RFC 6189: ZRTP конечно стана стандард!

Конечно ZRTP е доделен официјална RFC задача, RFC6189 ZRTP: патеката на медиумите Клучни договор за Unicast безбедна RTP.

Тоа беше како зависноста на SRTP со AES клуч големината на 256bit дека сега е дефинирана како RFC6188 .

Тоа е возбудливо да се види на RFC конечно ослободен, бидејќи тоа е важен чекор за да го поставите ZRTP како официјален стандард за крај-до-крај енкрипција многу како PGP е за пораки.

Сега секоја организација во светот ќе биде официјално можност да се спроведе ZRTP за крај-до-крај протокол кодирање на гласот

Во моментов 3 различни јавни употреби на ZRTP протокол постои:

Секој од нив обезбедуваат различни функции на протоколот, но најважно од се знае дека се компатибилни.

Новиот бран доаѓа на кодирање на гласот светот, irrupting во сива зона каде што повеќето од компаниите прават телефон енкрипција системи ги спроведува за криптирање.

Сега стандард е поставување и има неколку причини лево кон спроведување на нешто друго.

Hurra г. Цимерман и сите во заедницата на компании (како PrivateWave ) и физички лица (како Вернер Dittmann ) кои работеа на неа!

Денес е голем ден, како вид на технологија, сега е официјална и со повеќе постојни имплементација!

Филип, го правеше повторно, мојата комплименти на вашиот чист дух и утврдување:-)

Напредок за GSM пукање во Фрајбург универзитет

Возбудлив светот на мобилни протоколи (GSM, GSM-R, ТЕТРА, UMTS, итн) хакирањето е добивање на официјален истражувачки активности надвор од универзитетите.

Оваа инвестиција да се направи Свет код изданија на напукнување софтвер дава можност за студентите на универзитетот да работат на тоа, да го подобруваат и да прават силна истражување.

На Универзитетот во Фрајбург само го објави документот Практична вежба на GSM Енкрипција A5 / 1 заедно со gsmframencoder поддршка алатка за подобрување на душкаат, декодирање и процесот на пукање.

Отворање на хардвер, отворање на софтвер, отворање протокол покаже слабоста на било каков вид на комерцијален метод или процес за да се изгради-up комуникација и безбедносни технологии.

Тоа треба да биде цел на секој научници да се обиде да се отвори-up и да ја спречат било каков вид на сопственички и затворена технологија за да ја принуди на индустријата да се оди само со интероперабилни и отворен пристап при дизајнирање телекомуникациски протоколи.

Мои задачи излез јазли искуство се обидува да ги филтрираат бучна сообраќај

Почетокот на оваа година решив дека е време да се кандидира на работните задачи излез јазли, па јас донесе VPS во hetzner.de (затоа што тие се наведени како добар задачи интернет провајдер ) и подесување на излезот јазол со прекар privacyresearch.infosecurity.ch со 100Mbit / и поврзување за прв 1TB за месечни податоци, тогаш 10MBit / станот.

Таа, исто така се кандидира TOR2WEB софтвер на http://tor.infosecurity.ch .

Јас подесување на излезот политика како што е предложено од страна на водење излез јазли со минимални малтретирање и подготовка на злоупотреба одговор дефиниција .

Во првиот ден јас сум бил работи на јазол добив веднаш DMCA жалат поради peer-to-peer сообраќај.

Па решив да ги филтрираат надвор некои P2P сообраќај со употреба на OpenDPI iptables модул и DMCA жалат автоматски исчезна:

iptables -А ИЗЛЕЗ -М opendpi -edonkey -gadugadu -fasttrack -gnutella -directconnect -bittorrent -winmx -soulseek-j отфрламе

Потоа, бидејќи јас сум италијански, решив да се избегне моите задачи јазол да се поврзете со италијански интернет просторот за адреси со цел да се намали можноста дека глупав обвинител ќе ми се разбудам во утрото, бидејќи не можеше да сфати дека јас сум за извршување на работните задачи јазол.

Се обидов, со помош на hellais дека напишал писмо да се направи Егзит политика ја отфрли изјавата , да ги отфрли сите италијански netblocks врз основа на ioerror е blockfinder но ние откривме дека torrc конфигурација датотеки со 1000 линии е правење задачи несреќата.

Отидовме да се отвори билет да го пријавите на несреќата за нашиот обид да го блокира излезот задачи политика по земја и се најде сличен обид , каде што придонесе, но сепак се чини да се биде на отворено прашање.

Заклучокот е дека тоа не е можно да се направи Земја Егзит Политика за задачи излез јазли во чиста и љубезен начин, па решив да одам валкани начин со користење на iptables / GeoIP . По борбите за да го собере правилно, тоа беше една линија на iptables да го блокираат сообраќајот случува во Италија:

iptables -А ИЗЛЕЗ-P TCP -М државни -state НОВИ -М GeoIP -dst КК ИТ-j отфрламе

Сега од мојот излез јазли никаква врска со италијански мрежи ќе се направи и јас сум сигурен против можеби глупаво обвинителите не разбирање на работните задачи (имам исклучок за сите задачи јазол IP адреса се применува пред).

По некои други денови, јас почнав да добијат жали поради portscan активности потекнува од мојот Tor јазли.

Од моето гледиште сакам да ја поддржам анонимност мрежа, а не анонимен хакерските упади и така сакам да ги филтрираат надвор portscan и напади од кои потекнуваат од мојот node.That е комплексна материја која бара некои студирање, па во меѓувреме ќе се инсталира scanlogd и шмрка затоа што сакам да се оцени колку напади, каков вид на напади се излегува од моите задачи излез јазли.
Подоцна ќе се обидам да се организира некој вид на филтрирање со цел да бидат сигурни дека да се биде во можност да ги филтрираат големи напади.
За што се поврзани со portscan се чини дека не постојат јавни алатки за да се открие и да ги филтрираат заминување portscan но само да се филтрира дојдовни portscan па веројатно ќе треба да напишете нешто ад-хок.
Јас ќе се однесуваат како се одвиваат работите и дали ќе има некој убав начин да се спроведе во Lightwave начин пухтене-РЕГИСТРАЦИЈА селективно филтер-од голем напад обид потекло од мојот излез јазли.

Мојата цел е да се задржи на излез јазол трчање во долгорочни (барем 1TB за сообраќај по месеци донирани на работните задачи), намалување на напорите поврзани со интернет провајдерите се жалат и се обидува да дадам се од себе да се кандидира на излез јазли со разумен одговорност.

ТЕТРА хакирање доаѓа: OsmocomTETRA

Тоа е многу возбудливо да се види ослободување на OsmocomTETRA , првиот Свет СПВ ( софтвер дефинирани радио ) имплементација на ТЕТРА demodulator, Филозофски и пониски MAC слоеви.

Тоа е ТЕТРА верзија на GSM airprobe дека отклучите пристап до податоци и рамката на ТЕТРА комуникациски протокол, давајќи големи хакирањето можност!

Сега, исто така, ТЕТРА технологија е отворена треба да се очекува во текот на оваа 2011 година, за да ја видите Свет ТЕТРА sniffers, а најверојатно, исто така, ЧАЈ енкрипција (на Тетра енкрипција алгоритам) испукани!

ТЕТРА се користи од страна на полицијата, службите за итна помош и војски како алтернатива мобилна комуникациска мрежа која може да работи дури и без достапноста на мрежна покриеност (само мобилен-кон-мобилен, без базна станица) и да се обезбеди некои посебни висока достапност услуги.

Напишав за ТЕТРА во мојот слајд мајор Гласот безбедносен протокол за преглед .

Во OsmocomBB мејлинг-листи имаше веќе дискусии за некои ТЕТРА мрежа статус:

  • Белгија Полицијата ТЕТРА Астрид мрежа: енкриптирани
  • Германската полиција тест ТЕТРА мрежа во Ахен: енкриптирани
  • Некои поранешни jugoslawia ТЕТРА мрежа: енкриптирани
  • Холандија C200 ТЕТРА мрежа: TEA2 криптирани со статична клучеви
  • Велика Британија Airwave ТЕТРА мрежа: TEA2 криптирани со TEA2

Тоа ќе биде навистина забавно да се види дека новите полициски и спасувачки хакирање враќаат од старите аналогни векови на новата дигитална радио:-)

Владата 2.0, за отворени податоци и 'Викиликс'

Концептите зад Викиликс, OpenLeaks, GlobalLeaks, BalkanLeaks е многу повеќе од само откривање на тајните на јавноста.

Тоа е дел од револуцијата со која доаѓа во владината организација, транспарентност и соработка со т.н. "веб 2.0 / вики" соработка системи.

Имаат на ум на оние Владата 2.0 - Воведување на Анке Domscheit Берг, Програмата Иновативни Владата води на Microsoft Германија и сопругата на Даниел Берг, ко-основачот на Викиликс и сега основач на OpenLeaks .

Имаат на ум на отворени податоци влада 2.0 иницијатива за спроведување на транспарентност на власта, намалување на корупцијата и подобрување на перформансите на организација на власта.

Револуцијата, тоа е нешто повеќе од една група на anarco-слободарски фанки момци кои сакаат да се создаде хаос со ширење на тајни, тоа е само почеток на брзање да се постигне нов организациски модел на владите од проширува целосна транспарентност и силна соработка со граѓаните.

