Results 1 to 5 of 5

Thread: Everyone Wants You To Have Security, But Not from Them

  1. #1
    Codex Athena Desaix DeBurgh's Avatar
    Join Date
    Sep 2010
    Last Online
    09-24-2016 @ 02:52 AM
    Location
    Catskills New York
    Meta-Ethnicity
    More human than human
    Ethnicity
    Norman aristocrat
    Ancestry
    French and various British isles
    Country
    United States
    Region
    New York
    Taxonomy
    Aristocratic body and facial profile
    Politics
    Feudalism ruled by Norman aristocrats
    Hero
    William the Conqueror and William DeBurgh
    Religion
    atheist but ostensibly religious to rule over peasants
    Gender
    Posts
    2,220
    Thumbs Up
    Received: 1,674
    Given: 16

    2 Not allowed!

    Default Everyone Wants You To Have Security, But Not from Them

    "Everyone Wants You To Have Security, But Not from Them

    In December, Google's Executive Chairman Eric Schmidt was interviewed at the CATO Institute Surveillance Conference. One of the things he said, after talking about some of the security measures his company has put in place post-Snowden, was: "If you have important information, the safest place to keep it is in Google. And I can assure you that the safest place to not keep it is anywhere else."

    The surprised me, because Google collects all of your information to show you more targeted advertising. Surveillance is the business model of the Internet, and Google is one of the most successful companies at that. To claim that Google protects your privacy better than anyone else is to profoundly misunderstand why Google stores your data for free in the first place.

    I was reminded of this last week when I appeared on Glenn Beck's show along with cryptography pioneer Whitfield Diffie. Diffie said:

    You can't have privacy without security, and I think we have glaring failures in computer security in problems that we've been working on for 40 years. You really should not live in fear of opening an attachment to a message. It ought to be confined; your computer ought to be able to handle it. And the fact that we have persisted for decades without solving these problems is partly because they're very difficult, but partly because there are lots of people who want you to be secure against everyone but them. And that includes all of the major computer manufacturers who, roughly speaking, want to manage your computer for you. The trouble is, I'm not sure of any practical alternative.

    That neatly explains Google. Eric Schmidt does want your data to be secure. He wants Google to be the safest place for your data as long as you don't mind the fact that Google has access to your data. Facebook wants the same thing: to protect your data from everyone except Facebook. Hardware companies are no different. Last week, we learned that Lenovo computers shipped with a piece of adware called Superfish that broke users' security to spy on them for advertising purposes.

    Governments are no different. The FBI wants people to have strong encryption, but it wants backdoor access so it can get at your data. UK Prime Minister David Cameron wants you to have good security, just as long as it's not so strong as to keep the UK government out. And, of course, the NSA spends a lot of money ensuring that there's no security it can't break.

    Corporations want access to your data for profit; governments want it for security purposes, be they benevolent or malevolent. But Diffie makes an even stronger point: we give lots of companies access to our data because it makes our lives easier.

    I wrote about this in my latest book, Data and Goliath:

    Convenience is the other reason we willingly give highly personal data to corporate interests, and put up with becoming objects of their surveillance. As I keep saying, surveillance-based services are useful and valuable. We like it when we can access our address book, calendar, photographs, documents, and everything else on any device we happen to be near. We like services like Siri and Google Now, which work best when they know tons about you. Social networking apps make it easier to hang out with our friends. Cell phone apps like Google Maps, Yelp, Weather, and Uber work better and faster when they know our location. Letting apps like Pocket or Instapaper know what we're reading feels like a small price to pay for getting everything we want to read in one convenient place. We even like it when ads are targeted to exactly what we're interested in. The benefits of surveillance in these and other applications are real, and significant.

    Like Diffie, I'm not sure there is any practical alternative. The reason the Internet is a worldwide mass-market phenomenon is that all the technological details are hidden from view. Someone else is taking care of it. We want strong security, but we also want companies to have access to our computers, smart devices, and data. We want someone else to manage our computers and smart phones, organize our e-mail and photos, and help us move data between our various devices.

    Those "someones" will necessarily be able to violate our privacy, either by deliberately peeking at our data or by having such lax security that they're vulnerable to national intelligence agencies, cybercriminals, or both. Last week, we learned that the NSA broke into the Dutch company Gemalto and stole the encryption keys for billions yes, billions of cell phones worldwide. That was possible because we consumers don't want to do the work of securely generating those keys and setting up our own security when we get our phones; we want it done automatically by the phone manufacturers. We want our data to be secure, but we want someone to be able to recover it all when we forget our password.

    We'll never solve these security problems as long as we're our own worst enemy. That's why I believe that any long-term security solution will not only be technological, but political as well. We need laws that will protect our privacy from those who obey the laws, and to punish those who break the laws. We need laws that require those entrusted with our data to protect our data. Yes, we need better security technologies, but we also need laws mandating the use of those technologies."

    https://www.schneier.com/blog/archiv...ne_wants_.html





  2. #2
    Codex Athena Desaix DeBurgh's Avatar
    Join Date
    Sep 2010
    Last Online
    09-24-2016 @ 02:52 AM
    Location
    Catskills New York
    Meta-Ethnicity
    More human than human
    Ethnicity
    Norman aristocrat
    Ancestry
    French and various British isles
    Country
    United States
    Region
    New York
    Taxonomy
    Aristocratic body and facial profile
    Politics
    Feudalism ruled by Norman aristocrats
    Hero
    William the Conqueror and William DeBurgh
    Religion
    atheist but ostensibly religious to rule over peasants
    Gender
    Posts
    2,220
    Thumbs Up
    Received: 1,674
    Given: 16

    0 Not allowed!

    Default

    Quote Originally Posted by BruceSchneier
    Governments are no different. The FBI wants people to have strong encryption, but it wants backdoor access so it can get at your data. UK Prime Minister David Cameron wants you to have good security, just as long as it's not so strong as to keep the UK government out. And, of course, the NSA spends a lot of money ensuring that there's no security it can't break.
    Quote Originally Posted by BruceSchneier
    Those "someones" will necessarily be able to violate our privacy, either by deliberately peeking at our data or by having such lax security that they're vulnerable to national intelligence agencies, cybercriminals, or both. Last week, we learned that the NSA broke into the Dutch company Gemalto and stole the encryption keys for billions yes, billions of cell phones worldwide. That was possible because we consumers don't want to do the work of securely generating those keys and setting up our own security when we get our phones; we want it done automatically by the phone manufacturers. We want our data to be secure, but we want someone to be able to recover it all when we forget our password.
    "
    When Strong Encryption Isn't Enough to Protect Our Privacy
    By Bill Blunden [1] / AlterNet [2]
    February 26, 2015

    “None of the claims of what comsec works is to be taken saltless: Tor, OTR, ZTRP are lures.” —Cryptome [3], Dec. 30, 2014

    In the aftermath of Edward Snowden's disclosures, the American public has been deluged with talking points that advocate strong encryption as a universal solution for protecting our privacy. Unfortunately the perception of strong encryption as a panacea is flawed. In this report I’ll explain why strong encryption isn’t enough and then present some operational guidelines which can be used to enhance your online privacy. Nothing worthwhile is easy. Especially sidestepping the Internet’s global Eye of Providence.

    Anyone who reads through privacy recommendations published by the Intercept [4] or the Freedom of the Press Foundation [5] will encounter the same basic lecture. In a nutshell they advise users to rely on open source encryption software, run it from a CD-bootable copy of the TAILS operating system, and route their Internet traffic through the TOR anonymity network.

    This canned formula now has a degree of official support from, of all places, the White House. A few days ago during an interview with Re/Code, President Obama assured [6] listeners that “there’s no scenario in which we don’t want really strong encryption.” It’s interesting to note how this is in stark contrast to public admonishments [7] by FBI director James Comey this past October for key escrow encryption, which is anything but strong.

    So it would appear that POTUS is now towing a line advocated by none other than whistler-blower Snowden who asserted [8] that “properly implemented strong crypto systems are one of the few things that you can rely on.”

