home *** CD-ROM | disk | FTP | other *** search
-
- Archive-name: net-privacy/part3
- Last-modified: 1994/5/7
- Version: 3.0
-
-
- IDENTITY, PRIVACY, and ANONYMITY on the INTERNET
- ================================================
-
- (c) Copyright 1993 L. Detweiler. Not for commercial use except by
- permission from author, otherwise may be freely copied. Not to be
- altered. Please credit if quoted.
-
- SUMMARY
- =======
-
- Email and account privacy, anonymity, file encryption, relevant
- legislation and references, and other privacy and rights issues
- associated with use of the Internet and global networks in general.
-
- (Search for <#.#> for exact section. Search for '_' (underline) for
- next section.)
-
- PART 3
- ====== (this file)
-
- Resources
- ---------
-
- <6.1> What UNIX programs are related to privacy?
- <6.2> How can I learn about or use cryptography?
- <6.3> What is the cypherpunks mailing list?
- <6.4> What are some privacy-related newsgroups? FAQs?
- <6.5> What is internet Privacy Enhanced Mail (PEM)?
- <6.6> What are other Request For Comments (RFCs) related to privacy?
- <6.7> How can I run an anonymous remailer?
- <6.8> What are references on privacy in email?
- <6.9> What are some email, Usenet, and internet use policies?
-
- Miscellaneous
- -------------
-
- <7.1> What is ``digital cash''?
- <7.2> What is a ``hacker'' or ``cracker''?
- <7.3> What is a ``cypherpunk''?
- <7.4> What is `steganography' and anonymous pools?
- <7.5> What is `security through obscurity'?
- <7.6> What are `identity daemons'?
- <7.7> What standards are needed to guard electronic privacy?
-
- Footnotes
- ---------
-
- <8.1> What is the background behind the Internet?
- <8.2> How is Internet `anarchy' like the English language?
- <8.3> Most Wanted list
- <8.4> Change history
-
-
- * * *
-
-
- RESOURCES
- =========
-
-
- _____
- <6.1> What UNIX programs are related to privacy?
-
- For more information, type `man [cmd]' or `apropos [keyword]' at the
- UNIX shell prompt.
-
- passwd - change password
- finger - obtain information about a remote user
- chfn - change information about yourself obtainable by remote
- users (sometimes `passwd -f')
- chmod - change the rights associated with a file or directory
- umask - (shell) change the default (on creation) file access
- rights
- ls - list the rights associated with files and directories
- xhost - allow or disable access control of particular users to an
- Xwindow server
- last - list the latest user logins on the system and their
- originations
- who - list other users, login/idle times, originations
- w - list other users and what they are running
- xhost - access control list for X Window client use
- xauth - control X Window server authentication
-
- .signature - file in the home directory appended to USENET posts
- .forward - file used to forward email to other accounts
- .Xauthority - file used for X Window server authentication keys
- $SIGNATURE - variable used for name in email and USENET postings
-
- The 'tcpdump' packet-tracing program is loosely based on SMI's
- "etherfind". It was originally written by Van Jacobson, Lawrence
- Berkeley Laboratory, as part of an ongoing research project to
- investigate and improve tcp and internet gateway performance. A
- current version is available via anonymous ftp from host
- ftp.ee.lbl.gov (currently at address 128.3.254.68) file
- tcpdump.tar.Z (a compressed Unix tar file).
-
- _____
- <6.2> How can I learn about or use cryptography?
-
- A general introduction to mostly theoretical cryptographic issues,
- especially those frequently discussed in sci.crypt, is available
- in FAQ form:
-
- > Compiled by:
- > cme@ellisun.sw.stratus.com (Carl Ellison)
- > Gwyn@BRL.MIL (Doug Gwyn)
- > smb@ulysses.att.com (Steven Bellovin)
-
- NIST (U.S. National Institute for Standards and Technology)
- publishes an introductory paper on cryptography, special
- publication 800-2 ``Public-Key Cryptograhy'' by James Nechvatal
- (April 1991). Available via anonymous FTP from
- csrc.ncsl.nist.gov (129.6.54.11), file pub/nistpubs/800-2.txt.
- Also via available anonymous FTP from wimsey.bc.ca as crypt.txt.Z
- in the crypto directory. Covers technical mathematical aspects
- of encryption such as number theory.
-
- More general information can be found in a FAQ by Paul Fahn of RSA
- Labortories via anonymous FTP from rsa.com in /pub/faq.ps.Z. See
- the `readme' file for information on the `tex' version. Also
- available as hardcopy for $20 from RSA Laboratories, 100 Marine
- Parkway, Redwood City, CA 94065. Send questions to
- faq-editor@rsa.com.
-
- Phil Zimmerman's PGP (Pretty Good Privacy) package for public key
- encryption is available at numerous sites, and is in widespread use
- over the internet for general PC-, Macintosh-, and UNIX-based file
- encryption (including email). Consult the archie FTP database.
- Also see the newsgroup alt.security.pgp. Mailing list requests to
- info-pgp-request@lucpul.it.luc.edu.
-
- From the RIPEM FAQ by Marc VanHeyningen
- <mvanheyn@whale.cs.indiana.edu> on news.answers:
-
- > RIPEM is a program which performs Privacy Enhanced Mail (PEM)
- > using the cryptographic techniques of RSA and DES. It allows
- > your electronic mail to have the properties of authentication
- > (i.e. who sent it can be confirmed) and privacy (i.e. nobody can
- > read it except the intended recipient.)
- >
- > RIPEM was written primarily by Mark Riordan
- > <mrr@scss3.cl.msu.edu>. Most of the code is in the public domain,
- > except for the RSA routines, which are a library called RSAREF
- > licensed from RSA Data Security Inc.
- >
- > RIPEM is available via anonymous FTP to citizens and permanent
- > residents in the U.S. from rsa.com; cd to rsaref/ and read the
- > README file for info.
- >
- > RIPEM, as well as some other crypt stuff, has its `home site' on
- > rpub.cl.msu.edu, which is open to non-anonymous FTP for users in
- > the U.S. and Canada who are citizens or permanent residents. To
- > find out how to obtain access, ftp there, cd to pub/crypt/, and
- > read the file GETTING_ACCESS.
-
- Note: cryptography is generally not well integrated into email yet
- and some system proficiency is required by users to utilize it.
-
- _____
- <6.3> What is the cypherpunks mailing list?
-
- Eric Hughes <hughes@toad.com> runs the `cypherpunk' mailing list
- dedicated to ``discussion about technological defenses for privacy
- in the digital domain.'' Send email to
- cypherpunks-request@toad.com to be added or subtracted from the
- list. From the charter:
-
- > The most important means to the defense of privacy is encryption.
- > To encrypt is to indicate the desire for privacy. But to encrypt
- > with weak cryptography is to indicate not too much desire for
- > privacy. Cypherpunks hope that all people desiring privacy will
- > learn how best to defend it.
-
- _____
- <6.4> What are some privacy-related newsgroups? FAQs?
-
- Newsgroups
- ==========
-
- alt.comp.acad-freedom.news
- alt.comp.acad-freedom.talk
- --------------------------
- Moderated and unmoderated issues related to academic freedom and
- privacy at universities. Documented examples of violated
- privacy in e.g. email. Documented examples of `censorship' as
- in e.g. limiting USENET groups local availability.
-
- alt.cyberpunk
- -------------
- Virtual reality, (science) fiction by William Gibson and Bruce
- Sterling, cyberpunk in the mainstream.
-
- alt.hackers
- -----------
- USENET Network News Transfer Protocol (NNTP) posting mechanisms,
- Simple Mail Transfer Protocol (SMTP), `obligatory hack' reports.
-
- alt.privacy
- -----------
- General privacy issues involving taxpaying, licensing, social
- security numbers, etc.
-
- alt.privacy.anon-server
- -----------------------
- Spillover of debate on news.admin.policy regarding anonymous servers.
-
- alt.privacy.clipper
- -------------------
- Group dedicated to discussing technical/political aspects of the
- Clipper chip.
-
- alt.security
- comp.security.misc
- ------------------
- Computer related security issues. FAQ in news.answers below.
-
- alt.security.pgp
- alt.security.ripem
- ----------------
- Dedicated to discussing public domain cryptographic software
- packages: PGP, or ``Pretty Good Privacy'' Software developed by
- Phil Zimmerman for public key encryption, and RIPEM by Mark
- Riordan for public key and DES encryption.
-
- comp.society.privacy
- --------------------
- Privacy issues associated with computer technologies. Examples:
- caller identification, social security numbers, credit
- applications, mailing lists, etc. Moderated.
-
- comp.org.eff.news
- comp.org.eff.talk
- -----------------
- Moderated and unmoderated groups associated with the Electronic
- Frontier Foundation started by Mitch Kapor for protecting civil
- and constitutional rights in the electronic realm.
-
- news.admin
- news.admin.policy
- -----------------
- Concerns of news administrators. NNTP standards and mechanisms.
-
- news.lists
- ----------
- USENET traffic distributions. Most frequent posters, most
- voluminous groups, most active sites, etc.
