Pseudonymous Software Development and Strong Distribution

Presented at HOPE Number Six (2006), July 23, 2006, 4 p.m. (60 minutes).

A talk and tutorial on cryptographically strong pseudonymous software development and distribution models with the intent being to show hackers that when developing software is forbidden by law, developers can use PGP and other tools to continue to safely exercise their right to free speech in the form of source code. There will be a description of software release, upgrade cycle, security advisories, development team collaboration, and how to handle the reception of bug reports and patches from users. In addition you will learn how software developed by cypherpunks like the anonymous re-mailers, onion routing network implementations, and PGP key server networks can be used. See how the software works in theory (not command line options, etc.) covering topics like public key cryptography, digital signatures, zero knowledge proofs, and reputation systems. There will also be a discussion of the use of not commonly used cryptographic technologies such as ring signatures to prevent successful rubber hose attacks by authorities.


Presenters:

  • V. Alex Brennen
    V. Alex Brennen (VAB) is a programmer and systems administrator at MIT. He has been involved in the free software community for more than ten years. He has been producing software, patches, and documentation for most of that time. Before joining the MIT community, Alex worked for an IBM systems integrator, The Pediatric Oncology Group, and The University of Florida. His specialization is in medical information systems, peer to peer networking, and cryptographic solutions.

Links:

Similar Presentations: