Tag Archives: verslo

Produkto valdymas ir organizavimas

Turėjau geriau suprasti sąvokas, vaidmenis ir pareigas, susijusias su produktų vadybos ir produktų rinkodaros valdymo programinės įrangos kompanijų, kodėl reikia, kurie yra skirtumai ir kaip jie tilptų organizacinę struktūrą.

Dauguma asmuo, aš žinau niekada domina į šią konkrečiai darbo sričiai, bet kai norite būti produktas bendrovė (o ne konsultavimo ar tirpalas bendrovė), jums pradėti turintys įvairių produktų skirtingose ​​platformose įvairių tikslinių klientų parduotų lovio skirtingų kanalų su skirtingais kainos su montavimo / kitą pristatymo procesas ir kad sudėtingumo turi būti tvarkomi tinkamu būdu.

Jūs suprantate, kad norint leisti produktas bendrovė auga teisinga kryptimi, jums reikia organizuoti gaminių valdymo veiklą oficialiai, o ne uždaryti savo protą į standžias organizacijos vaidmenis, pavyzdžiui, rinkodaros, pardavimo, R & D.

Kai mes kalbame apie "Produktų valdymo aš rekomenduoju šviečiamojo skaityti strateginį vaidmenį Produktų valdymo (Kaip rinkos veikiamas dėmesys veda įmonėms kurti produktus žmonės nori pirkti), kad paaiškinti daug dalykų, net jei ji perspektyvos grynąjį atskyrimą vaidmenys produkto valdymo, kažkas T hat yra per sunkus ir mažos įmonės, kaip paleisties.

Vis dėlto, pateikti pareigų paskirstymą Produktų valdymo ir produktų rinkodaros diferenciacija.

Gerai išmanyti produktų vadybos susijusios su paleidimo i S pateikta straipsnyje kūrimas Produkto valdymas Startup rodyti kitą bylą, susijusią su produkto viziją į bendrovės vaidmenis.

Tai įvesti terminus generalinis direktorius produkto ta prasme, kad Produktų valdymo pareigas šokinėti į įvairias organizacijos funkcijas, suteikiant dėmesio ir pastangų ten, kur reikia, nepriklausomai nuo to, kad vidinė funkcija, reikia daugiau pastangų, yra kūrimo, rinkodaros, pardavimų ar Bendravimas. Tai reiškia praktiškai pagerinti produkto viziją, kaip tai reikia visų pagrindinių produktų susijusių funkcijų priėmimo vizija įmonių mastu suderintos.

Geras atstovavimas produktų vadybos ir produktų rinkodaros veiklai yra gerai aprašyta su diferenciacija tarp strateginio, technikos ir rinkodaros sektoriuje ir nėra aiškiai atskirta nuo valdymo, rinkodaros (ir pardavimo) ir R & D:

Triad.jpg

Aš perskaičiau, kad produkto vadybininkas fonas ir žinios skiriasi priklausomai nuo įmonės FOKUSAVIMAS ( kur veikia produktas valdymas priklauso organizacijoje? ):

  • B2C -> Marketingo patirtis
  • B2B -> Techninė patirtis

Apšvietimo (man) ir labai svarbi diferenciacija dėl gaminių valdymo pareigas yra diferenciacija tarp:

  • Produkto valdymas
  • Produkto rinkodara

Konkrečias pareigas priklausančių produktų marketingo vs valdymas yra labai paaiškinta Vaidmuo Apibrėžtys Produktų valdymo ir produktų rinkodara , kad aš siūlau skaityti, leidžia jums geriau apibrėžti užduotis ir atsakomybę visoje jūsų organizacijoje. Ji taip pat suteikia gerą apibrėžimą darbo reikalavimus, jei jums reikia ieškoti, kad figūra!

Tuo pačiu metu svarbu suprasti, kas nėra produktų vadybos efektyviai Produkto valdymas yra ne tik funkcija prioritetų .

Tuo pačiu metu svarbu suprasti, kokios profesinės figūra pati nėra produkto vadybininkas:

  • Produkto vadybininkas nėra rinkodaros vadybininkas - o produktas valdymas paprastai yra vertinamas kaip rinkodaros disciplina, rinkodaros orientuota į marketingo planą ir paprastai nevairuoja bendrą produkto kryptį. Šiomis aplinkybėmis vis dėlto galėtų būti rasta produktų rinkodaros vadybininkas Štai informacija apie produkto pateikimo į rinką ginklų, ypač maža organizacija.
  • Produkto vadybininkas nėra pardavimų vadybininkas - pardavimų vadybininkas yra apie ieškant, kaip parduoti produktą, po kurių pardavimo metodika, technika ir kanalus, taip pat jie gali vairuoti įmonę iš rinkos orientuotos bendrovės (produkto) į klientų poreikius orientuota įmonė (tirpalas ir konsultavimas)
  • Produkto vadybininkas nėra kūrėjas - Kūrėjai sutelktas į technologijas, o ne bendrą produktą. Puikių produktų vadybininkai yra buvę kūrėjai, tačiau tai sunku padaryti ir vienu metu. Yra natūrali įtampa tarp kūrėjų ir produkto vadybininkai, kurie turėtų būti laikomi taip, kad sukurti subalansuotą produktą.
  • Produkto vadybininkas nėra programinės įrangos vadovas - programinės įrangos vadovas yra funkcinis vadovas ir paprastai nėra orientuota į produkto ar klientams.
  • Produkto vadybininkas nėra projekto vadovas - projektų vadovai yra apie tai, kaip ir kada, o produkto vadybininkas yra apie ką. Projektų vadovai glaudžiai bendradarbiauja su vadybininkais užtikrinti sėkmingą skirtingų fazių produkto gyvavimo ciklą.

Tipiškas produktų valdymo veikla gali būti itin sintezės apibendrinti taip:

  • Strategija: Planavimas produkto strategiją
  • Techniniai duomenys: geriausias produktas pokyčiai
  • Rinkodara: teikiant produktą ar techninio turinio
  • Pardavimai: teikti išankstinę pardavimo paramą ir efektyviai dirbti su pardavimo

Produkto valdymas todėl nėra tiksliai plėtra, nėra tiksliai prekybos, tai nėra tiksliai pardavimai, todėl paprastai sunku nustatyti ", kur jis turėtų likti" viduje organizacinė struktūra (tai net sunku suprasti, ko reikia)?

Silicio slėnio Produktų grupė suteikti gražus supratimą apie produkto organizacinė struktūra , nurodydami, kurie yra privalumai ir pavojai keletą pasirinkimų. Vis Cranky Produkto vadybininkas sako, kad tai nesvarbu, kur produkto vadybininkas gyventi organizacijoje .

Tai svarbu būti atsargūs, kad asmenys, kurie yra per daug techninių ar per daug pardavimų orientuotas siekiant užpildyti tarp skirtingos organizacijos spragą. Per daug susiskaldymo užduotims visoje organizacijoje gali būti biurokratijos, per daug muitai vienam asmeniui gali sukelti neveiksmingos įgyvendinti reikalingos užduotys kai plotas ir į vidaus konkurencijos suvokimas atsižvelgiant į tradicinius vaidmenis.

Patikrinkite, labai gražus Tęsti apie praktinę patirtį produktų vadybos (tai pusei techniką / pusė rinkodaros vaikinai) specialistas.

Ak! Kitas labai dažnas nesusipratimas yra supainioti rinkodaros su komunikacijos kur ai rado taip gerai su prekybos sąvokos, kad aš tikrai patinka ir suprasti griežtai santykių su produkto valdymas:

Rinkodara yra pažįstame rinką taip gerai, kad produktas parduoti save

Bet kas atsitinka, kai jūs neturite dirbti gaminio valdymo ir produkto rinkodaros valdymo procese, apibrėžtu būdu?

Gražus pasakojimas yra parodyta kaip pavyzdžiui, strateginis vaidmuo Produktų valdymo :

Jūsų įkūrėjas, puikus specialistas, pradėjo bendrovė metų, kai jis mesti savo dienos darbą parduoti savo idėją visą laiką. Jis sukūrė produktą, jis tiesiog žinojo kitų žmonių reikia. Ir jis buvo teisus. Netrukus jis pateikė pakankamai produkto ir pasamdė jo geriausias draugas iš koledžo, kaip viceprezidentas pardavimų. Ir įmonė išaugo. Bet prieš ilgas, pardavimų viceprezidentas skundėsi: "Mes inžinerija vadovaujama bendrovė. Turime tapti užsakovo interesus. "Ir tai skambėjo gerai. Išskyrus ... kiekviena nauja sutartis atrodė nereikalauja specialieji darbai. Jūs pasirašė keliolika klientams dešimčių rinkos segmentuose ir naujausią kliento balso visada dominuoja produkto planus. Jūs padarė išvadą, kad "klientas varoma", tai reiškia "lėmė naujausias klientų", ir kad negalėjo būti teisūs.

