to the key on the device. Presumably, that will happen via a separate key held by the company that created the device, or another external agent (the report says only that the key will be “held securely.”)
But building new ways to break into encrypted devices—also known as backdoors—is just a bad idea. Narrowing down the situations and methods under which it takes place doesn’t change that fundamental calculation.
Breaking Encryption Hurts Privacy and Security
As we said when the National Academy of Sciences published a paper on this topic last year, there’s no substitute for strong encryption. If an additional decryption key exists, it can and will be misused. Putting it in the hands of the company that created the phone, and insisting on proper legal procedure, is no guarantee against misuse. Nor would it prevent an attack by an outside actor—a criminal who stole the keys, a rogue government agent who subverted legal process, or an insider at the key-holding company that abuses their access for personal interests.
Maintaining strong encryption—in which only the intended recipient of a message can see the message—isn’t an extreme or “absolutist” position. It’s a position that privacy- and security-enhancing technology should work properly, and shouldn’t be broken by design. It’s hard to search for “middle ground” in the debate when middle ground is, by definition, a security flaw.
Second, it’s not just U.S. government agencies that are interested in gaining access to mobile phones. Other governments, including repressive governments, will insist on having similar systems of access for their own police.
We can’t deny that in certain cases, providing exceptional access to law enforcement will provide helpful evidence. But constantly calling encryption a “challenge” to criminal investigations is a circular and disingenuous argument. It’s not much different than the “challenge” to law enforcement presented by any unrecorded, face-to-face conversation between two human beings. On this basis, any human interaction that is not overseen and recorded for law enforcement could be cited as an investigative “challenge.” Privacy does present challenges, but it’s indispensable to our lives. Without privacy, we won’t have the free expression and free debate we need for democracy to thrive.
Moving Beyond Breaking Phones
The FBI and DOJ have spent years arguing to the American people that they should have access to plaintext of every digital conversation that crosses our devices. But that ignores the many other techniques that make it possible to investigate, and draw conclusions about, what has happened in the past—including simple interviews that rely on memory.
One of the reasons for the Carnegie working group report’s narrow focus is, in fact, the astonishing amount of data police currently have access to. For instance, cloud services are excluded from consideration, dismissed as “a less worrisome area than encrypted phones or encrypted messaging.” The paper rightly points out that the prevalence of cloud data is already “a tool and source of data for law enforcement.” Even if more cloud data becomes encrypted—as EFF has urged—the adoption of Internet-connected devices will continue to generate data that’s accessible to law enforcement.
The paper also strategically leaves aside other methods of access, such as forced software updates. The authors correctly note that if software updates are mechanisms of access for law enforcement, consumers could lose trust in those updates. And the report acknowledges that this could be even more pronounced in vulnerable communities, citing “minority groups who fear law enforcement targeting.” These trust problems are real, and the “key escrow” system that the authors propose does not magically avoid them.
In the end, we’re disappointed that this thoughtful group chose to examine encryption solely as a “challenge” to police seeking a form of special access. We shouldn’t lose sight of the huge benefits that secure, private encryption provides us all.
Chairperson, Purism, SPC
Lawyer (LL.B, J.D.) and Chartered Director (C. Dir.)