    Only there’s a problem with this narrative and its promise of salvation: When your threat profile entails a funded outfit like the NSA, cyber security is largely a placebo.

    Down To the Metal

    A report [9] released by Moscow-based anti-virus vendor Kaspersky Lab proves that, despite the self-congratulatory public relations messaging of Google or Apple, strong encryption might not be the trendy cure-all it’s cracked up to be. The NSA has poured vast resources into hacking hardware platforms across the board, creating firmware modifications [10] that allow [11] U.S. spies to “capture a machine’s encryption password, store it in ‘an invisible area inside the computer’s hard drive’ and unscramble a machine’s contents.”

    On a side note, Kaspersky Lab is one of two companies authorized [12] by Russian security service to provide anti-virus technology to the Russian government. The company’s founder, Eugene Kaspersky, a former [13] Soviet intelligence officer himself, has links to the Russian Federal Security Service, or FSB. So it makes sense that the one company with the audacity and skill to publicly showcase a global espionage program by the NSA would also be a company aligned with a countervailing power center outside of the United States.

    Anyway, when it comes to bare-metal skullduggery there are plenty [14] of proof-of-concept [15] examples available in the public domain. But these experiments are nothing compared to the slick production-level malware deployed by NSA spies. When the Pentagon aims for information dominance [16] it doesn't screw around. Hence blind trust in encryption software is exposed as a sort of magical thinking.

    Some people would argue that the NSA’s hardware hacks aren’t a big deal because they’re used selectively for targeted intrusions. One problem with this stance is that spy gear has a habit of filtering down into the underworld because spies and crooks are kindred spirits who often work together. Another problem is that the NSA is actively working to industrialize [17] attacks so that they can be pulled off on a mass scale against large swathes [18] of users. The recent discovery of pre-installed malware [19] on Lenovo PCs should offer an unsettling hint [20] of where spies and their front companies are taking things.

    Face it, an intelligence agency that makes off [21] with the encryption keys from a large multinational company that manufactures billions of SIM cards each year is an agency that’s doing much more than just small-scale targeted hardware attacks. They want to “collect it all.”

    OPSEC Is Law

    “Iraqi Assault to Retake Mosul from Islamic State Is Planned for Spring” —New York Timesheadline, Feb. 20, 2015

    Given the sorry state of software engineering and the sheer scope of clandestine subversion programs, if spies want to root your machine they’ll probably find a way. The Internet is akin to a vast swamp in the Deep South. Users wade through a hostile murky environment surrounded by alligators prowling silently just below the surface.

    And don’t think that tools like Tor [22] will protect you. The FBI has demonstrated repeatedly that it can unmask [23] Tor users with exploits. The FBI’s collection of cyber scalps includes [24] a high-ranking cyber security director who probably thought his game was tight. The litany of Tor’s failures have led security researchers to conclude [25] that, “Tor makes you stick out as much as a transgender Mongolian in the desert.”

    Hence when going toe-to-toe with spies from the NSA’s Office of Tailored Access Operations [26] or, heaven forbid, its more daunting CIA brethren [27] in the Special Collection Service [28], operational security (OPSEC) becomes essential. This isn’t cynical “privacy nihilism” but rather clear-headed contingency planning. Once the NSA owns a computer the only things that stands between the user and spies is OPSEC. It takes groundwork, patience and (most of all) discipline. Even the professionals get this wrong. And when they do the results can be disastrous.

    For a graphic illustration of this contemplate the case of Ross Ulbricht, the creator of Silk Road. The celebrated Tor anonymity network did very little [29] to stop the feds from getting a bead on him. To make matters worse you’d think Ulbricht would know better [30] to work with his back to the room so the feds could sneak up on him before he could log off, leaving his encrypted laptop in a decidedly vulnerable state.

    It didn’t help that the Silk Road’s servers were configured to auto-login certain client machines and that Ulbricht’s laptop just happened to be connected to the Silk Road servers as a full administrator. Ditto that for Bitcoin wallets on the aforementioned laptop which allowed law enforcement agents to trace [31] over $13 million in Bitcoins to Ulbricht.

