Naif
Check out my: * (novecojis) mājas lapa par http://fabio.pietrosanti.it * profesionālā profilā http://www.linkedin.com/in/secret * slaidi arhīvu materiālus par http://slideshare.net/fpietrosanti /
Beidzot ZRTP ir piešķirts oficiālu RFC uzdevumu, RFC6189 ZRTP: Media Path atslēga nolīgums par vienraidei Secure RTP.
Tas bija kā atkarība SRTP ar AES galveno izmēru 256bit, ka tagad ir definēti kā RFC6188 .
Tas ir aizraujoši redzēt, RFC beidzot atbrīvoja, jo tas ir svarīgs pagrieziena punkts, lai noteiktu ZRTP par oficiālo standartu end-to-end šifrēšanu daudz, piemēram, PGP ir e-pastiem.
Tagad jebkurš pasaulē organizācija būs oficiāli varēs īstenot ZRTP end-to-end protokola balss šifrēšanas
Pašlaik 3 dažādas valsts implementāciju ZRTP protokolu pastāv:
Katrs no tiem nodrošina dažādas funkcijas protokolu, bet vissvarīgākais ir zināms, ka sadarbspējīgas.
Jaunais vilnis tuvojas balss šifrēšanas pasaulē, irrupting uz pelēkajā zonā, kur lielākā daļa no uzņēmumiem, kas veic telefona šifrēšanas sistēmas ir īstenošanas pasūtījuma šifrēšanu.
Tagad standarts ir setup, un tur ir daži iemesli, pa kreisi, lai īstenotu kaut ko citu.
Hurra Mr Zimmermann un visu uzņēmumu kopienas (piemēram, PrivateWave ) un privātpersonas (piemēram, Werner DITTMANN ), kas strādāja par to!
Šodien ir lieliska diena, šāda veida tehnoloģija tagad ir oficiāls, un arī ar vairākiem esošajiem īstenošanā!
Philip, jūs to atkal, mani komplimentus jūsu tīru garu un apņēmību :-)
Aizraujošas pasaules mobilo protokoliem (GSM, GSM-R, TETRA, UMTS, uc), hakeru kļūst oficiālās pētniecības darbības no universitātēm.
Ieguldījums, lai padarītu opensource kodu relīzes krekinga programmatūra dod iespēju studentiem universitātē, lai strādātu par to, uzlabot un darīt spēcīgu pētniecības.
Freiburgas Universitāte tikko atbrīvota papīra Praktisko uzdevumu par GSM šifrēšanas A5 / 1 kopā ar gsmframencoder atbalsta instrumentu, lai uzlabotu sniffing, dekodēšanas un plaisāšanu procesu.
Atklāšanas aparatūru, atverot programmatūru, atverot protokols liecina par vājumu jebkāda veida patentētu metodi vai procesu, lai veidotu-up komunikācijas un drošības tehnoloģijas.
Tas būtu mērķis visiem zinātniekiem, lai mēģinātu atvērt-up un kreka jebkāda veida privāto un slēgto tehnoloģiju, lai piespiestu nozarei notiek tikai ar savstarpēji un atvērtu pieeju, vienlaikus izstrādājot telekomunikāciju protokolus.
Šī gada sākumā es nolēmu, ka ir pienācis laiks, lai palaistu TOR izejas mezglu, lai es celta VPS pie hetzner.de (tāpēc, ka tie ir reģistrēti kā Good TOR ISP ), un uzstādīšana izejas-mezglu ar iesauku privacyresearch.infosecurity.ch ar 100Mbit / s savienojums pirmo 1TB ikmēneša datiem, tad 10Mbit / s dzīvoklis.
Tā arī palaist TOR2WEB programmatūru http://tor.infosecurity.ch .
Es setup izejas-politiku, kā to ierosināja, vadot izejas mezglu ar minimālu uzmākšanās un sagatavoja ļaunprātīgu atbildes veidni .
Pirmajā dienā es esmu darbojas mezglu es saņēmu uzreiz DMCA sūdzību sakarā ar peer to peer satiksmi.
Tāpēc es nolēmu, lai filtrētu-dažus P2P satiksmi, izmantojot OpenDPI iptables moduli un DMCA sūdzas automātiski pazuda:
iptables-OUTPUT-m opendpi-eDonkey-gadugadu-FastTrack-Gnutella directconnect-BitTorrent-WinMX-SoulSeek-j noraida
Tad, jo es esmu itāļu, es nolēmu, lai izvairītos no savu TOR mezglu, lai izveidotu savienojumu ar Itālijas interneta adrešu, lai samazinātu iespēju, ka stulba prokurors varētu pamosties mani pie rīta, jo nesaprata, ka es esmu darbojas TOR mezglu.
Es mēģināju, ar kuras palīdzību hellais kas uzrakstīja skriptu, lai Exit politika noraida apgalvojumu , lai noraidītu visus Itālijas netblocks, pamatojoties uz ioerror s blockfinder bet mēs atradām, ka torrc konfigurācijas faili ar 1000 līnijām bija pieņemšanas TOR crash.
Mēs devāmies uz atvērtu biļeti, lai ziņotu par crash par mūsu mēģinājums bloķēt TOR izejas politiku, valsts un konstatēja līdzīgu mēģinājumu , kur mēs palīdzēja, bet tas joprojām, šķiet, ir atklāts jautājums.
Secinājums ir tāds, ka tas nav iespējams veikt valsts Iziet politiku TOR izceļošanas mezglu tīrā un pieklājīgs veidā, tāpēc es nolēmu doties netīro ceļu, izmantojot iptables / GeoIP . Pēc tam, kad cīnās, lai padarītu to sastādīt pareizi, tā bija viena līnija iptables bloķēt satiksmes dodas uz Itāliju:
iptables-OUTPUT-p TCP-m state-state NEW-m GeoIP-dst-cc IT-j noraida
Tagad no mana izejas-mezglu nē itāļu tīkliem savienojums tiks darīts, un es esmu drošs pret, iespējams, stulba prokurori nesaprot TOR (man ir izņēmums attiecībā uz visiem TOR mezglu ip adresi, ko piemēro pirms).
Pēc dažām citām dienām es sāku saņemt sūdzības, jo portscan darbībām cēlies no maniem tor mezgliem.
No mana viedokļa, es gribu, lai atbalstītu anonimitāti tīklu, nevis anonīms hakeru mēģinājums, un tāpēc es vēlos, lai filtrētu-out portscan un uzbrukumus no izcelsmes manas node.That 's sarežģītu jautājumu, kas nepieciešami daži pētījumu, lai pa to laiku es uzstādītas scanlogd un iešņauc jo es gribu, lai novērtētu, cik daudz uzbrukumus, kāda veida uzbrukumi kļūst ārā no manas TOR izejas mezglā.
Vēlāk es centīšos noorganizēt kādu filtrēšanu, lai būtu pārliecināts, ka, lai varētu noskaidrot galvenos uzbrukumus.
Par to, kas ir saistīts ar portscan šķiet, ka nav valsts līdzekļi, lai atklātu un filtrēt izejošo portscan, bet tikai, lai filtrētu ienākošo portscan tāpēc, iespējams, būs nepieciešams, lai kaut ko uzrakstītu ad-hoc.
Es atsaukšos kā lietas notiek, un, ja būs kāds jauks veids, kā īstenot tādā Lightwave veidā sprauslāt-inline , lai selektīvi filtrēt-out galvenais uzbrukuma mēģinājums nāk no manas izejas-mezglu.
Mans mērķis ir, lai saglabātu izejas mezglā darbojas ilgtermiņā (vismaz 1TB satiksmes mēnesī, ziedota TOR), samazinot piepūli attiecībā uz ISP sūdzēties, un cenšas darīt visu iespējamo, lai palaistu izejas-mezglu ar saprātīgu atbildības.
Tas ir ļoti aizraujoši redzēt atbrīvošanu OsmocomTETRA , pirmais opensource SDR ( Software Defined Radio ) īstenošana TETRA demodulators, PHY un zemākas MAC slāņi.
Tas ir TETRA versija GSM airprobe ka atslēgt piekļuvi datiem un TETRA sakaru protokols rāmis, tādējādi sniedzot lielisku hakeru iespēju!
Tagad, kad arī TETRA tehnoloģija ir atvērta mums vajadzētu gaidīt, 2011.gadā šo, lai redzētu, opensource Tetra narkotiku meklētājiem, un, visticamāk, arī TEA šifrēšanu (Tetra šifrēšanas algoritms), krekinga!
TETRA izmanto policijas, neatliekamās palīdzības dienesti un militāristi kā alternatīvu mobilo sakaru tīklu, kas var strādā pat bez pieejamības tīkla pārklājuma (tikai mobilo uz mobilo bez bāzes stacijas) un sniegt dažus īpašus augstas pieejamības pakalpojumus.
Es rakstīju par TETRA manā slaidu Major Balss drošības protokolu Review .
Jo OsmocomBB adresātu sarakstiem jau bija diskusija par kādu TETRA tīkla statusu:
Tas būs ļoti jautri, lai redzētu, ka jaunu policijas un glābšanas dienests hakeru atgriežoties no vecās analogās vecumu uz jauno digitālo radio :-)
Aiz WikiLeaks, OpenLeaks, GlobalLeaks, BalkanLeaks jēdzieni ir daudz vairāk nekā tikai atklāt noslēpumus, lai sabiedrībai.
Tā ir daļa no revolūcijas, kas ir nāk valdības organizāciju, pārredzamību un sadarbību ar tā saukto "web 2.0 / wiki" sadarbības sistēmu.
Ir apskatīt šo valdības 2.0 - Ievads , ko Anke Domscheit Berg, inovatīvas valdība programma noved Microsoft Vācijas un Daniel Berg, no līdzdibinātājs sievu WikiLeaks un tagad ir dibinātājs OpenLeaks .
Ir apskatīt atvērto datu valdības 2,0 iniciatīvas, lai piespiestu valdības pārredzamību, samazinot korupciju un uzlabot veiktspēju valdības organizācijas.
Tas revolūciju, tas ir tikai vairāk nekā grupu anarco-brīvdomātājs bailīgs puiši, kas vēlas radīt haosu, izplatot noslēpumu, tas ir tikai sākums skriešanās, lai sasniegtu jaunu organizācijas modeli valdību, piesaistot pilnīgu pārredzamību un spēcīgu sadarbību ar iedzīvotājiem.
