Government requests for your personal data

The latest Google Transparency report makes a sobering read. It documents how governments are ordering Google to hand over user data (i.e. everything that Google knows about you, which is a lot*)

For per-country statistics for User Data Requests click here. Sample to pique your interest:

US authorities asked for the personal data of 16,281 users/accounts in the first six months of 2012. Google will not say exactly how many they handed over, but 90% is implied to be a reasonable estimate.

Citizens of other countries, please refer to the report before celebrating too much.

* Some things Google knows about you, and will continue knowing for the foreseeable future (remember, computers don’t forget what you clicked on 6 years ago):

  • Every email you have ever sent.
  • Every email you have ever received.
  • Every link you have ever clicked in an email
  • Everything you have typed in the Google “chat” box, and everything your chatting partner said.
  • Everything you have searched for on the web, while being logged in to your Google account.
  • Google maps
  • Picasa & Google albums
  • …and much more, even about your connections’ connections, to a surprising degree – check out your Google profile (note: you have to be logged in to Google for this to work) for more.

Some excerpts from Evgeny Morozov’s “The Net Delusion”

Evgeny Morozov’s “The Net Delusion: How not to liberate the world” is a refreshing note of realism amongst the cheerleading majority that promise us that “the Internet” or “information” will somehow magically transform our lives for the better.

Here are a few excerpts from the book which I found particularly pertinent:

Chapter “Orwell’s favourite lolcat” (Morozov’s book chapters are too funny and to the point to not mention)

On the “mash-up” of attitudes towards “freedom” between West and Rest (here personified in China):

[…]as the writer Naomi Klein puts it, “China is becoming more like [the West] in very visible ways (Starbucks, Hooters, cellphones that are cooler than ours), and [the West is] becoming more like China in less visible ones (torture, warrantless wiretapping, indefinite detention, though not nearly on the Chinese scale).”

On the modus operandi of modern dictatorships:

It seems fairly noncontroversial that most modern dictators would prefer a Huxleyan world to an Orwellian one, if only because controlling people through entertainment is cheaper and doesn’t involve as much brutality. When the extremely restrictive Burmese government permits – and sometimes even funds – hip-hop performances around the country, it’s not 1984 that inspires them.

Chapter “Censors and Sensibilities”
On how most citizens of “The Rest” do not necessarily share the ill-defined dreams of “democracy” as portrayed in the West:

Most citizens of modern-day Russia or China do not go to bed reading Darkness at Noon only to wake up to the jingle of Voice of America or Radio Free Europe; chances are that much like their Western counterparts, they, too, wake up to the same annoying Lady Gaga song blasting from their iPhones. While they might have a strong preference for democracy, many of them take it to mean orderly justice rather than the presence of free elections and other institutions that are commonly associated with the Western model of liberal democracy. For many of them, being able to vote is not as valuable as being able to receive education or medical care without having to bribe a dozen greedy officials. Furthermore, citizens of authoritarian do not necessarily perceive their undemocratically installed governments to be illegitimate, for legitimacy can be derived from things other than elections; jingoist nationalism (China), fear of a foreign invasion (Iran), fast rates of economic development (Russia), low corruption (Belarus), and efficiency of government services (Singapore) have all been successfully co-opted for these purposes.

Chapter “Hugo Chavez Would Like to Welcome You to the Spinternet”

On enforced jingoist nationalism in China:

In 2009 millions of customers of the state-controlled China Mobile, who perhaps were not feeling patriotic enough on the country’s National Day, woke up to discover that the company replaced their usual ringback tone with a patriotic tune sang by the popular actor Jackie Chan and a female actress.[…] These days even the website of China’s Defense Ministry has a section with music downloads; one can enjoy jingoistic music all one wants.”

On propaganda reusing the West’s “liberating” technologies:

The use of text messaging for propaganda purposes – known as “red-texting” – reveals another creative streak among China’s propaganda virtuosos. The practice may have grown out of a competition organized by one of China’s mobile phone operators to compose the most eloquent Party-admiring text message. Fast forward a few years, and senior telecom officials in Beijing are already busily attending “red-texting” symposia.
“I really like these words of Chairman Mao: ‘The world is ours, we should unite for achievements. Responsibility and seriousness can conquer the world and the Chinese Communist Party members represent these qualities.’ These words are incisive and inspirational.” This is a text message that thirteen million mobile phone users in the Chinese city of Chongqing received one day in April 2009. Sent by Bo Xilai, the aggressive secretary of the city’s Communist Party who is speculated to have strong ambitions for a future in national politics, the messages were then forwarded another sixteen millions times. Not so bad for an odd quote from a long-dead Communist dictator.

Chapter “Why the KGB wants you to join Facebook”

On why databases are better (at their job) than Stasi officers:

The Lives of Others, a 2006 Oscar-winning German drama, with its sharp portrayal of pervasive surveillance activities of the Stasi, GDR’s secret police, helps to put things into perspective. Focusing on the meticulous work of a dedicated Stasi officer who has been assigned to snoop on the bugged apartment of a brave East German dissident, the film reveals just how costly surveillance used to be. Recording tape had to be bought, stored and processed; bugs had to be installed one by one; Stasi officers had to spend days and nights on end glued to their headphones, waiting for their subjects to launch into an antigovernment tirade or inadvertently disclose other members of their network. And this line of work also took a heavy psychological toll on its practitioners: the Stasi anti-hero of the film, living alone and given to bouts of depression, patronizes prostitutes – apparently at the expense of his understanding employer.
As the Soviet Union began crumbling, a high-ranking KGB officer came forward with a detailed description of how much effort it took to bug an apartment:

“Three teams are usually required for that purpose: One team monitors the place where that citizen works; a second team monitors the place where the spouse works. Meanwhile, a third team enters the apartment and establishes observation posts one floor above and one floor below the apartment. About six people enter the apartment wearing soft shoes; they move aside a bookcase, for example, cut a square opening in the wallpaper, drill a hole in the wall, place the bug inside, and glue the wallpaper back. The artist on the team airbrushes the spot so carefully that one cannot notice any tampering. The furniture is replaced, the door is closed, and the wiretappers leave.”

Given such elaborate preparations, the secret police had to discriminate and go only for well-known high-priority targets. The KGB may have been the most important institution of the Soviet regime, but its resources were still finite; they simply could not afford to bug everyone who looked suspicious. Despite such tremendous efforts, surveillance did not always work as planned. Even the toughest security officers – like the protagonist of the German film – had their soft spots and often developed feelings of empathy for those under surveillance, sometimes going so far as to tip them off about upcoming searches and arrests. The human factor could thus ruin months of diligent surveillance work.
The shift of communications into the digital realm solves many of the problems that plagued surveillance in the analog age. Digital surveillance is much cheaper: Storage space is infinite, equipment retails for next to nothing, and digital technology allows doing more with less. Moreover, there is no need to read every single word in an email to identify its most interesting parts; one can simply search for certain keywords – “democracy”, “opposition”, “human rights”, or simply the names of the country’s opposition leaders – and focus only on particular segments of the conversation. Digital bugs are also easier to conceal. While seasoned dissidents knew they constantly had to search their own apartments looking for the bug or, failing that, at least tighten their lips, knowing that the secret police was listening, this is rarely an option with digital surveillance. How do you know that someone else is reading your email?

On wholesale surveillance using cameras and face recognition software:

[…]the Chinese government keeps installing video cameras in its most troubling cities. Not only do such cameras remind passersby about the panopticon they inhabit, they also supply the secret police with useful clues[…]. Such revolution in video surveillance did not happen without some involvement from Western partners.
Researchers at the University of California at Los Angeles, funded in part by the Chinese government, have managed to build surveillance software that can automatically annotate and comment on what it sees, generating text files that can later be searched by humans, obviating the need to watch hours of video footage in search of one particular frame. (To make that possible, the researchers had to recruit twenty graduates of local art colleges in China to annotate and classify a library of more than two million images.) Such automation systems help surveillance to achieve the much needed scale, for as long as the content produced by surveillance cameras can be indexed and searched, one can continue installing new surveillance cameras.
[…]
The face-recognition industry is so lucrative that even giants like Google can’t resist getting into the game, feeling the growing pressure from smaller players like Face.com, a popular tool that allows users to find and automatically annotate unique faces that appear throughout their photo collections. In 2009 Face.com launched a Facebook application that first asks users to identify a Facebook friend of theirs in a photo and then proceeds to search the social networking site for other pictures in which that friend appears. By eary 2010, the company boasted of scanning 9 billion pictures and identifying 52 million individuals. This is the kind of productivity that would make the KGB envious.

(ed: Note that automatic face recognition technology is now a standard feature of Facebook, as well as popular products like Google’s Picasa and Google Web albums)

On government “open-source” surveillance via social sites like Facebook:

One gloomy day in 2009, the young Belarusian activist Pavel Lyashkovich learned the dangers of excessive social networking the hard way. A freshman at a public university in Minsk, he was unexpectedly called to the dean’s office, where he was met by two suspicious-looking men who told him they worked for the KGB, one public organization that the Belarusian authorities decided not to rename even after the fall of communism (they’re a brand-conscious bunch).
The KGB officers asked Pavel all sorts of detailed questions about his trips to Poland and Ukraine as well as his membership in various antigovernment movements.
Their extensive knowledge of the internal affairs of the Belarusian opposition – and particularly of Pavel’s own involvement in them, something he didn’t believe to be common knowledge – greatly surprised him. But then it all became clear, when the KGB duo loaded his page on vkontakte.ru, a popular Russian social networking site, pointing out that he was listed as a “friend” by a number of well-known oppositional activists. Shortly thereafter, the visitors offered Lyashkovich to sign an informal “cooperation agreement” with their organization. He declined – which may eventually cost him dearly, as many students sympathetic to the opposition and unwilling to cooperate with authorities have been expelled from universities in the past. We will never know how many other new suspects the KGB added to its list by browsing Lyashkovich’s profile.

On using “technology” as the proposed solution to anything, denying our responsibility for real decisions and action:

Since technology, like gas, will fill any conceptual space provided, Leo Marx, professor emeritus at the Massachusetts Institute of Technology, describes it as a “hazardous concept” that may “stifle and obfuscate analytic thinking”. He notes, “Because of its peculiar susceptibility to reification, to being endowed with the magical power of an autonomous entity, technology is a major contributant to that gathering sense… of political impotence. The popularity of the belief that technology is the primary force shaping the postmodern world is a measure of our.. neglect of moral and political standards, in making decisive choices about the direction of society.”

Highly recommended to help us re-focus on the things that matter and stop waving around the “technology, technology, technology!” magic wand, hoping that it fixes the world.

Private online communications part 2 – text chatting

When you use Google Talk to chat with your friends, Google records everything you say. Facebook does the same. Others probably do the same. The only way to ensure you are only communicating with your friends, without your every word being recorded and kept by corporations or governments, is to use OTR. OTR stands for Off The Record. It’s a genius protocol that gives you many desirable properties, like

  • Encryption
  • Authentication
  • Deniability
  • Perfect forward secrecy

To understand the value of each of the above properties, please check out the OTR website at http://www.cypherpunks.ca/otr/

Here’s a quick video tutorial on how to use OTR with Jitsi, using your Google account. You can do exactly the same with your Facebook, Yahoo!, MSN, ICQ, AIM, XMPP or Jabber account!

Private online communication – a matter of decency

I feel there is something inherently indecent about having a private conversation, while someone else is listening in. With modern Internet communication, that “someone else” is usually a corporation or a government.

It’s not the-STASI-is-listening-so-we-better-behave feeling that bugs me. It’s more the “I am a decent human being and I have the right to share my thoughts with my loved ones, and just with them!” feeling.

In that spirit, I encourage as many people as possible to use tools like Jitsi. Not allowing others to snoop on your private life is a matter of human decency, and you deserve it.

Get Jitsi:

Use Jitsi for private voice calls that do not allow eavesdropping:

Anyone with a Google account can make encrypted, private voice calls by using Jitsi as shown above. If you don’t have a Google account, you use any of the (many) other services Jitsi supports (MSN, Yahoo!, AIM, ICQ, SIP, XMPP, but not Facebook – they don’t support secure calls).

Spread the word!

Good analysis of the “Why you should not get a CISSP” Twitter storm kicked up by the recent DEFCON talk of the same title.