Jei norite būti produktas bendrovė jis atitinka tiksliai sekti strategiją varomas produktų rinkodaros ir vadybos, o ne pardavimo.

Supainioti pareigas produktų vadybos / rinkodaros ir pardavimo gali lemti nesėkmingą produktų įmonės, kurios negali tęsti pagal savo strategiją, nes jie tiesiog gauti galimybę, kad vairuoti verslo "out-of-apimtis.

Produktas įmonė privalo investuoti į jį savo gaminių kūrimą ir rinkodarą siekiant leisti pardavimo veikla susitelkti ir užtikrinti, kad organizacija yra kiekvieną dieną efektyviau rinkoje.

Po šio svarstymo, mano supratimu, yra ta, kad jis atitinka nustatyti, kaip sukurti lanksčią verslo procesų rinkinį, kaip elgtis įvairių produktų vadybos ir produktų rinkodaros pareigas, skiriančias juos nuo pardavimų.

Dalis

Gyvatė aliejus saugumo pretenzijos šifravimo saugumo produkto

Apsaugos rinka auga, vis daugiau bendrovių eina į rinką, bet kiek iš jų yra rimtai ką jie daro?

Jūs žinote, tai saugumo technologija reiškia, kad esate asmeniškai atsakingas už naudotojo informacijos apsaugą. Jūs turite padėti jiems suvokti, ką jie turi, ką jūsų darote ir kokios grėsmės modelio jūsų produktas apsaugoti.

Tipinė problema produkto saugumo funkcijų atstovauja naudotojo nesugebėjimas įvertinti saugumo reikalavimus paties produkto.

Taigi, yra daug bendrovių, darai ne taip etišką prekybos apsaugos priemonių, remiantis faktais, kad nė vienas vartotojas galės ją įvertinti.

Paaiškinta pirmiau situacija gyventi saugumo tema Snake Oil šifravimo, mokslinėje kriptografinės aplinkoje, leiskite mums šiandien naudoti geriausio informacijos apsaugos technologijų nereikia nerimauti per daug apie Backdoors ar nesaugumo evoliucija.

Leiskite kalbėti apie Snake Oil šifravimas

Gyvatė naftos Kriptografija : Be kriptografija , gyvatė aliejus yra terminas, vartojamas aprašyti komercinius kriptografijos metodus ir produktus, kurie laikomi fiktyvus ar apgaulingas. Skiriamieji saugų kriptografija nuo nesaugios kriptografija gali būti sunku iš naudotojo požiūriu. Daugelis cryptographers, pavyzdžiui, Bruce Schneier ir Phil Zimmermann , įsipareigoja šviesti visuomenę, kaip saugiai kriptografija yra padaryta, taip pat pabrėžti, kad klaidinančios komercinės kai kurių kriptografinių produktus.

Labiausiai siejama šifravimo saugumo guru Philipas Zimmermann, o Bruce Schneier buvo 1 kalbėti apie Snake Oil Šifravimas:

Gyvatė aliejus pateikė Philip Zimmermann

Gyvatė naftos Bruce Schneier

Mičiganas telekomunikacijos ir technologijos Law Review " taip pat padarė labai gerą analizę, susijusią su saugumo savybės saugumo produktų, SNAKE-OIL SAUGUMO REIKALAVIMAI, "sistemingai iškraipymas gaminio saugos . Jie aiškina apie bjaurių rinkodaros triukų, naudojamų įgnybti vartotojų nesugebėjimas įvertinti saugumo funkcijų, įskaitant ekonominį ir teisinį atsakomybės netiesiogiai.

Very famous is the sentence of Russ Nelson : Keletas gyvatė naftos apsaugos produktų bendrovės nepaaiškina ir neaišku, apie grėsmę modelį, kurį produktas taikyti Labai garsus yra sakinys. Russ Nelsonas :

"Atminkite, kriptografinius be grėsmės modelis yra tarsi slapukus be pieno. ..... Kriptografija be grėsmės modelio kaip motinystės be obuolių pyragas. Negaliu pasakyti, kad pakankamai kartų. Apskritai, saugumas be grėsmės modelis yra pagal apibrėžimą ketina nepavyks. "

Taigi, kaip atpažinti gyvatė naftos apsaugos produktus?

Patikrinti iš vietoje Snake Oil Šifravimas Produktai GAIRĖ: Snake Oil įspėjamieji ženklai, šifravimo programinė įranga išvengti pagal Matt Curtin .

Jūs galite pamatyti šį labai gerą kriptografini Snake Oil Pavyzdžiai pagal Emility Ratliff (IBM architektas Linux saugumo), kad bandė padaryti aiškų pavyzdį, kaip atpažinti Kriptografiniai Snake Oil.

Čia atstovavo pagrindinę gairę iš Matt Curtin popieriaus:


Patikrinus, taškų tai galima vertinti kaip rimtai šifravimo technologija ar produktas yra.

Bet apskritai, kaip nustatyti, kad neetiška saugumo principo?

Tai labai reikšmingas ir būtų tikrai naudinga kiekvienam apsaugos produktų kategorijos natūra padaryti kai stipriai ir nepriklausomo vertinimo gairės (kaip OSSTMM už skverbties bandymas), kad šis saugos vertinimo procesas tikrai į naudotojo rankas.

Taip pat būtų labai malonu turėti ką nors padaryti analizę ir vertinimą apsaugos produktų įmonių, skelbiant pranešimus apie Snake Oil ženklais.

Dalis

BlackBerry Saugumas ir šifravimas: Velnias ar angelas?

BlackBerry turėti gerą ir blogą reputaciją dėl savo saugumo pajėgumus, priklausomai iš kurios kampas jūs žiūrite į jį.

Šis pranešimas tai apibendrinti nustatyti Informacijos tegul skaitytojas Gauti vaizdą, neatsižvelgiant daug poziciją kaip RIM ir "BlackBerry gali būti laikoma, priklausomai nuo požiūriu labai saugios platformos arba itin pavojingo vienas.

bblock.jpg

Tegul eina.

Iš vienos pusės Blackberry tai platforma daug šifravimo funkcijų, apsaugos požymius visur, prietaisas saugiame (pagal užsakymą šifravimo), ryšio saugiame (su muitinės patentuotais protokolais , pavyzdžiui, mišraus kapitalo įmonės), labai geros patobulintomis saugos parametrus, šifravimo Framework Certicom ( dabar priklauso RIM ).

Iš kitos pusės, jie nėra pateikti tik prietaisas, bet perdangos prieigos tinklas, vadinamas TAB ( BlackBerry Internet Service " ), tai pasaulinė visame pasaulyje plačiajam tinklui, kur yra jūsų gervuogių įvesti, o jūs naršyti arba CheckMail naudojant blackberry.net AP.

Kai jūs, ar prašymas, naudokite blackberry.net APN esate ne tik jungiantis prie su vežėju interneto ryšį interneto, bet jūs einate viduje RIM tinklą, kuris bus proxy ir veikia kaip vartai pasiekti internetą.

Pačią atsitikti, kai jūs turite verslo naudojimą: Tiek BB prietaiso ir įmonių BES prisijungti prie RIM tinklą, kuris veikia kaip rūšiuoti VPN koncentracijos tinklo .

Taigi, iš esmės visos komunikacijos kirsti lovio RIM paslaugų infrastruktūrą užšifruoti su nustatyta nuosavybės šifravimo ir duomenų perdavimo protokolų.

Lygiai taip pat pranešimu, manau, kad "Google" pateikti gtalk per blackberry.net APN, pagaminti susitarimą siekiant pasiūlyti paslaugą viduje BB tinklo BB vartotojams. Įdiegus gtalk jums pridėjo 3 paslaugų knygas , kurie nurodo į GTALKNA01 tai iš gtalk vartai viduje RIM tinklo leisti vidaus bis Bendravimas ir veikti kaip gtalk vartai į interneto vardas.

Mobiliojo ryšio operatoriai paprastai nėra netgi leidžiama tikrinti tarp BlackBerry įrenginio ir BlackBerry tinklo srautą.

Taigi, RIM ir "BlackBerry kažkaip unikalus savo požiūrį, kaip jie teikia platforma, tinklo ir paslaugų visiems siejama kartu, ir jūs galite ne tik" gauti prietaisą ir programinę įrangą ", bet vartotojas ir įmonės visada jungiasi ir prijungtas prie paslaugos tinklas.