Hi all, šodien PrivateWave Italia SpA, Itālijas uzņēmums, kas nodarbojas ar attīstības tehnoloģiju privātās dzīves aizsardzību un informācijas drošību balss telekomunikāciju jomā, kur es esmu CTO, mēs atbrīvot Zorg, jauno atvērtā koda ZRTP protokola īstenošanu, kas pieejams lejupielādei no http://www. zrtp.org .
Zorg ir sākotnēji izstrādāti un īstenoti PrivateWave ir PrivateGSM balss šifrēšanas produktus, kas pieejami attiecībā uz šādām platformām: Blackberry, Nokia un iOS (iPhone).
Zorg C + + ir integrēta ar PJSIP atvērtā koda VoIP SDK [2], un tas ir paredzēts kā integrācijas plāksteris pret 1.8.5 PJSIP. Tā ir pārbaudīta uz iPhone, Symbian, Windows, Linux un Mac OS X.
Zorg Java ir integrēta pielāgotu versiju MJSIP [3] atvērta Blackberry platformu avots, un SDK tas ietver atmiņas izmantošanu optimizācijas nepieciešami, lai samazinātu ar minimālo atkritumu savācējs darbību.
Abas platformas ir atdalījušies un moduļu kriptogrāfisko muguras beidzas tā, ka kriptogrāfijas algoritmi īstenošana varētu tikt viegli aizstāja ar citiem uzņēmumiem.
. Zorg ir licencēta saskaņā ar GNU AGPL un avota kods ir pieejams GitHub pie https://github.com/privatewave/ZORG .
Mēs esam atbrīvojot to zem atvērtā koda un saskaņā ar mūsu pieeju drošības jomā [4], jo mēs patiesi ceram, ka tas var būt noderīgi, lai atvērtā koda ekosistēmas, lai radītu jaunas balss šifrēšanas sistēmas, lai atbalstītu vārda brīvību.
Vairāk nekā 20 pjsip balstītas atvērtā koda VoIP šifrēšanas programmatūru un vairākas rakstītas Java var gūt tiešu labumu no Zorg atbrīvošanu.
Mēs būtu priecīgi saņemt priekšlikumu par sadarbību, jaunu integrāciju, jaunu kriptogrāfisku back-ends bug skautu un neatkarīgi noderīgas, lai uzlabotu un ļaut ZRTP apstiprina, balss šifrēšanas standarts.
Zorg ir pieejams no http://www.zrtp.org .
[1] ZRTP: http://en.wikipedia.org/wiki/ZRTP
[2] PJSIP: http://www.pjsip.org
[3] MJSIP: http://www.mjsip.org
[4] Drošības pieeja: http://www.privatewave.com/security/approch.html
Mēs tikai atbrīvo tehnisku HOWTO par to, kā veidot Secured mobilā uz fiksēto VoIP infrastruktūru ar:
Nākamajā nedēļas citi HOWTO, piemēram, šo vienu būs iznākt, izmantojot citus serveru platformām, piemēram, FreeSWITCH, visi garā pārredzamības un opensource drošības tehnoloģijām sviras.
Ļoti apgaismojuma raksts par Eight Epic mazspēja, regulējot Kriptogrāfija un kopīgu pārpratumus ar valsts regulatoriem, kas nav plašu priekšstatu par to, kā tehnoloģijas darbojas.
Nekompetents valsts regulatori nav saprotams, ka stingra regula būtu šādi trūkumi:
Es pilnīgi izvairīties izmantot savu personīgo blogu, lai pelnītu veicināt jebkura veida produktu.
Tas laiks, tas nav atšķirīgs, bet es gribu pateikt jums faktus par produktiem, es strādāju bez iedomātā mārketingu, bet uzturas tehnisko.
Šodien, pie PrivateWave kur es esmu CTO un līdzdibinātājs , mēs izlaidām publiski mobilo VoIP šifrēšanas produktus Blackberry, iPhone un Nokia:
Pie PrivateWave mēs izmantojam atšķirīgu pieeju cieņu lielākoties balss šifrēšanas kompānija, kas pastāv, izlasiet mūsu pieeju drošībai .
Šīs šajā tehnoloģiju un rūpniecības ainavas produktu atbilstība var apkopot šādi:
Tie komplekts Mobile Secure Klienti, kas paredzēti profesionālai drošību lietot tikai izmantojot labāko telekomunikāciju un drošības tehnoloģijas, nodrošinātu augstu aizsardzības pakāpi, kopā ar labu sniegumu arī sliktos tīkla nosacījumiem:
Pieteikumi ir:
Atbalstītie mobilās ierīces ir:
Attiecībā ZRTP mēs nolēmām, lai uzsvērtu un stiept visu drošību un paranojas pazīme protokolu ar kādu nelielu papildus:
Our strict address book integration, goes beyond ZRTP RFC specification , that could be vulnerable to certain attacks when used on mobile phones because of user behavior of not to look at mobile screen.
Our paranoy way of using ZRTP mitigate such conditions, we will write about this later and/or will add specific details for RFC inclusion.
Some words on PrivateGSM Professional with end-to-end encryption with ZRTP
Read technical sheet there!
To download it click here and just put your phone number
Those are the results of hard work of all my very skilled staff (16 persons worked on this 6 projects for 3 different platforms) on challenging technologies (voice encryption) in a difficult operating environment (dirty mobile networks and dirty mobile operating systems) for more than 2 years.
I am very proud of our staff!
What next?
In next weeks you will see releasing of major set of documentations such as integration with asterisks, freeswitch and other Security Enabled PBX, along with some exciting other security technology news that i am sure will be noticed ;)
It has been an hard work and more have to be done but i am confident that the security and opensource community will like such products and our transparent approach also with open important releases and open source integration that make a very politically neutral (backdoor free) technology.
There are a lot of reason why one would need to access internet trough a VPN.
For example if you live in a country blocking certain contents (like anti-local-government website, porn, etc) and/or protocols (like skype, voip) you would probably want to move your internet connectivity outside the nasty blocking country by using encrypted VPN tunnels.
I evaluated several hosted VPN server and a couple of them sounds quite good among the widespread offering of such services:
Exit to the internet from Switzerland.
Izmaksu / 6 Šveices franku mēnešiem
Optional public fixed IP address
Useful if you need:
Exit to the internet by choosing among 20 different countries (each time you connect).
Useful if you need to do:
My own ECC curve security and selection analysis
Most modern crypto use Elliptic Curve Cryptographic (ECC) that, with a smaller key size and reduce computation power, give equivalent security strength of traditional crypto system known as DH (Diffie-Hellman) or RSA ( Rivest, Shamir and Adleman ) .
Not everyone knows that ECC encryption is selected for any future encryption applications and that even TLS/SSL (encryption used for securing the web) is moving to ECC.
I found plenty of so called “proprietary encryption products” which abandoned RSA and DH to goes with ECC alternatives, that tend to arbitrary use ECC bit key size without even specifying which kind of ECC crypto get used.
However there is a lot of confusion around Elliptic Curves, with a lot of different names and key size making difficult for a non-cryptographically-experienced-user to make your own figure when evaluating some crypto stuff.
Because of so diffused confusion i decided to make my own analysis to find out which are the best ECC encryption curves and right ECC key size to use.
This analysis would like to provide a security industry based choice among various curves and key sizes, leaving the mathematical and crypto analytical considerations that has been already been done during the years, summarizing the various choices taken in several standards and security protocols.
First the conclusion.
From my analysis only the following ECC curves are to be considered for use in encryption systems because are the only one selected among different authorities (ANSI, NSA, SAG, NIST, ECC BrainPool), different security protocol standards (IPSec, OpenPGP, ZRTP, Kerberos, SSL/TLS) and the only one matching NSA Suite B security requirements (de-facto standard also for NATO military environment):
with optional, just for really paranoid that want to get more key size bit, still not considered useful:
I would like to state that Koblitz curves should be avoided , in any key size (163 / 283 / 409 / 571) as they does not have enough warranty on crypto analytic activity and effectively they are:
I invite the reader to follow trough my analysis to understand the fundamentals that could be understood even without deep technical background but at least with a good technological background a some basic bit of cryptography.
Here we go with the analysis
My goal is to make an analysis on what/how the open scientific and security community choose ECC crypto system for usage in security protocols and standards defined by IETF RFC (the ones who define Internet Standards in a open and peer-reviewed way).
Below a set of RFC introducing ECC into existing system that get analyzed to understand what's better to use and what's better to exclude:
Mēs izmantosim veikto izvēli zinātnieks nosakot Internet Security protokolus, lai daļu no mūsu novērtējumu.
Turklāt ir jāsaprot, ka Curve izvēle nāk no dažādām iestādēm, kas padarīja savu izvēli līknes, lai pateikt, lai nozarei, ko lietot un ko izlaist:
Mēs izmantosim veikto izvēli zinātnieks, kas nosaka drošības prasības, standartizācijas iestādēm, lai daļu no mūsu novērtējumu.
Turklāt, kaut kas, ka lielākā daļa cilvēku nezina, bet tas ir ļoti būtiski, lai mūsu analīzes, ir tas, ka pastāv dažāda veida ECC līknes kriptogrāfiju un to "lielumu", tas ir dažādi atkarībā no veida līknes:
Ņemot vērā drošības spēku līdzvērtība eliptiskas līknes un Kobliz līkne ir dažāda atslēgas izmēru, piemēram, kad mēs lasām ECC 571 mēs atsaucamies uz Koblitz līkne ar līdzvērtīgu izturību pret ECC 521 Prime līkni.
