[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[tahoe-dev] press release: LeastAuthority.com announces Spy-Proof Backup

----- Forwarded message from Zooko Wilcox-OHearn <[email protected]> -----

Date: Wed, 31 Jul 2013 11:36:52 +0000
From: Zooko Wilcox-OHearn <[email protected]>
To: Tahoe-LAFS development <[email protected]>
Subject: [tahoe-dev] press release: LeastAuthority.com announces Spy-Proof Backup


We're really happy to be offering our LAFS-based ciphertext storage
service to the public! Please spread the word. Thank you very much to
everyone in our little community for making things like this possible.


Zooko Wilcox-O'Hearn

Founder, CEO, and Customer Support Rep


            LeastAuthority.com Announces A Spy-Proof Storage Service

   Wednesday, July 31, 2013

   [1]LeastAuthority.com today announced â??Simple Secure Storage Service
   (S4)â??, a backup service that encrypts your files to protect them from the
   prying eyes of spies and criminals.

   â??People deserve privacy and security in the digital data that make up our
   daily lives.â?? said the company's founder and CEO, Zooko Wilcox-O'Hearn.
   â??As an individual or a business, you shouldn't have to give up control
   over your data in order to get the benefits of cloud storage.â??

                         verifiable end-to-end security

   The Simple Secure Storage Service offers verifiable end-to-end security.

   It offers â??end-to-end securityâ?? because all of the customer's data is
   encrypted locally â?? on the customer's own personal computer â?? before it is
   uploaded to the cloud. During its stay in the cloud, it cannot be
   decrypted by LeastAuthority.com, nor by anyone else, without the
   decryption key which is held only by the customer.

   S4 offers â??verifiable end-to-end securityâ?? because all of the source code
   that makes up the Simple Secure Storage Service is published for everyone
   to see. Not only is the source code publicly visible, but it also comes
   with Free (Libre) and Open Source rights granted to the public allowing
   anyone to inspect the source code, experiment on it, alter it, and even to
   distribute their own version of it and to sell commercial services.

   Wilcox-O'Hearn says â??If you rely on closed-source, proprietary software,
   then you're just taking the vendor's word for it that it actually provides
   the end-to-end security that they claim. As the PRISM scandal shows, that
   claim is sometimes a lie.â??

   The web site of LeastAuthority.com proudly states â??We can never see your
   data, and you can always see our code.â??.

                               trusted by experts

   The Simple Secure Storage Service is built on a technology named
   â??Least-Authority File System (LAFS)â??. LAFS has been studied and used by
   computer scientists, hackers, Free and Open Source software developers,
   activists, the U.S. Defense Advanced Research Projects Agency, and the
   U.S. National Security Agency.

   The design has been published in a peer-reviewed scientific workshop:
   Wilcox-O'Hearn, Zooko, and Brian Warner. â??Tahoe: the least-authority
   filesystem.â?? Proceedings of the 4th ACM international workshop on Storage
   security and survivability. ACM, 2008.

   It has been cited in more than 50 scientific research papers, and has
   received plaudits from the U.S. Comprehensive National Cybersecurity
   Initiative, which stated: â??Systems like Least-Authority File System are
   making these methods immediately usable for securely and availably storing
   files at rest; we propose that the methods be further reviewed, written
   up, and strongly evangelized as best practices in both government and

   Dr. Richard Stallman, President of the Free Software Foundation
   ([3]https://fsf.org/) said â??Free/Libre software is software that the users
   control. If you use only free/libre software, you control your local
   computing â?? but using the Internet raises other issues of freedom and
   privacy, which many network services don't respect. The Simple Secure
   Storage Service (S4) is an example of a network service that does respect
   your freedom and privacy.â??

   Jacob Appelbaum, Tor project developer ([4]https://www.torproject.org/)
   and WikiLeaks volunteer ([5]http://wikileaks.org/), said â??LAFS's design
   acknowledges the importance of verifiable end-to-end security through
   cryptography, Free/Libre release of software and transparent peer-reviewed
   system design.â??

   The LAFS software is already packaged in several widely-used operating
   systems such as Debian GNU/Linux and Ubuntu.



   Visible links
   1. https://leastauthority.com/
   2. http://eprint.iacr.org/2012/524.pdf
   3. https://fsf.org/
   4. https://www.torproject.org/
   5. http://wikileaks.org/
   6. https://leastauthority.com/

tahoe-dev mailing list
[email protected]

----- End forwarded message -----
Eugen* Leitl <a href="http://leitl.org";>leitl</a> http://leitl.org
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B  47EE F46E 3489 AC89 4EC5