Category Archives: work2

Qubes sw compartimentalization is a must, but non sufficient

Qubes uses virtual machines to let you manage separate “security domains”. A virtual machine (VM) is basically a tiny operating system running inside of your real operating system. If your VM gets hacked, the attacker is able to access the files and read keystrokes in that VM, but not in other VMs or on your host computer. In Qubes all software (besides the desktop environment) is running inside of VMs, and you can easily and efficiently make as many as you need for whatever purposes you need. It’s also designed in such a way that if one VM gets infected with malware, the malware won’t be there the next time you reboot that VM.

https://pressfreedomfoundation.org/blog/2014/04/operating-system-can-protect-you-even-if-you-get-hacked

A most-likely main processor-level hack method by NSA

Rather than risk getting caught messing with everyone’s updates, my bet is that the NSA has compromised the microcode update signing keys giving the NSA the ability to selectively target specific computers. (Your operating system ensures security of updates by checking downloaded update packages against the signing key.) The NSA then can send out backdoors disguised as a Windows update for “security.” (Ironic but possible.)

That means you don’t need backdoors baked in the hardware, don’t need Intel’s buy-in, don’t have discoverable rootkits, and you can target specific systems without impacting the public at large.

http://www.democraticunderground.com/10023377711#post1

Exodus Intelligence, exposing TAILS bugs, may be doing the best service to privacy after Snowden

Exodus Intelligence, revealing how vulnerable top FLOSS are, may be doing the greatest service to privacy since Snowden.

They are finally making clear – to all to mainstream tech writers, privacy tech tools users and developers – that software should be much more audited relative to complexity, which means large investments and/or huge much expanded volunteer participation.

Sure a zero day market should not exist and but it always will and will keep growing as it cannot be stopped. No major country will make it illegal to kit disclose a discovered zero day because every other major country would continue to stockpile them.

We are fortunate some in that market see economic convenience in releasing such info (and apparently in responsible).

The only very major objection to Exodus Intelligence is that they haven’t gone nearly far enough as there are so many potential vulnerabilities at the firmware and hardware level which they do not mention.

I’d argue they know very well given their general competencies. But, possibly they haven’t because they cannot provide any services in that area, and it is in their best interest to underestimate such threat to increase the perceived value of their software-level zero-days for defensive purposes.

Unfortunately, we may never see a similar company coming out for hw-level zero-days as it would have to be upper echelons of US state security agencies or highest-clearance execs in dominant mainstream processor and hardware makers, as well as major world foundries.

To start moving to solve those vulnerabilities we’ll have to rely on their proven feasibility, the opinion of the world-highest experts persons and bodies, and other supporting evidence. We’ll look at that in a future post.

Snowden: ” Imagine an app or a cell phone or an operating system for a cell phone or a small device, anything that would allow people to have free and ready access to meaningfully secure communications platforms that don’t require sophistication to use and operate”.

Snowden to the Guardian 2 days ago:

“Recently, I’ve been spending a lot of time thinking about press freedom issues in addition to the ordinary individual’s private communications, and I’ve been partnering with civil liberties organisations to see where we can contribute and try to create new tools, new techniques, new technologies that will make sure our rights are protected regardless of the status of law in a given jurisdiction.

Imagine an app or a cell phone or an operating system for a cell phone or a small device, anything that would allow people to have free and ready access to meaningfully secure communications platforms that don’t require sophistication to use and operate”.

http://www.theguardian.com/world/2014/jul/18/-sp-edward-snowden-nsa-whistleblower-interview-transcript

How Hackers Stole the Nasdaq – Businessweek

“What the investigators found inside Nasdaq shocked them, according to both law enforcement officials and private contractors hired by the company to aid in the investigation. Agents found the tracks of several different groups operating freely, some of which may have been in the exchange’s networks for years, including criminal hackers and Chinese cyberspies. Basic records of the daily activity occurring on the company’s servers, which would have helped investigators trace the hackers’ movements, were almost nonexistent”

http://mobile.businessweek.com/articles/2014-07-17/how-russian-hackers-stole-the-nasdaq

DARPA’s Trust in Integrated Circuits standards, extended to software and end-user verifiable…

… is what we need as a society for our critical civilian and military uses. 
The nation(s) and/or companies that will standardise them first may well also benefit from the huge benefits of being first mover advantage in offering techs that are substantially more user-trustworthy than anything available today.

http://www.darpa.mil/Our_Work/MTO/Programs/Trusted_Integrated_Circuits_(TRUST).aspx

A Jan 2014 blogger review of why Blackphone cannot deliver on its promises

http://tante.cc/2014/01/16/blackphone-build-hardware-software-broken-promises/

I would add to such great post that they will never have the resources to have control of sw, hw and manufacturing of such a full featured device. It would run into the hundreds of millions of $ or more.

The only way to achieve such levels of assurance with single or double digit millions of $ is through extreme hw and sw minimization, and a very small and thin form factor handheld devices that does not claim to replace the users ordinary smartphone, but complement it and uses it as an hostile environment to get on the net via bluetooth:

User Verified Social Telematics.

One may to resist endpoint attacks is to mix up the most valuable information in huge files, non easily and undetectably exfiltrated by attackers through low level device vulnerabilities

One the world greatest cryptologists says:

“I want the secret of the Coca-Cola company not to be kept in a tiny file of 1KB, which can be exfiltrated easily by an APT,” Shamir said. “I want that file to be 1TB, which can not be exfiltrated. I want many other ideas to be exploited to prevent an APT from operating efficiently. It’s a totally different way of thinking about the problem.”

Former NSA chief Alexander, and who knows how many others, can make millions in consulting only because the It industry and experts have not even started working on

…. computing solutions that would make such knowledge useless because they are so simple in sw and hw to afford and allow for extreme verification of all hw and sw involved at all stages,  including manufacturing.

Former NSA chief Alexander, and who knows how many others, can make millions in consulting only because the It industry and experts have not even started working on computing solutions that would make such knowledge useless because they are so extremely simplified in sw and hw, to afford and allow for extreme verification of all hw and sw involved at all stages, including manufacturing and design of any critical components.

Possibly, the main problem is the same that has prevented us to see how far NSA had gone. There is a problem in the dynamics of IT security media and blogs, similar to other sectors, where a range of acceptable opinions are created, out of which all are paranoid.

Experts are still differentiating between mass surveillance and targeted surveillance. Whereas if what the most pessimist day about hardware vulnerabilities is true, than large scale undetectable targeted surveillance may be so low cost to render any encryption tools we are using or improving useless for the masses (or at least for its most active citizenry).

https://www.schneier.com/blog/archives/2014/06/could_keith_ale.html?utm_source=twitterfeed&utm_medium=twitter

Dr Zimmermann, admit NSA may very well cheaply get into ALL Blackphones

The famous Blackphone is about to be http://www.pcworld.com/article/2362060/blackphones-coming-in-three-weeks-will-ship-in-millions-backers-say.html”>launched in 3 weeks:

Zimmermann. “If NSA really, really wants to get into just your phone … they’re going to get into your phone,” he said.

If this is supposed to be the best privacy-enhancing device out there, then “really, really” is terribly generic.

Tell us. How much would it cost them to get in it and what discoverability risk would they (or others) run into?!

Not having any control of manufacturing phase, nor of much prioritization firmware, and not having nearly enough verification on hw and sw components, how can you even assess such cost?!

If you can’t even begin to assess it for your blackphone, then, from what’s emerged with snowden, that cost may very well be so low that NSA may just by default get into each single Blackphone, just because its typical client is likely to have something of value to wrote or say!