Tai gerai ir tai blogai, nes tai reiškia, kad RIM suteikti labai gerą saugumo funkcijų ir galimybių saugotų informaciją, prietaisą ir informacijos prieinamumą įvairaus lygio su trečiąja šalimi.

Bet tai visada sunku įvertinti grėsmę ir riziką, susijusią su RIM pati ir kurie galėtų padaryti politinį spaudimą prieš RIM.

Prašome apsvarstyti galimybę, kad aš nesakau "RIM žiūri savo duomenis" bet padaryti objektyvų rizikos analizė: kiek platforma daroma RIM turi valdžią ant prietaiso, ant-the-įrenginio informacijos ir dėl informacijos, kuri kerta tinklas. (Skaityti mano Mobile Security skaidres ).

Pavyzdžiui aptarkime tą pačią kontekstą Nokia telefonams.

Kai "Nokia" prietaisas yra parduodamas, "Nokia" neturi įgaliojimų ant prietaiso, nei ant-the-įrenginio informacijos, nei informacija, kad kirsti tinklą. Bet tai taip pat tiesa, kad "Nokia tiesiog suteikti prietaisą ir nesuteikia pridėtinės vertės paslaugas, pavyzdžiui, Enterprise integraciją (RIM tunelis), TAB tinklo prieigos ir visas vietinio ir nuotolinio saugumo atidėjiniai funkcijas, BlackBerry teikia.

Taigi, tai yra atsižvelgiant į rizikos kontekstą tinkamu būdu renkantis platformą reikalas, toks pavyzdys labai panašus į pasirenkant Microsoft Exchange Server (į savo paslaugų) ar gauti SaaS paslauga pavyzdžiui, "Google Apps".

Abiem atvejais jums reikia pasitikėti teikėją, tačiau pirmajame pavyzdyje jums reikia pasitikėti "Microsoft", kad nekeltų Backdoor nuo programinės įrangos, o 2-ojo Pavyzdžiui, jūs turite pasitikėti "Google", kaip platforma ir paslaugų teikėjo, kad jis negali pasiekti Jūsų informacija.

Taigi tai skirtingi paradigma turi būti vertinamos atsižvelgiant į jūsų grėsmė modelį.

Jei jūsų grėsmė modelis jums apsvarstyti RIM kaip patikimos trečiosios šalies paslaugų teikėjas (panašiai kaip Google), nei tai ok. Jei turite labai aukštą rizikos sąlygomis, kaip slaptas vieną, tada galime svarstyti ir atidžiai įvertinti, ar tai ne geriau laikyti BlackBerry paslaugas visiškai izoliuoti nuo prietaiso arba naudoti kitą sistemą, be sąveikos su gamintojo serveriams ir paslaugoms.

Dabar galime grįžti prie kai kurių mokslinių tyrimų ir kai apie gervuogių ir gervuogių saugumo pati faktais.

Pirmiausia kelių vyriausybių teko susidurti su RIM siekiant priversti jas suteikti prieigą prie informacijos, kad kirsti savo paslaugų tinklus, o kiti nusprendė tiesiogiai uždrausti Blackberry naudojimas aukštų pareigūnų, nes serverių, esančių Jungtinėje Karalystėje ir JAV, o kiti nusprendė įdiegti savo Backdoors.

Yra daug diskusijų, kai temos RIM Blackberry ir vyriausybės dėl įvairių priežasčių.

Žemiau pateiktas oficialiai saugumo informacijos, susijusios RIM BlackBerry platforma rinkinį:

Ir čia neoficialus apsaugos ir įsilaužimo susijusią informaciją RIM BlackBerry platforma rinkinys:

Nes tai 23.32 (GMT +1), aš esu pavargęs, manau, kad šis pranešimas bus baigti čia.

Tikiuosi, suteikė skaitytojui daug naudingos informacijos ir nagrinėjimo eiti giliau analizuojant ir atsižvelgiant į bendrą gervuogių saugumą rinkinį (į geras ir blogas, ji visada priklauso nuo jūsų grėsmė modeliu!).

Į sveikatą

Fabio Pietrosanti (Naivus)

ps aš valdyti saugumo technologijų kūrimą (balso šifravimo technologijų) Blackberry platforma, ir galiu pasakyti, kad nuo vystymo požiūriu tai absoliučiai geriau nei "Nokia", jų suderinamumą bei greičio plėtrą, bet naudoti tik Rimos 5.0 +!

Dalis

Kinija Šifravimas nuostatai

Sveiki visi,

Radau labai įdomų dokumentą dėl Kinijos šifravimo importo / eksporto / vidaus nuostatų daroma "Baker & McKenzie JAV.

Tai stipriai verslo ir reguliavimo orientuota suteikti labai gerai padaryta vaizdą apie tai, kaip Kinija taisyklės veikia ir kaip jis gali elgtis ateityje.

Skaitykite čia atkoduojant Kinija šifravimo nuostatus (forma Bakernet tinklalapyje).

Dalis

Mobile Security "kalbėti WHYMCA konferencijos

I want to share some slides i used to talk about mobile security at whymca mobile conference in Milan.

Read here my slides on mobile security .

The slides provide a wide an in-depth overview of mobile security related matters, i should be doing some slidecast about it putting also audio. Maybe will do, maybe not, it depends on time that's always a insufficient resource.

Dalis

SecurStar GmbH Phonecrypt answers on the Infosecurityguard/Notrax case: absolutely unreasonable! :-)

UPDATE 20.04.2010: http://infosecurityguard.com has been disabled. Notrax identity became known to several guys in the voice security environments (cannot tell, but you can imagine, i was right!) and so our friends decided to trow away the website because of legal responsibility under UK and USA laws.

UPDATE: Nice summary of the whole story (i know, it's long and complicated to read at 1st time) on SIPVicious VoIP security blog by Sandro Gauci .

Following my discoveries, Mr. Hafner, SecurStar chief exec, tried to ultimately defend their actions, citing absolutely unreasonable excuses to The Reg instead of publicly apologizing for what they have done: creating a fake independent security research to promote their PhoneCrypt product .

He tried to convince us that the person behind IP 217.7.213.59, used by the author of infosecurityguard.com and pointing to their office DSL line, was this hacker Notrax, using their anonymous surfing service and not one of their employees at their office:

“SecurStar chief exec Wilfried Hafner denied any contact with Notrax. Notrax, he said, must have been using his firm's anonymous browsing service, SurfSolo, to produce the results reported by Pietrosanti”

Let's reflect a moment on this sentence… Would really an hacker looking for anonymity spend 64 EUR to buy their anonymity surfing service called surfsolo instead of using the free and much more secure TOR (the onion router) ?Then let's reflect on this other piece of information:

  • The IP 217.7.213.59 is SecurStar GmbH's office DSL line
  • On 217.7.213.59 they have installed their VoIP/Asterisk PBX and internet gateway
  • They promote their anonymous proxy service for “Anonymous p2p use” ( http://www.securstar.com/products_ssolo.php ). Who would let users do p2p from the office dsl line where they have installed their corporate VoIP PBX ? If you do VoIP you can't let third party flood your line w/ p2p traffic, your phone calls would became obviously unreliable (yes, yes, you can do QoS, but you would not place an anonymous navigation proxy on your company office DSL line…).
  • Which company providing an anonymous navigation service would ever use their own office IP address? Just think how many times you would have the police knocking at your door and your employees as the prime suspects. (In past i used to run a TOR node, i know the risks…). Also think how many times you would find yourself blacklisted on google as a spyware bot.
  • Mr. Hafner also says “We have two million people using this product. Or he may have been an old customer of ours”. 2M users on a DSL line, really?
  • I don't use Surfsolo service, however their proxies are probably these ones:

surfsolo.securstar.net – 67.225.141.74

surfsolo.securstar.com – 69.16.211.133

Frankly speaking I can easily understand that Mr. Hafner is going do whatever he can to protect his company from the scandal, but the “anonymous proxy” excuse is at the very least suspicious.

How does the fact that the “independent research” was semantically a product review of PhoneCrypt, along with the discovery that the author come from the SecurStar GmbH IP address offices, along with the anonymity of this Notrax guy (SecurStar calls him a “well known it security professional” in their press release..) sound to you?

It's possible that earth will get an attack from outer space that's going to destroy our life?

Statistically extremely difficult, but yes, possible. More or less like the “anonymous proxy” story told by Mr. Hafner to cover the fact that they are the ones behind the infosecurityguard.com fake “independent security review”.

Hey, I don't need anything else to convince myself or to let the smart person have his own thoughts on this.

I just think that the best way for SecurStar to get out of this mess would probably be to provide public excuses to the hacking community for abusing the name and reputation of real independent security researches, for the sake of a marketing stunt.

Pagarbiai,

Fabio Pietrosanti

ps I am currently waiting for some other infos that will more precisely confirm that what Mr. Hafner is saying is not properly true. Stay tuned.

Dalis

Evidence that infosecurityguard.com/notrax is SecurStar GmbH Phonecrypt – A fake independent research on voice crypto

Below evidence that the security review made by an anonymous hacker on http://infosecurityguard.com is in facts a dishonest marketing plan by the SecurStar GmbH to promote their voice crypto product.

I already wrote about that voice crypto analysis that appeared to me very suspicious.

Now it's confirmed, it's a fake independent hacker security research by SecurStar GmbH, its just a marketing trick!

How do we know that Infosecurityguard.com, the fake independent security research, is a marketing trick from SecurStar GmbH?

1) I posted on http://infosecurityguard.com a comments to a post with a link to my blog to that article on israelian ministry of defense certification

2) The author of http://infosecurityguard.com went to approve the comment and read the link on my own blog http://infosecurity.ch

3) Reaching my blog he leaked the IP address from which he was coming 217.7.213.59 (where i just clicked on from wordpress statistic interface)

4) On http:// 217.7.213.59/panel there is the IP PBX interface of the SecurStar GmbH corporate PBX (openly reachable trough the internet!)

5) The names of the internal PBX confirm 100% that it's the SecurStar GmbH:

6) There is 100% evidence that the anonymous hacker of http://infosecurityguard.com is from SecurStar GmbH

Below the data and reference that let us discover that it's all but a dishonest marketing tips and not an independent security research.

Kudos to Matteo Flora for it's support and for his article in Debunking Infosecurityguard identity !

The http referral tricks

When you read a link going from a website to another one there is an HTTP protocol header, the “Referral”, that tell you from which page someone is going to another webpage.

The referral demonstrated that the authors of http://infosecurityguard.com read my post, because it was coming from http://infosecurityguard.com/wp-admin/edit-comments.php that's the webpage you use as a wordpress author/editor to approve/refuse comments. And here there was the link.

That's the log entry:

217.7.213.59 – - [30/Jan/2010:02:56:37 -0700] “GET /20100129/licensed-by-israel-ministry-of-defense-how-things-really-works/ HTTP/1.0″ 200 5795 “ http://infosecurityguard.com/wp-admin/edit-comments.php ” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”

The PBX open on the internet tell us that's SecurStar GmbH

The SecurStar GmbH PBX is open on the internet, it contains all the names of their employee and confirm us that the author of http:/infosecurityguard.com is that company and is the anonymous hacker called Notrax.

Here there is their forum post where the SecurStar GmbH guys are debugging IPCOPfirewall & Asterisk together (so we see also details of what they use) where there is the ip 217.7.213.59 .

SecurStarproof.png

Tai taip pat labai smagu!

Jie parduoda saugų telefonija, tačiau jų įmonė telefonijos sistema yra atvirai pažeidžiama internete. :-)

Aš galvojau skambinti generalinis direktorius, Hafner, per SIP savo vidaus darbastalio PBX paskelbti mes atradome jam triukus .. : ->

Jie išmatavo savo rinkodaros veiklą

Pažvelgus į mano svetainę rąstų radau, kad jie buvo jutimo google platinti informaciją dėl šių raktažodžių, siekiant suprasti, kaip efektyviai jie galėjo pulti konkuruojančius produktus. Ji protinga, jei investuoti pinigus į rinkodaros kampaniją norite pamatyti rezultatus :-)

Jie priėjo prie mano dienoraštį ir aš prisijungti savo paiešką:

infosecurityguard + CryptoPhone

infosecurityguard + aukso užraktas

217.7.213.59 - [30/Jan/2010: 02:22:42 -0700] "GET / HTTP/1.0" 200 31057 "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3;. NET CLR 1.1.4322;. NET CLR 2.0.50727;. NET CLR 3.0.4506.2152;. NET CLR 3.5.30729; InfoPath.2)

217.7.213.59 - [30/Jan/2010: 04:15:07 -0700] "GET HTTP/1.0 "200 15774 "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3;. NET CLR 1.1.4322;. NET CLR 2.0.50727;. NET CLR 3.0.4506.2152;. NET CLR 3.5.30729; InfoPath.2)


Domenų registravimo duomenys
Domenas buvo registruotas gruodžio 1 d 2009 vos du mėnesius pradėti rengti nesąžiningas rinkodaros kampaniją:

Domeno pavadinimas: INFOSECURITYGUARD.COM

Kancleris: GODADDY.COM, INC

Atnaujinta Data: 01-Dec-2009

Sukūrimo data: 01-Dec-2009

Domenas anonimiškai privatumo apsaugą lovio atlikti whois privatumo paslaugą:

Administracinė Kontaktai: Privatus, Registracija INFOSECURITYGUARD.COM @ domainsbyproxy.com, Domenai pagal įgaliojimą, Inc DomainsByProxy.com

Notrax įsilaužėlis neegzistuoja google
Kaip žinote nors hakeris, kad gauti visuomenei paprastai turi buvimą IT veiklos Google ", lankyti adresų sąrašus, forumas, Pradinis tinklalapis, atlikti tyrimai, dalyvavimas konferencijose ir tt, ir tt
Netikras hakeris, kad jie norėjo mums galvoti rašė nepriklausomą dienoraštį neturi jokios įtakos google pėdsakų. Tik kai apie kurio nukentėjo anonimiškai naršyklėje vadinamas Notrax bet nieko apie tą Hacker.
Gal kai SecurStar jei anonimiškumą įrankį į savo rinkodaros agentūra, padėti jiems apsaugoti anonimiškumą dėl padirbtų mokslinių tyrimų, jų suteikė jiems anoniminius naršyklės notrax.So rinkodaros vaikinas galvoti apie tai apie netikrą įsilaužėlių nick'as naudojamas kas? Notrax! :-)

"Nepriklausomas" visiškai orientuota viešinimas PhoneCrypt

Iš įvairių peržiūros don phonecrypt peržiūra tik teigiamas ir nuostabi gerų atsiliepimų, o kita yra tik blogas atsiliepimus ir nė vieno gera vieta.

Kaip galite įsivaizduoti, bet nepriklausoma produkto vertinimo rūšies visų produktų, yra prekės ir minusų. Ne Šiuo vienas yra tik produktas, kuris yra gera ir produktas, kuris yra blogi.

Jie praleido atsižvelgti į naudojamos technologijos produktų saugumą

Jie visiškai vengė kalbėti apie kriptografiją ir saugumo produktų.

They do not evaluated basic security features that must be in that kind of products.That's in order not to let anyone see that they did not followed basic security rules in building up their PhoneCrypt.
The technology is closed source, no transparency on algorithms and protocols, no peer review.Read my new comparison (from the basic cryptographic requirement point of view) About the voice encryption analysis (criteria, errors and different results) .
The results are somehow different than their one .

UPDATE: Who's Wilfried Hafner (SecurStar founder) ?

I got a notice from a reader regarding Wilfred Hafner, SecurStar founder, CEO and security expert.

He was arrested in 1997 for telephony related fraud (check 2nd article on Phrack) earning from telephony fraud 254.000 USD causing damages to local telcos trough blueboxing for 1.15 Million USD.

He was not doing “Blueboxing” for the pleasure of phreaking and connecting with other hackers, but to earn money.

Hacking for profit (and not for fun) in 1997… brrr…. No hacker's ethic at all!

All in all, is that lawful?

Badmouthing a competitor amounts to an unfair competition practice in most jurisdictions, so it is arguable (to say the least) that SecurStar is right on a legally sound ground here.
Moreover, there are some specific statutes in certain jurisdictions which provide for a straightforward ban on the practice we are talking about. For example in the UK the British Institute of Practitioners in Advertising - in compliance with the Consumer protection from Unfair Trading regulation – ruled that:

”falsely claiming or creating the impression that the trader is not acting for the purposes relating to his trade, business, craft or profession, or falsely representing oneself as a consumer” is a criminal offense .

We have no doubt that PRPR (which is the UK-based *PR company for SecurStar GmbH, led by Peter Rennison and Allie Andrews as stated in SecurStar Press Release ) did provide their client with this information. Heck, they *are* in the UK, they simply cannot ignore that!

IANAL, but I would not be surpised if someone filed a criminal complaint or start civil litigation for unfair competition against SecurStar GmbH.
Whether this is going to be a matter for criminal and/or civil Courts or not is not that important. However, it is clear enough that SecurStar GmbH appears to be at least ethically questionable and not really worth of trust.