- ex[b10w]sive security -

There’s been quite a lot of conversation on Twitter by the InfoSec community about the CISSP. Most of the hubbub has been generated by the Skytalk given by Timmay and a little help from Jericho at attrition.org. I was one of the fortunate folks to have a (nearly) front-row seat for this talk and I’ll be the first to say that I agree 100% with what was said. The title of the talk was “Why You Should Not Get A CISSP” – not “All CISSPs Are Dipshits” or “If You Have A CISSP: Kill Yourself” or “You Shouldn’t Be Hired In The InfoSec Community If You Have A CISSP”. There are plenty of folks out there who have a CISSP and are great assets to the community and are far better InfoSec folks than yours-truly. The main point of the talk was how the claims of the…

View original post 864 more words

Echelon: a global system for the interception of private and commercial communications

Conspiracy theory, right? Something like this would never happen in our free, democratic world…

Well guess what. I borrowed the title of this post from a European Parliament report, published in 2001!

Here is a copy of the report in English: “REPORT on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI))” [PDF]

This report gives us a very high degree of confidence that such a global interception system has been operational since the 1990’s.

Think about that the next time you think to yourself “Nah, the current snooping legislation and practice is fine – intelligence services around the world could never monitor and collate all this chaos of information”.

Using your taxes to monitor you

Oh wait… government doesn’t really need to do that.

As explained by Charles Farr, head of the UK’s “Office for Security and Counter-Terrorism” while giving evidence for the new Communications Data Bill in the UK:

  • it’s easier (faster, cheaper) to get your emails, chats, web pages visited, people you talked to etc straight from communications service providers (CSPs) such as Google and Facebook. Why bother relaying SSL or launching man-in-the-middle attacks against our citizens when we can just our friendly Googles, Facebooks, Apples, Microsofts and Yahoos of this world to simply hand us over the data? As the article’s subheading says: “We fully expect Google, Facebook and Twitter to hand over your data”
  • If that fails, we have DPI (Deep Packet Inspection) technology that the government would need to deploy in so-called “black boxes”, like the FBI “Carnivore” system in the USA… but wait, Internet Service Providers (ISPs – BT, Virgin, O2 etc) are already using such black boxes “as a matter of course”. So no problem, the technology is there, all we need to do is align the law to make it completely legal for the government to tap into this valuable source of surveillance information as well.
  • On the issue of how much Internet users (also known as citizens) can hide their personal communications, Farr said: “Not very much […] If you have the right kind of data, issues of anonymisation cease to be a problem. […] If people take greater efforts at anonymisation, it could become a problem […] but I’m satisfied by the techniques being developed. Many workarounds can be defeated […]” Farr admitted “there will still be workarounds” but claimed by 2018 that that gap could be tightened with a new law.
  • Over £900m is being budgeted for storage – presumably to keep historical communication information. That kind of money can buy the government a lot of space to keep our emails, discussions and online habits on file for a long time.

Source: http://www.theregister.co.uk/2012/07/11/communcations_data_bill_joint_committee/

What can you do to protect yourself from this wholesale surveillance?

  1. Act. Speak. Make people aware. Don’t fall for the popular myth that you’re surrounded by apathy. You’re not.
  2. Think. Do you really need to use Google Mail and Google Chat? Do you really need to interact with your friends on Facebook and talk to them over Facebook Chat? Ditto for Yahoo!, Hotmail, Skype, Apple services… you ought to know that you are speaking in a room full of microphones and cameras, and what you say and do is recorded for a very long time and made available to governments and private corporations alike.
  3. Seek alternatives. Expect that it won’t be easy. This is a multi-billion industry you’re trying to escape. For chatting online, use Off The Record technology (built into chat programs like Jitsi, Pidgin, Gibberbot for Android, ChatSecure for iPhones/iPads etc). For Skype alternatives (for voice/video chatting) use ZRTP products like Jitsi and Zfone
  4. Smarten up on the broader issues of how you are constantly under surveillance when using your phone or computer. Read up on EFF’s Surveillance Self Defense guide.
  5. Demand change from your leaders. Employing countermeasures that enforce your privacy will only be cumbersome in the long run. The law needs to change. Engage with your local community and reach out to groups like the Electronic Frontier Foundation (USA), the Open Rights Group (UK), La Quadrature du Net (France) and EDRI (EU) to get started.