    When professionals get operational security right they sometimes look a bit silly. Close circuit TVs are cheap and ubiquitous. Let’s just say that Snowden wasn’t being paranoid when he covered himself with a red blanket (the so-called [32] “magic mantle of power”) while entering his laptop password. For the sake of maintaining cover, simply obscuring your keyboard may be a wiser option in public as it’s less conspicuous. The last thing you want to do in a crowd is draw attention to yourself.

    Anti-Forensics in Theory and Practice

    “The only protection against communication systems is to avoid their use.” —Cryptome [33], Communications Privacy Folly, June 13, 2012

    Anti-forensics [34] is all about reducing both the quantity and quality of information that adversaries acquire. In other words, if spies succeed in breaching your computer then give them as little useful information as possible. One way to achieve this is through compartmentalization, a technique honed to a fine edge by intelligence outfits like the KGB.

    In the years following World War II the Soviet nuclear program was targeted heavily by U.S. spies. To counter this effort, the Soviets employed sophisticated, multi-level, denial and deception strategies. According to Mikhail Gladyshev [35], who was in charge of the plutonium enrichment station at the Mayak complex in the city of Ozersk, compartmentalization of information was pervasive:

    “[W]e put the [plutonium] paste in a box and transferred it to the consumer plant. How much plutonium was in that box we didn’t know and it was not recommended for us to know. Even later, when I was the plant’s chief engineer, the plans for plutonium production were known only to the facility’s director, and all documents were prepared in single copies”

    Given the reality of mass interception let’s look at mobile phones as a case study. They’re essentially portable Telescreens [21], glorified tracking [36] beacons that double as walkie-talkies. In private, when NSA spies feel comfortable enough to speak candidly with each other, iPhone users are referred to [37] as zombies who literally pay for their own surveillance. This is not an exaggeration and it speaks yards about how intelligence officers view society. You’ve been warned.

    The best option is to follow the example of WikiLeaks activist Sarah Harrison [38] and simply not carry a cellphone. Jihadists in the Middle East have learned this lesson the hard way and use hand couriers [39] for sensitive messages. Other organization like Los Zetas in Mexico have built private radio networks [40] to avoid official communication channels. Lebanon’s Hezbollah went so far as to set up its own covert fiber optic [41] data network in an effort to elude conventional eavesdropping.

    Listen to John Young of the web site Cryptome. The only sure-fire way to protect yourself against monitoring on a given communication system is not to use it.

    If having a cellphone is an absolute necessity there are shielding cases [42] available. Though removing the battery works just fine in a pinch as does sticking a cellphone in a sealed metal container like a refrigerator. Another thing to remember is that “dumb phones” lacking in bells and whistles tend to accumulate far less information [43] than more elaborate smartphones.

    Compromised mobile devices should be smashed and dumped in a remote location. Make sure the SIM card is completely destroyed. Recall how methodically the GCHQ officials disposed [44] of hardware belonging to the Guardian newspaper. This is another area where $10 dumb phones have an advantage.

    Once a cell phone is out in the open with its battery in place, consider the following recommendations. First, it’s extremely unwise for someone to power on a “secure” cell phone where they normally live and work. This includes recharging the phone! While traveling to a remote site to communicate be aware that automated license plate readers, traffic cameras, facial recognition software and built-in vehicle GPS units are becoming more commonplace.

    Avoid patterns (geographic, chronological, etc.). Arbitrarily relocate to new spots during the course of a phone call. Stay in motion. Phone calls should be as short as possible so that the amount of data collected by surveillance equipment [45] during the call’s duration is minimized. This will make it more difficult for spies to make accurate predictions.

    Another aim should be to maintain a closed communication network at all costs. Secure cell phones should not be used casually to call friends or relatives. Dial only other cell phones intended specifically for sensitive communication. Also remember that calling a landline may end up exposing the person who answers.

    Carrying additional mobile devices (e.g. surface tablet, second cell phone) creates the risk that the peripheral hardware may undermine anonymity through correlation. Finally, pay for items using cash when operational. Credit card transactions are like a big red flag.

