Log in

View Full Version : WASTE Encrypted Network



Vageli
1st May 2008, 22:04
Comrades,
I know many of you are weary of communication over the internet for fear of it being tracked. There are, however, other forms of secure communication that use the internet as a medium. One example of such a network is WASTE
(at http://waste.sourceforge.net/)

It allows for nearly unbreakable secure communications (it would take on the order of hundreds of thousands of years to crack even a single communique, using ALL of the computing resources available to man at this given point in time). Thus, it is safe to say it is reasonably secure :D. Secure enough to discuss tactics and direct action with comrades. If any of you guys are interested in using such a network, I have been thinking about starting a server up to route the communications. If a few people are interested, maybe we can start something.

Also note, it not only provides a means to communicate but to also share any other media you may have on your computer (pictures, movies, docs, whatever) using the same encryption techniques, ensuring the secure transmission of whatever data you may care to transmit.

DIzzIE
2nd May 2008, 23:16
I remember playing around with WASTE when it first came around. It's pretty good for file sharing though be aware that you do expose your IP address. If you're just using it for chat you'll be better off hopping onto an overseas SSL-backed jabber server with the OTR or pidgin-encryption plugins (or similarly, an overseas SSL-backed IRC server with the FiSH encryption add-on) (For more info see Underground Security Paper no.1: Encrypting your Instant Messaging Conversations (http://forum.rorta.net/showthread.php?t=576)).

Freenet is another darknet that is worth checking out as well...(and the Anarchist Black Cross has, or at least had, a page on there ;)). Oh, and WASTE itself hasn't been worked on in several years, the latest fork is WASTE again: http://wasteagain.sourceforge.net/. Also, the whole point of making a WASTE mesh is to exchange data with trusted parties, not random users on a web forum.


'secure enough to discuss tactics and direct action with comrades. '

Sigh.

Never trust technology. Just because you have various levels of crypto enabled doesn't mean you're not under any other surveillance that makes your precautions totally fucking useless. Hardware keyloggers, rootkits, compromising emanations (Tempest) (http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-577.pdf), CIPAV (http://en.wikipedia.org/wiki/Cipav), and so on...:cursing:

Vageli
6th May 2008, 07:12
Very true. And your insight is much appreciated. I will look further into the technologies you have mentioned and any similar as well.