ZORG, нови C ++ и Java ZRTP спроведување јавна порака

Здраво на сите, денес во PrivateWave Italia SpA, италијанската компанија се ангажирани во развојот на технологии за заштита на приватноста и безбедноста на информациите во гласот на телекомуникациите, каде што сум CTO, ние порака ZORG, нов софтвер со отворен код ZRTP Имплементацијата на протоколот достапна за преземање од http: // www. zrtp.org .

ZRTP [1] предвидува крај-до-крај размена на клучеви со елиптична крива Diffie-Hellmann 384bit и AES-256 SRTP енкрипција.

ZORG е првично развиени и имплементирани во PrivateGSM кодирање на гласот производи достапни за следните платформи PrivateWave е: Blackberry, Нокиа и IOS (iPhone).

Zorg C ++ е интегриран со PJSIP софтвер со отворен код на VoIP [2] пакети и тоа е услов за интеграцијата печ против PJSIP 1.8.5. Тоа е тестиран на iPhone, Symbian, Windows, Linux и Mac OS X.

Zorg Јава е интегриран во рамките на сопствени верзија на MJSIP [3] софтвер со отворен код пакети на Blackberry платформа и вклучува употребата на меморијата оптимизации се бара да се намали на минимум ѓубре колектор активност.

И двете платформи да ги раздели и модуларен криптографски назад-завршува така што спроведувањето на криптографски алгоритми лесно би можеле да бидат заменети со други.

. ZORG се лиценцирани според лиценцата на GNU AGPL и изворниот код е достапен на github на https://github.com/privatewave/ZORG .

Ние сме тоа ослободување под софтвер со отворен код и во кохерентност со нашиот пристап кон безбедноста [4] како што ние навистина се надевам дека тоа може да биде корисно за софтвер со отворен код екосистем за креирање на нови кодирање на гласот системи за поддршка на слободата на говорот.

Повеќе од 20 pjsip базирани на софтвер со отворен код на VoIP софтвер за енкрипција и неколку напишани во Јава директно може да имаат корист од ZORG ослободување.

Ние ќе бидеме среќни да добијат предлог на соработка, нова интеграција, нови криптографски назад-завршува, бубачки извидници и што и корисно да се подобрат и да ZRTP афирмира како глас енкрипција стандард.

Zorg е достапна од http://www.zrtp.org .

[1] ZRTP: http://en.wikipedia.org/wiki/ZRTP
[2] PJSIP: http://www.pjsip.org
[3] MJSIP: http://www.mjsip.org
[4] безбедност пристап: http://www.privatewave.com/security/approch.html

Шифрирана мобилни на фиксни телефонски повици со ѕвездичка 1.8

Ние само објави техничките Упатство за како да се изгради Препорачана од мобилен на фиксен VoIP инфраструктура со:

Во следните недели други HOWTO како овој ќе излезе со користење на друг сервер платформи како што се FreeSWITCH, сите во духот на транспарентноста и потпора на Свет безбедносни технологии.

Осум епски Неуспехот на регулирање на криптографија

А многу просветлувачка статија на осум епски неуспех на регулирање Криптографија и заеднички недоразбирање од страна на владините регулатори, кои не имаат широк поглед на тоа како технологијата работи.

Неуки владините регулатори не сфати дека строга регулатива ќе ги имаат следните недостатоци:

  1. Тоа ќе создаде ризик за безбедноста
  2. Тоа нема да запре на лошите момци
  3. Тоа ќе им наштети на иновации
  4. Тоа ќе им наштети на американската бизнис
  5. Тоа ќе чини потрошувачите
  6. Тоа ќе биде неуставен
  7. Тоа ќе биде огромен трошок на даночните долари

PrivateGSM: Blackberry / iPhone / Нокиа мобилни кодирање на гласот со ZRTP или SRTP / SDES

Јас апсолутно се избегне да го користам мојот личен блог да се направи промоција на било каков вид на производ.

Тоа време тоа не е различен, но јас сакам да ти кажам факти за производи кои ги работам без фенси маркетинг, но остануваат технички.

Денес, на PrivateWave каде што сум CTO и ко-основач , ние објавен јавно мобилни VoIP енкрипција производи за Blackberry, iPhone и Nokia:

  • На 1-ви некогаш Blackberry шифрирана VoIP со ZRTP - PrivateGSM VoIP Професионална
  • На 1-ви некогаш iPhone шифрирана VoIP со ZRTP - PrivateGSM VoIP Професионална
  • На 1-ви некогаш Blackberry шифрирана VoIP клиент со SRTP со SDES клучните размена преку СИП / TLS - PrivateGSM VoIP претпријатие

logo-privatewave-colore.png

Во PrivateWave ние ги користиме на различен пристап во однос на повеќето кодирање на гласот компанија таму, прочитајте ги нашите пристап кон безбедноста .

Релевантноста на оваа производи во технологијата и индустријата пејсаж може да се сумираат како што следи:

  • Тоа е првиот кодирање на гласот компанија со користење само на стандардите за безбедност протоколи (и очекуваме на пазарот ќе реагира, бидејќи е јасно дека комерцијален технологија доаѓа од наследството на ЦДХВ не може да обезбеди иста вредност)
  • Тоа е првиот пристап кодирање на гласот да се користи само со отворен код и стандард за енкрипција мотор
  • Тоа е првиот кодирање на гласот пристап кон обезбеди на различни безбедносни модел со користење на различни технологии (на крај-до-крај за ZRTP и крај-до-сајт за SRTP )

Оние пакет на мобилен безбедна клиенти, наменета за професионални безбедносни употреба само со користење на најдобрите телекомуникациски и безбедносни технологии, да обезбеди висок степен на заштита, заедно со добри перформанси и во лошо мрежа услови:

На апликации се:

icona-pgsm.png

Поддржани мобилни уреди се:

Во врска ZRTP решивме да се нагласи и да ја истегнете сите безбедносни и параноично карактеристика на протоколот со некои мали прилог:

Нашите строги адресар интеграција, оди подалеку од ZRTP RFC спецификација, кои можат да бидат подложни на одредени напади кога се користи на мобилни телефони, бидејќи на однесување на корисниците на да не гледа во мобилниот екранот.

Нашите paranoy начин на користење на ZRTP намалат таквите услови, ние ќе пишувам за ова подоцна и / или ќе додадете специфични детали за RFC инклузија.

Некои зборови за PrivateGSM Професионална со крај-до-крај енкрипција со ZRTP

Прочитајте технички лист таму!

За да ја преземете кликнете овде и само стави вашиот телефонски број

Тоа се резултатите од напорната работа на сите мои многу квалификувани вработени (16 лица работеа на 6 проекти за 3 различни платформи) за предизвикувачки технологии (кодирање на гласот) во тешка работа на животната средина (валкани мобилните мрежи и валкани мобилни оперативни системи) за повеќе од 2 години.

Многу сум горд на нашите вработени!

Што е следно?

Во следните недели ќе видите ослободување на голем сет на документација, како што се интеграција со звезди, freeswitch и други безбедносни Овозможено PBX, заедно со некои возбудливи други безбедносни технологија вести дека јас сум сигурен дека ќе бидат забележани;)

Тоа беше напорна работа и многу повеќе треба да се направи, но јас сум убеден дека безбедноста и Свет заедница ќе им се допадне на овие производи и нашите транспарентен пристап, исто така, со отворени важни за јавноста и софтвер со отворен код интеграција што го прават многу политички неутрални (задна врата бесплатно) технологија .

A couple of nice VPN provider

There are a lot of reason why one would need to access internet trough a VPN.

For example if you live in a country blocking certain contents (like anti-local-government website, porn, etc) and/or protocols (like skype, voip) you would probably want to move your internet connectivity outside the nasty blocking country by using encrypted VPN tunnels.

I evaluated several hosted VPN server and a couple of them sounds quite good among the widespread offering of such services:

SwissVPN

Exit to the internet from Switzerland.

Cost 6 CHF / months

Optional public fixed IP address

Useful if you need:

  • Just bypass local country filters with good high bandwidth
  • Expose public services trough the VPN with the optional fixed public IP address.

Overplay

Exit to the internet by choosing among 20 different countries (each time you connect).

Useful if you need to do:

  • business intelligence on competitor (appearing to come from country X when connecting them)
  • see film/telefilm allowed only from national IP web spaces
  • see google results among different countries

Not every elliptic curve is the same: trough on ECC security

My own ECC curve security and selection analysis

vn9jna1BdgrzDCYNBJHi09q09q.jpg

Most modern crypto use Elliptic Curve Cryptographic (ECC) that, with a smaller key size and reduce computation power, give equivalent security strength of traditional crypto system known as DH (Diffie-Hellman) or RSA ( Rivest, Shamir and Adleman ) .

Not everyone knows that ECC encryption is selected for any future encryption applications and that even TLS/SSL (encryption used for securing the web) is moving to ECC.

I found plenty of so called “proprietary encryption products” which abandoned RSA and DH to goes with ECC alternatives, that tend to arbitrary use ECC bit key size without even specifying which kind of ECC crypto get used.

However there is a lot of confusion around Elliptic Curves, with a lot of different names and key size making difficult for a non-cryptographically-experienced-user to make your own figure when evaluating some crypto stuff.

Because of so diffused confusion i decided to make my own analysis to find out which are the best ECC encryption curves and right ECC key size to use.

This analysis would like to provide a security industry based choice among various curves and key sizes, leaving the mathematical and crypto analytical considerations that has been already been done during the years, summarizing the various choices taken in several standards and security protocols.

First the conclusion.