Stiprības starp eliptisks līknes un Kotbliz Curves salīdzinājums tiek ziņots zemāk (no Mikey ECC interneta projekts ):
| Koblitz | ECC | DH / DSA / RSA | 163 | 192 | 1024 | 283 | 256 | 3072 | 409 | 384 | 7680 | 571 | 521 | 15360
Zemāk ir visu izvēlēto līkņu salīdzinājums ar visiem dažādiem uzņēmumiem un to attiecīgo nosaukumu (no RFC4492 IETF par ECC izmantošana TLS ):
Curve vārdi izvēlētie dažādu standartizācijas organizācijas ------------ + --------------- + ------------- SECG | ANSI X9.62 | NIST ------------ + --------------- + ------------- sect163k1 | | NIST K-163 sect163r1 | | sect163r2 | | NIST B-163 sect193r1 | | sect193r2 | | sect233k1 | | NIST K-233 sect233r1 | | NIST B-233 sect239k1 | | sect283k1 | | NIST K-283 sect283r1 | | NIST B-283 sect409k1 | | NIST K-409 sect409r1 | | NIST B-409 sect571k1 | | NIST K-571 sect571r1 | | NIST B-571 secp160k1 | | secp160r1 | | secp160r2 | | secp192k1 | | secp192r1 | prime192v1 | NIST P-192 secp224k1 | | secp224r1 | | NIST P-224 secp256k1 | | secp256r1 | prime256v1 | NIST P-256 secp384r1 | | NIST P-384 secp521r1 | | NIST P-521 ------------ + --------------- + -------------
Kas uzreiz šķiet, ka ir tikai divas līknes, kas izvēlēti ar visas iestādes, un ka pastāv vispārējs dempingu Koblitz pa ANSI.The līkumos tikai kopīgi saskaņotiem starp 3 iestādēm, ir šādas divas ECC līkne:
No tiem atlases ECC līknes TLS RFC5430 izlaidis pilnībā Koblitz līknes un atlasīti izmantošanu tikai:
ECC Brainpool izlaidis pilnībā Koblitz līknes un izvēlas izmantošanu šādi ECC Curves:
OpenPGP interneta projekts par ECC pielietojumam PGP d plosta-jivsov-OpenPGP-ECC-06 izlaidis pilnībā Koblitz līknes un izvēlas šādu ECC līknes
Kerberos protokols pagarinājumu ECC izmantošanai, noteikts RFC5349 un nosaka Microsoft viedkartes pieteikšanās izlaidis pilnībā Koblitz līknes un izvēlējās šādus ECC līknes:
Tātad, izklausās skaidrs, ka tiesības atlase ECC ir P-256, P-384 un P-521, bet Koblitz līkne ir izlaistas, lai Top Secret lietošanai un par jebkādiem drošības jutīgu protokola (IPSec, OpenPGP, ZRTP, Kerberos, SSL / TLS).
Es esmu darījis šo analīzi, pēc diskusijām man bija par konkrētiem balss šifrēšanas produktiem, visi pamatojoties uz muitas un patentētu protokolu, kas visi izmanto eliptiskas līknes Difī Hellman 571 bitu / ECDH 571/571 bitu ECDH / Koblitz 571 bitiem.
Visi tie ir, izmantojot K-571, kas, kā aprakstīts iepriekš, ir izņemta no visiem drošības jutīgu vidi un protokoliem un ir sevi dizainers balss šifrēšanas sīkumi, es domāju, ka viņu kriptogrāfisko izvēle ir absolūti nav labākais drošības izvēle.
Iespējams, tas ir darīts tikai mārketinga mērķiem, jo K-571 (Koblitz līkne), šķiet lielāks nekā P-521 (eliptiskas līknes pamatā Prime numuru). Ja jums ir "vairāk bit" jūsu mārketinga puiši var apgalvot, ka "drošāk". Koblitz eliptiskā līkne ir ātrāk nekā slepena ļāva galvenā eliptiskas līknes, un tā dod produktu menedžeris iespēju nodrošināt "vairāk bit", kas to pašu produktu, vienlaikus saglabājot atslēgu apmaiņas ātri.
Tas ir jautājums par filozofiskās izvēles.
Es gribētu, lai sekot tendencēm zinātnes aprindām ar pazemību nevis uzskatot sevi kriptogrāfijas eksperts, knowledgable vairāk nekā vispārējo drošību un zinātnisko aprindu pati.
Es gribētu tā vietā, lai izmantotu tikai algoritmus, kas ir apstiprinātas lietošanai īpaši jutīgā vidē (slepena klasifikācijas), kas tika izvēlētas visas iestādes un darba grupu analizējot šifrēšanas algoritmu esošos out-tur un kas pārstāv izvēle gandrīz visas standarta drošības protokoli (IPSec, OpenPGP, ZRTP, Kerberos, SSL / TLS, uc).
Es gribētu, lai saskaitītu summu smadzenes strādā uz kriptogrāfijas es izmantot, lai pārbaudītu, vai tas patiešām ir droša, ka izvērtēt, vai tur ir dažas nepilnības.
Gada Brais strādā Kriptogrāfijas plaši izkliedētās skaits ir par kārtu vairāk nekā skaitu smadzenes strādā uz kriptogrāfijas izmanto tikai daži cilvēki (piemēram, Koblitz līknes).
So i am not demonizing who use ECDH 571 using Koblitz Curve, but for sure i can affirm that they did not taken the best choice in terms of security and that any security professionals doing a security benchmarking would consider the fact that Elliptic Curve Diffie Hellman 571 bit done with Koblitz Curve is not widely diffused, it's dumped from standard security protocols and it's not certified for top secret use.
I had a look at European Defense Agency website and found the ESSOR project, a working project funded for 106mln EUR to develop strategic defense communication products based on new Software Defined Radio approach.
SDR approach is a revolutionary system that's completely changing the way scientist and industry is approach any kind of wireless technology.
Basically instead of burning hardware chip that implement most of the radio frequency protocols and techniques, they are pushed in “software” to specialized radio hardware that can work on a lot of different frequency, acting as radio interface for a lot of different radio protocols.
For example the USRP (Universal Software Radio Peripheral) from Ettus Research that cost 1000-2000USD fully loaded, trough the opensource GnuRadio framework, have seen opensource implementation of:
And a lot more protocols and transmission technologies.
That kind of new approach to Radio Transmission System is destinated to change the way radio system are implemented, giving new capability such as to upgrade the “radio protocol itself” in software in order to provide “radio protocol” improvements.
In the short terms we have also seen very strong security research using SDR technologies such as the GSM cracking and the Bluetooth Sniffing .
We can expect that other technologies, weak by design but protected by the restriction to hardware devices to hack the low level protocols, will be soon get hacked. In the first list i would really like to see the hacking of TETRA, a technology born with closed mindset and secret encryption algorithms, something i really dislike ;-)
I had to better understand the concepts, roles and duties related to Product management and Product marketing management in software companies, why are needed, which are the differences and how they fit inside an organization structure.
Most person i know never interested into this specific area of work, but when you want to be a product company (and not a consulting or solution company), you start having different products on different platforms for different target customers sold trough different channels with different pricing with a installation/different delivery process and that complexity must be managed in the proper way.
You realize that in order to let the product company grow in the right direction you need to organize product management activities formally, not closing your mind in rigid organization roles such as Marketing, Sales, R&D.
When we speak about Product Management i recommend the reading of the illuminating The strategic role of Product Management (How a market-driven focus leads companies to build products people want to buy) that clarify a lot of things, even if it outlook net separation of roles in product management, something t hat’s too heavy for a small company like a startup .
Tomēr tas sniedz diferenciāciju pienākumu starp produkta un produktu mārketinga.
Laba izpratne par produktu pārvaldības saistīta ar starta i s dots rakstā Radīt produktu pārvaldības Startup rāda uz augšu citu lietu, kas saistīti ar produkta sapņotājs iekļaušanu uzņēmuma lomas.
Tas ieviest terminu izpilddirektors produkta tādā nozīmē, ka produkts vadības pienākumus lēkā pa dažādām organizācijas funkcijas, sniedzot uzmanību un pūles, kur tas ir nepieciešams, neatkarīgi no tā, ka iekšējās funkcijas prasa vairāk pūļu ir attīstības, mārketinga, pārdošanas vai Komunikācija. Tas ir nozīmē praktiski uzlabot produktu redzējumu, jo tas ir nepieciešams visās lielākajās ražošanu saistītas funkcijas, padarot vīzija uzņēmuma mēroga saskaņota.
Labi atspoguļo produktu vadības un produktu mārketinga aktivitātēm ir labi aprakstīts ar diferenciāciju starp Stratēģiskā, tehnisko un mārketinga nozarē, un nav skaidri nodalīta no vadības, mārketinga (un pārdošanas) un R & D:
Es izlasīju, ka produktu menedžeris fons un zināšanas atšķiras atkarībā no uzņēmuma fokusu ( ja nav produktu pārvaldības pieder organizācijā? ):
Apgaismojuma (man), un ir ļoti svarīgi, diferencēšana par izstrādājumu pārvaldības pienākumus, ir atšķirība starp:
Īpašos nodokļus, kas pieder Product Marketing vs vadība ir ļoti paskaidrots Lomu Definīcijas Produktu vadības un produktu mārketinga , ka es iesaku izlasīt, ļaujot jums labāk definēt uzdevumus un pienākumus visā jūsu organizācijā. Tā arī nodrošina labu definīcija darba prasībām, ja jums ir nepieciešams meklēt šo skaitli!
Tajā pašā laikā tas ir svarīgi saprast, kas nav produktu vadība, efektīvi Produkts vadība ir ne tikai līdzeklis prioritāšu .
Tajā pašā laikā, tas ir svarīgi saprast, kas profesionāli skaitlis pats par sevi nav produktu menedžeris:
Tipisks produktu pārvaldības pasākumi varētu būt galējā sintēzē apkopot šādi:
Produkta vadība tāpēc tas nav precīzi attīstība, nav precīzi mārketings, tas nav precīzi pārdošanu, tāpēc parasti tas ir grūti identificēt ", kur tai vajadzētu palikt" iekšpusē organizācijas struktūru (tas ir pat grūti saprast, ka ir nepieciešams)?
Silicon Valley produktu grupa sniedz jauku ieskatu par produktu organizatorisko struktūru , norādot, kas ir priekšrocības un riski vairākām izvēlēm. Joprojām Cranky produktu menedžeris saka, ka tas nav svarīgi, kur produktu menedžeris dzīvo organizācijā .
Ir svarīgi būt uzmanīgiem, ir personas, kas ir pārāk daudz tehnisku vai pārāk daudz pārdošanas orientēta, lai aizpildītu plaisu starp dažādu organizāciju. Pārāk daudz sadrumstalotība pienākumiem visā organizācijā var novest pie birokrātijas, pārāk daudz nodokļus vienai personai var novest pie neefektīvas īstenošanai nepieciešamo uzdevumu kādā jomā, un uz iekšējo konkurences uztvere attiecībā uz tradicionālajām lomām.
Pārbaudiet, ļoti jauks Resume ir profesionālis ar praktisku pieredzi produktu pārvaldības (tas ir pusotru techie / puse mārketinga puiši).
Ah! Vēl viens ļoti bieži pārpratums ir sajaukt tirdzniecības ar paziņojumu kur ai atrada tik labi definīciju Marketing, kas man patiešām patīk un izprast, lai stingri attiecības ar Product Management:
Mārketings ir zināt tirgus tik labi, ka produktu pārdot pati
Bet kas notiek, ja jums nav rīkoties ar produktu vadības un produktu mārketinga vadības procesu, kas noteiktā veidā?
Jauks stāsts tiek parādīts kā piemēram, stratēģisko nozīmi Product Management :
Jūsu dibinātājs, izcils tehniķis, sākās uzņēmuma gadus atpakaļ, kad viņš atmest savu dienas darbu, lai pārdot savu ideju pilnu darba laiku. Viņš ir radījis produktu, kas viņš tikai zināja citiem cilvēkiem nepieciešams. Un viņam bija taisnība. Diezgan drīz viņš sniedza pietiekami daudz produkta un darbā viņa labākais draugs no koledžas, kā VP pārdošanas. Un uzņēmums pieauga. Bet pirms ilgi, Pārdošanas VP sūdzējās, "Mēs esam inženierijas vadīto uzņēmumu. Mums ir nepieciešams, lai kļūtu klientu orientētu. "Un tas skanēja labi. Izņemot ... katrs jauns līgums likās pieprasīt pasūtījuma darbu. Jūs parakstīja desmiti klientu duci tirgus segmentos un jaunākais klienta balss vienmēr dominē produkta plānus. Jūs secināja, ka "klientu orientētu" nozīmē "vada jaunāko klientu", un tas nevar būt taisnība.
Ja jūs vēlaties būt produktu kompānija, tas ir svarīgi precīzi ievērot stratēģiju vada produktu mārketingā un menedžmentā, nevis pārdošanu.
Neskaidrības starp pienākumu produktu pārvaldības / mārketinga un pārdošanas, varētu novest pie neveiksmīgu produktu uzņēmums, kas nespēj turpināt savā stratēģijā, vienkārši tāpēc, ka viņi kļūst iespējas, kas vadīt biznesa out-of-darbības joma.
Produktu uzņēmums ir jāiegulda to pašu produktu izstrādi un tirdzniecību, lai ļautu tirdzniecības aktivitāte palikt koncentrētākas un garantētu, ka organizācija ir katru dienu efektīvāka tirgū.
Pēc izlasīšanas, mana izpratne ir, ka tas ir būtiski, lai noteiktu to, kā radīt virkni elastīgu biznesa procesu par to, kā rīkoties ar dažādu produktu vadība un produktu mārketinga pienākumus, atdalot tos no pārdošanas.
Es ieteiktu lasījums attālināti pieskaroties VoIP telefoni "par VoIP Security Alliance Blog Shawn Merdinger .
Konkrēts piemērs par to, kā pašreizējā telefonu infrastruktūra kļūst uzņēmīgāki pret kiberuzbrukumiem.
Hi,
i made a talk about voice communication security technologies at University of Trento following an interesting information exchange with Crypto Lab managed Professor Massimiliano Sala .
I suggest interested people to read it, especially the second part, as there is an innovative categorization of the various voice encryption technologies that get used in several sectors.
Es centos paskaidrot un izkļūt no šīs ļoti sadrumstalotas tehnoloģiju sektorā, nodrošinot plašu pārskatu par tehnoloģijām, kas parasti ir absolūti nesaistīts viens viena-otru, bet praktiski tie visi attiecas uz balss šifrēšanas pēc šāda iedalījuma:
Tas ir milzīgs slideware, 122 slaidi, es iesaku iet lasot 2.daļa izlaižot pārtveršanas tehnoloģijas pārskatu jau uz ko manu prezentāciju 2009.
It īpaši man patīk jēdziens šokolādes kvalitātes šifrēšanu, kas vēlas sniegt dažus jauninājumus, no Snake Oil šifrēšanas koncepciju.
Bet man ir nepieciešams, lai iegūtu vairāk padziļināti par šokolādes kvalitātes šifrēšanas kontekstā, būs iespējams darīt pirms beigām-of-gada, nodrošinot piemērots kursu uz sapratni un izvērtējot praktiski reālo drošības kontekstā dažādu balss šifrēšanas tehnoloģijas.
We come in peace
We come in peace, said the conquerers of the New World.
We come in peace, says the government, when it comes to colonise, regulate, and militarise the new digital world.
We come in peace, say the nation-state sized companies that have set out to monetise the net and chain the users to their shiny new devices.
We come in peace, we say as hackers, geeks and nerds, when we set out towards the real world and try to change it, because it has intruded into our natural habitat, the cyberspace…
Call for paper for participation to 27C3 CCC congress is open, and i never saw a so exciting payoff :-)
See you on 30 December 2010 in Berlin!
As most of this blog reader already know, in past years there was a lot of activities related to public research for GSM auditing and cracking.
However when there was huge media coverage to GSM cracking research results, the tools to make the cracking was really early stage and still very inefficient.
Now Frank Stevenson , norwegian cryptanalyst that already broke the Content Scrambling System of DVD video disc, participating to the A51 cracking project started by Karsten Nohl , released Kraken , a new improved version of the A51 cracking system.
It's interesting to notice that WiFi cracking had a similar story, as the first WiFi wep cracking discovery was quite slow in earlier techniques but later Korek, an hacker working on cracking code, improve the attack system drammatically.
That's the story of security research cooperation, you start a research, someone follow it and improve it, some other follow it and improved it and at the end you get the result.
Read more on the Kraken GSM Cracking software release .
And stay tuned as next week at Blackhat Conference Karsten Nohl will explain the details of the required hardware setup and detailed instructions on how to do it :-)
I would really like to see those tools incorporated into Penetration Testing Linux Distribution BackTrack with OSSTMM methodology enforcing the testing of GSM interception and man in the middle :-)
If things proceed that way and Ettus Research (The producer of USRP2 software radio used for low cost GSM signal receiving) will not be taken down, we can still see this.
Security market grow, more companies goes to the market, but how many of them are taking seriously what they do?
You know, doing security technology mean that you are personally responsible for the protection of the user's information. You must make them aware of what they need, exactly what your are doing and which kind of threat model your product protect.
A typical problem of product's security features is represented by the inability of the user to evaluate the security claims of the product itself.
So there's a lot companies doing a not-so-ethical marketing of security features, based on the facts that no user will be able to evaluate it.
The previously explained situation reside in the security topic of Snake Oil Encryption , an evolution in the scientific cryptographic environment that let us today use best of breed information protection technologies without having to worry too much about backdoors or insecurities.
Let's speak about Snake Oil Encryption
Snake Oil Cryptography : In cryptography , snake oil is a term used to describe commercial cryptographic methods and products which are considered bogus or fraudulent. Distinguishing secure cryptography from insecure cryptography can be difficult from the viewpoint of a user. Many cryptographers, such as Bruce Schneier and Phil Zimmermann , undertake to educate the public in how secure cryptography is done, as well as highlighting the misleading marketing of some cryptographic products.
The most referenced crypto security guru, Philip Zimmermann and Bruce Schneier, was the 1st to talk about Snake Oil Encryption:
Snake Oil by Philip Zimmermann
Snake Oil by Bruce Schneier
The Michigan Telecommunications and Technology Law Review also made a very good analysis related to the Security Features of Security Products, SNAKE-OIL SECURITY CLAIMS” THE SYSTEMATIC MISREPRESENTATION OF PRODUCT SECURITY . They explain about the nasty marketing tricks used to tweak users inability to evaluate the security features, including economic and legal responsibility implication.
Several snake oil security product companies does not explain and are not clear about the threat model to which the product apply. Very famous is the sentence of Russ Nelson :
“Remember, crypto without a threat model is like cookies without milk. ….. Cryptography without a threat model is like motherhood without apple pie. Can't say that enough times. More generally, security without a threat model is by definition going to fail.”
So, how to spot snake oil security products?
Check a guideline of to spot Snake Oil Encryption Products: Snake Oil Warning Signs, Encryption Software to Avoid by Matt Curtin .
You can see this very good Cryptographic Snake Oil Examples by Emility Ratliff (IBM Architect at Linux Security), that tried to make clear example on how to spot Cryptographic Snake Oil.
Here represented the basic guideline from Matt Curtin paper:
By checking that points it's possible to evaluate how serious an encryption technology or product is.
But all in all how to fix that unethical security approach?
It's very significative and it would be really useful for each kind of security product category to make some strongly and independent evaluation guideline (like OSSTMM for Penetration testing) , to make this security evaluation process really in the hands of the user.
It would be also very nice to have someone making analysis and evaluation of security product companies, publishing reports about Snake Oil signs.
You know that web2.0 world it's plenty of leak of any kind (profiling, profiling, profiling) related to Privacy and users starts being concerned about it.
Users continuously download applications without knowing the details of what they do, for example iFart just because are cool, are fun and sometime are useful.
On mobile phones users install from 1000% up to 10.000% more applications than on a PC, and those apps may contain malware or other unexpected functionalities.
Recently infobyte analyzed ubertwitter client and discovered that the client was leaking and sending to their server many personal and sensitive data such as:
- Blackberry PIN
- Phone Number
- Email Address
- Geographic positioning information
Read about UbertTwitter 'spyware' features discovery here by infoByte .
It's plenty of applications leaking private and sensitive information but just nobody have a look at it.
Should mandatory data retention and privacy policies became part of application development and submission guideline for mobile application?
Imho a users must not only be warned about the application capabilities and API usage but also what will do with which kind of information it's going to handle inside the mobile phone.
Capabilities means authorizing the application to use a certain functionalities, for example to use GeoLocation API, but what the application will do and to who will provide such information once the user have authorized it?
That's a security profiling level that mobile phone manufacturer does not provide and they should, because it focus on the information and not on the application authorization/permission respect to the usage of device capabilities.
ps yes! ok! Es piekrītu! This kind of post would require 3-4 pages long discussion as the topic is hot and quite articulated but it's saturday morning and i gotta go!
I encountered a nice paper regarding analysis and consideration on which encryption algorithm it's best suited for use in the space by space ship and equipments.
The paper has been done by the Consultative Committee for Space Data Systems that's a consortium of all space agency around that cumulatively handled more than 400 mission to space .
Read the paper Encryption Algorithm Trade Survey as it gives interesting consideration and comparison between different encryption algorithms.
Obviously the finally selected algorithm is AES , while KASUMI (used in UMTS networks) was avoided.
Blackberry have good and bad reputation regarding his security capability, depending from which angle you look at it.
This post it's a summarized set of information to let the reader the get picture, without taking much a position as RIM and Blackberry can be considered, depending on the point of view, an extremely secure platform or an extremely dangerous one .
Let's goes on.
On one side Blackberry it's a platform plenty of encryption features, security features everywhere, device encrypted (with custom crypto), communication encrypted (with custom proprietary protocols such as IPPP), very good Advanced Security Settings, Encryption framework from Certicom ( now owned by RIM ).
On the other side they does not provide only a device but an overlay access network, called BIS ( Blackberry Internet Service ), that's a global worldwide wide area network where your blackberry enter while you browse or checkmail using blackberry.net AP.
When you, or an application, use the blackberry.net APN you are not just connecting to the internet with the carrier internet connection, but you are entering inside the RIM network that will proxy and act as a gateway to reach the internet.
The very same happen when you have a corporate use: Both the BB device and the corporate BES connect to the RIM network that act as a sort of vpn concentration network .
So basically all the communications cross trough RIM service infrastructure in encrypted format with a set proprietary encryption and communication protocols.
Just as a notice, think that google to provide gtalk over blackberry.net APN, made an agreement in order to offer service inside the BB network to the BB users. When you install gtalk you get added 3 service books that point to GTALKNA01 that's the name of GTALK gateway inside the RIM network to allow intra-BIS communication and act as a GTALK gateway to the internet.
The mobile operators usually are not even allowed to inspect the traffic between the Blackberry device and the Blackberry Network.
So RIM and Blackberry are somehow unique for their approach as they provide a platform, a network and a service all bundled together and you cannot just “get the device and the software” but the user and the corporate are always bound and connected to the service network.
That's good and that's bad, because it means that RIM provide extremely good security features and capabilities to protect information, device and access to information at various level against third party .
But it's always difficult to estimate the threat and risk related to RIM itself and who could make political pressure against RIM.
Please consider that i am not saying “RIM is looking at your data” but making an objective risk analysis: for how the platform is done RIM have authority on the device, on the information on-the-device and on the information that cross the network. (Read my Mobile Security Slides ).
For example let's consider the very same context for Nokia phones.
Once the Nokia device is sold, Nokia does not have authority on the device, nor on the information on-the-device nor on the information that cross the network. But it's also true that Nokia just provide the device and does not provide the value added services such as the Enterprise integration (The RIM VPN tunnel), the BIS access network and all the local and remote security provisioned features that Blackberry provide.
So it's a matter of considering the risk context in the proper way when choosing the platform, with an example very similar to choosing Microsoft Exchange Server (on your own service) or whether getting a SaaS service like Google Apps.
In both case you need to trust the provider, but in first example you need to trust Microsoft that does not put a backdoor on the software while in the 2nd example you need to trust Google, as a platform and service provider, that does not access your information.
So it's a different paradigm to be evaluated depending on your threat model.
If your threat model let you consider RIM as a trusted third party service provider (much like google) than it's ok. If you have a very high risk context, like top-secret one, then let's consider and evaluate carefully whether it's not better to keep the Blackberry services fully isolated from the device or use another system without interaction with manufacturer servers and services.
Now, let's get back to some research and some facts about blackberry and blackberry security itself.
First of all several governments had to deal with RIM in order to force them to provide access to the information that cross their service networks while other decided to directly ban Blackberry usage for high officials because of servers located in UK and USA, while other decided to install their own backdoors.
There's a lot of discussion when the topics are RIM Blackberry and Governments for various reasons.
Below a set of official Security related information on RIM blackberry platform:
And here a set of unofficial Security and Hacking related information on RIM Blackberry platform:
Because it's 23.32 (GMT+1), i am tired, i think that this post will end up here.
I hope to have provided the reader a set of useful information and consideration to go more in depth in analyzing and considering the overall blackberry security (in the good and in the bad, it always depends on your threat model!).
Priekā
Fabio Pietrosanti (naif)
ps i am managing security technology development (voice encryption tech) on Blackberry platform, and i can tell you that from the development point of view it's absolutely better than Nokia in terms of compatibility and speed of development, but use only RIMOS 5.0+ !
A cult book , ever green since 25 years.
It's been 25 years since “Hackers” was published. Author Steven Levy reflects on the book and the movement.
http://radar.oreilly.com/2010/06/hackers-at-25.html
Steven Levy wrote a book in the mid-1980s that introduced the term "hacker" -- the positive connotation -- to a wide audience. In the ensuing 25 years, that word and its accompanying community have gone through tremendous change. The book itself became a mainstay in tech libraries.
O'Reilly recently released an updated 25th anniversary edition of "Hackers," so I checked in with Levy to discuss the book's development, its influence, and the role hackers continue to play.
I read an interesting article about putting 1.000.000 computers, given the chance for a serious botnet owner to get it, to crack RSA.
The result is that in such context attacking an RSA 1024bit key would take only 28 years, compared to theoretical 19 billion of years.
Reading of this article , is extremely interesting because it gives our very important consideration on the cryptography strength respect to the computation power required to carry on cracking attempt, along with industry approach to “default security level”.
I would say a must read .
How many of you had to deal with patented technologies?
How many of the patented technologies you dealed with was also “secrets” in their implementation?
Well, there's a set of technologies whose implementation is open source ( copyright) but that are patented ( intellectual property right) .
A very nice paper about the topic opensource & patents that i suggest to read is from Fenwick & West and can be downloaded here (pdf) .
Hi all,
i found this very interesting paper on China Encryption Import/Export/Domestic Regulations done by Baker&Mckenzie in the US.
It's strongly business and regulatory oriented giving a very well done view on how china regulations works and how it may behave in future.
Read here Decrypting China Encryption's Regulations (form Bakernet website) .
A porting of famous netcat to Cisco IOS router operating system: IOSCat
The only main limit is that it does not support UDP, but that's a very cool tool!
A very good txt to read is Netcat hacker Manual .
In the '90, closed source and proprietary cryptography was ruling the world.
That's before open source and scientifically approved encrypted technologies went out as a best practice to do crypto stuff.
I would like to remind when, in 1992, USA along with Israel was, together with switzerland, providing backdoored (proprietary and secret) technologies to Iranian government to tap their communications, cheating them to think that the used solution was secure , making also some consideration on this today in 2010.
That's called The Crypto AG case , an historical fact involving the United States National Security Agency along with Signal Intelligence Division of Israel Ministry of Defense that are strongly suspected to had made an agreement with the Swiss cryptography producer company Crypto AG .
Basically those entities placed a backdoor in the secure crypto equipment that they provided to Iran to intercept Iranian communications.
Their crypto was based on secret and proprietary encryption algorithms developed by Crypto AG and eventually customized for Iranian government.
You can read some other facts about Crypto AG backdoor related issues:
The demise of global telecommunication security
Breaking codes: an impossible task? By BBC
Der Spiegel Crypto AG (german) article
Now, in 2010, we all know and understand that secret and proprietary crypto does not work.
Just some reference by top worldwide cryptographic experts below:
Secrecy, Security, Obscurity by Bruce Schneier
Just say No to Proprietary cryptographic Algorithms by Network Computing (Mike Fratto)
Security Through Obscurity by Ceria Purdue University
Unlocking the Secrets of Crypto: Cryptography, Encryption and Cryptology explained by Symantec
Time change the way things are approached.
I like very much the famous Philip Zimmermann assertion:
“Cryptography used to be an obscure science, of little relevance to everyday life. Historically, it always had a special role in military and diplomatic communications. But in the Information Age, cryptography is about political power, and in particular, about the power relationship between a government and its people. It is about the right to privacy, freedom of speech, freedom of political association, freedom of the press, freedom from unreasonable search and seizure, freedom to be left alone.”
Any scientist today accept and approve the Kerckhoffs' Principle that in 1883 in the Cryptographie Militaire paper stated:
The security of a cryptosystem should not depend on keeping the algorithm secret, but only on keeping the numeric key secret.
It's absolutely clear that the best practice for doing cryptography today obbly any serious person to do open cryptography, subject to public review and that follow the Kerckhoff principle.
So, what we should think about closed source, proprietary cryptography that's based on security trough obscurity concepts?
I was EXTREMELY astonished when TODAY, in 2010, in the age of information society i read some paper on Crypto AG website.
I invite all to read the Crypto AG security paper called Sophisticated Security Architecture designed by Crypto AG of which you can get a significant excerpt below:
The design of this architecture allows Crypto AG to provide a secret proprietary algorithm that can be specified for each customer to assure the perfect degree of cryptographic security and optimum support for the customer's security policy. In turn, the Security Architecture gives you the influence you need to be fully independent in respect of your encryption solution. You can determine all areas that are covered by cryptography and verify how the algorithm works. The original secret proprietary algorithm of Crypto AG is the foundation of the Security Architecture .
I have to say that their architecture is absolutely good from TLC point of view. Also they have done a very good job in making the design of the overall architecture in order to make a tamper-proof resistant crypto system by using dedicated crypto processor .
However there is still something missing:
T he overall cryptographic concept is misleading, based on wrong encryption concepts .
You may think that i am a troll telling this, but given the history of Crypto AG and given the fact that all the scientific and security community does not approve security trough obscurity concepts , it would legitimate to ask ourself:
Hey, i think that they have very depth knowledge on telecommunication and security, but given that the science tell us not to follow the secrecy of algorithms, i really have serious doubt on why they are still providing proprietary encryption and does not move to standard solutions (eventually with some kind of custom enhancement).
The cyber conflicts are really reaching a point where war and cyberwar merge together.
NATO countries have the right to use the force against attacks on computer networks .
I want to share some slides i used to talk about mobile security at whymca mobile conference in Milan.
Read here my slides on mobile security .
The slides provide a wide an in-depth overview of mobile security related matters, i should be doing some slidecast about it putting also audio. Maybe will do, maybe not, it depends on time that's always a insufficient resource.
I recently switched one of my multiple mobile phones with which i go around to iPhone.
I am particularly concerned about data protection in case of theft and so started having a look around about the iPhone provided protection system.
There is an interesting set of iPhone Business Security Features that make me think that iPhone is moving in the right path for security protection of the phone, but still a lot of things has to be done, especially for serious Enterprise and Government users.