-
- sci.crypt
- ---------
- Considers scientific and social issues of cryptography.
- Examples: legitimate use of PGP, public-key patents, DES,
- cryptographic security, cypher breaking, etc.
-
-
- FAQs
- ====
-
- FAQs or ``Frequently-Asked Questions'' are available in the
- newsgroups *.answers or via anonymous FTP to pit-manager.mit.edu
- [18.172.1.27] (also rtfm.mit.edu) from the directory
- /pub/usenet/news.answers/[x] where [x] is the archive name. This
- FAQ is archived in the file `net-privacy'. Others are:
-
- network-info/part1
- ------------------
- Sources of information about the Internet and how to connect to
- it, through the NSF or commercial vendors.
-
- alt-security-faq
- ----------------
- Computer related security issues arising in alt.security and
- comp.security.misc, mostly UNIX related.
-
- ssn-privacy
- -----------
- Privacy issues associated with the use of the U.S. Social
- Security number (SSN).
-
- pdial
- -----
- Public dialup internet accounts list.
-
- college-email/part1
- -------------------
- How to find email addresses for undergraduate and graduate
- students, faculty and staff at various colleges and
- universities.
-
- ripem/faq
- ---------
- Information on RIPEM, a program for public key mail encryption
- officially sanctioned by Public Key Partners Inc., the company
- that owns patents on public key cryptography.
-
- unix-faq/faq/part1
- ------------------
- Frequently-asked questions about UNIX, including information on
- `finger' and terminal spying.
-
- distributions/*
- ---------------
- Known geographic, university, and network distributions.
-
- _____
- <6.5> What is internet Privacy Enhanced Mail (PEM)?
-
- Internet drafts on Privacy Enhanced Mail (PEM) describe a standard
- under revision for six years delineating the official protocols for
- email encryption. The standard has only recently stabilized and
- implementations are being developed.
-
- - RFC-1421: ``Privacy Enhancement for Internet Electronic Mail:
- Part I: Message Encryption and Authentication Procedures.'' J.
- Linn <104-8456@mcimail.com>
-
- - RFC-1422: ``Privacy Enhancement for Internet Electronic Mail: Part
- II: Certificate-Based Key Management'' S. Kent <Kent@BBN.com>
-
- - RFC-1424: ``Privacy Enhancement for Internet Electronic Mail:
- Part IV: Key Certification and Related Services'' B. Kaliski
- <burt@rsa.com>
-
- - RFC-1423: ``Privacy Enhancement for Internet Electronic Mail: Part
- III: Algorithms, Modes, and Identifiers'' D. Balenson
- <belenson@tis.com>
-
- Send email to pem-info@tis.com for more information. See ``RFCs
- related to privacy'' for information on how to obtain RFCs.
-
- _____
- <6.6> What are other Request For Comments (RFCs) related to privacy?
-
- RFC-822: SMTP, Simple Mail Transfer Protocol
- RFC-977: NNTP, Network News Transfer Protocol
- RFC-1036: Standard for interchange of network news messages
- RFC-1208: Glossary of Networking Terms
- RFC-1207: Answers to ``experienced Internet user'' questions
- RFC-1206: Answers to ``new Internet user'' questions
- RFC-1355: Privacy issues in Network Information center databases
-
-
- RFC-1177 is ``FYI: Answers to commonly asked ``new internet user''
- questions, and includes: basic terminology on the Internet (TCP/IP,
- SMTP, FTP), internet organizations such as IAB (Internet
- Activities Board) and IETF (Internet Enbgineering Task Force), and
- a glossary of terms. Also from ftp.eff.org:
- /pub/internet-info/internet.q.
-
- > RFCs can be obtained via FTP from NIC.DDN.MIL, with the pathname
- > RFC:RFCnnnn.TXT or RFC:RFCnnnn.PS (where `nnnn' refers to the
- > number of the RFC). Login with FTP, username `anonymous' and
- > password `guest'. The NIC also provides an automatic mail
- > service for those sites which cannot use FTP. Address the
- > request to SERVICE@NIC.DDN.MIL and in the subject field of the
- > message indicate the RFC number, as in `Subject: RFC nnnn' (or
- > `Subject: RFC nnnn.PS' for PostScript RFCs).
- >
- > RFCs can also be obtained via FTP from NIS.NSF.NET. Using FTP,
- > login with username `anonymous' and password `guest'; then
- > connect to the RFC directory (`cd RFC'). The file name is of the
- > form RFCnnnn.TXT-1 (where `nnnn' refers to the number of the
- > RFC). The NIS also provides an automatic mail service for those
- > sites which cannot use FTP. Address the request to
- > NIS-INFO@NIS.NSF.NET and leave the subject field of the message
- > blank. The first line of the text of the message must be `SEND
- > RFCnnnn.TXT-1', where nnnn is replaced by the RFC number.
