Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Rufus Ping
Dec 27, 2006





I'm a Friend of Rodney Nano

Cocoa Crispies posted:

[citation needed]

cryptologic quarterly vol 26 number 4 (2006) supposedly but i dont think anyones been able to find the original article so its entirely possible its not actually a practical attack

Adbot
ADBOT LOVES YOU

ChickenOfTomorrow
Nov 11, 2012

god damn it, you've got to be kind

OSI bean dip posted:



infosec superstar dan kaminski

bsidessf 2012 featured a keynote by dan kaminsky who gradually became more and more drunk on free shots. i doubt he can remember the latter half of that speech; i know i can't. i think at one point he said php programmers weren't all bad so obviousy he was very very incapacitated


welp thats my security fuckup

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug

ChickenOfTomorrow posted:

bsidessf 2012 featured a keynote by dan kaminsky who gradually became more and more drunk on free shots. i doubt he can remember the latter half of that speech; i know i can't. i think at one point he said php programmers weren't all bad so obviousy he was very very incapacitated


welp thats my security fuckup

i think at defcon maybe five or so years ago (before i ever did jeopardy there) his jeopardy team did real well and he had to waddle to the bathroom and get filmed the whole way

Shame Boy
Mar 2, 2010

Just you guys wait until we have quantum-to-the-curb fiber networks and then everything will be information-theoretic secure and we can finally put this to rest.

Any day now...

Bloody
Mar 3, 2013

Deacon of Delicious posted:

best infosec: never have anyone to communicate with

x1000 unironically

Bloody
Mar 3, 2013

btw if you really care about securely communicating with another party then you hopefully already know that doing it low-latency is going to be a bad idea

spankmeister
Jun 15, 2008






presenting for your viewing pleasure; the anthem of China's internet censorship agency:

https://www.youtube.com/watch?v=kbBKPqOh6DU

Luigi Thirty
Apr 30, 2006

Emergency confection port.

Bloody posted:

btw if you really care about securely communicating with another party then you hopefully already know that doing it low-latency is going to be a bad idea

that's why I trained my body to communicate at the speed of farts

cinci zoo sniper
Mar 15, 2013




spankmeister posted:

presenting for your viewing pleasure; the anthem of China's internet censorship agency:

https://www.youtube.com/watch?v=kbBKPqOh6DU
Nice!

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug

Bloody posted:

btw if you really care about securely communicating with another party then you hopefully already know that doing it low-latency is going to be a bad idea

it depends on your threat model

most people don't actually need their communications to be nsa-secure or even organized-crime-secure, maybe secure from opportunists (in which case something realtime like voice is good because they're not recorded by both parties by default; or iMessage on iOS-only because iOS has the best security stance of end-user OSes)

ate shit on live tv
Feb 15, 2004

by Azathoth

cheese-cube posted:

are we going to encounter a reverse cyberpunk future where leet hackers are using modems with clipper chips because the government has forgotten how to decrypt them due to all knowledge being lost within the bureaucratic matrices of the master computer?

i pray i live that long so that i may die laffing

Analog "encryption" is a trivial problem these days with DSP. The encryption could be modeled as additive 'noise' and you could basically use signal processing with various filter's until you recognize human speech, even better if you have recorded that human speech before hand so you have a base signal to compare to. Back in the day, it was a difficult physical problem to solve since you'd have to make a custom filter out of discrete real components. But now you can digitize the stream, and apply all the filters you want, quickly.

Unfortunately that means a regressive cyber-future isn't really possible.

Bloody
Mar 3, 2013

Cocoa Crispies posted:

it depends on your threat model

most people don't actually need their communications to be nsa-secure or even organized-crime-secure, maybe secure from opportunists (in which case something realtime like voice is good because they're not recorded by both parties by default; or iMessage on iOS-only because iOS has the best security stance of end-user OSes)

they were talking about child pornographers on the last page whose threat model usually is "everyone wants to murder us" so

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug

Bloody posted:

they were talking about child pornographers on the last page whose threat model usually is "everyone wants to murder us" so

this is the fundamental security problem: your biggest threat to security is you

mandatory thegrugq link: http://www.slideshare.net/grugq/opsec-for-hackers

Bloody
Mar 3, 2013

Deacon of Delicious posted:

best infosec: never have anyone to communicate with

ate shit on live tv
Feb 15, 2004

by Azathoth
Also why doesn't a pre-shared secret over a sideband channel work to prevent MitM?

Basically, you chat with each other over your soon to be secured/authenticated connection. You then call each other from a different phone/throw-away email address, exchange the one-time-key, Bam, enjoy your secure session.

Is that the usability issue people are talking about?