From my analysis only the following ECC curves are to be considered for use in encryption systems because are the only one selected among different authorities (ANSI, NSA, SAG, NIST, ECC BrainPool), different security protocol standards (IPSec, OpenPGP, ZRTP, Kerberos, SSL/TLS) and the only one matching NSA Suite B security requirements (de-facto standard also for NATO military environment):

  • Elliptic Prime Curve 256 bit – P-256
  • Elliptic Prime Curve 384 bit – P-384

with optional, just for really paranoid that want to get more key size bit, still not considered useful:

  • Elliptic Prime Curve 521 bit – P-521

I would like to state that Koblitz curves should be avoided , in any key size (163 / 283 / 409 / 571) as they does not have enough warranty on crypto analytic activity and effectively they are:

  • Not part of NSA Suite-B cryptography selection
  • Not part of ECC Brainpool selection
  • Not part of ANSI X9.62 selection
  • Not part of OpenPGP ECC extension selection
  • Not part of Kerberos extension for ECC curve selection

I invite the reader to follow trough my analysis to understand the fundamentals that could be understood even without deep technical background but at least with a good technological background a some basic bit of cryptography.

Here we go with the analysis
 

My goal is to make an analysis on what/how the open scientific and security community choose ECC crypto system for usage in security protocols and standards defined by IETF RFC (the ones who define Internet Standards in a open and peer-reviewed way).

Below a set of RFC introducing ECC into existing system that get analyzed to understand what's better to use and what's better to exclude:

  • RFC5639 : ECC Brainpool Standard Curves & Curve Generation
  • RFC4869 : NSA Suite B Cryptographic Suites for IPsec
  • RFC5430 : NSA Suite B profile for Transport Layer Security (TLS)
  • RFC5008 : NSA Suite B in in Secure/Multipurpose Internet Mail Extensions (S/MIME)
  • RFC3766 : Determining Strengths For Public Keys Used For Exchanging Symmetric Keys
  • RFC5349 : Elliptic Curve Cryptography (ECC) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT)
  • RFC4492 : Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)
  • ZRTP voice encryption by Philip Zimmermann ECC curve
  • ECC in OpenPGP (draft d raft-jivsov-openpgp-ecc-06 )
  • ECC Curves selected by Microsoft for Smartcard Kerberos login

We will use the choice made by scientist defining Internet Security Protocols to make part of our evaluation.
Additionally it must be understood that the Curve selection comes from different authorities that made their own selection of Curves in order to tell to the industry what to use and what to skip:

We will use the choice made by scientist defining security requirements in the standardization agencies to make part of our evaluation.
Additionally, something that most people does not know, but that it's extremely relevant to our analysis, is that there are different kind of ECC curve cryptography and their “size” it's different depending on the kind of curve:

  • ECC Curves over Prime Field (often referred as Elliptic Curve and represented by P-keysize )
  • ECC Curves over Binary Field (often referred as Koblitz Curve and represented by K-keysize )

Given a security strength equivalence the Elliptic Curve and the Kobliz Curve have different key size, for example when we read ECC 571 we are referring to Koblitz Curve with an equivalent strength to ECC 521 Prime curve.

A comparison of strength between Elliptic Curves and Kotbliz Curves is reported below (from Mikey ECC internet Draft ):

| Koblitz | ECC | DH/DSA/RSA
| 163 | 192 | 1024
| 283 | 256 | 3072
| 409 | 384 | 7680
| 571 | 521 | 15360

Below there's a comparison of all selected curves by all the various entities and their respective name (from IETF RFC4492 for ECC usage for TLS ) :

Curve names chosen by different standards organizations
------------+---------------+-------------
SECG | ANSI X9.62 | NIST
------------+---------------+-------------
sect163k1 | | NIST K-163
sect163r1 | |
sect163r2 | | NIST B-163
sect193r1 | |
sect193r2 | |
sect233k1 | | NIST K-233
sect233r1 | | NIST B-233
sect239k1 | |
sect283k1 | | NIST K-283
sect283r1 | | NIST B-283
sect409k1 | | NIST K-409
sect409r1 | | NIST B-409
sect571k1 | | NIST K-571
sect571r1 | | NIST B-571
secp160k1 | |
secp160r1 | |
secp160r2 | |
secp192k1 | |
secp192r1 | prime192v1 | NIST P-192
secp224k1 | |
secp224r1 | | NIST P-224
secp256k1 | |
secp256r1 | prime256v1 | NIST P-256
secp384r1 | | NIST P-384
secp521r1 | | NIST P-521
------------+---------------+-------------

What immediately appear is that there are only two curves selected by all authorities, and that there is a general dumping of koblitz curves by ANSI.The only commonly agreed among the 3 authorities are the following two ECC curve:

  • secp192r1 / prime192v1 / NIST P-192
  • secp256r1 / prime256v1 / NIST P-256

Of those selection of ECC curve for TLS the RFC5430 skipped completely koblitz curves and selected for usage only:

  • P-256, P-384, P-521

The ECC Brainpool skipped completely Koblitz curves and selected for usage the following ECC Curves:

  • P-160, P-192, P-224, P-256, P-320, P-384, P-512 ( that's the only particular because it's not P-521 but P-512, the only key-size referred by ECC brainpool. Tnx Ian Simons from Athena SCS )

The OpenPGP internet draft for ECC usage in PGP d raft-jivsov-openpgp-ecc-06 skipped completely Koblitz curves and selected the following ECC curves

  • P-256, P-384, P-521

The Kerberos protocol extension for ECC use, defined in RFC5349 and defined by Microsoft for smartcard logon skipped completely Koblitz curves and selected the following ECC curves:

  • P-256, P-384, P-521

So, sounds clear that the right selection of ECC is for P-256, P-384 and P-521 while the Koblitz curve have been skipped for Top Secret use and for any security sensitive protocol (IPSec, OpenPGP, ZRTP, Kerberos, SSL/TLS).

Why i made this analysis?

I have done this analysis following a discussion i had regarding certain voice encryption products, all based on custom and proprietary protocols, that are all using Elliptic Curve Diffie Hellman 571 bit / ECDH 571 / 571-bit ECDH / Koblitz 571 bits .
All them are using the K-571 that, as described before, has been removed from all security sensitive environment and protocols and being myself a designer of voice encryption stuff i think that their cryptographic choice is absolutely not the best security choice.
Probably it has been done just for marketing purpose, because K-571 (Koblitz curve) seems stronger than P-521 (Elliptic curve based on Prime number). If you have “more bit” your marketing guys can claim to be “more secure”. Koblitz elliptic curve are faster than the top secret enabled prime elliptic curve and so give the product manager a chance to provide “more bit” in it's own product while keeping the key exchange fast.

It's a matter of philosophical choice.

I prefer to follow the trend of scientific community with the humility of not to considering myself a cryptographic expert, knowledgable more than the overall security and scientific community itself.

I prefer instead to use only algorithms that are approved for use in highly sensitive environments (top secret classification), that have been selected by all the authorities and working group analyzing encryption algorithms existing out-there and that represent the choice of almost all standard security protocols (IPSec, OpenPGP, ZRTP, Kerberos, SSL/TLS, etc).
I prefer to count the amount of brains working on the crypto i use, that check that's really secure, that evaluate whether there's some weakness.

The number of brais working on Crypto widely diffused are of order of magnitude more than the number of brains working on crypto used by just few people (like Koblitz curve).
So i am not demonizing who use ECDH 571 using Koblitz Curve, but for sure i can affirm that they did not taken the best choice in terms of security and that any security professionals doing a security benchmarking would consider the fact that Elliptic Curve Diffie Hellman 571 bit done with Koblitz Curve is not widely diffused, it's dumped from standard security protocols and it's not certified for top secret use.

Essor, Европската сигурен софтвер дефинирани радио (СПВ)

I had a look at European Defense Agency website and found the ESSOR project, a working project funded for 106mln EUR to develop strategic defense communication products based on new Software Defined Radio approach.

SDR approach is a revolutionary system that's completely changing the way scientist and industry is approach any kind of wireless technology.

Во суштина, наместо на горење хардвер чип кој ги спроведе повеќето од радиофреквенцискиот протоколи и техники, тие се доведени во "софтвер" за радио специјализирани хардвер кој може да работи на многу различни фреквенции, во својство на радио интерфејс за голем број на различни радио протоколи.

На пример, USRP (универзален софтвер радио Периферни) од Ettus истражувања , кои чинат 1000-2000USD целосно натоварен, преку Свет GnuRadio рамка, видовме Свет имплементација на:

И многу повеќе протоколи и пренос на технологии.

Овој вид на нов пристап за радио пренос систем е destinated да го промени начинот на радио систем се спроведува, даваат нови можности како на пример да се надополни "радио самиот протокол" во софтвер, со цел да се обезбеди "радио протокол" подобрувања.

Во кратки рокови ние сме, исто така, се гледа многу силни безбедносни истражувања со користење на СПВ технологии како што се GSM пукање и Bluetooth душкаат .

Можеме да очекуваме дека други технологии, слаба страна на дизајнот, но заштитена од ограничувањето на хардверски уреди да се пробие на ниско ниво протоколи, ќе бидат наскоро се пробиени. Во првата листа Јас навистина би сакале да го видите хакирање на ТЕТРА, технологија родени со затворени начин на размислување и тајни енкрипција алгоритми, нешто што навистина не им се допаѓаат;-)

Производ за управување и организација

Морав да се разбере подобро на концепти, улогите и обврските поврзани со управување на производот и производ маркетинг менаџмент во софтверски компании, зошто се потребни, кои се разликите и како тие се вклопуваат во внатрешноста на организационата структура.

