Technical security

As a collective we have a responsibility to act carefully and compassionately when it comes to security of the users of both our physical and internet spaces. There are some things we do well and some things we need to work on and this should be clear to users of our spaces. If you have questions you can email us at [email protected].

Store tech

We operate a wireless network in the store (Spartacus). This network is open to anyone using the space and LAN traffic is allowed between clients. We store no logs of network usage beyond a list of recently connected devices with their hostnames and MAC addresses. We regularly audit this data for suspicious clients.

We provide two public computers for anyone to use. These computers run a Debian flavour of linux. We keep them up to date as much as we can. We store no logs on these machines. However, we encourage folks to use Tails or another live operating system on these computers if they are concerned about security.

Events/volunteer application

Our events calendar and email is hosted by Google. You should consider the security implications of sending us information via email or the events/volunteer form. Collective members can help with a lot of things in person at the store, avoiding email altogether.

Email

We can accept PGP email sent encrypted with our public key (fingerprint = 25C3 A3D3 5DD5 FB19 CBC8  1704 EDE2 4E51 2DE5 47FF). And we will send you back email encrypted as well. It may take longer to receive a response if you use PGP as not many collective members can use PGP.

Canary

See https://riseup.net/en/canary for explanation on what a canary is. The below canary is signed with our signing subkey (fingerprint = 263F 6812 3BA2 CC67 F18A 1CB3 AC78 BC6C 7875 F028).

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Spartacus Books positively confirms that to the best of our knowledge the integrity of our systems are sound. We have not disclosed any private information, and we have not been forced to modify our system to allow access or information leakage to a third party. We have not been forced to install equipment (eg: recording/monitoring devices) in our store that could impact the privacy of those who use the space. 

This canary will be signed again on the following dates:

* March 8
* June 8
* Sept 8
* Dec 8

We will include a link to a recent news article [1] in each update to establish that the signature was not pre-generated. 
 

1. https://www.nytimes.com/2020/03/08/us/politics/jesse-jackson-bernie-sanders-michigan.html
-----BEGIN PGP SIGNATURE-----
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=xBwh
-----END PGP SIGNATURE-----

To verify our canary you need to do the following

  • Receive the key into GPG: gpg --keyserver keys.openpgp.org --recv-key 25C3A3D35DD5FB19CBC81704EDE24E512DE547FF
  • Confirm that the fingerprint matches, the output should be 25C3A3D35DD5FB19CBC81704EDE24E512DE547FF: gpg --fingerprint 25C3A3D35DD5FB19CBC81704EDE24E512DE547FF
  • Verify the signature: gpg --auto-key-retrieve --verify canary.txt

There is no guarantee that this website hasn’t been tampered with, so the above key should not be automatically trusted. For better assurance that our key is correct you can come in to our store and we have a printed copy of our fingerprint posted on top of the store desk.