Qtotonibudinibudet
Nov 7, 2011



Omich poluyobok, skazhi ty narkoman? ya prosto tozhe gde to tam zhivu, mogli by vmeste uyobyvat' narkotiki

spankmeister posted:

presenting for your viewing pleasure; the anthem of China's internet censorship agency:

https://www.youtube.com/watch?v=kbBKPqOh6DU

was legit expecting https://www.youtube.com/watch?v=wKx1aenJK08

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug

Powercrazy posted:

Also why doesn't a pre-shared secret over a sideband channel work to prevent MitM?

Basically, you chat with each other over your soon to be secured/authenticated connection. You then call each other from a different phone/throw-away email address, exchange the one-time-key, Bam, enjoy your secure session.

Is that the usability issue people are talking about?

yes, i'm carrying my one phone, not a loving tool belt of drat gizmos in holsters like a sad middle manager in 2006

Shaggar
Apr 26, 2006

Powercrazy posted:

Analog "encryption" is a trivial problem these days with DSP. The encryption could be modeled as additive 'noise' and you could basically use signal processing with various filter's until you recognize human speech, even better if you have recorded that human speech before hand so you have a base signal to compare to. Back in the day, it was a difficult physical problem to solve since you'd have to make a custom filter out of discrete real components. But now you can digitize the stream, and apply all the filters you want, quickly.

Unfortunately that means a regressive cyber-future isn't really possible.

excuse me but theres no way your loving dsp is anywhere near as accurate as my analog components.

Illusive Fuck Man
Jul 5, 2004
RIP John McCain feel better xoxo 💋 🙏
Taco Defender

Powercrazy posted:

Also why doesn't a pre-shared secret over a sideband channel work to prevent MitM?

Basically, you chat with each other over your soon to be secured/authenticated connection. You then call each other from a different phone/throw-away email address, exchange the one-time-key, Bam, enjoy your secure session.

Is that the usability issue people are talking about?

yes. exchanging poo poo in advance (eg: gpg and key signing parties) is secure, but nobody wants to bother with that poo poo, and it's not really feasible in many of the circumstances where you would want to communicate secretly.

plus, if you can already communicate over some other channel that you consider secure, then you dont need a new secure connection.

Shaggar
Apr 26, 2006

Powercrazy posted:

Also why doesn't a pre-shared secret over a sideband channel work to prevent MitM?

Basically, you chat with each other over your soon to be secured/authenticated connection. You then call each other from a different phone/throw-away email address, exchange the one-time-key, Bam, enjoy your secure session.

Is that the usability issue people are talking about?

how do you secure the side channel?!?!

spankmeister
Jun 15, 2008






spankmeister posted:

presenting for your viewing pleasure; the anthem of China's internet censorship agency:

https://www.youtube.com/watch?v=kbBKPqOh6DU

srsly these guys own we're hosed

Bloody
Mar 3, 2013

Shaggar posted:

excuse me but theres no way your loving dsp is anywhere near as accurate as my analog components.

lol

Erwin
Feb 17, 2006

Shaggar posted:

excuse me but theres no way your loving dsp is anywhere near as warm as my analog components.

ChickenOfTomorrow
Nov 11, 2012

god damn it, you've got to be kind

let's go back to one-time pads printed on rice paper so you can eat them if you're about to be captured by the axis

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug

ChickenOfTomorrow posted:

let's go back to one-time pads printed on rice paper so you can eat them if you're about to be captured by the axis

or just really hungry

distortion park
Apr 25, 2011


has anyone posted this yet?
http://arstechnica.com/information-technology/2015/02/box-hands-cloud-encryption-keys-over-to-its-customers/
Featuring aws, the cloud, enterprise and:
[quote]
When asked if the service would prevent Box from handing data over to the government, a company spokesperson said, Unless the customer provides authorization to Box to provide the content thats asked for, Box is prevented from sharing the content. When customers use Box EKM we are not able to provide decrypted content because we dont have the encryption keys protecting the customers content.
...


File uploaded to Box (encrypted in transit with TLS).
We generate a Box Key to encrypt the file.
We encrypt the file with the Box Key.
We send the Box Key securely over to the Customer's HSM.
HSM encrypts the Box Key with the Customer Key and sends it back securely to Box.

...
Box needs permission from the customer when decrypting files. Before we can use our key, we need the customer to decrypt it inside the HSM, the company said. It's a layered encryption model. So while the data itself is not encrypted with the customer's key, the customer key is the gatekeeper for decrypting it. In effect, our key is useless until it's decrypted by the customer.

Each time Box needs temporary access to decrypt files, we go back to the customer to request access (by sending over the document key for decryption). Each request is captured in the logs controlled exclusively by the customer. Customers can monitor that log to see how the data is accessed and how the keys are being used, and we have no way of modifying that log.