Nice try, gentlemen… however, next time just do it right (whether “right” for them means “in a honest manner” or “in a fashion not to be caught” I will let them choose)”

Fabio Pietrosanti (naif)

Dalis

Dishonest security: The SecurStart GmbH Phonecrypt case

I would like to provide considerations on the concept of ethics that a security company should have respect to the users, the media and the security environment.

SecurStar GmbH made very bad things making that infosecuriguard.com fake independent research.

It's unfair approach respect to hacking community.

It's unfair marketing to end user. They should not be tricking by creating fake independent review.

It's unfair competition in the security market.

Let's make some more important consideration on this.

Must be serious on cryptographic products. They are not toys

When you do cryptographic tools you should be really aware of what you are doing, you must be really serious.

If you do bad crypto people could die.

If you don't follow basic security rules for transparency and security for cryptography you are putting people life at risk.

You are taking the responsibility of this. (I want to sleep at night, don't think SecurStar CEO/CTO care about this…)

Security research need reference and transparency

Security research have to be public, well done, always subject to public discussion and cooperation.
Security research should not be instrumentally used for marketing purpose.Security research should be done for awareness and grow of the knowledge of the worldwide security environment.

Hacking environment is neutral, should not be used instrumentally

Hackers are considered neutral, nerds, doing what they do for their pleasure and passion.

If you work in the security market you work with hackers.

If you use hackers and hacking environment for your own marketing purposes you are making something very nasty.

Hackers give you the technology and knowledge and you use them for your own commercial purpose.

Consideration on the authority of the information online

That's something that pose serious consideration on the authority of information online.An anonymous hacker, with no reference online, made a product security review that appear like an independent one. I have to say that the fake review was very well prepared, it always posed good/bad things in an indirect way. It did not appeared to me at 1st time like a fake. But going deeply i found what's going on.

However Journalists, news media and blogger went to the TRAP and reviewed their fake research. TheRegister, NetworkWorld and a lot of blogs reported it. Even if the author was completely anonymous.

What they have done is already illegal in UK

SecurStar GmbH is lucky that they are not in the UK, where doing this kind of things is illegal .

Fabio Pietrosanti (naif)

Dalis

About the SecurStar GmbH Phonecrypt voice encryption analysis (criteria, errors and different results)

This article want to clarify and better explain the finding at infosecurityguard.com regaring voice encryption product evaluation.
This article want to tell you a different point of view other than infosecurityguard.com and explaining which are the rational with extensive explaination from security point of view.
Today i read news saying: “PhoneCrypt: Basic Vulnerability Found in 12 out of 15 Voice Encryption Products and went to read the website infosecurityguard .

Initially it appeared to my like a great research activity but then i started reading deeply the read about it.I found that it's not properly a security research but there is are concrete elements that's a marketing campaign well done in order to attract public media and publicize a product.
Imho they was able to cheat journalists and users because the marketing campaign was absolutely well done not to be discovered on 1st read attempt. I personally considered it like a valid one on 1st ready (they cheated me initially!).

But if you go deeply… you will understand that:
- it's a camouflage marketing initiative arranged by SecurStar GmbH and not a independent security research
- they consider a only security context where local device has been compromised (no software can be secured in that case, like saying SSL can be compromised if you have a trojan!)
- they do not consider any basic security and cryptographic security criteria

However a lot of important website reported it:

This article is quite long, if you read it you will understand better what's going on around infosecurityguard.com research and research result.

I want to to tell you why and how (imho) they are wrong.

The research missed to consider Security, Cryptography and Transparency!

Well, all this research sound much like being focused on the marketing goal to say that their PhoneCrypt product is the “super” product best of all the other ones.
Any security expert that would have as duty the “software evaluation” in order to protect the confidentiality of phone calls will evaluate other different characteristics of the product and the technology.

Yes, it's true that most of the product described by SecurStar in their anonymous marketing website called http://infosecurityguard.com have some weakness.
But the relevant weakness are others and PhoneCrypt unfortunately, like most of the described products suffer from this.
Let's review which characteristics are needed basic cryptography and security requirement (the best practice, the foundation and the basics!)

a – Security Trough Obscurity does not work

A basic rule in cryptography cames from 1883 by Auguste Kerckhoffs:

In a well-designed cryptographic system, only the key needs to be secret; there should be no secrecy in the algorithm.
Modern cryptographers have embraced this principle, calling anything else “security by obscurity.”
Read what Bruce Schneir, recognized expert and cryptographer in the world say about this
Any security expert will tell you that's true. Even a novice university student will tell you that's true. Simply because that's the only way to do cryptography.
Almost all product described in the review by SecurStar GmbH, include PhoneCrypt, does not provide precise details about their cryptographic technologies.
Precise details are:
  • Išsami kriptografinis algoritmas (tai ne tik sakydamas: "mes naudojame AES )
  • Išsami kriptografinio protokolo (tai ne tik sakydamas: "mes naudojame Diffie Hellman )
  • Detali specifikacija matavimo šifravimo stiprumas (tai ne tik sakydamas: "mes turime 10000000 bitų rakto dydis )

Tikslius duomenis reiškia turėti daugybę dokumentų teorinių ir praktinių pasekmių dokumentavimo bet kurį vieną būdą, kaip algoritmas veikia, kaip protokolas dirba su tikslios atkartoti jį sąveikos bandymai.
Tai reiškia, kad mokslo bendruomenei turėtų būti suteikta galimybė žaisti su technologija, audituoti, nulaužti.
Jei mes nieko nežinome apie kriptografinės sistemos detales, kaip mes galime žinoti, kurie yra silpnumas ir stipriosios pusės?

Mike Fratto, Svetainės redaktorius Network Computing, padarė didelį straipsnį apie "sakydamas" ne nuosavybės kriptografinių sistemų " .
Cerias Purdue universiteto pasakyti tai .

B - NE recenzuojamas ir ne moksliškai patvirtintas Kriptografija neveikia

Bet kokiu atveju ir bet kokiomis sąlygomis jūs darote kriptografija jūs turite būti tikri, kad kažkas bus patikrinti, peržiūrėti, analizuoti, Distruct ir reconstract nuo nulio savo technologijas ir teikti šias informaciją laisvai visuomenei atvirą diskusiją.
Būtent kaip AES gimė ir kaip JAV Nacionalinio instituto standartą padaryti kriptografija daro (su viešojo konkurso su visuomenės tarpusavio peržiūrą, kur tik geriausiai įvertinti win).
Vieša diskusija su visuomenės konkurse, kur daug peržiūrą garsiausių ir ekspertų cryptographer pasaulyje, įsilaužėliai (su savo vardą, pavardę ir veidą, o ne kaip Notrax) teikti savo indėlį, pasakyti, ką jie galvoja.
Tai vadinama "peer review".

Jei kriptografinės technologijos pratęstas ir svarbus tarpusavio peržiūrą, platinamas pasaulio atvyksta iš universitetų, privačios saugos įmonių, karinių institucijų, įsilaužėlių ir visi iš skirtingų pasaulio dalis (iš JAV į Europą Rusijos į Pietų Ameriką į Artimuosius Rytus į Kiniją), ir visi jie sutinka, kad konkrečią technologiją, tai saugus ...
Na, tokiu atveju mes galime svarstyti technologija saugi, nes subjektų, su gera reputacija ir autoritetu, gaunamą iš įvairių pasaulio vietos daug daug viešai peržiūrėti, analizuoti ir patvirtino, kad technologija tai saugus.

Kaip privati ​​bendrovė gali net galvoti sugalvoti apie tai savo saugiame ryšių protokole, kai jis moksliškai pareiškė, kad tai nėra įmanoma tai padaryti "patentuotą ir uždarus būdu"?
IBM pasakyti, kad tarpusavio peržiūros ji reikalinga kriptografija .
Bruce Schneier pasakyti, kad "Geros cryptographers žinau, kad nieko pakaitalų didelę tarpusavio peržiūrą ir metų analize."
Pilypas Zimmermann, jums pasakys, kad saugokitės Snake Oil kur istorija: "Kiekvienas programinės įrangos inžinierius fantazijos save cryptographer, kuri atvedė prie tikrai blogai šifravimo programinės įrangos platinimo."

C - uždaro kodo kriptografija neveikia

Kaip žinote bet "rimtas" ir rūšies "gerą reputaciją" šifravimo technologija yra įgyvendinta opensource.
Yra paprastai kelis įgyvendinimas pačiu šifravimo algoritmas ir šifravimo protokolą, kad būtų galima peržiūrėti visą, kaip ji veikia ir patvirtina sąveiką.
Supposing to use a standard with precise and extended details on “how it works”, that has been “peer reviewed” by the scientific community BUT that has been re-implemented from scratch by a not so smart programmer and the implementation it's plenty of bugs.