A Skype alternative worth its salt: Jitsi

I’ve been using Skype, Google Talk and Facebook chat for years to communicate with friends and family. They’re all convenient, reliable and easy to use. But there is a big problem: They are all very easy to record and monitor by 3rd parties. We now know that:

  • Microsoft (owner of Skype) keeps records of who talked to whom and for how long. We also have very good reason to believe that there are tools out there (built by private companies and sold to governments) that can eavesdrop on Skype voice calls. Skype executives have been unable to deny that they comply with local law enforcement requests to eavesdrop on Skype calls.
  • Google definitely record all of your text chats. They don’t deny they do that, even when you use the “Go off the record” option in Google Talk. We’re not sure what recording they do with voice calls but can be certain that they comply with the law – therefore building “legal intercept” capabilities into their products.
  • Facebook record and analyze all of your text chats and will report you to the police if they see anything “suspicious” (source: Reuters). We don’t know what they do with voice/video calls, but again can be certain that they comply with the law – therefore building “legal intercept” capabilities into their products.

So if you happen to live in a surveillance state (think countries of the Arab Spring, think UK with their repeated attempts to introduce surveillance of their citizens, think USA with their record-breaking demands for your personal data from all of the above service providers (Microsoft, Google and Facebook)) then you can expect that all your online communications with your loved ones (voice calls, video calls, text chats) are recorded and stored, or at least eavesdropped upon. They’re all great free services that allow you to keep in touch with people, with one caveat: the government is listening in.

If you have no problem with that, perhaps because you subscribe to the flawed “I have nothing to hide” school of thought, read no further.

If you feel that being spied upon constantly, and having no reasonable expectation of privacy for your online life is not cool, read on.

The work of thousands of visionaries (starting with people like Richard Stallman in the 70’s) has today given us the free tools to protect our online communications to a reasonable degree. These are not tools to stop a police investigation against you from succeeding – these are tools that empower you to opt-out from the surveillance-by-default communications channels most of us use, and instead keep your private thoughts and words only between yourself and your loved ones.

Jitsi main window
The easiest one to get us started is Jitsi.

Jitsi gives you voice calls, video calls, instant text messages and group chats. It therefore covers 100% of the communication capabilities of Microsoft’s Skype, Google Talk, Facebook Chat, IRC channels and the like. Use Jitsi, and you don’t need to use any of these again.

Why switch to Jitsi?

Because it protects your privacy as much as possible. If you and your loved ones use Jitsi, you can:

  • Have end-to-end encryption of your voice and video calls – guaranteeing that nobody is listening in or recording.
  • Have end-to-end encryption of your text (instant messaging) chats with Off The Record (OTR) technology – the world’s finest in preserving your privacy with unique features like Perfect Forward Secrecy and Deniability.

As an additional benefit, it’s great to have all of your instant messaging contacts in one window, and Jitsi gives you that. It also runs on Windows, MacOSX and GNU/Linux.

encrypted video call

Start using Jitsi instead of Skype, Google Talk and Facebook Chat and stop corporations and governments collecting, storing and analyzing the thoughts you share with your loved ones.

PS: You can only have private communications if both ends of the chat/voice/video call support this. If both you and your loved ones use Jitsi, voice & video calls are private by default. For text chats, you will have to click the lock icon in your chat window (as shown below) until it displays a closed “lock” state.

this conversation is NOT private
PPS: No “lock” icon? That probably means that the person you are chatting with is not using Jitsi or a similar program that can protect your chats with OTR. You can only have a private conversation if both ends support OTR.

PPPS: Looking for something like Jitsi for your smartphone? For private text messaging (using the Off The Record protocol) look at ChatSecure for iPhones or GibberBot for Android phones. For private voice calls on the Android, look into csipsimple and Moxie Marlinspike’s RedPhone. Remember, both ends of the conversation need the same technology to create a private channel.

On addresses

In the era of the Internet, addresses are wonderfully diverse and quirky creatures.

  • Mr John Doe, 82 Gjjirigh Road, 18721, Paris, France – snail mail address
  • la7iu@spam.la – email address
  • https://www.eff.org/ – (World Wide) Web address
  • http://xdtfje3c46d2dnjd.onion/ – Tor hidden network address – using this you can have an anonymous & private chat using https://crypto.cat via the Tor network
  • 1ESKsNEfjmCZJt3yEYjdE31L1QKqnRVcmn – Bitcoin wallet address – using this you can donate to JuiceMedia, creators of Rap News using bitcoins.
  • 00-50-57-C0-00-08 – MAC address
  • 127.0.0.1 – IP address

Simple use of Bitcoin

Executive summary

  • Create a Mt.Gox account
  • Add funds to your Mt.Gox account using traditional currency
  • Send bitcoins from your Mt.Gox account to your personal wallet.
  • Send bitcoins from your personal wallet to anyone you like.

