Part II

the Daemon at the Gateway

play part II

the Story

At end of the last scene, you board a plane with a banner waving behind it. On that banner, there is a number: your device's IP address. You fly off into the air to join other packets flying through the electromagnetic spectrum. While in the air, you begin to speak with other packets. Though you can see every packet and their IP addresses waving behind them, you can't always see what they're carrying inside. Some of these packets fly through the air unencrypted, and in those cases, they share their contents with you... be it an embarrassing forum post left by their user or a password being used to log into a server. In other cases, the packets are carrying encrypted payloads. You can see them flying around, but you can't read what they're carrying. Eventually you reach the router, a lighthouse on an island floating in the sky. There you meet another daemon. This one is in charge of establishing the network all the users in the cafe are connected to and assigning each their local IP addresses. Like an air traffic controller, he guides packets in and out of the local network. It is at this point that our local network connects to the rest of the Internet.

the Daemon at the Gateway is based on a real program called dnsmasq which is where the desing of his mask comes from.

the Tech

Every device on a network needs an IP address so that routers know where a packet needs to go and where it came from. The router of your local WiFi network assigns you an IP address when you connect to it, but when the packet leaves the local network it adopts the router's IP address assigned to it by the ISP, or Internet Service Provider (the next stage in our journey).

We are surrounded by electromagnetic radiation resonating at different frequencies, which is known as the electromagnetic spectrum. For most of human history we didn't know it was there, except, of course, for the part we could see (the visible light spectrum), but over time we discovered the rest of it and created technology that would allow us to broadcast messages over it, like radio and television. In the United States, the FCC regulates who can use which part of the electromagnetic spectrum and what they can use it for. They allow anyone to use the 2.4GHz or 5GHz part of the spectrum for WiFi.

Your computer typically ignores any packets which aren't meant for you (i.e., which aren't addressed to your IP). But it's trivially easy to use your WiFi card to listen to all the packets on the network, as it's all just floating through the air. This is one reason why encryption is important. While the outer layers of the packets must remain unencrypted for the Internet to work (everyone needs to be able to see the IP addresses otherwise they won't be routed properly), the application layer payloads inside can, and often should, be encrypted.

taking care of the net

They say if you're not doing anything wrong, you've got nothing to hide. Of course that's ridiculous. There are plenty of things worth keeping secret–e.g., personal finances or health. There are times you might want to keep your location private from your friends, or your political views private from certain family members, or your sexual orientation from your government. Or maybe you've got some kinky interests you don't want anyone except a significant other to know about. Or maybe you're writing a book and you don't want anyone anywhere to see it until the first draft is finished... and in none of those cases is what your hiding "wrong." When we're doing something online that you don't want the entire world to know about, you can use "encryption."

To encrypt data means to scramble the contents of that file using a key (aka passphrase) such that it can't be unscrambled (decrypted) without using the same (or otherwise cryptographically-related) key. Every time you use a passphrase, you are encrypting or decrypting something. Your browser sometimes handles the passphrase part for you. Every time you see the green lock or HTTPS (the "S" is for "secure") in your browser's address bar, that means you're using encryption to communicate with the computer running that website's server. Your packets are scrambled before they leave your device and remain scrambled throughout their journey until they arrive at the computer running that website's server. This is what's known as "end-to-end encryption".

Unfortunately, as a user of a web app or site, you don't really have a say in whether or not that website uses HTTPS; only the web developer can implement that. Often they don't, simply because it's not as much of a priority as graphic design or user interaction. Fortunately, as we continue to live more of our lives online and are realizing the importance of encryption, HTTPS has become the norm. Web developers have started to prioritize it to meet our demand. Unfortunately, for those in power, the proliferation of encryption is sometimes seen as an obstacle, and they often attempt to weaken encryption by passing laws that enforce "backdoors" and other intentionally weak encryption standards in the name of "security," but it's important to ask "security for who?"

All that said, using an HTTP site isn't the worse thing in the world. While it does mean others could, in theory, read your data (especially those on the same local network, like the other folks in the same cafe as our user), a good rule of thumb is to treat any HTTP activity like a public space; don't do anything you wouldn't be okay with the rest of the folks on that cafe WiFi network knowing about. Not EVERYTHING has to be encrypted; there are things you intentionally want to share. The most important part is to be aware and decide for yourself when and where it's important for you. This is a process known as "threat modeling," a somewhat intense phrase for an otherwise routine thought experiment.

a "bit" of history

Encryption is not an Internet-age invention. We've had secrets longer than we've had written language, and encryption is nearly as old. Some of the earliest forms of encryption date back to ancient Egypt, Greece and Rome. Of course, in those days it was done by hand. In ancient Rome, they would take a message and replace each letter with another a certain number of letters separated from it in the alphabet. The number to shift each letter by was the "key." So if the key was 3, the phrase "abcdefg" becomes "defhijk", or "hello" becomes "khoor." This was known as the Caesar Shift Cipher.

Over the years various forms of encryption have been used for everything from love to war. In Victorian England, it wasn't easy for young lovers to express their affection, especially when it was forbidden by parents. When writing letters through the post was too risky, they would instead leave encrypted messages for each other in the personal columns of the newspaper. These were known as "agony columns." During World War II, much of the communication was done over radio, which as discussed earlier can be easily intercepted, so some form of encryption was necessary. The US Marines enlisted twenty-nine Native American Navajo people to translate English messages into the Navajo language before communicating it over the radio. The non-written language was so unique it proved uncrackable during the war, and those Marines became known as the Navajo Code Talkers.

Cryptography isn't always about scrambling messages in transit, which is to say there are other techniques for communicating secretly beyond encryption. During the Vietnam War, American POW Jeremiah Denton was forced to lie on camera about the brutal conditions he was being held in by his captors in a televised press conference. However, he was able to hide the truth in plain site by spelling out "T-O-R-T-U-R-E" in Morse Code by blinking his eyes. The idea of hiding a message in plain site is generally referred to as steganography. One common example is writing a message using invisible ink. Another is taking a newspaper and marking certain letters with tiny dots or holes underneath, each discreetly-marked letter being a part of the secret message.

Computers are really good at traditional forms of mathematical encryption, so this has become the dominant form of cryptography today. That doesn't mean there isn't room for new creative forms of digital age steganography. For example, artist Maddy Varner hides secret messages within images of Kim Kardashian which proliferate on social media. She even produced a browser plugin called KARDASHIAN KRYPT so you can too. Another example is this website. If you're reading this on a desktop computer use your mouse to highlight the text of these paragraphs to discover a secret message we've left you!