[/quote[

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug

pointsofdata posted:

File uploaded to Box (encrypted in transit with TLS).
We generate a Box Key to encrypt the file.
We encrypt the file with the Box Key.
We send the Box Key securely over to the Customer's HSM.
HSM encrypts the Box Key with the Customer Key and sends it back securely to Box.

did they just elide the part where box deletes the key they generate?

Suspicious Dish
Sep 24, 2011

2020 is the year of linux on the desktop, bro
Fun Shoe
I'm not seeing what the Customer-encrypted Box Key is for. What's the point of that?

Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug

Suspicious Dish posted:

I'm not seeing what the Customer-encrypted Box Key is for. What's the point of that?

i think the theory is that box deletes their copy of the key and has to call the customer for it every time they need it and promise to delete it later

Arcsech
Aug 5, 2008

The writeup of how it works is sort of poorly written but is this as poo poo as I think it is? It sounds like they're saying "we don't keep the encryption key, pinky swear" so it doesn't actually add anything, but maybe I'm an idiot

vOv
Feb 8, 2014

MORE CURLY FRIES posted:

mitm doesnt just mean changing the contents of the messages but being able to intercept them

doing it irl or over phone does not get you out of these problems

the whole point of key exchanges like DH is that they're secure against passive eavesdroppers. if you use DH over a channel that can be modified and then verify the key over a modification-proof channel you're fine.

Shame Boy
Mar 2, 2010

Cocoa Crispies posted:

did they just elide the part where box deletes the key they generate?

well if they kept the key after decrypting it and using it once they would have to tell the customer's logs, it's right there in the design :downs:

jetz0r
May 10, 2003

Tomorrow, our nation will sit on the throne of the world. This is not a figment of the imagination, but a fact. Tomorrow we will lead the world, Allah willing.



Cocoa Crispies posted:

this is the fundamental security problem: your biggest threat to security is you

mandatory thegrugq link: http://www.slideshare.net/grugq/opsec-for-hackers

Optimus_Rhyme
Apr 15, 2007

are you that mainframe hacker guy?

spankmeister posted:

presenting for your viewing pleasure; the anthem of China's internet censorship agency:

https://www.youtube.com/watch?v=kbBKPqOh6DU

We've spent a lot of money on a choir, song writing, a stage, that drum, the lighting and a television studio, do we have any money left over for a real band? No? gently caress it, get the choir director and his Sanyo keyboard it's good enough.

Pile Of Garbage
May 28, 2007



Optimus_Rhyme posted:

We've spent a lot of money on a choir, song writing, a stage, that drum, the lighting and a television studio, do we have any money left over for a real band? No? gently caress it, get the choir director and his Sanyo keyboard it's good enough.

isn't that like US college football half-time show 101?

Malloc Voidstar
May 7, 2007

Fuck the cowboys. Unf. Fuck em hard.
https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf
http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/
Kaspersky report on the equation apt group which may be the nsa

quote:

One of the Equation Group's malware platforms, for instance, rewrote the hard-drive firmware of infected computersa never-before-seen engineering marvel that worked on 12 drive categories from manufacturers including Western Digital, Maxtor, Samsung, IBM, Micron, Toshiba, and Seagate.

The malicious firmware created a secret storage vault that survived military-grade disk wiping and reformatting, making sensitive data stolen from victims available even after reformatting the drive and reinstalling the operating system. The firmware also provided programming interfaces that other code in Equation Group's sprawling malware library could access. Once a hard drive was compromised, the infection was impossible to detect or remove.

Bhodi
Dec 9, 2007

Oh, it's just a cat.
Pillbug
That article is amazing. Some of that is scary CSI, next-level poo poo.

* A bootkit that injects code into the MBR and kernel at start
* Firmware flashing that works on all major brands of hard drives and creates a basically undetectable partition
* Sophisticated air gap spanning via thumbdrive with stored-commands and sniffer software
* An encrypted Virtual file system that lives solely in registry entries hidden away in bits of the registry
* Encapsulated modules, each with different encryption keys stored on the VFS

Lysidas
Jul 26, 2002

John Diefenbaker is a madman who thinks he's John Diefenbaker.
Pillbug
i remember reading about a researcher who developed a proof of concept firmware hack for western digital (iirc) hard drives, that was some really neat/scary stuff and i have his example code saved somewhere

spankmeister
Jun 15, 2008







Read most of this and :vince:

Adbot
ADBOT LOVES YOU

EMILY BLUNTS
Jan 1, 2005

how do you know if your seagate is infected?
it doesnt die after 2 years :v:

  • Locked thread