Well, if the implementation is “opensource” this means that it can be reviewed, improved, tested, audited and the end user will certaintly have in it's own had a piece of technology “that works safely” .

Google release opensource crypto toolkit
Mozilla release opensource crypto toolkit
Bruce Schneier tell you that Cryptography must be opensource .

Another cryptographic point of view

I don't want to convince anyone but just provide facts related to science, related to cryptography and security in order to reduce the effect of misinformation done by security companies whose only goes is to sell you something and not to do something that make the world a better.

When you do secure products, if they are not done following the proper approach people could die.
It's absolutely something irresponsible not to use best practice to do crypto stuff.

To summarize let's review the infosecurityguard.com review from a security best pratice point of view.

Product name Security Trough Obscurity Public peer review Open Source Compromise locally?
Caspertec Obscurity No public review Closed Taip
CellCrypt Obscurity
No public review
Closed
Taip
Cryptophone Transparency Limited public review Public Taip
Gold-Lock Obscurity
No public review
Closed
Taip
Illix Obscurity
No public review
Closed
Taip
No1.BC Obscurity No public review
Closed
Taip
PhoneCrypt Obscurity
No public review
Closed
Taip
Rode&Swarz Obscurity
No public review
Closed
Taip
Secure-Voice Obscurity
No public review
Closed
Taip
SecuSmart Obscurity
No public review
Closed
Taip
SecVoice Obscurity
No public review
Closed
Taip
SegureGSM Obscurity
No public review
Closed
Taip
SnapCell Obscurity
No public review
Closed
Taip
Tripleton Obscurity
No public review
Closed
Taip
Zfone Transparency Public review
Open Taip
ZRTP Transparency Public review
Open Taip

*Green means that it match basic requirement for a cryptographic secure system

* Red / Broken means that it does not match basic requirement for a cryptographic secure system
That's my analysis using a evaluation method based on cryptographic and security parameters not including the local compromise context that i consider useless.

However, to be clear, those are only basic parameters to be used when considering a voice encryption product (just to avoid being in a situation that appears like i am promoting other products). So it may absolutely possible that a product with good crypto ( transparency, peer reviewed and opensource) is absolutely a not secure product because of whatever reason (badly written, not usable causing user not to use it and use cleartext calls, politically compromised, etc, etc).
I think i will prepare a broader criteria for voice crypto technologies and voice crypto products, so it would be much easier and much practical to have a full transparent set of criterias to evaluate it.

But those are really the basis of security to be matched for a good voice encryption system!
Read some useful past slides on security protocols used in voice encryption systems (2nd part).

Now read below some more practical doubt about their research.

The security concept of the review is misleading: any hacked device can be always intercepted!

I think that the guys completely missed the point: ANY KIND OF SOFTWARE RUNNING ON A COMPROMISED OPERATING SYSTEM CAN BE INTERCEPTED

Now they are pointing out that also Zfone from Philip Zimmermann is broken (a pc software), just because they install a trojan on a PC like in a mobile phone?
Any security software rely on the fact that the underlying operating system is somehow trusted and preserve the integrity of the environment where the software run.

  • If you have a disk encryption system but your PC if infected by a trojan, the computer is already compromised.
  • If you have a voice encryption system but your PC is infected by a trojan, the computer is already compromised.
  • If you have a voice encryption system but your mobile phone is infected by a trojan, the mobile phone is already compromised.

No matter which software you are running, in such case the security of your operating environment is compromised and in one way or another way all the information integrity and confidentiality is compromised.

Like i explained above how to intercept PhoneCrypt.

The only things that can protect you from this threat is running in a closed operating system with Trust Computing capability, implementing it properly.
For sure on any “Open” operating system such us Windows, Windows Mobile, Linux, iPhone or Android there's no chance to really protect a software.
On difficult operating system such as Symbian OS or RimOS maybe the running software can be protected (at least partially)

That's the reason for which the security concept that guys are leveraging to carry on their marketing campaign has no clue.
It's just because they control the environment, they know Flexispy software and so they adjusted their software not to be interceptable when Flexispy is installed.
If you develop a trojan with the other techniques i described above you will 100% intercept PhoneCrypt.

On that subject also Dustin Tamme l, Security researcher of BreakPoint Systems , pointed on on VoIP Security Alliance mailing lists that the security analysis is based on wrong concepts .

The PhoneCrypt can be intercepted: it's just that they don't wanted to tell you!

PhoneCrypt can be intercepted with “on device spyware”.
Kodėl?
Because Windows Mobile is an unsecure operating environment and PhoneCrypt runs on Windows Mobile.
Windows Mobile does not use Trusted Computing and so any software can do anything.
The platform choice for a secure telephony system is important.
How?
I quickly discussed with some knowledgeable windows mobile hackers about 2 different way to intercept PhoneCrypt with an on-device spyware (given the unsecure Windows Mobile Platform).

a) Inject a malicious DLL into the software and intercept from within the Phonecrypt itself.
In Windows Mobile any software can be subject to DLL code injection.
What an attacker can do is to inject into the PhoneCrypt software (or any software running on the phone), hooking the Audio related functions acting as a “function proxy” between the PhoneCrypt and the real API to record/play audio.
It's a matter of “hooking” only 2 functions, the one that record and the one that play audio.
Read the official Microsoft documentation on how to do DLL injection on Windows Mobile processes. or forum discussing the technique of injecting DLL on windows mobile processes.
That's simple, any programmer will tell you to do so.
They simply decided that's better not to make any notice about this.
b) Create a new audio driver that simply act as a proxy to the real one and intercept PhoneCrypt
In Windows Mobile you can create new Audio Drivers and new Audio Filters.
What an attacker can do is to load a new audio driver that does not do anything else than passing the real audio driver function TO/FROM the realone. In the meantime intercept everything recorded and everything played :-)
Here there is an example on how to do Audio driver for Windows Mobile .
Here a software that implement what i explain here for Windows “Virtual Audio Cable” .
The very same concept apply to Windows Mobile. Check the book “Mobile Malware Attack and Defense” at that link explaining techniques to play with those techniques.
They simply decided that's better not to make any notice to that way of intercepting phone call on PhoneCrypt .
Those are just 2 quick ideas, more can be probably done.

Sounds much like a marketing activity – Not a security research.

I have to tell you. I analyzed the issue very carefully and on most aspects. All this things about the voice encryption analisys sounds to me like a marketing campaign of SecurStar GmbH to sell PhoneCrypt and gain reputation. A well articulated and well prepared campaign to attract the media saying, in an indirect way cheating the media, that PhoneCrypt is the only one secure. You see the press releases of SecurStar and of the “Security researcher Notrax telling that PhoneCrypt is the only secure product” . SecurStar PhoneCrypt is the only product the anonymous hacker “Notrax” consider secure of the “software solutions”.
The only “software version” in competition with:

SnapCell – No one can buy it. A security company that does not even had anymore a webpage. The company does not almost exist anymore.
rohde-schawarz – A company that have in his list price and old outdated hardware secure phone . No one would buy it, it's not good for genera use.

Does it sounds strange that only those other products are considered secure along with PhoneCrypt .

Also… let's check the kind of multimedia content in the different reviews available of Gold-Lock, Cellcrypt and Phonecrypt in order to understand how much the marketing guys pressed to make the PhoneCrypt review the most attractive:

Application Screenshots of application Video with demonstration of interception Network demonstration
PhoneCrypt 5 0 1
CellCrypt 0 2 0
GoldLock 1 2 0

It's clear that PhoneCrypt is reviewed showing more features explicitly shown and major security features product description than the other.

Too much difference between them, should we suspect it's a marketing tips?

But again other strange things analyzing the way it was done…
If it was “an impartial and neutral review” we should see good and bad things on all the products right?

Ok, see the table below regarding the opinion indicated in each paragraph of the different reviews available of Gold-Lock, CellCrypt and Phonecrypt (are the only available) to see if are positive or negative.

