Risk
10/1/2013
11:14 AM
Connect Directly
RSS
E-Mail
50%
50%

John McAfee Wants To Shield You From NSA

Eccentric antivirus company founder pitches $100 gadget meant to help you evade all forms of electronic surveillance.

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
Antivirus founder John McAfee wants to sell you a $100 box called D-Central designed to escape the National Security Agency's digital dragnet.

That pitch was made by McAfee -- Twitter tagline: "eccentric millionaire and still alive" -- Saturday during a "fireside chat" at Silicon Valley's C2SV Technology Conference. He said the devices could be used to create local, decentralized networks allowing laptops, tablets and smartphones to communicate and share files, backed by encryption to mask the network activity from any prying eyes.

"There will be no way [for the government] to tell who you are or where you are," McAfee said in his fireside chat, reported The Verge.

McAfee, who in 1987 founded but is no longer involved with the antivirus product company bearing his name, stormed back into the public consciousness last year after becoming a fugitive from justice in Belize, botching an attempted asylum bid in Guatemala, being deported to Miami, and ultimately landing in Portland, Ore., where he now resides.

[ Is the National Security Agency listening to your calls? Read NSA Vs. Your Smartphone: 5 Facts. ]

Since then, McAfee said he's been advancing plans to bring his D-Central to market, especially in the wake of the non-stop revelations over widespread NSA surveillance.

According to McAfee, D-Central will sport a unique encryption scheme that "the NSA won't get into," and be able to create a local Wi-Fi network with a range of about three blocks, which would further complicate efforts to monitor the networks. "Dcentral is the Internet equivalent of the Klingon cloaking device" from Star Trek, McAfee tweeted Monday.

McAfee himself "decloaked" earlier this year, at least in the pop culture sense, after he released a guide to uninstalling McAfee antivirus software, which proved popular with Internet viewers. (Spoiler alert: Some drugs and firearms might be required.)

Now, McAfee also plans to pitch D-Central not just for "privacy and freedom" purposes, but also squarely at pop culture consumers. Given the ease with which the gadgets could be used to enable file sharing, "I cannot imagine any college student not standing in line to buy one of these," McAfee said.

When might D-Central be ready for public vetting? McAfee said he's shooting for a prototype in about six months, and a related "Future Tense" website set up to advertise the product promised Tuesday that more details would be released in 172 days. "We have the design in place, we're looking for partners for development of the hardware," McAfee said.

Still, as noted by Mashable, this isn't the first attempt to create a localized network that offers better security and privacy than your typical hotspot. For example, a $50 Kickstarter-funded device known as FreedomBox will create a local mesh network. According to FreedomBox Foundation program manager Ian Sullivan, the system is meant to "keep your communications free and private whether chatting with friends or protesting in the street," although he emphasized that it could help during disaster response. Similarly, the Occupy movement's Occupy.here offers an "invisible temporary autonomous zone" that allows anyone within physical range of a device to use interact -- via Wi-Fi -- using the equivalent of an offline Web forum that gets carried on and replicated with each subsequent Occupy.here zone that the user encounters.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Greg MacSweeney
50%
50%
Greg MacSweeney,
User Rank: Apprentice
10/1/2013 | 5:26:40 PM
re: John McAfee Wants To Shield You From NSA
Klingon cloaking devices, Star Trek, McAfee, "Eccentric Millionaire & Still Alive." This article practically writes itself!
OtherJimDonahue
50%
50%
OtherJimDonahue,
User Rank: Apprentice
10/1/2013 | 7:15:59 PM
re: John McAfee Wants To Shield You From NSA
But who will protect us from John McAfee?
Mathew
50%
50%
Mathew,
User Rank: Apprentice
10/1/2013 | 7:25:48 PM
re: John McAfee Wants To Shield You From NSA
I am but a medium.
Laurianne
50%
50%
Laurianne,
User Rank: Apprentice
10/1/2013 | 7:35:23 PM
re: John McAfee Wants To Shield You From NSA
Cloaking devices: Perhaps Harry Potter could be of help here, too. I look forward to the next chapter.
OtherJimDonahue
50%
50%
OtherJimDonahue,
User Rank: Apprentice
10/1/2013 | 7:44:19 PM
re: John McAfee Wants To Shield You From NSA
You are a medium rare.
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Moderator
10/1/2013 | 8:00:59 PM
re: John McAfee Wants To Shield You From NSA
"There will be no way [for the government] to tell who you are or where you are..." For $100, you too can escape the scrutiny of an agency with $10 billion in annual funding and the legal cover to do pretty much whatever it wants. What a bargain.
Michael Endler
50%
50%
Michael Endler,
User Rank: Apprentice
10/1/2013 | 8:57:15 PM
re: John McAfee Wants To Shield You From NSA
You couldn't invent this guy. Last I'd really paid attention, he'd been arrested on suspicion of murder. And suddenly he pops up with a $100 technology that's going to thwart the NSA.
JFL01
50%
50%
JFL01,
User Rank: Apprentice
10/2/2013 | 9:16:10 AM
re: John McAfee Wants To Shield You From NSA
Great thinking however i don't think this will see light if it is engineered against the government.
Squeetard
50%
50%
Squeetard,
User Rank: Apprentice
10/2/2013 | 4:52:49 PM
re: John McAfee Wants To Shield You From NSA
That's cute. John McAfee thinks there are still people in this world who don't know he is a raving lunatic.
asksqn
50%
50%
asksqn,
User Rank: Apprentice
10/7/2013 | 1:00:41 AM
re: John McAfee Wants To Shield You From NSA
The joke is on consumers who fall forMcAfee's snakeoil - the NSA occupies the backbone of the internet thereby putting its data sniffing devices into optimal positioning for interception. It has also cracked TOR's encryption that can be had for FREE. So in addtn to being spied on w/o a warrant, consumers will also have their money extracted by a con artist. Such a bargain.
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4594
Published: 2014-10-25
The Payment for Webform module 7.x-1.x before 7.x-1.5 for Drupal does not restrict access by anonymous users, which allows remote anonymous users to use the payment of other anonymous users when submitting a form that requires payment.

CVE-2014-0476
Published: 2014-10-25
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

CVE-2014-1927
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928....

CVE-2014-1928
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulner...

CVE-2014-1929
Published: 2014-10-25
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.