Disclaimer 1: Bitcoin does not provide strong anonymity. Do not count on it for life-or-death situations.

Disclaimer 2: I am a Bitcoin newbie

On with the show…

1. What is Bitcoin?

Bitcoin

Bitcoin is a digital currency. Just like countries use national currencies ($, €, £ etc), Internet users can use digital currencies. One of these digital currency systems is Bitcoin. It is not well understood by the general population and is still considered an experimental system, but using it for simple tasks like making a single transaction is quite straightforward, as detailed below.

Why would you want to go through the trouble of learning how to use a new currency system?

Well, it has some unique advantages:

  • Better anonymity than traditional non-cash transactions. Transactions are linked to the unique identity of the wallet you are using at the time, but wallets can be created easily and do not require human identity validation. This is not strong anonymity (e.g. against the state monitoring you specifically), but is much better than the current payment processing systems (guy on the street buys a coke using a plastic card in Moscow, 30” later Washington knows). Read also a precautionary note with funky graphs about how Bitcoin is not anonymous. (hat tip to hypnos)
  • Transactions are instantaneous. There are no intermediaries involved. No banks. Bitcoins move instantly and directly to their destinations. Bitcoin is a peer to peer system with no central authority.
  • Transactions can not be blocked by the usual payment processors – e.g. when in 2010 Visa, Mastercard and Paypal blocked donations to Wikileaks, it was still possible to donate using bitcoins.
  • There are no fees to transfer bitcoins.

In short, Bitcoin is an alternative to the traditional currency system that does not appear to be controlled by banks or payment processors like Visa or Mastercard.

2. Exchanging traditional currency for Bitcoins

Most people will want to convert a small amount of traditional currency into bitcoins to test the system first. You can use a Bitcoin exchange for this. One such exchange is Mt. Gox: https://mtgox.com

After you have created an account on the Mt. Gox website you will want to buy some bitcoins. To do that, go to “Funding Options -> Add Funds”. There you are given the bank details you can use to send money with a traditional bank money transfer or other methods. You have not started using bitcoins yet, so this is a very traditional transfer of funds between your bank and Mt. Gox.

Once Mt. Gox have received your funds, your Mt. Gox account will reflect them. Say for example you instructed your bank to send Mt. Gox $10 with a method that did not incur any charges. Your Mt. Gox account will show you have $10 available to spend.

You can now go to Trade -> Buy Bitcoins and buy some bitcoins at the going rate for USD to bitcoin conversion. Let’s say you manage to buy 2.31 bitcoins with your $10. You can send these bitcoins directly to the person/organisation you wish to pay, which is the quick option, but leaves a clear trace of your transaction, since Mt. Gox know who you are and who you paid. Alternatively you can transfer your bitcoins to a digital wallet on your personal computer, which means that Mt. Gox no longer know where the money is.

To do that, you need to setup your bitcoin wallet on your personal computer.

3. Creating your Bitcoin digital wallet

Download and install the latest Bitcoin client from http://bitcoin.org

For the following examples I will be using Bitcoin-Qt version 0.6.2

Please note that there is a 8+ hour startup time for this client, as it synchronises with the global transaction database. Once it’s up and running (and fully synchronised), you’re good to go.

Click on “Receive coins”. You will there find your digital wallet’s address, which will look like a string of random characters similar to this:

1ES2sNEfjmCZJt3yE6jdE31L1QgqnrVcmn

4. Transferring Bitcoins to your wallet

In your Mt. Gox account, choose “Funding Options” and then “Withdraw funds”.

Enter the amount you want to send to the wallet on your computer, and your wallet’s address (which you found out above).

After confirming the transaction, the Bitcoins should appear in your computer’s digital wallet within a few seconds.

5. Sending money to another Bitcoin user

So you have bitcoins on your computer now. How do you send them to other people? Simple, all you need is their bitcoin address. Ask them for it, check their donations web page etc – you’re looking after a bitcoin address that looks similar to yours (a long string of random characters).

Once you have the address you want to send the bitcoins to, click the “Send coins” button in the bitcoin application, enter the amount and address, and click “Send”.

That’s it, the money has been transferred!

If you want to let them know it was you who send them the money, you might want to send them an email notifying them – otherwise from the bitcoin transaction alone they won’t know.