Повеќето лице знам никогаш заинтересирани во оваа специфична област на работа, но кога ќе сакате да биде производ на компанијата (а не консултантска компанија или решение), ќе почнете да има различни производи на различни платформи за различни целни клиенти се продаваат преку различни канали со различни цените со инсталација / различни испорака процес и дека комплексноста мора да се управува во соодветен начин.

Сфаќате дека, со цел да ги споделите со производот на компанијата расте во вистинската насока треба да се организираат активности за управување со производи, формално, не затворање вашиот ум во крути организација улоги, како што е маркетинг, продажба, R & D.

Кога станува збор за производи Менаџмент јас препорачувам читање на возвишеното Стратешката улога на производи Менаџмент (Како пазарно-управувано фокус води компании за изградба на производи луѓе сакаат да купат), кои се разјаснат многу работи, дури и ако тоа перспектива нето поделба на улоги во управување со производи, нешто т шапка е премногу тешка за мала компанија како стартување.

Сепак тоа се обезбеди диференцијација на обврските помеѓу производ на управување и маркетинг на производи.

А добро разбирање на управување со производи поврзани со стартување з s дадени во член Креирање производи Менаџмент на стартување појавува различен случај, поврзан со улогите на производот визионерски во компанијата.

It introduce the terms ceo of the product in the sense that the product management duties jump around into the various organization function by providing focus and effort where it's needed, independently from the fact that the internal function requiring more effort is Development, Marketing, Sales or Communication. That's means practically enhancing the product vision as it's needed across all major product-related functions making the vision corporate-wide coherent.

A good representation of product management and product marketing activities is well described with the differentiation of between Strategical, Technical and Marketing sector and is not clearly separated between Management, Marketing(and Sales) and R&D :

Triad.jpg

I read that product manager background and knowledge are different depending on the company focus ( where does product management belong in the organization? ):

  • B2C -> Marketing experience
  • B2B -> Technical experience

An illuminating (for me) and very important differentiation regarding product management duties is the differentiation between:

  • Product Management
  • Product Marketing

The specific duties belonging to Product Marketing vs Management are greatly explained in Role Definitions For Product Management and Product Marketing that i suggest to read, letting you to better define tasks and responsibilities across your organization. It also provide a good definition of job requirements if you need to look for that figure!

At the same time it's important to understand what's NOT product management, effectively Product management is not just feature prioritization .

At the same time it's important to understand which professional figure is NOT itself a product manager:

  • Product manager is not a marketing manager – while product management is usually seen as a marketing discipline, marketers are focused on the marketing plan and are usually not driving the overall product direction. In that context could however be found Product marketing manager that's the arms of the marketing of the product, especially in small organization.
  • Product manager is not a sales manager – sales manager are about finding out how to sell a product, following which sales methodology, technique and channels and they could drive the company from a market oriented company ( product) to a customer oriented company (solution and consulting)
  • Product manager is not a developer – Developers are focused on the technology and not the overall product. Some great product managers are former developers, but it is difficult to do both at once. There is a natural tension between developers and product managers that should be maintained to create a balanced product.
  • Product manager is not a software manager – the software manager is a functional manager and usually not focused on the product or the customers.
  • Product manager is not a project manager – project managers are about how and when, while the product manager is about what. Project managers work closely with product managers to ensure successful completion of different phases in the product life cycle.

The typical product management activities could be in extreme synthesis summarized as follow:

  • Strategy: Planning a product strategy
  • Technical: leading product developments
  • Marketing: providing product and technical content
  • Sales: provide pre sales support and work effectively with sales

Product management so it's not precisely development, is not precisely marketing, it's not precisely sales, so typically it's difficult to identify “where it should stay” inside the organization structure (it's even difficult to understand that's needed)?

The Silicon Valley Product Group provide a nice insight on Product Organization Structure by pointing out which are the advantages and risks of several choices. Still the Cranky Product Manager say that It doesn't matter where the product manager live in the organization .

It's relevant to be careful not to have persons that are too much technical or too much sales oriented in order to fill the gap among different organization. Too much fragmentation of assigned duties across the organization may lead to bureaucracy, too much duties on one person may lead to ineffective implementation of needed tasks in some area and to a internal competition perception respect to the traditional roles.

Check there a very nice Resume of a professional with practical experience in product management (it's an half techie/half marketing guys).

Ah! Another very common misunderstanding is to confuse marketing with communication where ai found a so good definition of Marketing that i really like and understand for strict relationship with Product Management:

Marketing is know the market so well that the product sell itself

But what happen when you don't handle a product management and product marketing management process in a defined way?

A nice story is shown as example in The strategic role of Product Management :

Your founder, a brilliant technician, started the company years ago when he quit his day job to market his idea full time. He created a product that he just knew other people needed. And he was right. Pretty soon he delivered enough of the product and hired his best friend from college as VP of Sales. And the company grew. But before long, the VP of Sales complained, “We're an engineering-led company. We need to become customer-driven.” And that sounded fine. Except… every new contract seemed to require custom work. You signed a dozen clients in a dozen market segments and the latest customer's voice always dominated the product plans. You concluded that “customer-driven” meant “driven by the latest customer” and that couldn't be right.

If you want to be a product company it's relevant to precisely follow a strategy driven by product marketing and management and not by sales.

Confusion between duties of product management/marketing and sales could lead to unsuccessful product company that are not able to proceed within their strategy, simply because they getting opportunities that drive the business out-of-scope.

A product company must invest in it's own product development and marketing in order to let sales activity stay focused and guarantee that the organization is every day more effective on the market.

After this reading, my understanding is that it's relevant to identify how to create a set of flexible business process on how to handle various product management and product marketing duties separating them from sales.

Далечински зграпчување snom VoIP телефони

Предлагам читање од далечина прислушување VoIP телефони "на VoIP безбедност Алијансата Блог од Шон Merdinger .

Конкретен пример за тоа како сегашните телефонија инфраструктура се добива се повеќе ранливи на сајбер нападите.

Говорна комуникација безбедност работилница

Здраво,

Направив се зборува за говорна комуникација безбедносни технологии на Универзитетот во Тренто следниве интересна размена на информации со Крипто лабораторија успеа професор Масимилијано сала .

Јас Ви предлагам заинтересирани луѓе да го прочита, особено во вториот дел, како што е иновативна категоризација на различни кодирање на гласот технологии кои се користат во неколку сектори.

Се обидов да се објасни и да се извлече од ова во голема мера фрагментирани технолошки сектор преку обезбедување на широк преглед на технологии кои обично се апсолутно неповрзани една секој-друг, но практично сите тие се однесуваат на кодирање на гласот по категоризација:

  • Мобилни TLC индустрија кодирање на гласот стандарди
  • Владини и воени кодирање на гласот стандарди
  • Јавната безбедност стандарди кодирање на гласот
  • IETF кодирање на гласот стандарди
  • Разно комерцијален кодирање на гласот технологија

Тоа е огромен slideware, 122 слајдови, јас предлагам да оди читање на 2. дел скокнеш следење технологии преглед опфатени со мојата презентација на 2009 година.

Говорна комуникација безбедност


Прикажи повеќе презентации од Фабио Pietrosanti .

Особено ми се допаѓа концептот на чоколадо одделение енкрипција кои сакаат да се обезбедат некои иновации на концептот змија нафта за енкрипција.

Но, јас треба да се добие повеќе во длабочина за чоколадо одделение енкрипција контекст, веројатно ќе се направи пред крајот на годината со обезбедување на применети разбира на разбирање и оценување на практично вистинската безбедносниот контекст на различни кодирање на гласот технологија.

27C3 - CCC Конгресот ОПР: Доаѓаме во мир

Доаѓаме во мир

189322778_8cb9af1365_m.jpg

Доаѓаме во мир, се вели во завоеватели на Новиот свет.

Доаѓаме во мир, вели дека владата, кога станува збор за колонизирање, се регулира и милитаризира нови дигиталниот свет.

Доаѓаме во мир, велат нација-држава со големина на компании кои имаат намера да monetise мрежата и синџирот на корисници на комплетно нов уреди.

Доаѓаме во мир, да кажеме како хакери, видливо и nerds, кога тргнуваме кон реалниот свет и да се обиде да го промени, бидејќи тоа е упад во нашето природно живеалиште, сајбер-просторот ...

Call for paper for participation to 27C3 CCC congress is open, and i never saw a so exciting payoff :-)

See you on 30 December 2010 in Berlin!

GSM cracking in penetration test methodologies (OSSTMM) ?

As most of this blog reader already know, in past years there was a lot of activities related to public research for GSM auditing and cracking.

However when there was huge media coverage to GSM cracking research results, the tools to make the cracking was really early stage and still very inefficient.

Now Frank Stevenson , norwegian cryptanalyst that already broke the Content Scrambling System of DVD video disc, participating to the A51 cracking project started by Karsten Nohl , released Kraken , a new improved version of the A51 cracking system.

It's interesting to notice that WiFi cracking had a similar story, as the first WiFi wep cracking discovery was quite slow in earlier techniques but later Korek, an hacker working on cracking code, improve the attack system drammatically.

That's the story of security research cooperation, you start a research, someone follow it and improve it, some other follow it and improved it and at the end you get the result.

Read more on the Kraken GSM Cracking software release .