-
- _____
- <6.7> How can I run an anonymous remailer?
-
- Cypherpunk remailer source is at soda.berkeley.edu in the
- /pub/cypherpunks directory. It's written in PERL, and is
- relatively easy to install (no administrative rights are required)
- although basic familiarity with UNIX is necessary. Karl Barrus
- <elee9sf@menudo.uh.edu> has more information and modifications.
- Also, most remailer operators mentioned above are amenable to
- discussing features, problems, and helping new sites become
- operational. Address all points in the section ``responsibities of
- anonymous use'' in this document prior to advertising your service.
- You should be committed to the long-term stability of the site and
- avoid running one surreptitiously.
-
- _____
- <6.8> What are references on privacy in email?
-
-
- Brown, Bob. ``EMA Urges Users to Adopt Policy on E-mail Privacy.''
- Network World (Oct 29, 1990), 7.44: 2.
-
- Bairstow, Jeffrey. ``Who Reads your Electronic Mail?'' Electronic
- Business (June 11, 1990) 16 (11): 92.
-
- ``Electronic Envelopes - the uncertainty of keeping e-mail private''
- Scientific American, February 1993.
-
- ftp.eff.org
- ===========
-
- /pub/eff/papers/email_privacy
- ---
- Article on the rights of email privacy. by Ruel T. Hernandez.
-
- /pub/academic/law/privacy.email
- ---
- ``Computer Electronic Mail and Privacy'', an edited version of a
- law school seminar paper by Ruel T. Hernadez.
-
- /pub/eff/papers/email-privacy-biblio-2
- ---
- Compilation of bibliography on E-Mail and its privacy issues (part
- 2 of the work). Compiled by Stacy B. Veeder (12/91).
-
- /pub/eff/papers/email-privacy-research
- ---
- The author at Digital Research tried to formalize their employee
- privacy policy on E-Mail. The casesightings are divided into two
- groups: US Constitutional law, and California law.
-
- /pub/eff/papers/company-email
- ---
- Formulating a Company Policy on Access to and Disclosure of
- Electronic Mail on Company Computer Systems by David R. Johnson
- and John Podesta for the Electronic Mail Assocation
-
- /pub/cud/alcor
- ---
- Information on Alcor Co., an e-mail privacy suit.
-
- /pub/academic/law/privacy.email
- ---
- Email privacy search at Berkeley.
-
- _____
- <6.9> What are some email, Usenet, and internet use policies?
-
- The Computer Policy and Critiques Archive is a collection of the
- computer policies of many schools and networks, run by the
- Computers and Academic Freedom group on the Electronic Frontier
- Foundation FTP site. The collection also includes critiques of some
- of the policies.
-
- > If you have gopher, the archive is browsable with the command:
- > gopher -p academic/policies gopher.eff.org
- >
- > The archive is also accessible via anonymous ftp and email. Ftp
- > to ftp.eff.org (192.88.144.4). It is in directory
- > `pub/academic/policies'. For email access, send email to
- > archive-server@eff.org. Include the line:
- >
- > send acad-freedom/policies <filenames>
- >
- > where <filenames> is a list of the files that you want. File
- > README is a detailed description of the items in the directory.
- >
- > For more information, to make contributions, or to report typos
- > contact J.S. Greenfield (greeny@eff.org). Directory `widener'
- > contains additional policies (but not critiques).
-
-
- ftp.eff.org
- ===========
-
- /pub/cud/networks
- ---
- Acceptable Use Policies for various networks, including CompuServe
- (file `compuserve'), NSFNET (file `nsfnet') with information on
- research and commercial uses. See /pub/cud/networks/index.
-
- /pub/cud/networks/email
- ---
- Policies from various sysadmins about how they handle the issue of
- email privacy, control, and abuse, compiled by T. Hooper
- <hooper_ta@cc.curtin.edu.au>.
-
- /pub/cud/schools/
- ---
- Computer use policies of a number of schools. See schools/Index
- for a full list and description.
-
-
- Commentary
- ==========
-
- /pub/academic/faq/policy.best
- ---
- Opinions on the best academic computer policies.
-
-
- /pub/academic/faq/email.policies
- ---
- Do any universities treat email and computer files as private?
-
- /pub/academic/faq/netnews.writing
- ---
- Policies on what users write on Usenet.
-
- /pub/academic/faq/netnews.reading
- ---
- Policies on what users read on Usenet: should my university remove
- (or restrict) Netnews newsgroups because some people find them
- offensive?
-
- /pub/academic/faq/policy
- ---
- What guidance is there for creating or evaluating a university's
- academic computer policy?
-
-
- MISCELLANEOUS
- =============
-
- _____
- <7.1> What is ``digital cash''?
-
- With digital encryption and authentication technologies, the
- possibility of a widespread digital cash system may someday be
- realized. A system utilizing codes sent between users and banks
- (similar to today's checking system except entirely digital) may
- be one approach. The issues of cryptography, privacy, and
- anonymity are closely associated with transfer of cash in an
- economy. See the article in Scientific American by David Chaum
- (~Dec.1992).
-
- An experimental digital bank is run by Karl Barrus
- <elee9sf@Menudo.UH.EDU> based on suggestions by Hal Finney on the
- cypherpunks mailing list. To use the server send mail to
- elee7h5@rosebud.ee.uh.edu message with the following text:
-
- ::
- command: help
-
- user@host
-
- where `user@host' is your email address.
-
-
- _____
- <7.2> What is a ``hacker'' or ``cracker''?
-
- These terms arouse strong feelings by many on their meaning,
- especially on the internet. In the general news media in the past
- a person who uses computers and networks to malicious ends (such as
- breaking into systems) has been referred to as a hacker, but most
- internet users prefer the term ``cracker'' for this. Instead, a
- ``hacker'' is perceived as a benign but intensely ambitious,
- curious, and driven computer user who explores obscure areas of a
- system, for example---something of a proud electronic pioneer and
- patriot. This is the sense intended in this document. See also
- the ``Hacker's Dictionary'' and the FAQ `alt-security-faq'.
-
-
- _____
- <7.3> What is a ``cypherpunk''?
-
- From the charter of the cypherpunk mailing list:
-
- > Cypherpunks assume privacy is a good thing and wish there were
- > more of it. Cypherpunks acknowledge that those who want privacy
- > must create it for themselves and not expect governments,
- > corporations, or other large, faceless organizations to grant
- > them privacy out of beneficence. Cypherpunks know that people
- > have been creating their own privacy for centuries with whispers,
- > envelopes, closed doors, and couriers. Cypherpunks do not seek
- > to prevent other people from speaking about their experiences or
- > their opinions.
-
- See information on the cypherpunk mailing list below.
-
- See also the CryptoAnarchist Manifesto and the Cryptography Glossary
- in soda.berkeley.edu:/pub/cypherpunks.
-
- _____
- <7.4> What is `steganography' and anonymous pools?
-
- Closely associated with encryption is `steganography' or the
- techniques for not only pursuing private (encrypted) communication
- but concealing the very existence of the communication itself.
- Many new possibilities in this area are introduced with the
- proliferation of computer technology. For example, it is possible
- to encode messages in the least-significant bits of images,
- typically the most 'noisy'. In addition, when such an item is
- posted in a public place (such as a newsgroup), virtually
- untraceable communication can take place between sender and
- receiver. For steganographic communications in the electronic
- realm one another possibility is setting up a mailing list where
- individual messages get broadcast to the entire list and individual
- users decode particular messages with their unique key. An
- anonymous pool has been set up by Miron Cuperman
- (miron@extropia.wimsey.com) for experiments. Send email to
- <pool0-request@extropia.wimsey.com> with one of the following
- commands in the subject line:
-
- subscribe
- unsubscribe
- help
-
- _____
- <7.5> What is `security through obscurity'?
-
- `Security through obscurity' refers to the attempt to gain
- protection from system weaknesses by hiding sensitive information
- or programs relating to them. For example, a company may not make
- public information on its software's encryption techniques to evade
- `attacks' based on knowledge of it. Another example would be
- concealing data on the existence of security holes or bugs in
- operating systems. Or, some reliance may be made on the fact that
- some standard or mechanism with potential problems is serious
- because they are ``not widely known'' or ``not widely used.'' This
- argument is occasionally applied to mechanisms for email and Usenet
- posting `forgery'. `Security through obscurity' is regarded as a
- very feeble technique at best and inappropriate and ineffective at
- worst (also called the ``head-in-the-sand approach''). See the FAQ
- for alt.security.
-
- Some remarks of John Perry Barlow, cofounder of the Electronic
- Frontier Foundation, directed to NSA agents at the First
- International Symposium on National Security & National
- Competitiveness held in McLean, Virginia Dec. 1, 1992:
-
- > Digitized information is very hard to stamp classified or keep
- > contained. ... This stuff is incredibly leaky and volatile. It's
- > almost a life form in its ability to self-propagate. If
- > something hits the Net and it's something which people on there
- > find interesting it will spread like a virus of the mind. I
- > believe you must simply accept the idea that we are moving into
- > an environment where any information which is at all interesting
- > to people is going to get out. And there will be very little
- > that you can do about it. This is not a bad thing in my view,
- > but you may differ...
-
- _____
- <7.6> What are `identity daemons'?
-
- RFC-931 describes a protocol standard that allows UNIX programs to
- query a remote user's login name after connection to a local
- communication socket (a connection of this type is established
- during FTP and TELNET sessions, for example). The standard is not
- widely supported, perhaps 10% of internet sites currently implement
- it but the number is increasing. The mechanism is detrimental to
- anonymity. Regular users cannot disable it but system
- adminstrators can circumvent it. This standard may represent a
- trend toward greater authentication mechanisms.
-
- _____
- <7.7> What standards are needed to guard electronic privacy?
-
-
- Remailing/Posting
- -----------------
-
- - Stable, secure, protected, officially sanctioned and permitted,
- publicly and privately operated anonymous servers and hubs.
- - Official standards for encryption and anonymity in mail and USENET
- postings.
- - Truly anonymous protocols with source and destination information
- obscured or absent and hidden routing mechanisms (chaining,
- encrypted addresses, etc.)
- - Standards for anonymous email addressing, embedding files, and
- remailer site chaining.
-
- General
- -------
-
- - Recognition of anonymity, cryptography, and related privacy
- shields as legitimate, useful, desirable, and crucial by the
- general public and their governments.
- - Widespread use and implementation of these technologies
- by systems designers into
- hardware, software, and standards, implemented `securely,'
- `seamlessly,' and `transparently'.
- - General shift of use, dependence, and reliance to means other than
- wiretapping and electronic surveillance by law enforcement
- agencies.
- - Publicity, retraction, and dissolution of laws and government
- agencies opposed to privacy, replaced by structures dedicated to
- strengthening and protecting it.
-
-
-
- FOOTNOTES
- =========
-
-
- _____
- <8.1> What is the background behind the Internet?
-
- The article ``Internet'' in Fantasy and Science Fiction by Bruce
- Sterling <bruces@well.sf.ca.us> contains general and nontechnical
- introductory notes on origins of the Internet, including the role
- of the RAND corporation, the goal of network resilience in face of
- nuclear attack, MIT, UCLA, ARPANET, TCP/IP, NSF, NREN, etc.:
-
- > ARPANET itself formally expired in 1989, a happy victim of its
- > own overwhelming success. Its users scarcely noticed, for
- > ARPANET's functions not only continued but steadily improved.
- > The use of TCP/IP standards for computer networking is now
- > global. In 1971, a mere twenty-one years ago, there were only
- > four nodes in the ARPANET network. Today there are tens of
- > thousands of nodes in the Internet, scattered over forty-two
- > countries, with more coming on-line every day. Three million,
- > possibly four million people use this gigantic
- > mother-of-all-computer-networks.
- >
- > The Internet is especially popular among scientists, and is
- > probably the most important scientific instrument of the late
- > twentieth century. The powerful, sophisticated access that it
- > provides to specialized data and personal communication has sped
- > up the pace of scientific research enormously.
- >
- > The Internet's pace of growth in the early 1990s is spectacular,
- > almost ferocious. It is spreading faster than cellular phones,
- > faster than fax machines. Last year the Internet was growing at
- > a rate of twenty percent a *month.* The number of `host'
- > machines with direct connection to TCP/IP has been doubling
- > every year since 1988. The Internet is moving out of its
- > original base in military and research institutions, into
- > elementary and high schools, as well as into public libraries
- > and the commercial sector.
-
- References
- ==========
-
- Bowers, K., T. LaQuey, J. Reynolds, K. Roubicek, M. Stahl, and A.
- Yuan, ``Where to Start - A Bibliography of General Internetworking
- Information'' (RFC-1175), CNRI, U Texas, ISI, BBN, SRI, Mitre,
- August 1990.
-
- The Whole Internet Catalog & User's Guide by Ed Krol. (1992)
- O'Reilly and Associates, Inc.
- ---
- A clear, non-jargonized introduction to the intimidating business
- of network literacy written in humorous style.
-
- Krol, E., ``The Hitchhikers Guide to the Internet'' (RFC-1118),
- University of Illinois Urbana, September 1989.
-
- ``The User's Directory to Computer Networks'', by Tracy LaQuey.
-
- The Matrix: Computer Networks and Conferencing Systems Worldwide.
- by John Quarterman. Digital Press: Bedford, MA. (1990)
- ---
- Massive and highly technical compendium detailing the
- mind-boggling scope and complexity of global internetworks.
-
- ``!%@:: A Directory of Electronic Mail Addressing and Networks'' by
- Donnalyn Frey and Rick Adams.
-
- The Internet Companion, by Tracy LaQuey with Jeanne C. Ryer (1992)
- Addison Wesley.
- ---
- ``Evangelical'' etiquette guide to the Internet featuring
- anecdotal tales of life-changing Internet experiences. Foreword
- by Senator Al Gore.
-
- Zen and the Art of the Internet: A Beginner's Guide by Brendan P.
- Kehoe (1992) Prentice Hall.
- ---
- Brief but useful Internet guide with plenty of good advice on
- useful databases.
-
-
- See also ftp.eff.com:/pub/internet-info/. (Thanks to Bruce Sterling
- <bruces@well.sf.ca.us> for contributions here.)
-
-
- General
- =======
-
- Cunningham, Scott and Alan L. Porter. ``Communication Networks: A
- dozen ways they'll change our lives.'' The Futurist 26, 1
- (January-February, 1992): 19-22.
-
- Brian Kahin, ed., BUILDING INFORMATION INFRASTRUCTURE (New York:
- McGraw-Hill, 1992) ISBN# 0-390-03083-X
- ---
- Essays on information infrastructure. Policy and design issues,
- research and NREN, future visions, information markets. See
- table of contents in ftp.eff.org:/pub/pub-infra/1992-03.
-
- Shapard, Jeffrey. ``Observations on Cross-Cultural Electronic
- Networking.'' Whole Earth Review (Winter) 1990: 32-35.
-
- Varley, Pamela. ``Electronic Democracy.'' Technology Review
- (November/December, 1991): 43-51.
-
- ______
- <8.2> How is Internet `anarchy' like the English language?
-
- According to Bruce Sterling <bruces@well.sf.ca.us>:
-
- > The Internet's `anarchy' may seem strange or even unnatural, but
- > it makes a certain deep and basic sense. It's rather like the
- > `anarchy' of the English language. Nobody rents English, and
- > nobody owns English. As an English-speaking person, it's up
- > to you to learn how to speak English properly and make whatever
- > use you please of it (though the government provides certain
- > subsidies to help you learn to read and write a bit).
- > Otherwise, everybody just sort of pitches in, and somehow the
- > thing evolves on its own, and somehow turns out workable. And
- > interesting. Fascinating, even. Though a lot of people earn
- > their living from using and exploiting and teaching English,
- > `English' as an institution is public property, a public good.
- > Much the same goes for the Internet. Would English be improved
- > if the `The English Language, Inc.' had a board of directors
- > and a chief executive officer, or a President and a Congress?
- > There'd probably be a lot fewer new words in English, and a lot
- > fewer new ideas.
-
-
- _____
- <8.3> Most Wanted list
-
- Hopefully you have benefitted from this creation, compilation, and
- condensation of information from various sources regarding privacy,
- identity, and anonymity on the internet. The author is committed
- to keeping this up-to-date and strengthening it, but this can only
- be effective with your feedback, especially on sections of
- interest. In particular, the following items are sought:
-
- - Short summaries of RFC documents and other references listed,
- esp. CPSR files.
- - More data on the specific uses and penetration of RFC-931.
- - Internet traffic statistics. How much is email? How much
- USENET? What are the costs involved?
- - Famous or obscure examples of compromised privacy
- on the internet.
- - FTP site for the code (NOT the code) to turn the .plan file into a
- named pipe for sensing/reacting to remote `fingers'.
- - X Windows, EFF, CPSR FAQhood in news.answers.
-
- Commerical use of this document is negotiable and is a way for the
- author to recoup from a significant time investment. Email feedback
- to ld231782@longs.lance.colostate.edu. Please note where you saw
- this (which newsgroup, etc.).
-
- _____
- <8.4> Change history
-
- 5/7/93 v3.0 (current)
-
- Revisions/additions to Anonymity history. Anonymity history &
- commentary moved to new FAQ. Information on the Clipper chip
- initiative. Minor miscellaneous corrections. Crosslink program
- info deleted. Some EFF out-of-date file pointers not fixed.
-
- 3/3/93 v2.1
-
- CPSR pointer, new UNIX mode examples, digital telephony act,
- Steve Jackson incident, additions/ reorganization to
- anonymity section, part 3. Note: v2.0 post to sci.crypt,
- alt.privacy, news.answers, alt.answers, sci.answers was cancelled
- by J. Kamens because of incorrect subject line.
