Bonum Certa Men Certa

Julian Assange on Cryptographically-deniable Block Storage Device (aka Marutukku)

posted by Roy Schestowitz on Jun 26, 2024

Julian Assange outside court in 1995

THE original page of the archive has not been online for years, but it was captured by the Wayback Machine and the Internet Archive is now at risk due to litigation. So today we reproduce a message sent nearly 25 years ago by Julian Assange, proposing secure transmissions:

From: Julian Assange <proff@i...> Subject: call for ocaml volunteers

For some time now, our group has been working on a cryptographically-deniable block storage device (aka Marutukku), on which regular file-systems can be mounted, targeted at the human/activist community. We expect to release a developers code set at the Usenix Security Symposium in Denver next week.

This is like a regular encrypted disk except that it supports multiple keys, where it is computationally infeasible given some of those keys to show that there are more keys, or that particular blocks of data are being used to store something other than unallocated space. Even for the legitimate user.

This mitigates against coercive interrogations and legal compulsion. Only "safe" information need be revealed. It isn't possible to show that additional information exists. Nor is it possible for the subject of a coercive demand to show that they have revealed all information. Thus a rational coercer can never demand proof of full co-operation, as its provision is computationally infeasible.

We have assorted kernel modules for Linux, NetBSD and FreeBSD. Although these modules are designed to abstract away OS primitives and provide a fast kernel<->userland messaging layer so the effort involved in porting to other operating systems is minimised.

However there are ways to protect against coercive interrogations that can be layered on top of cryptographic deniability and this is where Ocaml comes in. Keying schemes can be chosen that have beneficial psychological or psychological properties. These novel keying schemes are often graphical in nature and so Ocaml's ability to produce simple portable stand-alone graphics executables are spot on.

At the moment we have a passphrase-based keying feeding into a sophisticated key set up routine (that enforces 1 second of original cpu time per attempted key). However, passphrase based keying is non-optimal under many circumstances that the target group (human rights workers) might encounter, because passphrases can be quickly conveyed by speech or writing. That is:

1) Interrogations can take place in room101 and not the computer room. It's nicer, particularly given the frequency of equatorial despotism to be tortured in the computer room.

2) Revealing a passphrase only requires (some of) the brain and jaw or hand to be left functional.

3) Revealing a passphrase is quick and requires few higher cognitive functions, thus it is vulnerable to peak pain, hallucinogens and `truth drugs' such as schopolomine.

4) A single observation of a passphrase is enough grasp the whole keying state. Keyboard sniffers are cheap and in Australia at least, video bugging is not uncommon.

A good keying system prevents revealing of the key, placing the subject of interrogation in a hostile environment (i.e not the computer room), damage to as many parts of the subject's body as possible, retardation of the subjects mental faculties and retardation of the subject's free will. The keying system should also be practical enough to be used and adopted by real life people, and not require expensive or hard to find hardware.

Where a group of co-operating individuals is concerned, keying schemes should discourage defection against the group of individuals being coersively interrogated. Marutukku cryptographic deniability discourages defection due to the subject's inability to show that they have fully compiled with the interrogation (thus the incentive to defect, or at least defect completely, is minimised), but perhaps novel keying schemes can augment this.

It is important to understand that maru requires keying and not authentication. However any authentication method can be turned into a keying method, provided sufficient information for the authentication isn't held on the "server". For an example, maru could issue n challenges, each of which which the user's authentication algorithm authenticates or fails to authenticate; the hash of the concatenated authenticated challenges then forms the key. However schemes like this require n to be >=48, which seems practical only for automated methods, or combined with another method which presents more bits of key entropy per iteration.

Some possible alternatives to passphrase based keying (we have some more notes on these ideas, but no code or concrete design documentation):

1) interactive transposition matrixes. This is a simple method to prevent keyboard immediate keyboard sniffing. The user keeps their passphrase in their head, and a for each letter a transposition matrix is displayed on the screen.

2) Maze walking. A maze with several "landmarks" is drawn on the screen. The user must "visit" and move past these landmarks in a particular order and direction. 3) Enhanced face recognition. Several arrays of faces are displayed. The user must choose the numbers next to each face, perform a simple mathematical operation on them and input the number.

4) Constraint/simile problems. The user is presented with several secret knowledge problems of A is to B as C is to in different forms which test areas of cognitive function and or visual function which would be affected by drugs or severe pain.