And stay tuned as next week at Blackhat Conference Karsten Nohl will explain the details of the required hardware setup and detailed instructions on how to do it :-)

I would really like to see those tools incorporated into Penetration Testing Linux Distribution BackTrack with OSSTMM methodology enforcing the testing of GSM interception and man in the middle :-)

If things proceed that way and Ettus Research (The producer of USRP2 software radio used for low cost GSM signal receiving) will not be taken down, we can still see this.

Snake-oil security claims on crypto security product

Security market grow, more companies goes to the market, but how many of them are taking seriously what they do?

Знаете, го прават безбедност технологија значи дека сте лично одговорен за заштита на информациите на корисникот. Мора да ги направи свесни за она што им треба, точно она што ти се прави и кој вид на закана модел на вашиот производ заштити.

Типичен проблем на безбедносни карактеристики на производот е претставен од страна на неспособноста на корисникот да се оцени безбедноста на побарувањата на самиот производ.

So there's a lot companies doing a not-so-ethical marketing of security features, based on the facts that no user will be able to evaluate it.

Претходно објасни ситуацијата живеат во безбедност тема на змија нафта енкрипција, еволуција во научната криптографски средина која ги споделите со нас денес користат најдобрите на технологии информации раса заштита без да се грижите премногу за backdoors или несигурности.

Let's speak about Snake Oil Encryption

Snake Oil Cryptography : In cryptography , snake oil is a term used to describe commercial cryptographic methods and products which are considered bogus or fraudulent. Разлика безбедна криптографија од несигурни криптографија може да биде тешко, од гледна точка на корисникот. Many cryptographers, such as Bruce Schneier and Phil Zimmermann , undertake to educate the public in how secure cryptography is done, as well as highlighting the misleading marketing of some cryptographic products.

Најмногу референцирани крипто безбедност гуру, Филип Цимерман и Брус Schneier, беше 1. да се зборува за змија нафта Енкрипција:

Snake Oil by Philip Zimmermann

Змија нафта од Брус Schneier

The Michigan Telecommunications and Technology Law Review also made a very good analysis related to the Security Features of Security Products, SNAKE-OIL SECURITY CLAIMS” THE SYSTEMATIC MISREPRESENTATION OF PRODUCT SECURITY . They explain about the nasty marketing tricks used to tweak users inability to evaluate the security features, including economic and legal responsibility implication.

Several snake oil security product companies does not explain and are not clear about the threat model to which the product apply. Very famous is the sentence of Russ Nelson :

“Remember, crypto without a threat model is like cookies without milk. ... .. Криптографија без закана модел е како мајчинство без јаболко пита. Can't say that enough times. Поопшто, безбедност без закана модел е по дефиниција ќе пропадне. "

Значи, како да се на место змија масло безбедносни производи?

Проверете упатство за на самото место змија нафта енкрипција производи: змија нафта знаци на предупредување, енкрипција софтвер за да се избегне од страна на Мет Curtin .

Можете да ја видите оваа многу добра криптографска змија нафта Примери од Emility Ratliff (IBM, архитект на Линукс за безбедност), која се обиде да направи јасен пример за тоа како да се на место криптографски змија нафта.

Here represented the basic guideline from Matt Curtin paper:


By checking that points it's possible to evaluate how serious an encryption technology or product is.

But all in all how to fix that unethical security approach?

It's very significative and it would be really useful for each kind of security product category to make some strongly and independent evaluation guideline (like OSSTMM for Penetration testing) , to make this security evaluation process really in the hands of the user.

It would be also very nice to have someone making analysis and evaluation of security product companies, publishing reports about Snake Oil signs.

Web2.0 privacy leak in Mobile apps

Вие знаете дека web2.0 светот дека е многу истекување на било кој вид (профилирање, профилирање, профилирање) поврзани со приватноста и корисниците ќе почне да бидат загрижени за тоа.

Users continuously download applications without knowing the details of what they do, for example iFart just because are cool, are fun and sometime are useful.

На мобилни телефони на корисниците инсталирате од 1000% до 10,000% повеќе апликации отколку на компјутер, и оние апликации може да содржи малициозен софтвер или други неочекувани функционалности.

Recently infobyte analyzed ubertwitter client and discovered that the client was leaking and sending to their server many personal and sensitive data such as:

- Blackberry PIN

- Телефонски број

- E-mail адреса

- Geographic positioning information

Read about UbertTwitter 'spyware' features discovery here by infoByte .

It's plenty of applications leaking private and sensitive information but just nobody have a look at it.

Should mandatory data retention and privacy policies became part of application development and submission guideline for mobile application?

Imho a users must not only be warned about the application capabilities and API usage but also what will do with which kind of information it's going to handle inside the mobile phone.

Capabilities means authorizing the application to use a certain functionalities, for example to use GeoLocation API, but what the application will do and to who will provide such information once the user have authorized it?

Тоа е безбедноста профилирање ниво што мобилен телефон производителот не обезбеди и што треба, затоа што се фокусира на информации, а не за примената овластување / дозвола однос на употребата на уред способности.

ps yes! ok! I agree! This kind of post would require 3-4 pages long discussion as the topic is hot and quite articulated but it's saturday morning and i gotta go!

АЕС алгоритам избрани за употреба во вселената

I encountered a nice paper regarding analysis and consideration on which encryption algorithm it's best suited for use in the space by space ship and equipments.

The paper has been done by the Consultative Committee for Space Data Systems that's a consortium of all space agency around that cumulatively handled more than 400 mission to space .

topban.jpg

Read the paper Encryption Algorithm Trade Survey as it gives interesting consideration and comparison between different encryption algorithms.

Obviously the finally selected algorithm is AES , while KASUMI (used in UMTS networks) was avoided.

Blackberry Security and Encryption: Devil or Angel?

Blackberry have good and bad reputation regarding his security capability, depending from which angle you look at it.

This post it's a summarized set of information to let the reader the get picture, without taking much a position as RIM and Blackberry can be considered, depending on the point of view, an extremely secure platform or an extremely dangerous one .

bblock.jpg

Let's goes on.

Од една страна Blackberry тоа е платформа многу Енкрипција карактеристики, безбедносни карактеристики насекаде, уредот шифрирана (со сопствени крипто), комуникација шифрирана (со сопствени неслободни протоколи како што се IPPP), многу добар Напредни поставки за безбедност, рамка за енкрипција од Certicom ( сега во сопственост на РИМ ).

Од друга страна, тие не се обезбеди само еден уред, но преклоп пристап до мрежата, наречен бис ( BlackBerry Internet Service ), тоа е глобален светски широк простор мрежа, каде што вашиот BlackBerry внесете додека пребарувате или checkmail користење blackberry.net АП.

Кога вие или некоја апликација, користете blackberry.net APN не се само поврзување на интернет со медиумот интернет конекција, но дали ги внесувате во мрежата на компанијата RIM која ќе прокси и ќе делува како порта за да стигнат до интернет.

Истото се случи кога имате корпоративна употреба: И ББ уред и на корпоративниот Бес се поврзете на мрежата на компанијата RIM, кои дејствуваат како еден вид на концентрација VPN мрежа .

Значи, во основа сите комуникации крстот преку РИМ сервисна инфраструктура во шифрирана форма со сет неслободни енкрипција и протоколи за комуникација.

Само како најава, мислам дека Гугл да им обезбеди Gtalk над blackberry.net APN, склучи договор со цел да им понуди на услуги во мрежата на корисниците ББ ББ. Кога ќе го инсталирате Gtalk ви се додадат 3 сервисни книги кои упатуваат на GTALKNA01 тоа е името на Gtalk портал во внатрешноста на РИМ мрежа за да им овозможи на интра-БИС комуникација и да дејствува како Gtalk портал на интернет.

Мобилните оператори обично не се ни е дозволено да изврши увид во сообраќајот помеѓу BlackBerry уредот и мрежата на Blackberry.

Значи РИМ и Blackberry се некако уникатна за нивниот пристап, како тие се обезбеди платформа, мрежа и услуги на сите во комплет заедно, а не само да се "добие уредот и софтверот", но на корисникот и на корпоративниот секогаш се врзани и се поврзани на услугата мрежа.

Тоа е добро, а што е лошо, бидејќи тоа значи дека компанијата RIM обезбеди исклучително добри безбедносни карактеристики и способности за да се заштитат информациите, уреди и пристап до информации на различни ниво во однос на трети лица.

Но, тоа е секогаш тешко да се процени опасноста и ризикот поврзан со РИМ себе и кои може да се направи политички притисок врз РИМ.

Ве молиме сметаат дека не сум велејќи: "РИМ е во потрага на вашите податоци", но правејќи објективна анализа на ризикот: за тоа како платформа е направено РИМ има авторитет на уредот, на информациите на-на-уредот и на информациите кои се премине мрежа. (Прочитајте мојот Мобилен за безбедност Слајдови ).

На пример, ајде да се разгледа истиот контекст за Nokia телефони.

Откако Nokia уред се продава, Nokia не имаат надлежност на уредот, ниту за информациите на-на-уред, ниту на информациите кои излегуваат на мрежата. Но, тоа исто така е точно дека Nokia само им даваат на уредот и не обезбедува услуги со додадена вредност, како што се Enterprise интеграција (РИМ VPN тунелот), БИС пристап до мрежата и сите локални и далечински безбедност предвидено карактеристики кои Blackberry обезбеди.

Така, тоа е прашање на разгледување контекст на ризикот во соодветен начин, кога изборот на платформа, со пример многу слични на изборот на Microsoft Exchange Server (на свој сервис), или дали добивање на SaaS услуги како Google Apps.

