[Noisebridge-discuss] cryptoparty Tahoe-LAFS workshop

Mitch Altman maltman23 at hotmail.com
Mon Sep 8 21:37:03 UTC 2014

Hi David, 

I think the best thing to do is to schedule the workshop at a date that is good for you, with enough time to publicize.  And people will come! 

Please add it to the wiki under Events. 


Date: Sat, 6 Sep 2014 17:50:51 +0000
From: dstainton415 at gmail.com
To: noisebridge-discuss at lists.noisebridge.net
Subject: Re: [Noisebridge-discuss] cryptoparty Tahoe-LAFS workshop

Dear Noisebridge,
I am returning to San Francisco tomorrow and I think we should now discuss when to have our Tahoe-LAFS workshop.
If we do it right this will not be a normal workshop where we just talk about things.
We will build a Tahoe-LAFS storage grid that will only be accessible over Tor Hidden Services.
Everyone contributing storage will benefit from the collective of storage nodes because your
stored ciphertext will have the option of data redundancy beyond your own storage node(s).
Additionally, Tahoe-LAFS grids whose storage nodes are controlled by several entities have more
robust security guarantees... and when the Tor Project fixes their Hidden Services implementation we also win.
How does a Saturday afternoon sound?
My schedule is extremely flexible... and I was just guessing that most people have jobs
or other responsibilities during the week.
One really cool thing you can do with your storage node is: use it to serve content directly from Tahoe-LAFS over
a seperate Tor hidden service onion address. Using nejucomo's Restrictive Proxy Gateway python program I generated an nginx config setup to safely proxy Tahoe-LAFS URIs from the URL to the Tahoe-LAFS node gateway which retrieves the content from the grid and decrypts it.
If this sounds confusing... it's not and I can help you set this up and explain the differing security guarantees.
It allows you to publish web content that is backed by the Tahoe-LAFS grid.
For instance you can create an APT mirror (for Debian, Mempo or whatever) with just a few lines of bash:
cat <<EOT>mirror.list
set base_path    /home/amnesia/apt-mirror
set defaultarch  amd64
set nthreads     20
set _tilde 0
deb http://deb.mempo.org/debian wheezy main
clean http://deb.mempo.org/debian
sudo apt-get update
sudo apt-get install apt-mirror
apt-mirror mirror.list
tahoe create-alias mempo-repo
tahoe backup --verbose /home/amnesia/apt-mirror/mirror/deb.mempo.org mempo-repo:mempo
AND.... voila! an APT repository whose contents are censorship resistant and only accessible via the Tor network!
In my paricular case this content is now accessible from a Tahoe-LAFS grid using this URL:
I now leave you with a reminder of the Cypherpunks Manifesto; if you attend my workshop and help us build our Tahoe-LAFS storage grid and use it instead of the inferior mainstream cloud storage implementations you will be participating in this Cypherpunks movement:
We must defend our own privacy if we expect to have any.  We must
come together and create systems which allow anonymous transactions
to take place.  People have been defending their own privacy for
centuries with whispers, darkness, envelopes, closed doors, secret
handshakes, and couriers.  The technologies of the past did not allow
for strong privacy, but electronic technologies do.
We the Cypherpunks are dedicated to building anonymous systems.
""" → https://w2.eff.org/Privacy/Crypto/Crypto_misc/cypherpunk.manifesto
David Stainton
my contact info → https://www.lumiere.net/~mrdavid/contact.txt

Noisebridge-discuss mailing list
Noisebridge-discuss at lists.noisebridge.net
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.noisebridge.net/pipermail/noisebridge-discuss/attachments/20140908/6a7086b9/attachment-0003.html>

More information about the Noisebridge-discuss mailing list