5) Grid drawing. The user draws shapes within a n x n matrix. The direction of boundary crossing forms the key. For a similar idea, see "Graphical Passwords", a paper presented at last years usenix security symposium.

6) Colour contrast discrimination. It has been shown that individuals see slightly different hues due to visual cortex and cone cell / retina retina variation. It maybe possible to design moire or other tests on 24 bit displays which are recognisable by one party but not another. Just hope no-one runs a magnet over your monitor :)

7) Forward Error Correction based biometric keying. Traditionally signature and individual biometric variation tests have failed to provide good alternatives for keying, for two reasons. 1) the bio-authorisation template is "secret", hence useless for something like marutukku, where *all* secrecy is derived from the key. 2) quantitisation by the template of the inherent analog variability in the biological source in order to match with the template dramatically reduces the keyspace. A FEC based approach may resolve these issues.

Our current designs for plugable keying mechanims, simply introduce saved state on stdin and expect output state (which is subsequently hashed to form the key) on stdout.

What follows is a proto-type of 5.

As novel keying methods are an intresting problem that requires lateral thinking rather than specialist cryptographic expertise, I thought it may be of interest to ocaml coders in general.

(* keygrid (c) 2000 Julian Assange <proff-copyright@iq.org> *)

open Graphics
open Pervasives

let win_x = 400 let win_y = 300 let pi = 3.1415926951 let divisions = 6 let fdivisions = float_of_int divisions let sub_xy (x,y) (x',y') = (x -. x', y -. y') let scale x s = int_of_float(x *. (float_of_int s)) let scale_xy (x,y) = (scale x win_x), (scale y win_y) let rscale x s = (float_of_int x) /. (float_of_int s) let rscale_xy (x,y) = (rscale x win_x), (rscale y win_y) let cell_of_xy (x,y) = int_of_float (x*. fdivisions +. (floor (y *. fdivisions)) *. fdivisions ) let xy_of_cell cell = ((float_of_int (cell mod divisions)) /. fdivisions), ((float_of_int (cell / divisions)) /. fdivisions) let openwin () = open_graph (":0 " ^ string_of_int win_x ^ "x" ^ string_of_int win_y) let line xy0 xy1 = let (x0',y0') = scale_xy xy0 and (x1',y1') = scale_xy xy1 in Graphics.moveto x0' y0'; Graphics.lineto x1' y1'
let drawgrid () = let f x = (float_of_int x) /. (float_of_int divisions) in for n = 1 to divisions do line (0.0,(f n)) (1.0,(f n)); line ((f n),0.0) ((f n),1.0) done
exception Restart
let vectorise (x0,y0) (x1,y1) = let len = sqrt ((sqr (x0 -. x1)) +. (sqr (y0 -. y1))) in let angle = pi /. 2.0 +. asin ((x0 -. x1) /. len) in (angle, len)
let rec bordercross xy stat = let mstatus = Graphics.wait_next_event [Mouse_motion; Button_down; Button_up; Key_pressed] in let stat' = if Graphics.button_down() then `Following else `NotFollowing in let xy' = rscale_xy (mstatus.mouse_x, mstatus.mouse_y) in if mstatus.keypressed then if mstatus.key = ' ' then raise Restart else [] else let cell = cell_of_xy xy in if stat = `Following then let cell' = cell_of_xy xy' in line xy xy'; if cell != cell' or stat' = `NotFollowing then let (theta, len) = vectorise (xy_of_cell cell) (xy_of_cell cell') in (cell,cell') :: bordercross xy' stat' else bordercross xy' stat' else bordercross xy' stat'
let rec print_xovers = function | [] -> [] | (a,b)::tl -> print_string ((string_of_int a) ^ "->" ^ (string_of_int b) ^ " "); print_xovers tl
let main () = openwin(); let rec loop() = Graphics.clear_graph(); Graphics.set_color (rgb 0 0 200); drawgrid(); Graphics.set_color (rgb 200 0 0); Graphics.moveto 8 15; Graphics.draw_string "Draw secret. Press return when complete, or space to start over."; Graphics.set_color (rgb 0 0 0); try bordercross (0.0,0.0) `NotFollowing with Restart -> loop() in let xovers = loop() in let xovers' = List.stable_sort (fun (a0,a1) (b0,b1) -> a1 - b1) xovers in let xovers'' = List.stable_sort (fun (a0,a1) (b0,b1) -> a0 - b0) xovers' in print_xovers xovers'' ;;
main()

That was the year 2000.