Во двата случаи треба да му верувате на услуги, но во првиот пример што треба да им верувате на Microsoft дека не се стави задна врата на софтвер, додека во 2 пример треба да му верувате на Google, како платформа и давателот на услугата, со што не се пристап вашите информации.

Значи, ситуацијата е поинаква парадигма треба да се оценува во зависност од вашите закана модел.

Ако вашиот закана модел ви овозможи да се разгледа РИМ како доверливи трети лица даватели на услуги (многу сличен на Google), отколку што е во ред. Ако имате многу висок ризик контекст, како топ-тајна еден, тогаш ајде да се разгледа и оцени внимателно дали не е подобро да се задржи на BlackBerry услугите целосно изолирани од уредот или да користите друг систем без интеракција со производителот сервери и услуги.

Сега, ајде да се вратам на некои истражувања и некои факти во врска со капина и капина безбедност себе.

Прво на сите неколку влади мораше да се справи со РИМ, со цел да ги принуди да се обезбеди пристап до информациите кои излегуваат од нивната услуга мрежи, додека други одлучиле директно да се забрани Blackberry употреба за високи функционери поради сервери лоцирани во Велика Британија и САД, додека други одлучиле да инсталира свои задната врата.

Има многу на дискусија кога темите се RIM Blackberry и влади од различни причини.

Подолу збир на официјални информации поврзани со безбедноста на RIM BlackBerry платформа:

И тука збир на неофицијални безбедност и информации за компанијата RIM Blackberry платформа поврзани со Хакерство:

Because it's 23.32 (GMT+1), i am tired, i think that this post will end up here.

I hope to have provided the reader a set of useful information and consideration to go more in depth in analyzing and considering the overall blackberry security (in the good and in the bad, it always depends on your threat model!).

Запиша во листата

Fabio Pietrosanti (naif)

ps i am managing security technology development (voice encryption tech) on Blackberry platform, and i can tell you that from the development point of view it's absolutely better than Nokia in terms of compatibility and speed of development, but use only RIMOS 5.0+ !

Celebrating “Hackers” after 25 years

A cult book , ever green since 25 years.

201007010924.jpg

It's been 25 years since “Hackers” was published. Author Steven Levy reflects on the book and the movement.

http://radar.oreilly.com/2010/06/hackers-at-25.html 
Steven Levy wrote a book in the mid-1980s that introduced the term "hacker" -- the positive connotation -- to a wide audience. In the ensuing 25 years, that word and its accompanying community have gone through tremendous change. The book itself became a mainstay in tech libraries.
O'Reilly recently released an updated 25th anniversary edition of "Hackers," so I checked in with Levy to discuss the book's development, its influence, and the role hackers continue to play.

Botnet for RSA cracking?

I read an interesting article about putting 1.000.000 computers, given the chance for a serious botnet owner to get it, to crack RSA.

The result is that in such context attacking an RSA 1024bit key would take only 28 years, compared to theoretical 19 billion of years.

Reading of this article , is extremely interesting because it gives our very important consideration on the cryptography strength respect to the computation power required to carry on cracking attempt, along with industry approach to “default security level”.

I would say a must read .

Patent rights and opensource: can they co-exist?

How many of you had to deal with patented technologies?

How many of the patented technologies you dealed with was also “secrets” in their implementation?

Well, there's a set of technologies whose implementation is open source ( copyright) but that are patented ( intellectual property right) .

A very nice paper about the topic opensource & patents that i suggest to read is from Fenwick & West and can be downloaded here (pdf) .

China Encryption Regulations

Hi all,

i found this very interesting paper on China Encryption Import/Export/Domestic Regulations done by Baker&Mckenzie in the US.

It's strongly business and regulatory oriented giving a very well done view on how china regulations works and how it may behave in future.

Read here Decrypting China Encryption's Regulations (form Bakernet website) .

IOScat – a Port of Netcat to Cisco IOS

A porting of famous netcat to Cisco IOS router operating system: IOSCat

The only main limit is that it does not support UDP, but that's a very cool tool!

A very good txt to read is Netcat hacker Manual .

На (стар) Крипто АГ случај, а некои размислување за тоа

Во '90, затворен извор и комерцијален криптографија беше владее со светот.

That's before open source and scientifically approved encrypted technologies went out as a best practice to do crypto stuff.

I would like to remind when, in 1992, USA along with Israel was, together with switzerland, providing backdoored (proprietary and secret) technologies to Iranian government to tap their communications, cheating them to think that the used solution was secure , making also some consideration on this today in 2010.

caq63crypto.t.jpg

That's called The Crypto AG case , an historical fact involving the United States National Security Agency along with Signal Intelligence Division of Israel Ministry of Defense that are strongly suspected to had made an agreement with the Swiss cryptography producer company Crypto AG .

Basically those entities placed a backdoor in the secure crypto equipment that they provided to Iran to intercept Iranian communications.

Their crypto was based on secret and proprietary encryption algorithms developed by Crypto AG and eventually customized for Iranian government.

You can read some other facts about Crypto AG backdoor related issues:

Пропаѓањето на глобалната телекомуникациска безбедност

The NSA-Crypto AG sting

Кршење кодови: невозможна задача? Со БиБиСи

Дер Шпигел Крипто АГ (германски) член

Сега, во 2010 година, сите знаеме и да се разбереме дека тајните и комерцијален крипто не функционира.

Само некои референца од страна на врвот во светот криптографски експерти подолу:

Secrecy, Security, Obscurity by Bruce Schneier

Just say No to Proprietary cryptographic Algorithms by Network Computing (Mike Fratto)

Security Through Obscurity by Ceria Purdue University

Отклучување на тајните на Крипто: Криптографија, енкрипција и криптологија објасни од Symantec

Време промени начинот на кој работите се приближуваше.

I like very much the famous Philip Zimmermann assertion:

"Криптографија користи за да биде една мрачна наука, на мала релевантност за секојдневниот живот. Historically, it always had a special role in military and diplomatic communications. But in the Information Age, cryptography is about political power, and in particular, about the power relationship between a government and its people. It is about the right to privacy, freedom of speech, freedom of political association, freedom of the press, freedom from unreasonable search and seizure, freedom to be left alone.”

Било научник денес го прифати и одобри на Kerckhoffs "Принцип дека во 1883 година во Cryptographie Militaire хартија изјави:

The security of a cryptosystem should not depend on keeping the algorithm secret, but only on keeping the numeric key secret.

It's absolutely clear that the best practice for doing cryptography today obbly any serious person to do open cryptography, subject to public review and that follow the Kerckhoff principle.

So, what we should think about closed source, proprietary cryptography that's based on security trough obscurity concepts?

Бев исклучително вчудоневиден кога денес, во 2010 година, во ерата на информатичкото општество читам некои хартија на Крипто АГ веб-сајт.

I invite all to read the Crypto AG security paper called Sophisticated Security Architecture designed by Crypto AG of which you can get a significant excerpt below:

The design of this architecture allows Crypto AG to provide a secret proprietary algorithm that can be specified for each customer to assure the perfect degree of cryptographic security and optimum support for the customer's security policy. In turn, the Security Architecture gives you the influence you need to be fully independent in respect of your encryption solution. Може да се утврди сите области кои се опфатени со криптографија и потврди како алгоритам работи. Оригиналот тајна комерцијален алгоритам на Крипто АГ е основа на архитектура на безбедност.

I have to say that their architecture is absolutely good from TLC point of view. Also they have done a very good job in making the design of the overall architecture in order to make a tamper-proof resistant crypto system by using dedicated crypto processor .
However there is still something missing:

T he overall cryptographic concept is misleading, based on wrong encryption concepts .

You may think that i am a troll telling this, but given the history of Crypto AG and given the fact that all the scientific and security community does not approve security trough obscurity concepts , it would legitimate to ask ourself:

Зошто тие се уште се прават безбедност преку опскурноста криптографија со тајни и на неслободен алгоритми?



Hey, i think that they have very depth knowledge on telecommunication and security, but given that the science tell us not to follow the secrecy of algorithms, i really have serious doubt on why they are still providing proprietary encryption and does not move to standard solutions (eventually with some kind of custom enhancement).

Missiles against cyber attacks?

The cyber conflicts are really reaching a point where war and cyberwar merge together.

НАТО земји имаат право да користат сила против напади врз компјутерски мрежи .

Mobile Security talk at WHYMCA conference

I want to share some slides i used to talk about mobile security at whymca mobile conference in Milan.

Read here my slides on mobile security .

The slides provide a wide an in-depth overview of mobile security related matters, i should be doing some slidecast about it putting also audio. Maybe will do, maybe not, it depends on time that's always a insufficient resource.

iPhone PIN: useless encryption

I recently switched one of my multiple mobile phones with which i go around to iPhone.

I am particularly concerned about data protection in case of theft and so started having a look around about the iPhone provided protection system.

There is an interesting set of iPhone Business Security Features that make me think that iPhone is moving in the right path for security protection of the phone, but still a lot of things has to be done, especially for serious Enterprise and Government users.

201006011551.jpg

For example it turned out that the iPhone PIN protection is useless and it can be broken just plugging the iPhone to a Linux machine and accessing the device like a USB stick.

That's something disturbing my paranoid mindset that make me think not to use sensitive data on my iPhone if i cannot protect my data.

Probably an iPhone independent disk encryption product would be very useful in order to let the market create protection schemas that fit the different risk contexts that different users may have.

Probably a general consumer is not worried about this PIN vulnerability but for me, working within highly confidential envirnonment such as intelligence, finance and military, it's something that i cannot accept.

I need strong disk encryption on my mobile phone.

