Censorware outfit targets cDc's anonymity app ‘Peekabooty’

No good deed goes unpunished

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

The press has been blissfully buzzing lately with rumors and long-shot speculation about a privacy/anonymity application called Peekabooty, which white hat group Cult of the Dead Cow (cDc) is developing for roll-out at this year's Defcon convention in Las Vegas this July.

It certainly didn't take long for UK-based security/censorware outfit Baltimore Technologies to try to parlay the rumors into a fast buck by selling protection from Peekabooty -- which it warns will shelter criminals and pedophiles and lead to all sorts of crippling liabilities for corporate network operators -- with its product MIMEsweeper.

"Organizations can prepare and protect themselves from the malicious use of the "Peekabooty" browser, due to be launched in July, by using the Baltimore MIMEsweeper family of solutions," an alarmist company press release says.

"Although developed for ethical reasons [PB] has raised concerns that it may be abused and used maliciously to circulate child pornography, confidential information, and stolen data." (We just love it when censors try to sound righteous and civic-minded.)

But here's what's interesting; Balto Tech thinks it knows how Peekabooty works, and cites the media (chiefly ZDNet and the BBC) as the source of its information.

"Recent media reports claim that 'Peekabooty', a browser developed by 'The Cult of the Dead Cow', can make it impossible to control the material people have access to on the World Wide Web," the company warns.

Of course, controlling the material people have access to on the Web is what MIMEsweeper is all about. But we're not confident that Baltimore Tech knows what it's saying, because no one from cDc is willing to reveal precisely how Peekabooty works just yet. They naturally want to save the details for the rollout.

So Balto Tech is really saying that if PB works the way a few news drones guess it works, then they'll be able to defeat it; and you'd be wise to buy their products now, before this gangster-and-pedo-enabling scary hacker stuff gets loose.

Rumor and Innuendo

The great P2P myth comes originally, we think, from ZDNet's Will Knight, who on 30 April claimed that PB "will be based on peer-to-peer network technology. This allows data to be distributed directly between computer systems and has attained fame through the emergence of music-sharing technologies such as Napster and Gnutella."

And then that venerable technology source the BBC swallowed it whole, paraphrased it, and passed it along: "Peekabooty will work like the Gnutella peer-to-peer network that has no central server and instead uses all the machines in the system to hold data," their report dated 6 May says.

Undoubtedly this is how Balto Tech hopes it works. But unless they managed to obtain a beta version, then they're only guessing and selling the security equivalent of snake oil -- which is hardly a unique move in the world of commercial Internet security and virus protection.

The usual marketing fraud here depends on exaggerating some lame little threat in a slew of alarmist media releases, thereby using a less-than tech savvy press corps as a mechanism of free advertising to help sell peace-of-mind in the form of a product or service.

And here Balto Tech is showing great mastery of the 'exaggerated threat' genre, cynically appealing to the protection of innocent children in a bid to hustle its wares.

Some Truth about Peekabooty

We can't tell you exactly what it is (though we will in about a month's time); but we can certainly tell you what it isn't.

First off, it's not based on P2P technology; it's got nothing to do with anonymous file sharing, and nothing to do with distributed data storage. And, contrary to what Balto Tech imagines, it's not a 'browser.'

On the other hand, generally speaking, it has to do with anonymizing a client's access to a server. It will be distributed, but actual Web content won't (i.e., it's not a proxy scheme).

What's to be distributed here is a means of anonymous access to the Web. It will be collaborative, and in that sense similar to SafeWeb's Triangle Boy, and yet individualized.

It's also highly political. It defies, and rightly so, the outrageous claims of government and commerce upon our natural, human right to communicate freely, anonymously, and in confidence.

If it works as advertised, governments and corporations will hate it, and will struggle to defeat it. But if it works as advertised, it will evolve as an open-source application and perhaps stay a step ahead of would-be censors.

That it has both political and philosophical dimensions is no accident. The group is quite conscious of both, and is developing the tool deliberately in anticipation of political impact. In that sense, it represents hacktivism at its best.

Because it's able (we hope) to defeat commercial and government observation, and because it can be set up by individuals or small groups for their own use without recourse to any sort of 'official' assistance, it cuts society out of the private communications loop which it so desperately wishes to regulate.

Thus it speaks to the difference between civil rights, which are granted by societies through their governments, and human rights, or natural rights, which belong to us a priori. These are so essential to our nature as a species that no legitimate government has the right to abridge them, or even presume to grant them.

Among these are the right to draw breath; to believe what we will in spite of social conditioning; to draw the curtains when needed and be secure in an inviolable state of privacy, whether in solitude or in company. And of course, to communicate freely with our own kind. These are not 'civil rights': these are natural human needs, which grant us the natural privileges which each one of us owns from birth until death.

So if Peekabooty really does work as advertised, it will have the effect of removing society and its enforcers from one district, at least, in the realm of natural-rights regulation, where it has no business venturing, and restore an important balance of power between the individual and the masses surrounding him who think they know what he should be allowed to read, and to say.

We've got our fingers crossed. ®

Top three mobile application threats

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Sonos AXES support for Apple's iOS4 and 5
Want to use your iThing? You can't - it's too old
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Joe Average isn't worth $10 a year to Mark Zuckerberg
The Social Network deflates the PC resurgence with mobile-only usage prediction
prev story


Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.