Application Number of paragraphs Positive paragraphs Negative paragraphs Neutral paragraphs
PhoneCrypt 9 9 0 0
CellCrypt 12 0 10 2
GoldLock 9 0 8 1

Detailed paragraphs opinion analysis of Phonecrypt
Paragraph of review Opinion expressed
From their website Positive Marketing feedback
Apple iPhone Positive Marketing feedback
Disk Encryption or voice Encryption Positive Marketing feedback
PBX Compatibility? Really Positive Marketing feedback
Cracking <10. Not. Positive Marketing feedback
Good thinking! Positive Marketing feedback
A little network action Positive Marketing feedback
UI Positive Marketing feedback
Good Taste Positive Marketing feedback
Detailed paragraphs opinion analysis of Gold-Lock 3G
Paragraph of review Opinion expressed
From their website Negative Marketing feedback
Licensed by The israeli Ministry of Denfese Negative Marketing feedback
Real Company or Part Time hobby Negative Marketing feedback
16.000 bit authentication Negative Marketing feedback
DH 256 Negative Marketing feedback
Downad & Installation! Neutral Marketing feedback
Cracking it <10 Negative Marketing feedback
Marketing BS101 Negative Marketing feedback
Cool video stuff Negative Marketing feedback
Detailed paragraphs opinion analysis of CellCrypt
Paragraph of review Opinion expressed
From their website Neutral Marketing feedback
A little background about cellcrypt Negative Marketing feedback
Master of Marketing Negative Marketing feedback
Secure Voice calling Negative Marketing feedback
Who's buying their wares Negative Marketing feedback
Downad & Installation! Neutral Marketing feedback
My Demo environment Negative Marketing feedback
Did they forget some code Negative Marketing feedback
Cracking it <5 Negative Marketing feedback
Room Monitoring w/ FlexiSpy Negative Marketing feedback
Cellcrypt unique features.. Negative Marketing feedback
Plain old interception Negative Marketing feedback
The Haters out there Negative Marketing feedback

Now it's clear that from their point of view on PhoneCrypt there is no single bad point while the other are always described in a negative way.
No single good point. Strange?
All those considerations along with the next ones really let me think that's very probably a marketing review and not an independent review.

Other similar marketing attempt from SecurStar

SecurStar GmbH is known to have used in past marketing activity leveraging this kind of “technical speculations”, abusing of partial information and fake unconfirmed hacking stuff to make marketing/media coverage.
Imho a rare mix of unfairness in leveraging the difficult for people to really understand the complexity of security and cryptography.

They already used in past Marketing activities like the one about creating a trojan for Windows Mobile and saying that their software is secure from the trojan that they wrote.
Read about their marketing tricks of 2007

They developed a Trojan (RexSpy) for Windows Mobile, made a demonstration capability of the trojan and later on told that they included “Anti-Trojan” capability to their PhoneCrypt software.They never released informations on that trojan, not even proved that it exists.

The researcher Collin Mulliner told at that time that it sounds like a marketing tips (also because he was not able to get from SecurStar CEO Hafner any information about that trojan):

“This makes you wonder if this is just a marketing thing.”

Now, let's try to make some logical reassignment.
It's part of the way they do marketing, an very unfriendly and unpolite approach with customers, journalist and users trying to provide wrong security concepts for a market advantage. Being sure that who read don't have all the skills to do in depth security evaluation and find the truth behind their marketing trips.

Who is the hacker notrax?

It sounds like a camouflage of a fake identity required to have an “independent hacker” that make an “independent review” that is more strong on reputation building.
Read about his bio:

¾ Human, ¼ Android (Well that would be cool at least.) I am just an enthusiast of pretty much anything that talks binary and if it has a RS232 port even better. During the day I masquerade as an engineer working on some pretty cool projects at times, but mostly I do the fun stuff at night. I have been thinking of starting an official blog for about 4.5 years to share some of the things I come across, can't figure out, or just cross my mind. Due to my day job and my nighttime meddling, I will update this when I can. I hope some find it useful, if you don't, well you don't.

There are no information about this guy on google.
Almost any hacker that get public have articles online, post in mailing archive and/or forum or some result of their activity.
For notrax, nothing is available.

Additionally let's look at the domain…
The domain infosecurityguard.com is privacy protected by domainsbyproxy to prevent understanding who is the owner.
The domain has been created 2 months ago on 01-Dec-09 on godaddy.com registrar.

What's also very interesting to notice that this “unknown hacker with no trace on google about him that appeared on December 2009 on the net” is referred on SecurStar GmbH Press Release as a “An IT security expert”.

Maybe they “know personally” who's this anonymous notrax? :)

Am i following my own conspiracy thinking or maybe there's some reasonable doubt that everything was arrange in that funny way just for a marketing activity?

Social consideration

If you are a security company you job have also a social aspects, you should also work to make the world a better place (sure to make business but “not being evil”). You cannot cheat the skills of the end users in evaluating security making fake misleading information.

You should do awareness on end users, to make them more conscious of security issues, giving them the tools to understand and decide themselves.

Hope you had fun reading this article and you made your own consideration about this.

Fabio Pietrosanti (naif)

ps Those are my personal professional opinion, let's speak about technology and security, not marketing.
pps i am not that smart in web writing, so sorry for how the text is formatted and how the flow of the article is unstructured!

Dalis

Index of economic freedom

When looking at facts and figures about globalized world, the index of economic freedom is a nice tool to make proper considerations.

Dalis

Military contractors going commercial

Most military contractors are suffering from the restriction of government's budgets for military expenses and are moving into commercial markets, still they have to adjust a lot of things.

Read here a nice analysis from rochtel on how military contractors should adapt their strategy.

Dalis

Iphone jailbreaking crashing towers? FUD!

It's interesting to read a news about an anti-jailbreaking statement by apple that say that with jailbreaked phones it may be possible to crash mobile operator's towers:

By tinkering with this code, “a local or international hacker could potentially initiate commands (such as a denial of service attack) that could crash the tower software, rendering the tower entirely inoperable to process calls or transmit data,”

So fun, as the Baseband Processor interface of iPhone is precisely the same of Google android and all Windows Mobile powered devices:

Basically the operating system use AT commands (do you remember old hayes modem commands?) with additional parameters documented and standardized by 3GPP that let more deep (but not that much deep) interaction with the mobile networks.

Please note that those AT commands are standard and widely available on all phones and are the interface to the Baseband Processor .

On iPhone that's the list of commands that an from apple point of view could let “a international hacker to crash the tower software” :

Undocumented commands on iPhone

Damn, those European anarchist of Nokia are providing publicly also their AT command sets, and are AVAILABLE TO ANYONE:

Nokia AT Commands

Oh jesus! Also the terrorist oriented Microsoft corporation let third party to use AT commands:

Windows Mobile AT Commands

It's absolutely unacceptable that also RIM, canadian funky against USA, provide access to AT commands:

Blackberry AT commands

And it's unbelivable to see that Google Android also document how the system speak to the Baseband Processor and find on forums that it's ease to access it:

Google Android Basedband Processor

Not to speak to ALL other mobile manufactuer that use the very same approach and let any party to speak via AT commands to the baseband processor of the phone.

Is the baseband processor of iphone buggy and the AT&T tower software buggy so that it's dangerous to let the user make experiment with it?

Probably yes, and so those are only excuse because the software involved are not robust enough.

Apple, be careful, you have the trust of your users because you are apple you always have done things for the user advantages.

Users does like telephone companies that are huge lobbies that try to restrict and control users as much as possible.

If you, Apple, start behaving like a phone company users will not trust you anymore.

Be careful with FUD statements.

Dalis

chinese espionage: the worst and more silent threat for western countries

Sveiki visi,

in the past few years i saw an incredible increase in the amount of “public” news about espionage against different western countries and usually coming from far-east, typically china.

China want to be the largest economic power within 2020 and it's following a grow rate of 8% per year. Their “controlled” capitalism without the inefficiency of the democracy it's something that's beating the western countries, less efficient because democratic.

China, in order to quickly grow it's R&D capacity make an extensive use of espionage, it's estimated that Chinese government have more than 1.000.000 intelligence agents worldwide.

And they know how to do espionage, their “spy” does not cost that much like western countries' spy, less guarantee, less payments.

Also they are using cyber espionage as an important source of information and competitiveness against western countries companies and government R&D results. China is so un-cooperative that now also western countries spying each other, or even Russian, use chinese internet space as the “start base” for their internet based espionage activities.

I knew of a USA phisher that used to build it's own trojan with a chinese version of Windows Xp with a chinese version of the Microsoft Visual Studio development suite. Kodėl? For information deception, in order to tweak the forensics effort of the FBI analyst and have them think that it's own attacks was coming from China!

Any investigators that see an attack coming from china typically think “oh shit, it comes from china, we're lost”, and now even cybercrime use China like a far-west, untouchable base for cyber attacks.

Back tracing attacks coming from china it's like trying to find out what's inside a black hole , it's a one-way trip and no information comes back.

To give better an idea of what i am speaking about just get the following list of reference:

Vokietija kaltina Kiniją pramoniniu šnipinėjimu

Kinų stažuotojas eina į teismą, kaip Prancūzijos pramonės baimes šnipinėjimu

JAV pažeidžiami Kinijos Cyber ​​Šnipinėjimas

Masinis kinų Šnipinėjimas tinklas

Cyber ​​spy tinklas taip pat nukreipimas Suomija

Kaip Vakarų šalys ginti save programą?

Tai gražus taškų kalbėti apie tai, nes nėra paprastas būdas apsisaugoti nuo šnipinėjimo išskyrus svarstant jį kaip rimta ir konkreti grėsmė.

Vyriausybės turėtų būti suteikta galimybė gauti daugiau supratimo, kad jų požiūris į informations sistemų ir informacijos saugumo politika turi būti ne tik egzistuoja ant popieriaus, bet taip pat būti taikomos visur, kad būtų veiksmingas. Vyriausybės yra sudėtingos organizacijos ir tik keletas pakankamai protingas, kad būtų galima greitai ir efektyviai atlikti saugumo politika tikrai gali būti įgyvendinta visoje organizacijoje. Bet jie bando, ypač labiausiai konkurencingas tie kaip JAV, Didžiojoje Britanijoje ir Vokietijoje.

Įmonės vietoj turėtų įgyti supratimą apie šią problemą, kuri yra dabar, galima, betonas betonas yra tikimybė, kad kažkas pradeda biurų pavogti geras (ne šnipinėjimui). Dėl šios priežasties įmonės vietą signalizacijos sistemos, prieigos kontrolės su ženkleliu, kamera stebėjimo sistemas.

Bet šnipinėjimas nereiškia kovoti ir apsaugoti nuo blogos vagių, bet vietoj su vis sudėtingesni, nei techniškai ir socialiai, užpuolikas, kuris gali naudoti senosios mokyklos žvalgybos metodus visada veiksmingas. Kaip dirba ir vagia informaciją dirbdami. Modeliavimas turi būti klientams sukurti nuorodą pasitikėjimą, pardavėjas ir tada rasti priežastį tegul vykdyti kenkėjišką programinę įrangą "Ei, bet mano modellization programinės įrangos demostrate, kad jūsų modelis, naudojamas matuoti savo produkto naudingumo koeficientą tai ne vienas iš jūsų reklamuojamas. Check it out, pamatyti save su programinės įrangos mes naudojome!. Ką manote pardavėjas bus padaryti, norint sugauti perspektyva klientas?

Tik suvokimas, žinios apie problemas, gali padaryti tokia rizika turi būti laikoma rimtai.

Vyriausybės turėtų suteikti finansavimą pramonės asociacijomis, prekybos rūmų commerces ir panašių įstaigų, siekiant, kad tokį sąmoningumą nacionalinę pločio ir tegul verslininkai tapo sąmoningas ir tapo pasiruošusi pripažinti, nustatyti ir sustabdyti šnipinėjimo veiklą.

Teisės požiūriu

Vyriausybės turėtų sustiprins savo įstatymus, kad būtų galima turėti reikiamus teisės įrankiai vykdyti nuo šnipinėjimo apsauga.

Pažvelkite į atliktą analizę mano protingas pusbrolis Angelo Pietrosanti apie šnipinėjimą "Ar Europos MTTP vienodai apsaugoti nuo šnipinėjimo kaip JAV R & D?

Šalis Civilinės sankcijos prekybos paslapčių grėsmę Baudžiamosios sankcijos prekybos paslapčių grėsmę Metai praėjusių modificationg
JAV 5 mil $ up to 10(for domenistic) or 15 (for foreigners) Years of Jail 1996 ( Economic Espionage Act )
Vokietija YES up to 3 Years of Jail 1986
Prancūzija 0.03 mln $ up to 2 Years of Jail 1992
Jungtinė Karalystė YES NE 1984
Italija YES up to 2 Years of Jail 1942
Šveicarija YES up to 3 Years of Jail 1986
Suomija YES up to 3 Years of Jail 1990
Švedija YES up to 6 Years of Jail 1990
The Netherlands YES up to 4 Years of Jail 1992

What this table show?

  • Outdated law (except USA)
  • Not so serious sanctions against espionage activities. (except USA)

Maybe some european policy on this could help.

In conclusion

We are in an economic war where the winner is not the one having more forces, but the one being more technologically advanced, and economically clever.

Chinese are demonstrating to be enough aggressive and clever, will the western countries be able to react both on the defense and the attack in this war?

Dalis

Criminal business model: Somali pirate case study

Sveiki visi,

this blog post is to have a nice economical point of view on somali pirates business model, something nice as also crime is a business and need it's business evaluation:

An economic Analysis of Somali Pirates Business Model

It sounds much like a great deal, check it out the details:

The attack model and costs

The negotiation phase (Offer and Counter offer)

The resolution

And for the pleasure of home gamer, Cuttrhouat Capitalism: the game

Dalis

Nokia World in Stuttgard 2-3 September

Everyone who's business is directly connected to mobile, aggregators, operators and generally speaking mobility application should really attend Nokia World where most of the world key people in the mobile business .

It's extremely interesting to see the evolution of the business models related to the Application Portals, how the mobile operators are changing their approach to the market, the increasing of value added services related to mobile industry.

And the most important things is, the mobile operators will be able to became financial operators to really provide mobile payment systems integrated into any day digital life?

And if this will happen, how the manufacturer and operating system provider will play this game?

Dalis

Saas: is the end of the myth?

Saas business models growth a lot during the past few years and i personally appreciate it.

No software to be installed, configured, maintained, service available when you needed with a early adoption time and most important reduction (or apparent reduction) of the total costs of ownership.

I had few experience with SaaS business (as a customer) and i have to say that the following Gartner Group analysis on SaaS businesses imho tell you the truth only for half of statements:

  • There is always a partial integration issue (not all systems are so flexible to really integrate into your business like you would like)
  • There is often a lacks of the technical requirements needed by the specific business case
  • I DO NOT agree that there is a barrier in the costs, as SaaS usually let you start spending only a few. However it's true that while doing the deployment you should be more conservative in the usage of features and items (es: I am using for my company a hosted VoIP PBX system, we pay for each extension we add. We don't have test extension or extensions that are not strictly needed because it costs. When we had an internal VoIP PBX system, we was plenty of test extension. This slightly increase some complexity in maintenance and deployment, even if the total cost of maintenance is a lot lower than an internal system to be managed.

So we can assume that Saas it's for most but not for all, especially if the need of customizations for the very specific business needs are relevant.

An in depth analysis and testing has to be carried on, in order to discover all the limits of the solution, on functionalities and pricing, to really discover if the specific solution fit the business need.

Dalis

Best advices by world leaders

Today i found a very nice set of 22 'best advices' on Fortune coming from world leaders and i would really like to link there some of the most interesting ones (at least for me).

I think that those suggestion let you work and manage your projects and goals (in any situation you play a leadership role, being business or personal stuff) in a proper, rational and effective way.

Colin Powel: Focus on performance, not power

Jim Sinegal: Show, don't tell

Mort Zuckerman: Do what you love

Meredith Whitney: Always set realistic goals

Lauren Zalaknick: Listen (others opinion)

Robin Li: Underpromise ir perviršį (važiuojant bendrovę)

Mika Brzezinski: Use failure to motivate yourself

Dalis

The real goal of online marketing: lead generation

Often i discuss about online marketing, however it include the mysterious “marketing” magic word that's tipically subject to misunderstanding and misconception .

The end goal of online marketing is to generate qualified leads coming from international markets.

Some interesting links about it, and how things should be properly done are below:

I would really like to see an effective leverage of online techniques and tools as the main interface and providers of information, the main pre-sales agent of the company explaining almost everything required to get back a qualified lead.

Dalis

Voice encryption in government sectors

I will make some in depth articles about how voice encryption really works in government environments.

The open standards and open source still have to reach the military and government environments for what's related to secure speech.

To give you an idea of the complexity and kind of particular issues that exists, look at the USA 3G Wireless Security: A Government Perspective and the A Waveform Architecture to Support Security and Interoperability in Multi-National Wireless Networks for Tactical Communication .

They are using so-custom protocols like Secure Communications Interoperability Protocol that require the use of patented MELPe ultra-narrowband codec that there's not a real market of application and equipment using this. Only a small elite of government controlled companies from few countries manage this de-facto lobby.

Should we change this bringing open standards also to government sectors?

Dalis

Produkto valdymas

You know, product management it's a job for half-fish, half-meat guys, that understand both business needs and technology issues.

I found two amazing and very well done presentations about it, i suggest to read it as it clarify a lot of things of the marketing and technical activities applied to the management of products inside companies to reach the market.

The strategic Role of Product Management

Very in depth presentation. Ask yourself, do you know what's the differences between marketing and promotions, sales, advertising? How to really manage the core of the company, the product?

Product Management for BrainMates

Very smooth presentation going to the point: A product is the tiny overlap between the needs of a business, the aspirations of it's development team and the unsatisfied desires of the customer.

Dalis