-
- 2/14/93 v2.0
-
- Major revisions. New section for X Windows. Some email privacy
- items reorganized to network security section. New sections for
- email liability issues, anonymity history and responsibilities.
- Split into three files. Many new sources added, particularly
- from EFF and CAF in new `issues' part. `commentary' from
- news.admin.policy. 21 day automated posting starts.
-
- 2/3/93 v1.0
-
- More newsgroups & FAQs added. More `Most Wanted'. Posted to
- news.answers. Future monthly posting to sci.crypt, alt.privacy.
-
- 2/1/93 v0.3
-
- Formatted to 72 columns for quoting etc. `miscellaneous,'
- `resources' sections added with cypherpunk servers and use
- warnings. More UNIX examples (`ls' and `chmod'). Posted to
- alt.privacy, comp.society.privacy.
-
- 1/29/93 v0.2
-
- `Identity' and `Privacy' sections added. `Anonymity' expanded.
- Remailer addresses removed due to lack of information and
- instability. Posted to sci.crypt.
-
- 1/25/93 v0.1
-
- Originally posted to the cypherpunks mailing list on 1/25/93 as a
- call to organize a list of anonymous servers.
-
- email ld231782@longs.lance.colostate.edu for earlier versions.
-
-
- * * *
-
- SEE ALSO
- ========
-
- Part 1
- ------ (first file)
-
- <1.1> What is `identity' on the internet?
- <1.2> Why is identity (un)important on the internet?
- <1.3> How does my email address (not) identify me and my background?
- <1.4> How can I find out more about somebody from their email address?
- <1.5> Why is identification (un)stable on the internet?
- <1.6> What is the future of identification on the internet?
-
- <2.1> What is `privacy' on the internet?
- <2.2> Why is privacy (un)important on the internet?
- <2.3> How (in)secure are internet networks?
- <2.4> How (in)secure is my account?
- <2.5> How (in)secure are my files and directories?
- <2.6> How (in)secure is X Windows?
- <2.7> How (in)secure is my email?
- <2.8> How am I (not) liable for my email and postings?
- <2.9> How do I provide more/less information to others on my identity?
- <2.10> Who is my sysadmin? What does s/he know about me?
- <2.11> Why is privacy (un)stable on the internet?
- <2.12> What is the future of privacy on the internet?
-
- <3.1> What is `anonymity' on the internet?
- <3.2> Why is `anonymity' (un)important on the internet?
- <3.3> How can anonymity be protected on the internet?
- <3.4> What is `anonymous mail'?
- <3.5> What is `anonymous posting'?
- <3.6> Why is anonymity (un)stable on the internet?
- <3.7> What is the future of anonymity on the internet?
-
- Part 2
- ------ (previous file)
-
- <4.1> What is the Electronic Frontier Foundation (EFF)?
- <4.2> Who are Computer Professionals for Social Responsibility (CPSR)?
- <4.3> What was `Operation Sundevil' and the Steve Jackson Game case?
- <4.4> What is Integrated Services Digital Network (ISDN)?
- <4.5> What is the National Research and Education Network (NREN)?
- <4.6> What is the FBI's proposed Digital Telephony Act?
- <4.7> What is U.S. policy on freedom/restriction of strong encryption?
- <4.8> What other U.S. legislation is related to privacy?
- <4.9> What are references on rights in cyberspace?
- <4.10> What is the Computers and Academic Freedom (CAF) archive?
-
- <5.1> What is the Clipper Chip Initiative?
- <5.2> How does Clipper blunt `cryptography's dual-edge sword'?
- <5.3> Why are technical details of the Clipper chip being kept secret?
- <5.4> Who was consulted in the development of the Clipper chip?
- <5.5> How is commerical use/export of Clipper chips regulated?
- <5.6> What are references on the Clipper Chip?
- <5.7> What are compliments/criticisms of the Clipper chip?
- <5.8> What are compliments/criticisms of the Clipper Initiative?
- <5.9> What are compliments/criticisms of the Clipper announcement?
- <5.10> Where does Clipper fit in U.S. cryptographic technology policy?
-
- * * *
-
- This is Part 3 of the Privacy & Anonymity FAQ, obtained via anonymous
- FTP to pit-manager@mit.edu:/pub/usenet/news.answers/net-privacy/ or
- newsgroups news.answers, sci.answers, alt.answers every 21 days.
- Written by L. Detweiler <ld231782@longs.lance.colostate.edu>.
- All rights reserved.
-