For example it turned out that the iPhone PIN protection is useless and it can be broken just plugging the iPhone to a Linux machine and accessing the device like a USB stick.
That's something disturbing my paranoid mindset that make me think not to use sensitive data on my iPhone if i cannot protect my data.
Probably an iPhone independent disk encryption product would be very useful in order to let the market create protection schemas that fit the different risk contexts that different users may have.
Probably a general consumer is not worried about this PIN vulnerability but for me, working within highly confidential envirnonment such as intelligence, finance and military, it's something that i cannot accept.
I need strong disk encryption on my mobile phone.
I do strong voice encryption for it , but it would be really nice to have also something to protect the whole iPhone data and not just phone calls.
I like geopolitic and i am following carefully iran issues.
I went to National Iranian Oil Company website and have seen “ Exploration & Production ” section where are listed all the companies and their country of origin that are allowed to make Exploration of oil in Iran.
On that list we find the list of countries along with the data of signing of exploration agreement:
Those countries's oil companies are allowed to do oil extraction in Iran and i would like to point out that Iran is the 2nd world Oil Reserve just after Saudi Arabia.
As you can see there's NO USA company doing extraction.
Of European Countries the only one doing business with IRAN are:
While of the well known non-US-simpatizing countries, the one doing Oil business with Iran are:
Don't missing some Asian involvement.
As you can see Iran is doing Oil business with most big south America and Far Asia countries, with some little exception in Europe for what apply to Norway, Italy and Spain.
To me it sounds that those European countries are going to face serious trouble whether they will accept and subscribe UN sanction against Iran.
Or some of them, like Italy, are protected by the strenghtening cooperation they are doing with Russia on Energy matters?
Well, i don't know how things will end up, but it's possible the most hypocrit countries like the European ones doing business in Iran while applying Sanctions will be the only European winning in the international competition for Iran Oil (Unless France did not drop a nuclear bomb on theran ;) ).
It seems that the hacking community somehow like to target securstar products, maybe because hacking community doesn't like the often revealed unethical approach already previously described in this blog by articles and user's comments.
In 2004 a lot of accusation against Hafner of SecurStar went out because of alleged intellectual property theft regarding opensource codes such as Encryption 4 the masses and legal advert also against the Free and opensource TrueCrypt project .
In 2008 there was a pre-boot authentication hacking against DriveCrypt Plus posted on Full-Disclosure.
Early 2010 it was the time of the fake infosecurity research secretly sponsored by securstar at http://infosecurityguard.com (that now they tried to remove from the web because of embarrassing situation, but backup of the story are available, hacking community still wait for apologies) .
Now, mid 2010, following a research published in December 2009 about Disk Encryption software vulnerabilities made by Neil Kettle (mu-b), Security researcher at digit-labs and Penetration tester at Convergent Network Solutions , DriveCrypt was found to be vulnerable and exploitable breaking on-device security of the system and exploit code has been just released.
Exploit code reported below (thanks Neil for the code release!):
The exploit code has been tested against DriveCrypt 5.3, currently released DriveCrypt 5.4 is reported to be vulnerable too as it has just minor changes related to win7 compatibility. Can anyone make a double check and report a comment here?
Very good job Neil!
In the meantime the Free Truecrypt is probably the preferred choice for disk encryption, given the fact that it's difficult to trust DriveCrypt, PGP has been acquired by Symantec and there are very bad rumors about the trust that people have in Symantec and there are not many widely available alternatives.
Rumors say that also PhoneCrypt binaries are getting analyzed and the proprietary encryption system could reveal something fun…
Quantum cryptography it's something very challenging, encryption methods that leverage the law of phisycs to secure communications over fiber lines.
To oversimplify the system is based on the fact that if someone cut the fiber, put a tap in the middle, and joint together the other side of the fiber, the amount of “errors” that will be on the communications path will be higher than 20% .
So if QBER (Quantum Bit Error Rate) goes above 20% then it's assumed that the system is intercepted.
Researcher at university of toronto was able to cheat the system with a staying below the 20%, at 19.7% , thus tweaking the threshold used by the system to consider the communication channel secure vs compromised.
The product found vulnerable is called Cerberis Layer2 and produced by the Swiss ID Quantique .
Some possibile approach to detect the attack has been provided but probably, imho, such kind of systems does not have to be considered 100% reliable until the technology will be mature enough.
Traditional encryption has to be used together till several years, eventually bundled with quantum encryption whether applicable.
When we will see a quantum encryption systems on an RFC like we have seen for ZRTP , PGP and SSL ?
-naif
Please read it carefully Film that needed better infosec .
One the the review, imho the most fun one on film Star Wars :
The scene
Death star getting blown up
Infosec Analysis
Darth Vader must be heralded as the prime example of a chief executive who really didn't care about information security. The entire board was unapproachable and clearly no system testing was undertaken. The network security was so poor that it was hacked into and the designs for the death star were stolen without anyone knowing.
Even worse than that, the death star had a major design flaw where by dropping a bomb thingy into a big hole on the outside, it actually blew up the entire thing!
Darth Vader needed to employ a good Security Consultant to sit on the executive board and promise not to force choke him. Should have commissioned a full risk assessment of the death star followed by a full penetration test. Only then should the death star have been released into the production environment.
Most of us know about voice scrambler that can be used across almost any kind of voice based communication technology.
Extremely flexible approach: works everything
Extreme performance: very low latency
but unfortunately…
Extremely weak: Scrambling cannot be considered secure.
Only encryption can be considered secure under the Kerckoff's principle .
So please don't even consider any kind of analog scrambler if you need real security.
Read deeply the paper Implementation of a real-time voice encryption system ” by Markus Brandau, especially the cryptoanalysis paragraph.
UPDATE 20.04.2010: http://infosecurityguard.com has been disabled. Notrax identity became known to several guys in the voice security environments (cannot tell, but you can imagine, i was right!) and so our friends decided to trow away the website because of legal responsibility under UK and USA laws.
UPDATE: Nice summary of the whole story (i know, it's long and complicated to read at 1st time) on SIPVicious VoIP security blog by Sandro Gauci .
Following my discoveries, Mr. Hafner, SecurStar chief exec, tried to ultimately defend their actions, citing absolutely unreasonable excuses to The Reg instead of publicly apologizing for what they have done: creating a fake independent security research to promote their PhoneCrypt product .
He tried to convince us that the person behind IP 217.7.213.59, used by the author of infosecurityguard.com and pointing to their office DSL line, was this hacker Notrax, using their anonymous surfing service and not one of their employees at their office:
“SecurStar chief exec Wilfried Hafner denied any contact with Notrax. Notrax, he said, must have been using his firm's anonymous browsing service, SurfSolo, to produce the results reported by Pietrosanti”
Let's reflect a moment on this sentence… Would really an hacker looking for anonymity spend 64 EUR to buy their anonymity surfing service called surfsolo instead of using the free and much more secure TOR (the onion router) ?Then let's reflect on this other piece of information:
Hey, I don't need anything else to convince myself or to let the smart person have his own thoughts on this.
I just think that the best way for SecurStar to get out of this mess would probably be to provide public excuses to the hacking community for abusing the name and reputation of real independent security researches, for the sake of a marketing stunt.
Sveicieni,
Fabio Pietrosanti
ps I am currently waiting for some other infos that will more precisely confirm that what Mr. Hafner is saying is not properly true. Stay tuned.
Below evidence that the security review made by an anonymous hacker on http://infosecurityguard.com is in facts a dishonest marketing plan by the SecurStar GmbH to promote their voice crypto product.
I already wrote about that voice crypto analysis that appeared to me very suspicious.
Now it's confirmed, it's a fake independent hacker security research by SecurStar GmbH, its just a marketing trick!
How do we know that Infosecurityguard.com, the fake independent security research, is a marketing trick from SecurStar GmbH?
1) I posted on http://infosecurityguard.com a comments to a post with a link to my blog to that article on israelian ministry of defense certification
2) The author of http://infosecurityguard.com went to approve the comment and read the link on my own blog http://infosecurity.ch
3) Reaching my blog he leaked the IP address from which he was coming 217.7.213.59 (where i just clicked on from wordpress statistic interface)
4) On http:// 217.7.213.59/panel there is the IP PBX interface of the SecurStar GmbH corporate PBX (openly reachable trough the internet!)
5) The names of the internal PBX confirm 100% that it's the SecurStar GmbH:
6) There is 100% evidence that the anonymous hacker of http://infosecurityguard.com is from SecurStar GmbH
Below the data and reference that let us discover that it's all but a dishonest marketing tips and not an independent security research.
Kudos to Matteo Flora for it's support and for his article in Debunking Infosecurityguard identity !
The http referral tricks
When you read a link going from a website to another one there is an HTTP protocol header, the “Referral”, that tell you from which page someone is going to another webpage.
The referral demonstrated that the authors of http://infosecurityguard.com read my post, because it was coming from http://infosecurityguard.com/wp-admin/edit-comments.php that's the webpage you use as a wordpress author/editor to approve/refuse comments. And here there was the link.
That's the log entry:
217.7.213.59 – - [30/Jan/2010:02:56:37 -0700] “GET /20100129/licensed-by-israel-ministry-of-defense-how-things-really-works/ HTTP/1.0″ 200 5795 “ http://infosecurityguard.com/wp-admin/edit-comments.php ” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”
The PBX open on the internet tell us that's SecurStar GmbH
The SecurStar GmbH PBX is open on the internet, it contains all the names of their employee and confirm us that the author of http:/infosecurityguard.com is that company and is the anonymous hacker called Notrax.
Here there is their forum post where the SecurStar GmbH guys are debugging IPCOPfirewall & Asterisk together (so we see also details of what they use) where there is the ip 217.7.213.59 .
That's also really fun!
They sell secure telephony but their company telephony system is openly vulnerable on the internet . :-)
I was thinking to call the CEO, Hafner, via SIP on his internal desktop PBX to announce we discovered him tricks.. :->
They measured their marketing activity
Looking at the logs of my website i found that they was sensing the google distribution of information for the following keywords, in order to understand how effectively they was able to attack competing products. It's reasonable, if you invest money in a marketing campaign you want to see the results :-)
They reached my blog and i logged their search:
infosecurityguard+cryptophone
infosecurityguard+gold-lock
217.7.213.59 – - [30/Jan/2010:02:22:42 -0700] “GET / HTTP/1.0″ 200 31057 “http://www.google.de/search?sourceid=navclient&ie=UTF-8&rlz=1T4SKPB_enDE350DE350&q=infosecurityguard+cryptophone” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”
217.7.213.59 – - [30/Jan/2010:04:15:07 -0700] “GET /20100130/about-the-voice-encryption-analysis-phonecrypt-can-be-intercepted-serious-security-evaluation-criteria/ HTTP/1.0″ 200 15774 “http://www.google.de/search?sourceid=navclient&ie=UTF-8&rlz=1T4SKPB_enDE350DE350&q=gold-lock+infosecurityguard” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”
The domain registration data
The domain have been registered on 1st December 2009, just two months to start preparing the dishonest marketing campaign:
Domain Name: INFOSECURITYGUARD.COM
Registrar: GODADDY.COM, INC.
Updated Date: 01-dec-2009
Creation Date: 01-dec-2009
The domain is anonymously privacy protected trough a whois privacy service:
Administrative Contact: Private, Registration INFOSECURITYGUARD.COM@domainsbyproxy.com , Domains by Proxy, Inc. DomainsByProxy.com
Notrax hacker does not exist on google
As you know any hacker that get public usually have presence of it's activity on google, attending mailinglists, forum, homepage, past research, participation to conferences, etc, etc.
The fake hacker that they wanted us to to think was writing an independent blog does NOT have any trace on google. Only some hit about an anonymous browser called Notrax but nothing about that hacker.
Maybe when SecurStar provided the anonymity tool to their marketing agency, to help them protecting anonymity for the fake research, their provided them the anonymous browser notrax.So the marketing guy thinking about the nickname of this fake hackers used what? Notrax! :-)
The “independent review”completely oriented in publicizing PhoneCrypt
Of the various review don the phonecrypt review is only positive and amazing good feedback, while the other are only bad feedback and no single good point.
As you can imagine, in any kind of independent product evaluation, for all products there are goods and bad points. No. In this one there are only product that are good and product that are bad.
They missed to consider the security of the technology used by the products
They completely avoided to speak about cryptography and security of the products.
They do not evaluated basic security features that must be in that kind of products.That's in order not to let anyone see that they did not followed basic security rules in building up their PhoneCrypt.
The technology is closed source, no transparency on algorithms and protocols, no peer review.Read my new comparison (from the basic cryptographic requirement point of view) About the voice encryption analysis (criteria, errors and different results) .
The results are somehow different than their one .
UPDATE: Who's Wilfried Hafner (SecurStar founder) ?
I got a notice from a reader regarding Wilfred Hafner, SecurStar founder, CEO and security expert.
He was arrested in 1997 for telephony related fraud (check 2nd article on Phrack) earning from telephony fraud 254.000 USD causing damages to local telcos trough blueboxing for 1.15 Million USD.
He was not doing “Blueboxing” for the pleasure of phreaking and connecting with other hackers, but to earn money.
Hacking for profit (and not for fun) in 1997… brrr…. No hacker's ethic at all!
All in all, is that lawful?
Badmouthing a competitor amounts to an unfair competition practice in most jurisdictions, so it is arguable (to say the least) that SecurStar is right on a legally sound ground here.
Moreover, there are some specific statutes in certain jurisdictions which provide for a straightforward ban on the practice we are talking about. For example in the UK the British Institute of Practitioners in Advertising - in compliance with the Consumer protection from Unfair Trading regulation – ruled that:
”falsely claiming or creating the impression that the trader is not acting for the purposes relating to his trade, business, craft or profession, or falsely representing oneself as a consumer” is a criminal offense .
We have no doubt that PRPR (which is the UK-based *PR company for SecurStar GmbH, led by Peter Rennison and Allie Andrews as stated in SecurStar Press Release ) did provide their client with this information. Heck, they *are* in the UK, they simply cannot ignore that!
IANAL, but I would not be surpised if someone filed a criminal complaint or start civil litigation for unfair competition against SecurStar GmbH.
Whether this is going to be a matter for criminal and/or civil Courts or not is not that important. However, it is clear enough that SecurStar GmbH appears to be at least ethically questionable and not really worth of trust.
Nice try, gentlemen… however, next time just do it right (whether “right” for them means “in a honest manner” or “in a fashion not to be caught” I will let them choose)”
Fabio Pietrosanti (naif)
I would like to provide considerations on the concept of ethics that a security company should have respect to the users, the media and the security environment.
SecurStar GmbH made very bad things making that infosecuriguard.com fake independent research.
It's unfair approach respect to hacking community.
It's unfair marketing to end user. They should not be tricking by creating fake independent review.
It's unfair competition in the security market.
Let's make some more important consideration on this.
Must be serious on cryptographic products. They are not toys
When you do cryptographic tools you should be really aware of what you are doing, you must be really serious.
If you do bad crypto people could die.
If you don't follow basic security rules for transparency and security for cryptography you are putting people life at risk.
You are taking the responsibility of this. (Es gribu gulēt naktī, nedomāju SecurStar CEO / CTO rūpēties par šo ...)
Security research need reference and transparency
Drošības pētniecība ir jābūt publiski, labi darīts, vienmēr ievērojot sabiedriskajai apspriešanai un sadarbībai.
Security research should not be instrumentally used for marketing purpose.Security research should be done for awareness and grow of the knowledge of the worldwide security environment.
Hakeru vide ir neitrāla, nedrīkst lietot instrumentāli
Hackers are considered neutral, nerds, doing what they do for their pleasure and passion.
Ja jūs strādājat drošības tirgū jūs strādājat ar hakeriem.
If you use hackers and hacking environment for your own marketing purposes you are making something very nasty.
Hackers give you the technology and knowledge and you use them for your own commercial purpose.
Consideration on the authority of the information online
That's something that pose serious consideration on the authority of information online.An anonymous hacker, with no reference online, made a product security review that appear like an independent one. I have to say that the fake review was very well prepared, it always posed good/bad things in an indirect way. It did not appeared to me at 1st time like a fake. But going deeply i found what's going on.
However Journalists, news media and blogger went to the TRAP and reviewed their fake research. TheRegister, NetworkWorld and a lot of blogs reported it. Even if the author was completely anonymous.
What they have done is already illegal in UK
SecurStar GmbH is lucky that they are not in the UK, where doing this kind of things is illegal .
Fabio Pietrosanti (naif)
This article want to clarify and better explain the finding at infosecurityguard.com regaring voice encryption product evaluation.
This article want to tell you a different point of view other than infosecurityguard.com and explaining which are the rational with extensive explaination from security point of view.
Today i read news saying: “PhoneCrypt: Basic Vulnerability Found in 12 out of 15 Voice Encryption Products and went to read the website infosecurityguard .
Initially it appeared to my like a great research activity but then i started reading deeply the read about it.I found that it's not properly a security research but there is are concrete elements that's a marketing campaign well done in order to attract public media and publicize a product.
Imho they was able to cheat journalists and users because the marketing campaign was absolutely well done not to be discovered on 1st read attempt. I personally considered it like a valid one on 1st ready (they cheated me initially!).
But if you go deeply… you will understand that:
- it's a camouflage marketing initiative arranged by SecurStar GmbH and not a independent security research
- they consider a only security context where local device has been compromised (no software can be secured in that case, like saying SSL can be compromised if you have a trojan!)
- they do not consider any basic security and cryptographic security criteria
However a lot of important website reported it:
This article is quite long, if you read it you will understand better what's going on around infosecurityguard.com research and research result.
I want to to tell you why and how (imho) they are wrong.
Well, all this research sound much like being focused on the marketing goal to say that their PhoneCrypt product is the “super” product best of all the other ones.
Any security expert that would have as duty the “software evaluation” in order to protect the confidentiality of phone calls will evaluate other different characteristics of the product and the technology.
Yes, it's true that most of the product described by SecurStar in their anonymous marketing website called http://infosecurityguard.com have some weakness.
But the relevant weakness are others and PhoneCrypt unfortunately, like most of the described products suffer from this.
Let's review which characteristics are needed basic cryptography and security requirement (the best practice, the foundation and the basics!)
A basic rule in cryptography cames from 1883 by Auguste Kerckhoffs:
Providing precise details means having extensive documentation with theoretical and practical implications documenting ANY single way of how the algorithm works, how the protocol works with precise specification to replicate it for interoperability testing.
It means that scientific community should be able to play with the technology, audit it, hack it.
If we don't know anything about the cryptographic system in details, how can we know which are the weakness and strength points?
Mike Fratto, Site editor of Network Computing, made a great article on “Saying NO to proprietary cryptographic systems” .
Cerias Purdue University tell this .
In any case and in any condition you do cryptography you need to be sure that someone else will check, review, analyze, distruct and reconstract from scratch your technology and provide those information free to the public for open discussion.
That's exactly how AES was born and like US National Institute of Standard make crypto does (with public contest with public peer review where only the best evaluated win).
A public discussion with a public contest where the a lot of review by most famous and expert cryptographer in the world, hackers (with their name,surname and face, not like Notrax) provide their contribution, tell what they thinks.
That's called “peer review”.
If a cryptographic technology has an extended and important peer review, distributed in the world coming from universities, private security companies, military institutions, hackers and all coming from different part of the world (from USA to Europe to Russia to South America to Middle east to China) and all of them agree that a specific technology it's secure…
Well, in that case we can consider the technology secure because a lot of entities with good reputation and authority coming from a lot of different place in the world have publicly reviewed, analyzed and confirmed that a technology it's secure.
How a private company can even think to invent on it's own a secure communication protocol when it's scientifically stated that it's not possible to do it in a “proprietary and closed way” ?
IBM tell you that peer review it's required for cryptography .
Bruce Schneier tell you that “Good cryptographers know that nothing substitutes for extensive peer review and years of analysis.”
Philip Zimmermann will tell you to beware of Snake Oil where the story is: “Every software engineer fancies himself a cryptographer, which has led to the proliferation of really bad crypto software.”
As you know any kind of “serious” and with “good reputation” cryptographic technology is implemented in opensource.
There are usually multiple implementation of the same cryptographic algorithm and cryptographic protocol to be able to review all the way it works and certify the interoperability.
Supposing to use a standard with precise and extended details on “how it works”, that has been “peer reviewed” by the scientific community BUT that has been re-implemented from scratch by a not so smart programmer and the implementation it's plenty of bugs.