I do strong voice encryption for it , but it would be really nice to have also something to protect the whole iPhone data and not just phone calls.

Who extract Oil in Iran? Business and UN sanction together

I like geopolitic and i am following carefully iran issues.

Отидов на Националната иранска нафтена компанија веб-сајт и го видел " експлоатација и производство "делот каде се наведени сите компании и нивната земја на потекло кои се дозволени да се направи истражување на нафта во Иран.

On that list we find the list of countries along with the data of signing of exploration agreement:

  • Norway/Russia (2000)
  • Australia/Spain/Chile (2001)
  • Индија (2002)
  • China (2001)
  • Brazil (2004)
  • Spain (2004)
  • Thailand (2005)
  • China x 2 (2005)
  • Norway (2006)
  • Italy (2008)
  • Vietnam (2008)

Those countries's oil companies are allowed to do oil extraction in Iran and i would like to point out that Iran is the 2nd world Oil Reserve just after Saudi Arabia.

As you can see there's NO USA company doing extraction.

Of European Countries the only one doing business with IRAN are:

IRAN Norway Relationship

IRAN ITALY Relationship

IRAN SPAIN Relationship

While of the well known non-US-simpatizing countries, the one doing Oil business with Iran are:

Иран РУСИЈА Брачен

Иран Бразил Брачен

IRAN China Relationship

Don't missing some Asian involvement.

IRAN India Relationship

Иран Виетнам Брачен

As you can see Iran is doing Oil business with most big south America and Far Asia countries, with some little exception in Europe for what apply to Norway, Italy and Spain.

За мене тоа звучи дека оние европски земји ќе се соочат со сериозни проблеми дали тие ќе го прифатат и да се претплатите на ОН санкција против Иран.

Or some of them, like Italy, are protected by the strenghtening cooperation they are doing with Russia on Energy matters?

Па, јас не знам како работите ќе завршат, но можно е најмногу hypocrit земји како европските водење бизнис во Иран, додека аплицирањето санкции ќе биде единствената европска победа на меѓународен конкурс за Иран масло (Освен ако Франција не капка нуклеарна бомба на theran;)).

Exploit code against SecurStar DriveCrypt published

It seems that the hacking community somehow like to target securstar products, maybe because hacking community doesn't like the often revealed unethical approach already previously described in this blog by articles and user's comments.

In 2004 a lot of accusation against Hafner of SecurStar went out because of alleged intellectual property theft regarding opensource codes such as Encryption 4 the masses and legal advert also against the Free and opensource TrueCrypt project .

In 2008 there was a pre-boot authentication hacking against DriveCrypt Plus posted on Full-Disclosure.

Early 2010 it was the time of the fake infosecurity research secretly sponsored by securstar at http://infosecurityguard.com (that now they tried to remove from the web because of embarrassing situation, but backup of the story are available, hacking community still wait for apologies) .

Now, mid 2010, following a research published in December 2009 about Disk Encryption software vulnerabilities made by Neil Kettle (mu-b), Security researcher at digit-labs and Penetration tester at Convergent Network Solutions , DriveCrypt was found to be vulnerable and exploitable breaking on-device security of the system and exploit code has been just released.

Exploit code reported below (thanks Neil for the code release!):

  • Arbitrary kernel code execution security exploit of DriveCrypt: drivecrypt-dcr.c
  • Arbitrary file reading/writing security exploit via unchecked user-definable parameters to ZxCreateFile/ReadFile/ WriteFile: drivecrypt-fopen.c

The exploit code has been tested against DriveCrypt 5.3, currently released DriveCrypt 5.4 is reported to be vulnerable too as it has just minor changes related to win7 compatibility. Can anyone make a double check and report a comment here?

Very good job Neil!

In the meantime the Free Truecrypt is probably the preferred choice for disk encryption, given the fact that it's difficult to trust DriveCrypt, PGP has been acquired by Symantec and there are very bad rumors about the trust that people have in Symantec and there are not many widely available alternatives.

Rumors say that also PhoneCrypt binaries are getting analyzed and the proprietary encryption system could reveal something fun…

Quantum cryptography broken

Quantum cryptography it's something very challenging, encryption methods that leverage the law of phisycs to secure communications over fiber lines.

To oversimplify the system is based on the fact that if someone cut the fiber, put a tap in the middle, and joint together the other side of the fiber, the amount of “errors” that will be on the communications path will be higher than 20% .

So if QBER (Quantum Bit Error Rate) goes above 20% then it's assumed that the system is intercepted.

Researcher at university of toronto was able to cheat the system with a staying below the 20%, at 19.7% , thus tweaking the threshold used by the system to consider the communication channel secure vs compromised.

The product found vulnerable is called Cerberis Layer2 and produced by the Swiss ID Quantique .

Some possibile approach to detect the attack has been provided but probably, imho, such kind of systems does not have to be considered 100% reliable until the technology will be mature enough.

Traditional encryption has to be used together till several years, eventually bundled with quantum encryption whether applicable.

When we will see a quantum encryption systems on an RFC like we have seen for ZRTP , PGP and SSL ?

-naif

FUN! Infosecurity consideration on some well known films

Please read it carefully Film that needed better infosec .

One the the review, imho the most fun one on film Star Wars :

The scene

Death star getting blown up

Infosec Analysis

Darth Vader must be heralded as the prime example of a chief executive who really didn't care about information security. The entire board was unapproachable and clearly no system testing was undertaken. The network security was so poor that it was hacked into and the designs for the death star were stolen without anyone knowing.

Even worse than that, the death star had a major design flaw where by dropping a bomb thingy into a big hole on the outside, it actually blew up the entire thing!

Darth Vader needed to employ a good Security Consultant to sit on the executive board and promise not to force choke him. Should have commissioned a full risk assessment of the death star followed by a full penetration test. Only then should the death star have been released into the production environment.

great point of view

Because security of a cryptographic system it's not a matter of “how many bits do i use” but using the right approach to do the right thing to mitigate the defined security risk in the most balanced way.

security.png

Encryption is not scrambling: be aware of scrambler!

Most of us know about voice scrambler that can be used across almost any kind of voice based communication technology.

Extremely flexible approach: works everything

Extreme performance: very low latency

but unfortunately…

Extremely weak: Scrambling cannot be considered secure.

Only encryption can be considered secure under the Kerckoff's principle .

So please don't even consider any kind of analog scrambler if you need real security.

Read deeply the paper Implementation of a real-time voice encryption system ” by Markus Brandau, especially the cryptoanalysis paragraph.

SecurStar GmbH Phonecrypt answers on the Infosecurityguard/Notrax case: absolutely unreasonable! :-)

Ажурирање 20.04.2010: http://infosecurityguard.com е оневозможена. Notrax идентитет стана познат на неколку момци во гласот безбедност средини (не може да се каже, но може да се замисли, сум бил во право!) И така нашите пријатели одлучи да trow намалува сајт, бидејќи на правна одговорност во Велика Британија и САД закони.

Ажурирање: Убаво резиме на целата приказна (знам, тоа е долг и комплициран за да го прочитате на 1 време) на SIPVicious VoIP безбедност блог од страна на Сандро Gauci .

Following my discoveries, Mr. Hafner, SecurStar chief exec, tried to ultimately defend their actions, citing absolutely unreasonable excuses to The Reg instead of publicly apologizing for what they have done: creating a fake independent security research to promote their PhoneCrypt product .

Тој се обидел да нè убеди дека лицето зад ИП 217.7.213.59, што се користи од страна на авторот на infosecurityguard.com и покажувајќи на нивната канцеларија DSL линија, е ова хакер Notrax, со користење на еден анонимен Сурфањето на услугата, а не една од своите вработени во нивната канцеларија:

“SecurStar chief exec Wilfried Hafner denied any contact with Notrax. Notrax, рече тој, мора да е со користење на анонимни бараат услуга неговата фирма, SurfSolo, за да се произведе резултати пријавени од страна Pietrosanti "

Let's reflect a moment on this sentence… Would really an hacker looking for anonymity spend 64 EUR to buy their anonymity surfing service called surfsolo instead of using the free and much more secure TOR (the onion router) ?Then let's reflect on this other piece of information:

  • The IP 217.7.213.59 is SecurStar GmbH's office DSL line
  • On 217.7.213.59 they have installed their VoIP/Asterisk PBX and internet gateway
  • Тие ги промовираат своите анонимни прокси сервисот за "Анонимни P2P употреба" ( http://www.securstar.com/products_ssolo.php ). Кој ќе овозможи на корисниците да ги P2P од канцеларијата DSL линија каде што тие ги инсталираа своите корпоративни VoIP телефонска централа? If you do VoIP you can't let third party flood your line w/ p2p traffic, your phone calls would became obviously unreliable (yes, yes, you can do QoS, but you would not place an anonymous navigation proxy on your company office DSL line…).
  • Which company providing an anonymous navigation service would ever use their own office IP address? Само помислете колку пати ќе имаат полицијата тропа на вашата врата и на вработените, како главни осомничени. (Во минатото, јас се користи да се кандидира на работните задачи јазол, знам дека ризици ...). Исто така мислам колку пати ќе се најде себе си црната листа на Google како шпионски бот.
  • Г-дин Hafner исто така вели: "Имаме два милиони луѓе со користење на овој производ. Или, пак, можеби се работи за стариот клиент наш ". 2M users on a DSL line, really?
  • I don't use Surfsolo service, however their proxies are probably these ones:

surfsolo.securstar.net - 67.225.141.74

surfsolo.securstar.com – 69.16.211.133

Искрено кажано јас лесно може да се разбере дека г-дин Hafner се случува да направи што може да се заштити неговата компанија од скандалот, но "анонимен прокси" оправдување е во најмала рака сомнителна.