How time flies. I was a student at the time and "war on terror" was not yet going on in Iraq. No 9/11 (yet), either. No PATRIOT Act.

Other Recent Techrights' Posts

IRC Proceedings: Saturday, January 17, 2026
IRC logs for Saturday, January 17, 2026
Microsoft Lunduke Keeps Distracting From the Real Problems With Rust
Microsoft Lunduke is stigmatising critics
Stack Ranking Against IBM/Red Hat Staff and a Signal of Mass Layoffs (RAs) Justified by Red Hat and IBM as Poor Performance/Misconduct/Other
Working in an atmosphere like this sounds like a nightmare
Microsoft's "valuation depends on infrastructure that does not exist."
Indeed
The Typical Trajectory: Datamation Began Experimenting With LLM Slop for Fake Articles. Then Datamation Died. (Last Month)
It's always ending up this way
Avoiding the Spooks (Nobody Watches the Watchers, They're Practically Unaccountable)
If more people adopt encryption, it'll be easier for us to deal with whistleblowers
Protecting Whistleblowers Requires Technical Knowledge/Skills
even the highest media judges aren't aware of how to protect sources
Report/Benchmark Says 'Vibe Coding' Results in Security Holes
There are risks they don't like talking about
Record Traffic in Geminispace or Over Gemini Protocol
it's never too late to join
The "Alicante Mafia" - Part III - Europe's Second-Largest Organisation on Strike, Protests, Other Industrial Actions to Come Impacting Over 95% of the Workforce
The EPO's management is highly evasive, weak, and vulnerable
 
Slop Bubble "Is Worse Than The Dot Com Bubble"
Edward Zitron Says It like it is
Software Patents and USMCA (or NAFTA)
We recently pondered going back to issuing 2-3 articles per day about patents and common issues with them
IBM Sued Over PIPs
PIPs are "performance improvement plans"
Sites With "Linux" in Their Name That Are in Effect Slopfarms and Issue Fake Articles
We try to name some of the prolific culprits
Gemini Links 18/01/2026: Raising Notifications From Terminal and Environmental Sanity
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
Links 17/01/2026: Internet Blackout Normalised, Russian Attacks Civilians by Causing Massive Blackouts
Links for the day
Linuxiac Has Become a Slopfarm, Calling Them Out Isn't Fixing That
What a shame. A once-decent site about "Linux" bites the dust.
Luzern Lion Monument, Albanian Female Whistleblowers: Swiss jurists were cowards
Reprinted with permission from Daniel Pocock
The Splinternet is Already Here, Owing to the Militarisation of Technology (Slop, Social Control Media, Back Doors, and More)
you know what's gonna happen next...
Gemini Links 17/01/2026: Slow computing and Environment Leak
Links for the day
Links 17/01/2026: US Censorship and Violence Crisis, Growing Anger Levels Against Slop Sold as "Intelligence"
Links for the day
Accounts or Devices (e.g. Phones) That Get 'Burnt' Have Many Pitfalls
Embassies and consulates habitually fail at this
At Least 5 Women Quit Brett Wilson LLP in Recent Months. It's the Firm That Attacked My Wife and I on Behalf of Americans (One of Them Strangled Women).
It seems like good news that the women escape this workplace
Slop About Slop and Slop About "Linux"
In short, avoid slopfarms
EPO Abuses Covered in Spanish
Knowing what we know (and heard/saw), the sinister silence of the media is perceived by some to be complicity of the lower order.
Richard Stallman Encourages "ICE Out For Good" Protests, His Opponents Do Not (Passive and Uncaring About Human Rights)
He has done a lot philosophically, politically, and so on
Claim That IBM Marked 15% of its Workforce for Potential Layoffs
No wonder we keep hearing from Red Hat people who say they hate IBM
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, January 16, 2026
IRC logs for Friday, January 16, 2026
Great Reset at IBM, the Company That Pulps Red Hat
In 2026 many workers are RTO'ed, PIP'ed, and at Red Hat many have effectively 'left the company' and now start afresh as "IBM" staff
The "Alicante Mafia" - Part II - Breakout of Discontent This Winter in Europe's Second-Largest Organisation
So far we've caused a lot of panic and stress inside Team Campinos
The "Alicante Mafia" - Part I - An Introduction to the Mafia Governing the EPO
Are some people 'evacuating' themselves to save face?
J.H.M. Ray Dassen & Debian, Red Hat, GNOME unexplained deaths
Reprinted with permission from Daniel Pocock
At Microsoft, "Firing People is a "Cheat Code" to Pump the Stock Short-term But They Are Literally Destroying the Company's Soul Long-term."
They frame layoffs as a "success story"
Gemini Links 16/01/2026: "Porting My Main Website Over to Gemini" and Seeed Studio DevBoard
Links for the day
IBM Stacked and Ranked Badly, Maladministration Dooms the Company
Now they stack people up for PIPs and layoffs ("RAs")
Google News Poisons Its Own Index With More Slopfarms (Including "filmogaz")
Naming and shaming lazy slobs who rip off other people using LLMs can work, eventually
Links 16/01/2026: UK Royal Family's "Legal Team Accused of Dishonesty, Fraud and Misconduct", OSI Still Controlled by Microsoft (the OSI's Spokesperson is on Microsoft's Payroll, Not Interim Executive Director, Deborah Bryant)
Links for the day
Writing About Corruption
Fraud is everywhere
The B in IBM is Brown-nosing and Buzzwords (or Both)
International Buzzwords Machines
Naming Culprits in Switzerland
Switzerland is highly secretive about white-collar crime
IBM's 'Scientific-Sounding' Tech-Porn Won't Help IBM Survive (or Be Bailed Out)
Who's next in the pipeline?
IBM Was Never the Good Guy
its original products were used for large-scale surveillance, not scientific endeavours
The Bluewashing is Making Red Hat Extinct (They All Become "IBM", Little by Little)
IBM does not care what's legal
Slopfarms Push Fake News About Microsoft Shutdown, 30,000+ Microsoft Layoffs Last Year Spun as Only "15,000"
The Web is seriously ill
Countries Take Action Against Social Control Media and 'Smart' 'Phones', Not Slop (Plagiarised Information Synthesis Systems or P.I.S.S.)
None of this is unprecedented except the scale and speed of sharing
Sanitised Plagiarism as "AI" (How Oligarchy Plots to Use Slop to Hide or Distract From Its Abuses, or Cause People Not to Trust Anything They See/Read Online)
This isn't innovation but repression
Sites That Expose Corruption Under Attack, Journalism Not Tolerated Anymore (the Super-Rich Abuse Their Wealth and Political Power)
Sometimes, albeit not always, the harder people try to hide something, the more effective and important it is for the general public
Recent Layoffs at Red Hat (2026 the Year of Ultimate Bluewashing)
I found it amusing that Red Hat's CEO has just chosen to wear all blue, as if to make a point
Links 16/01/2026: Social Control Media Curbs in Australia Underway, MElon Still Profiting by Sexualising Kids 'as a Service'
Links for the day
More People Nowadays Say "GNU/Linux"
We still see many distros and even journalists that say "GNU/Linux"
LLM Slop on the Web is Waning, But Linuxiac Has Become a Slopfarm
I gave Linuxiac a chance to deny this or explain this; Linuxiac did not
More Signs of Financial Troubles at Microsoft, Europe Puts Microsoft Under Investigation
The end of the library is part of the cuts
Team Campinos Talks About SAP Days Before EPO Industrial Actions and a Day Before the "Alicante Mafia" Series (About Team Campinos Doing Cocaine)
EPO staff that isn't morally feeble will insist on objecting to illegal instructions
Pedophilia-Enabling Microsoft Co-founder Cuts Staff
Compensating by sleeping with young girls does not make one younger
Microsoft Shuts Down Campus Library, Resorts to Storytelling About "AI" to Spin the Seriousness of It
Microsoft is in pain
Free Software Foundation (FSF) Back to Advertising the Talks of Richard Stallman
A pleasant surprise
Stack(ed) Rankings and Ongoing Layoffs at Red Hat and IBM (Failure to Keep Staff Acquired by IBM)
IBM is mismanaged and its sole aim is to game the stock market (by faking a lot of things)
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, January 15, 2026
IRC logs for Thursday, January 15, 2026
Gemini Links 16/01/2026: House Flood and Pragmatic Retrocomputing Dogfooding
Links for the day