Well, if the implementation is “opensource” this means that it can be reviewed, improved, tested, audited and the end user will certaintly have in it's own had a piece of technology “that works safely” .
Google release opensource crypto toolkit
Mozilla release opensource crypto toolkit
Bruce Schneier tell you that Cryptography must be opensource .
I don't want to convince anyone but just provide facts related to science, related to cryptography and security in order to reduce the effect of misinformation done by security companies whose only goes is to sell you something and not to do something that make the world a better.
When you do secure products, if they are not done following the proper approach people could die.
It's absolutely something irresponsible not to use best practice to do crypto stuff.
To summarize let's review the infosecurityguard.com review from a security best pratice point of view.
Product name | Security Trough Obscurity | Public peer review | Open Source | Compromise locally? |
Caspertec | Obscurity | No public review | Closed | Jā |
CellCrypt | Obscurity | No public review | Closed | Jā |
Cryptophone | Transparency | Limited public review | Public | Jā |
Gold-Lock | Obscurity | No public review | Closed | Jā |
Illix | Obscurity | No public review | Closed | Jā |
No1.BC | Obscurity | No public review | Closed | Jā |
PhoneCrypt | Obscurity | No public review | Closed | Jā |
Rode&Swarz | Obscurity | No public review | Closed | Jā |
Secure-Voice | Obscurity | No public review | Closed | Jā |
SecuSmart | Obscurity | No public review | Closed | Jā |
SecVoice | Obscurity | No public review | Closed | Jā |
SegureGSM | Obscurity | No public review | Closed | Jā |
SnapCell | Obscurity | No public review | Closed | Jā |
Tripleton | Obscurity | No public review | Closed | Jā |
Zfone | Transparency | Public review | Open | Jā |
ZRTP | Transparency | Public review | Open | Jā |
*Green means that it match basic requirement for a cryptographic secure system
However, to be clear, those are only basic parameters to be used when considering a voice encryption product (just to avoid being in a situation that appears like i am promoting other products). So it may absolutely possible that a product with good crypto ( transparency, peer reviewed and opensource) is absolutely a not secure product because of whatever reason (badly written, not usable causing user not to use it and use cleartext calls, politically compromised, etc, etc).
I think i will prepare a broader criteria for voice crypto technologies and voice crypto products, so it would be much easier and much practical to have a full transparent set of criterias to evaluate it.
But those are really the basis of security to be matched for a good voice encryption system!
Read some useful past slides on security protocols used in voice encryption systems (2nd part).
Now read below some more practical doubt about their research.
I think that the guys completely missed the point: ANY KIND OF SOFTWARE RUNNING ON A COMPROMISED OPERATING SYSTEM CAN BE INTERCEPTED
Now they are pointing out that also Zfone from Philip Zimmermann is broken (a pc software), just because they install a trojan on a PC like in a mobile phone?
Any security software rely on the fact that the underlying operating system is somehow trusted and preserve the integrity of the environment where the software run.
No matter which software you are running, in such case the security of your operating environment is compromised and in one way or another way all the information integrity and confidentiality is compromised.
Like i explained above how to intercept PhoneCrypt.
The only things that can protect you from this threat is running in a closed operating system with Trust Computing capability, implementing it properly.
For sure on any “Open” operating system such us Windows, Windows Mobile, Linux, iPhone or Android there's no chance to really protect a software.
On difficult operating system such as Symbian OS or RimOS maybe the running software can be protected (at least partially)
That's the reason for which the security concept that guys are leveraging to carry on their marketing campaign has no clue.
It's just because they control the environment, they know Flexispy software and so they adjusted their software not to be interceptable when Flexispy is installed.
If you develop a trojan with the other techniques i described above you will 100% intercept PhoneCrypt.
On that subject also Dustin Tamme l, Security researcher of BreakPoint Systems , pointed on on VoIP Security Alliance mailing lists that the security analysis is based on wrong concepts .
PhoneCrypt can be intercepted with “on device spyware”.
Kāpēc?
Because Windows Mobile is an unsecure operating environment and PhoneCrypt runs on Windows Mobile.
Windows Mobile does not use Trusted Computing and so any software can do anything.
The platform choice for a secure telephony system is important.
How?
I quickly discussed with some knowledgeable windows mobile hackers about 2 different way to intercept PhoneCrypt with an on-device spyware (given the unsecure Windows Mobile Platform).
I have to tell you. I analyzed the issue very carefully and on most aspects. All this things about the voice encryption analisys sounds to me like a marketing campaign of SecurStar GmbH to sell PhoneCrypt and gain reputation. A well articulated and well prepared campaign to attract the media saying, in an indirect way cheating the media, that PhoneCrypt is the only one secure. You see the press releases of SecurStar and of the “Security researcher Notrax telling that PhoneCrypt is the only secure product” . SecurStar PhoneCrypt is the only product the anonymous hacker “Notrax” consider secure of the “software solutions”.
The only “software version” in competition with:
Does it sounds strange that only those other products are considered secure along with PhoneCrypt .
Also… let's check the kind of multimedia content in the different reviews available of Gold-Lock, Cellcrypt and Phonecrypt in order to understand how much the marketing guys pressed to make the PhoneCrypt review the most attractive:
Application | Screenshots of application | Video with demonstration of interception | Network demonstration | |
PhoneCrypt | 5 | 0 | 1 | |
CellCrypt | 0 | 2 | 0 | |
GoldLock | 1 | 2 | 0 |
It's clear that PhoneCrypt is reviewed showing more features explicitly shown and major security features product description than the other.
But again other strange things analyzing the way it was done…
If it was “an impartial and neutral review” we should see good and bad things on all the products right?
Ok, see the table below regarding the opinion indicated in each paragraph of the different reviews available of Gold-Lock, CellCrypt and Phonecrypt (are the only available) to see if are positive or negative.
Application | Number of paragraphs | Positive paragraphs | Negative paragraphs | Neutral paragraphs |
PhoneCrypt | 9 | 9 | 0 | 0 |
CellCrypt | 12 | 0 | 10 | 2 |
GoldLock | 9 | 0 | 8 | 1 |
Paragraph of review | Opinion expressed |
From their website | Positive Marketing feedback |
Apple iPhone | Positive Marketing feedback |
Disk Encryption or voice Encryption | Positive Marketing feedback |
PBX Compatibility? Really | Positive Marketing feedback |
Cracking <10. Not. | Positive Marketing feedback |
Good thinking! | Positive Marketing feedback |
A little network action | Positive Marketing feedback |
UI | Positive Marketing feedback |
Good Taste | Positive Marketing feedback |
Paragraph of review | Opinion expressed |
From their website | Negative Marketing feedback |
Licensed by The israeli Ministry of Denfese | Negative Marketing feedback |
Real Company or Part Time hobby | Negative Marketing feedback |
16.000 bit authentication | Negative Marketing feedback |
DH 256 | Negative Marketing feedback |
Downad & Installation! | Neutral Marketing feedback |
Cracking it <10 | Negative Marketing feedback |
Marketing BS101 | Negative Marketing feedback |
Cool video stuff | Negative Marketing feedback |
Paragraph of review | Opinion expressed |
From their website | Neutral Marketing feedback |
A little background about cellcrypt | Negative Marketing feedback |
Master of Marketing | Negative Marketing feedback |
Secure Voice calling | Negative Marketing feedback |
Who's buying their wares | Negative Marketing feedback |
Downad & Installation! | Neutral Marketing feedback |
My Demo environment | Negative Marketing feedback |
Did they forget some code | Negative Marketing feedback |
Cracking it <5 | Negative Marketing feedback |
Room Monitoring w/ FlexiSpy | Negative Marketing feedback |
Cellcrypt unique features.. | Negative Marketing feedback |
Plain old interception | Negative Marketing feedback |
The Haters out there | Negative Marketing feedback |
Now it's clear that from their point of view on PhoneCrypt there is no single bad point while the other are always described in a negative way.
No single good point. Strange?
All those considerations along with the next ones really let me think that's very probably a marketing review and not an independent review.
SecurStar GmbH is known to have used in past marketing activity leveraging this kind of “technical speculations”, abusing of partial information and fake unconfirmed hacking stuff to make marketing/media coverage.
Imho a rare mix of unfairness in leveraging the difficult for people to really understand the complexity of security and cryptography.
They already used in past Marketing activities like the one about creating a trojan for Windows Mobile and saying that their software is secure from the trojan that they wrote.
Read about their marketing tricks of 2007
They developed a Trojan (RexSpy) for Windows Mobile, made a demonstration capability of the trojan and later on told that they included “Anti-Trojan” capability to their PhoneCrypt software.They never released informations on that trojan, not even proved that it exists.
The researcher Collin Mulliner told at that time that it sounds like a marketing tips (also because he was not able to get from SecurStar CEO Hafner any information about that trojan):
Now, let's try to make some logical reassignment.
It's part of the way they do marketing, an very unfriendly and unpolite approach with customers, journalist and users trying to provide wrong security concepts for a market advantage. Being sure that who read don't have all the skills to do in depth security evaluation and find the truth behind their marketing trips.
It sounds like a camouflage of a fake identity required to have an “independent hacker” that make an “independent review” that is more strong on reputation building.
Read about his bio:
There are no information about this guy on google.
Almost any hacker that get public have articles online, post in mailing archive and/or forum or some result of their activity.
For notrax, nothing is available.
Additionally let's look at the domain…
The domain infosecurityguard.com is privacy protected by domainsbyproxy to prevent understanding who is the owner.
The domain has been created 2 months ago on 01-Dec-09 on godaddy.com registrar.
What's also very interesting to notice that this “unknown hacker with no trace on google about him that appeared on December 2009 on the net” is referred on SecurStar GmbH Press Release as a “An IT security expert”.
Am i following my own conspiracy thinking or maybe there's some reasonable doubt that everything was arrange in that funny way just for a marketing activity?
If you are a security company you job have also a social aspects, you should also work to make the world a better place (sure to make business but “not being evil”). You cannot cheat the skills of the end users in evaluating security making fake misleading information.
You should do awareness on end users, to make them more conscious of security issues, giving them the tools to understand and decide themselves.
Hope you had fun reading this article and you made your own consideration about this.
Fabio Pietrosanti (naif)
ps Those are my personal professional opinion, let's speak about technology and security, not marketing.
pps i am not that smart in web writing, so sorry for how the text is formatted and how the flow of the article is unstructured!