|Contact|| Tom Twiddlebit, Wau Holland Foundation;
carlo von lynX, secushare; Christian Grothoff, GNUnet; Hellekin, Lorea/FSF.
|Description||This summer the rumour was finally confirmed: somebody broke the Internet. We are inviting all projects that are providing a piece of the puzzle to create a GNU Internet stack that cuts out the man in the middle. Maybe your project is already on our map.|
|Members||Bart, Codethief, Grothoff, Hellekin, Infinity0, Jriede, Kaie, LynX, Nana, SonOfRa, Stalex, Tg|
|Projects||GNUnet, Lounge, Secushare, Tox|
|Self-organized Sessions||Detector.io, YBTI Crypto Names, YBTI Cryptographic Routing, YBTI Hardware, YBTI Introduction, YBTI Meshnet Works, YBTI Operating System, YBTI Political Attack Vectors, YBTI Results, YBTI Scalability, YBTI Strategic Choices, YBTI TNG Apps, YBTI Usability|
|Related to assembly||Amnesty International, C-base, DN42, Debian, EDRi, Electronic Frontier Foundation (EFF), Example Assembly, Das Gängeviertel, Forth-Gesellschaft, Gentoo, HACAS, I2P, LaQuadratureDuNet, Leiwandville, MEre, MuCCC, Awesome Retro, Wau Holland Stiftung|
|Registered on||12 November 2013 21:33:12|
|Location for self-organized sessions||no|
|Assembly specification||3. We need something special or in between those options: Please specify in the field planning notes.|
|Planning notes||[[Has planning notes::Seat numbers are inaccurate as we will share stuff and people with n² and HACAS.]]|
WE'LL MAKE OURSELVES A GNU ONE
This summer the rumour was finally confirmed: somebody broke the Internet. We are inviting all projects that are providing a piece of the puzzle to create a GNU Internet stack that cuts out the man in the middle. Maybe your project is already on our map.
Follow us on PRISM if you have nothing to hide... @youbrokethenet
At the 30c3 we'll hang out with HACAS and Wau Holland Stiftung within the NoisySquare (aka n²) when not in Hall E. You can also leave feedback (or your contact details) in our postbox at the latter assembly.
Finally, please feel free to fill the wiki with your ideas.
Somebody broke the Internet! The situation is urgent. We must meet in a series of workshops to discuss the layers of a new network stack and get projects to work together on the common goal of realizing the constitutional requirement of Secrecy of Correspondence. All panels and workshops are held in English. At each session there will be short presentations by various project panelists leading into debate & hacking.
We will also make audio/video recordings of the sessions, but no live stream. On the contrary, whenever you want to make a statement off-the-record just say so, we'll edit it out and wipe/shred it from the memory cards. We are collecting results from the sessions in the GNU wiki.
List sorted alphabetically
Here is the list of all sessions provided by people and groups related to #youbroketheinternet
|Detector.io||DetecTor is an open source project to implement client side SSL/TLS MITM detection, compromised CA detection and server impersonation detection, by making use of the Tor network.|
|YBTI Crypto Names||The great shoot out panel of the name resolution titans. Does it make sense to patch the Domain Name System? Which strategy should we pick for a safer new Internet stack? Should we require cryptographic privacy of name resolution?
|YBTI Cryptographic Routing||Cryptographic routing is the foundation of our GNU Internet beyond X.509, DNS, SMTP and XMPP. Even the IETF is now considering that Onion Routing should be a fundamental capability of the Internet. How would that look like in practice?
|YBTI Hardware||If the hardware we are running our systems on is intrinsically insecure, we may be building a fortress on top of a house of cards. Let's OWN what we BUY so it doesn't SPY on us.
|YBTI In Depth||A chance to go in-depth and cover some missing aspects.
|YBTI Introduction||Somebody broke the Internet. We will meet in a series of workshops to discuss the layers of a new stack and motivate projects to work together on the common goal of fixing the net and implement the constitutional right of Secrecy of Correspondence. This is a short kick-off introduction to the event series just before the Crypto Names session.|
|YBTI Meshnet Works||Cut out the service provider middle man. Projects like ServalMesh, Zyre, Briar, GNUnet and of course freifunk are already doing this. Let's make it a part of normality. Let's exchange public keys this way etc.
|YBTI Operating System||From safer use of cryptography over kernel magic to reproducible compilation up to a vision of a full security redesign of the OS.
|YBTI Political Attack Vectors||How much damage can be limited by appropriate legislation? Is it okay for example to propose a law that makes unencrypted private conversation technology illegal after 2014?
|YBTI Results||Presenting the results of the #youbroketheinternet sessions: - Which projects will participate in building the stack of a GNU Internet. - What architectural and security choices have we made. - Which jobs to be done have been identified, how you can help.|
|YBTI Scalability||How can we build systems that are capable of scaling to hundreds of millions of users? Why is it so hard to do a distributed Twitter so that it actually works?
|YBTI Strategic Choices||Based on the sessions in the past days it is time to take some decisions on the future of #youbroketheinternet:
|YBTI TNG Apps||The next generation on privacy and crypto apps all satellite around cryptographic routing. We'll discuss E-Mail replacements, secure telephony and DHT-based storage systems.
|YBTI Usability||How can we make our technologies grandparent compatible and the exchange of cryptographic keys and shared secrets a natural everyday transaction? Does every piece of software have to be socially aware to be usable?
List of sessions by architectural layer
- YBTI Introduction
- Usability and Adoption Threshold
- Next-Generation Applications
- YBTI In Depth: Architecture and Social Networking
- Scalability and Architecture
- Futures of Crypto Routing Backends
- Secure Name Systems
- Operating Systems
- (Wireless) Mesh Networks
- Free & Open Hardware
- Strategic Choices, Financing and Dissemination
- YBTI Results
- Political Attack Vectors
List of sessions by date
Check out http://youbroketheinternet.org or grab a flyer at the Wau Holland booth.
Related talks at NoisySquare:
- @smarimc –– mailpile
- @Kaepora –– cryptocat
Related Lightning Talks:
Related main conference talks:
What puts a project on the YBTI map?
(this answer is a work in progress)
We believe projects are participating in fixing the Internet if:
- they are contributing a piece to the GNU Internet stack;
- they are not investing in technologies that depend on DNS or X.509 (or, to put it differently, that use the cryptographic identity for resolution, authentication and routing rather than trying to fight the lost battle of securing key discovery);
- they are not trying to fix SMTP or XMPP (or, in other words, that aren't dependent on deploying servers that maintain private data in the clear);
- they don't mind Affero GPL being a political requirement (at the foundations of privacy we cannot afford companies to participate with proprietary versions or add-ons that will break such privacy. but they are welcome to do business over our upcoming infrastructure).