    If spies somehow captures a secure cell phone and are able to siphon data off of it, one potential countermeasure is to flood the device with false information. Skillful application of this technique can lead spies on a goose chase. When Edward Snowden was fleeing Hong Kong he intentionally bought a plane ticket to India with his own credit card in an effort to throw pursuers off his track.

    Final Words

    Ultimately there’s no ironclad formula for protecting your identity. No guarantees. Privacy isn’t something I can give you, it’s something you must attain on your own through hard work. In summary, expect security tools to fail, compartmentalize to contain damage and apply the Grugq’s core tenets of anti-forensics. Don’t put blind faith in technology. Focus your resources on maintaining rigorous procedures. When things get dicey it’ll be your training and preparation that keep you secure.

    Bill Blunden is the author of several books, including “The Rootkit Arsenal” and “Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” He is the lead investigator at Below Gotham Labs.
    Share on Facebook Share
    Share on Twitter Tweet
    Report typos and corrections to 'corrections@alternet.org'. [46]
    [47]
    Source URL: http://www.alternet.org/news-amp-pol...ct-our-privacy

    Links:
    [1] http://www.alternet.org/authors/bill-blunden
    [2] http://alternet.org
    [3] https://twitter.com/Cryptomeorg/stat...10942072049666
    [4] https://firstlook.org/theintercept/2...owden-secrets/
    [5] https://freedom.press/encryption-works
    [6] https://recode.net/2015/02/15/white-...meets-swisher/
    [7] http://www.fbi.gov/news/speeches/goi...llision-course
    [8] http://www.spiegel.de/international/...a-1010361.html
    [9] https://securelist.com/files/2015/02...nd_answers.pdf
    [10] http://arstechnica.com/information-t...sive-backdoor/
    [11] http://www.nytimes.com/2015/02/17/te...firm-says.html
    [12] http://www.wired.com/2012/07/kaspersky-indy/
    [13] http://www.wired.com/2012/07/ff_kaspersky/
    [14] http://www.wired.com/2014/10/code-pu...le-usb-attack/
    [15] https://www.blackhat.com/presentatio...kit-SLIDES.pdf
    [16] http://www.spiegel.de/international/...a-1013409.html
    [17] http://www.wired.com/2013/05/pentago...gry-birds/all/
    [18] https://firstlook.org/theintercept/2...uters-malware/
    [19] http://bits.blogs.nytimes.com/2015/0...ters-security/
    [20] http://arstechnica.com/security/2015...zen-more-apps/
    [21] https://firstlook.org/theintercept/2...eat-sim-heist/
    [22] http://www.belowgotham.com/Darknet-Sweep.pdf
    [23] http://www.wired.com/2014/12/fbi-metasploit-tor/
    [24] http://www.wired.com/2014/08/federal...-porn-charges/
    [25] https://grugq.github.io/presentation...encryption.pdf
    [26] http://www.spiegel.de/international/...-a-940969.html
    [27] http://cryptome.info/0001/cia-nsa-scs.htm
    [28] http://www.spiegel.de/international/...-a-930205.html
    [29] http://www.wired.com/2014/09/fbi-sil...king-question/
    [30] http://www.itworld.com/article/28817...anonymity.html
    [31] http://www.wired.com/2015/01/prosecu...richts-laptop/
    [32] http://www.theguardian.com/film/2014...en-documentary
    [33] http://cryptome.org/2012/06/comms-folly.htm
    [34] http://www.belowgotham.com/RootkitArsenalTOC.htm
    [35] https://www.cia.gov/library/center-f...article01.html
    [36] http://www.wired.com/2014/11/feds-mo...herfng-planes/
    [37] https://privacysos.org/node/1177
    [38] http://www.vogue.com/11122973/sarah-...wikileaks-nsa/
    [39] http://www.nytimes.com/2013/09/30/us...elligence.html
    [40] http://www.vice.com/read/the-los-zet...-radio-network
    [41] http://www.theguardian.com/world/201...ollah-telecoms
    [42] http://silent-pocket.com/
    [43] http://www.networkworld.com/article/...ip-phones.html
    [44] http://www.theguardian.com/world/201...stroyed-london
    [45] http://www.wsj.com/articles/american...ram-1415917533
    [46] mailto:corrections@alternet.org?Subject=Typo on When Strong Encryption Isn't Enough to Protect Our Privacy
    [47] http://www.alternet.org/
    [48] http://www.alternet.org/%2Bnew_src%2B"

    http://www.alternet.org/print/news-a...ct-our-privacy





  3. #3
    Veteran Member LightHouse89's Avatar
    Join Date
    Jul 2011
    Last Online
    01-28-2018 @ 11:36 PM
    Meta-Ethnicity
    Germanic/Celtic
    Ethnicity
    White, cis gender shit lord
    Ancestry
    Anglo-Saxon/Celt-WASP A pariah of the west.
    Country
    United States
    Region
    Brittany
    Politics
    The power of Kek
    Religion
    God Emperor
    Age
    24
    Gender
    Posts
    28,124
    Thumbs Up
    Received: 14,428
    Given: 28,057

    0 Not allowed!

    Default

    Interesting. I am no computer expert or with security but I am not shocked.

    The internet is the wild west in a way.
    ''Tolerance and Apathy are the last virtues of a dying society''- Aristotle

  4. #4
    Codex Athena Desaix DeBurgh's Avatar
    Join Date
    Sep 2010
    Last Online
    09-24-2016 @ 02:52 AM
    Location
    Catskills New York
    Meta-Ethnicity
    More human than human
    Ethnicity
    Norman aristocrat
    Ancestry
    French and various British isles
    Country
    United States
    Region
    New York
    Taxonomy
    Aristocratic body and facial profile
    Politics
    Feudalism ruled by Norman aristocrats
    Hero
    William the Conqueror and William DeBurgh
    Religion
    atheist but ostensibly religious to rule over peasants
    Gender
    Posts
    2,220
    Thumbs Up
    Received: 1,674
    Given: 16

    1 Not allowed!

    Default

    Quote Originally Posted by LightHouse89 View Post
    Interesting. I am no computer expert or with security but I am not shocked.

    The internet is the wild west in a way.
    No, the internet used to be the wild west when I started using it in the the 90s but not anymore.

    In fact I used to hang out with hackers on IRC, in the 90s, one had the handle DocHoliday aka Scott Chasin he was part of the hacker group Legions of Doom (LOD)

    https://en.wikipedia.org/wiki/Legion..._%28hacking%29





  5. #5
    Veteran Member LightHouse89's Avatar
    Join Date
    Jul 2011
    Last Online
    01-28-2018 @ 11:36 PM
    Meta-Ethnicity
    Germanic/Celtic
    Ethnicity
    White, cis gender shit lord
    Ancestry
    Anglo-Saxon/Celt-WASP A pariah of the west.
    Country
    United States
    Region
    Brittany
    Politics
    The power of Kek
    Religion
    God Emperor
    Age
    24
    Gender
    Posts
    28,124
    Thumbs Up
    Received: 14,428
    Given: 28,057

    0 Not allowed!

    Default

    Quote Originally Posted by Desaix DeBurgh View Post
    No, the internet used to be the wild west when I started using it in the the 90s but not anymore.

    In fact I used to hang out with hackers on IRC, in the 90s, one had the handle DocHoliday aka Scott Chasin :

    http://en.wikipedia.org/wiki/Great_Hacker_War
    Yes. I bet the gov is using newer techniques to spy on people. Would be interesting to work for the NSA to see what they are really doing.
    ''Tolerance and Apathy are the last virtues of a dying society''- Aristotle

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. IT Security & Network Security - News & Reviews
    By SKYNET in forum Computers and Internet
    Replies: 4
    Last Post: 02-24-2014, 10:39 PM
  2. University Security Bulletins
    By EagleAtHeart in forum Law & Concepts
    Replies: 1
    Last Post: 11-24-2012, 03:57 AM
  3. Replies: 0
    Last Post: 08-31-2011, 07:38 PM
  4. New Homeland Security List
    By Atlas in forum News Articles
    Replies: 0
    Last Post: 05-02-2009, 03:34 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •