Tag Archives: Ben Wizner

This is What Tor Supporters Look Like: Cory Doctorow and Ben Wizner

Cory Doctorow and family

I've been using Tor for more than a decade. I travel all the time, and often find myself connected to manifestly untrustworthy networks -- from the nets at hacker conferences to the one the Chinese government provided for our use at a World Economic Forum event in Dalian. Tor is my assurance that I'm browsing safely, privately and anonymously. When I do investigative journalism work on national security subjects, my go-to first line of defense is Torbrowser.

That why we at Boing Boing operate a high speed, high quality exit node. By the way, just this year we received two law enforcement requests for records relating to that node, and despite all the doomsaying about how the cops would punish you for operating an anonymizing tool, in both cases, we sent polite letters explaining that we don't keep logs, and in both cases, the cops returned a polite thanks and went away.

I donate to Tor, and I trust Tor, but even if I didn't trust 'em, I'd still use it. The great thing about free/open projects like Tor is that they're designed to work even if the people who make them don't agree with you or want what's best for you.

Ben Wizner
Ben Wizner, in thinking about the ways that Tor facilitates his work, is very clear: “It’s not an overstatement to say that secure technology such as Tor has made the ACLU’s work with Edward Snowden possible, “ he says.

Like Laura Poitras, using encryption was a learning process for Wizner, facilitated by key teachers, the first of whom was Laura herself.

“I was someone who went through most of my life unaware of these tools,” he says. “Laura (Poitras) came to my office in 2011 and installed Adium for me. `This is how we are going to communicate,” she said. “And this will help you communicate with the rest of the world as well.”

Jacob Appelbaum, Chris Soghoian, Renata Avila and Daniel Kahn Gillmor were all instrumental to Wizner as a he followed a similar learning curve to Poitras, quickly becoming familiar with Tor, PGP, Tails and Signal for many aspects of his work as Director of the ACLU’s Speech, Privacy and Technology project. It was his next teacher that, as he says, “gets us to the heart of the story. Starting in July 2013 I had a need to be able to communicate securely with Edward Snowden.”

From the start, as Ben aided Snowden with legal advice, he learned from him as well.

“[I was…] dealing with someone who is a world-class security technologist and also an excellent and very patient teacher,” he says. “I was entering a mode of communication where he felt extremely at home and I did not. This was going to be the only means of communication for an unknown length of time and we needed to exchange critical information, get to know each other and build trust, all while I am hunting and pecking on this tiny burner keyboard. And I have learned over the months and years how profound and intimate a chat conversation can be.”

Somehow it worked, and worked so well in fact, that meeting Snowden in person was a different experience for Wizner that he had expected.

“That was the surprising thing,” he says. “Even though we had gotten to know each other so well over so many hours of online conversation, I still had the expectation that our real relationship would begin when we met face to face. And yet it turned out to be a continuation rather than a new chapter.”

Wizner thinks often about the role that secure technology continues to play in both providing the foundation for their work together, and more broadly, in Ed’s continued participation in the larger dialogue around encryption.

“On one level, secure technology like Tor and Tails, has allowed Ed to defeat exile in a really profound way. Physical isolation has been imposed, but Ed is able to continue communicating to larger audiences from wherever he is. All of the legal and strategic advice,” he adds, “that goes into making these opportunities available and accessible for him would not be possible without using secure communications tools like Tor.”