Како, пак, фактот дека "независно истражување" беше семантички производ преглед на PhoneCrypt, заедно со откривањето дека авторот доаѓаат од SecurStar GmbH IP адреса канцеларии, заедно со анонимноста на овој Notrax човек (SecurStar го нарекува "многу добро познат ИТ безбедност професионалец "во соопштението ..) на звукот со вас?

Можно е дека земјата ќе добие напад од вселената кој нема да го уништи нашиот живот?

Статистички исклучително тешко, но да, можно. More or less like the “anonymous proxy” story told by Mr. Hafner to cover the fact that they are the ones behind the infosecurityguard.com fake “independent security review”.

Еј, не ми треба ништо друго да си ја убеди или да ги споделите со паметен човек има свои мисли за ова.

Јас само мислам дека најдобар начин за SecurStar да се излезе од овој хаос, најверојатно, ќе биде да се обезбеди јавна изговори за хакирање заедница за злоупотребувајќи го името и угледот на вистински независна безбедност истражувања, за доброто на еден маркетинг трик.

Со почит,

Fabio Pietrosanti

PS Јас сум во моментов чекање за некои други дополнителни информации кои попрецизно ќе потврди дека она што г-дин Hafner вели не е правилно точно. Stay tuned.

Evidence that infosecurityguard.com/notrax is SecurStar GmbH Phonecrypt – A fake independent research on voice crypto

Below evidence that the security review made by an anonymous hacker on http://infosecurityguard.com is in facts a dishonest marketing plan by the SecurStar GmbH to promote their voice crypto product.

I already wrote about that voice crypto analysis that appeared to me very suspicious.

Now it's confirmed, it's a fake independent hacker security research by SecurStar GmbH, its just a marketing trick!

How do we know that Infosecurityguard.com, the fake independent security research, is a marketing trick from SecurStar GmbH?

1) I posted on http://infosecurityguard.com a comments to a post with a link to my blog to that article on israelian ministry of defense certification

2) The author of http://infosecurityguard.com went to approve the comment and read the link on my own blog http://infosecurity.ch

3) Reaching my blog he leaked the IP address from which he was coming 217.7.213.59 (where i just clicked on from wordpress statistic interface)

4) On http:// 217.7.213.59/panel there is the IP PBX interface of the SecurStar GmbH corporate PBX (openly reachable trough the internet!)

5) The names of the internal PBX confirm 100% that it's the SecurStar GmbH:

6) There is 100% evidence that the anonymous hacker of http://infosecurityguard.com is from SecurStar GmbH

Below the data and reference that let us discover that it's all but a dishonest marketing tips and not an independent security research.

Kudos to Matteo Flora for it's support and for his article in Debunking Infosecurityguard identity !

The http referral tricks

When you read a link going from a website to another one there is an HTTP protocol header, the “Referral”, that tell you from which page someone is going to another webpage.

The referral demonstrated that the authors of http://infosecurityguard.com read my post, because it was coming from http://infosecurityguard.com/wp-admin/edit-comments.php that's the webpage you use as a wordpress author/editor to approve/refuse comments. And here there was the link.

That's the log entry:

217.7.213.59 – - [30/Jan/2010:02:56:37 -0700] “GET /20100129/licensed-by-israel-ministry-of-defense-how-things-really-works/ HTTP/1.0″ 200 5795 “ http://infosecurityguard.com/wp-admin/edit-comments.php ” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”

The PBX open on the internet tell us that's SecurStar GmbH

The SecurStar GmbH PBX is open on the internet, it contains all the names of their employee and confirm us that the author of http:/infosecurityguard.com is that company and is the anonymous hacker called Notrax.

Here there is their forum post where the SecurStar GmbH guys are debugging IPCOPfirewall & Asterisk together (so we see also details of what they use) where there is the ip 217.7.213.59 .

SecurStarproof.png

That's also really fun!

They sell secure telephony but their company telephony system is openly vulnerable on the internet . :-)

I was thinking to call the CEO, Hafner, via SIP on his internal desktop PBX to announce we discovered him tricks.. :->

They measured their marketing activity

Looking at the logs of my website i found that they was sensing the google distribution of information for the following keywords, in order to understand how effectively they was able to attack competing products. It's reasonable, if you invest money in a marketing campaign you want to see the results :-)

They reached my blog and i logged their search:

infosecurityguard+cryptophone

infosecurityguard+gold-lock

217.7.213.59 – - [30/Jan/2010:02:22:42 -0700] “GET / HTTP/1.0″ 200 31057 “http://www.google.de/search?sourceid=navclient&ie=UTF-8&rlz=1T4SKPB_enDE350DE350&q=infosecurityguard+cryptophone” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”

217.7.213.59 – - [30/Jan/2010:04:15:07 -0700] “GET /20100130/about-the-voice-encryption-analysis-phonecrypt-can-be-intercepted-serious-security-evaluation-criteria/ HTTP/1.0″ 200 15774 “http://www.google.de/search?sourceid=navclient&ie=UTF-8&rlz=1T4SKPB_enDE350DE350&q=gold-lock+infosecurityguard” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”


The domain registration data

The domain have been registered on 1st December 2009, just two months to start preparing the dishonest marketing campaign:

Domain Name: INFOSECURITYGUARD.COM

Registrar: GODADDY.COM, INC.

Updated Date: 01-dec-2009

Creation Date: 01-dec-2009

The domain is anonymously privacy protected trough a whois privacy service:

Administrative Contact: Private, Registration INFOSECURITYGUARD.COM@domainsbyproxy.com , Domains by Proxy, Inc. DomainsByProxy.com

Notrax hacker does not exist on google
As you know any hacker that get public usually have presence of it's activity on google, attending mailinglists, forum, homepage, past research, participation to conferences, etc, etc.
The fake hacker that they wanted us to to think was writing an independent blog does NOT have any trace on google. Only some hit about an anonymous browser called Notrax but nothing about that hacker.
Maybe when SecurStar provided the anonymity tool to their marketing agency, to help them protecting anonymity for the fake research, their provided them the anonymous browser notrax.So the marketing guy thinking about the nickname of this fake hackers used what? Notrax! :-)

The “independent review”completely oriented in publicizing PhoneCrypt

Of the various review don the phonecrypt review is only positive and amazing good feedback, while the other are only bad feedback and no single good point.

As you can imagine, in any kind of independent product evaluation, for all products there are goods and bad points. No. In this one there are only product that are good and product that are bad.

They missed to consider the security of the technology used by the products

They completely avoided to speak about cryptography and security of the products.

They do not evaluated basic security features that must be in that kind of products.That's in order not to let anyone see that they did not followed basic security rules in building up their PhoneCrypt.
The technology is closed source, no transparency on algorithms and protocols, no peer review.Read my new comparison (from the basic cryptographic requirement point of view) About the voice encryption analysis (criteria, errors and different results) .
The results are somehow different than their one .

UPDATE: Who's Wilfried Hafner (SecurStar founder) ?

I got a notice from a reader regarding Wilfred Hafner, SecurStar founder, CEO and security expert.

He was arrested in 1997 for telephony related fraud (check 2nd article on Phrack) earning from telephony fraud 254.000 USD causing damages to local telcos trough blueboxing for 1.15 Million USD.

He was not doing “Blueboxing” for the pleasure of phreaking and connecting with other hackers, but to earn money.

Hacking for profit (and not for fun) in 1997… brrr…. No hacker's ethic at all!

All in all, is that lawful?

Badmouthing a competitor amounts to an unfair competition practice in most jurisdictions, so it is arguable (to say the least) that SecurStar is right on a legally sound ground here.
Moreover, there are some specific statutes in certain jurisdictions which provide for a straightforward ban on the practice we are talking about. For example in the UK the British Institute of Practitioners in Advertising - in compliance with the Consumer protection from Unfair Trading regulation – ruled that:

”falsely claiming or creating the impression that the trader is not acting for the purposes relating to his trade, business, craft or profession, or falsely representing oneself as a consumer” is a criminal offense .

We have no doubt that PRPR (which is the UK-based *PR company for SecurStar GmbH, led by Peter Rennison and Allie Andrews as stated in SecurStar Press Release ) did provide their client with this information. Heck, they *are* in the UK, they simply cannot ignore that!

IANAL, but I would not be surpised if someone filed a criminal complaint or start civil litigation for unfair competition against SecurStar GmbH.
Whether this is going to be a matter for criminal and/or civil Courts or not is not that important. However, it is clear enough that SecurStar GmbH appears to be at least ethically questionable and not really worth of trust.

Nice try, gentlemen… however, next time just do it right (whether “right” for them means “in a honest manner” or “in a fashion not to be caught” I will let them choose)”

Fabio Pietrosanti (naif)

Dishonest security: The SecurStart GmbH Phonecrypt case

I would like to provide considerations on the concept of ethics that a security company should have respect to the users, the media and the security environment.

SecurStar GmbH made very bad things making that infosecuriguard.com fake independent research.

It's unfair approach respect to hacking community.

It's unfair marketing to end user. They should not be tricking by creating fake independent review.

It's unfair competition in the security market.

Let's make some more important consideration on this.

Must be serious on cryptographic products. They are not toys

When you do cryptographic tools you should be really aware of what you are doing, you must be really serious.

If you do bad crypto people could die.

If you don't follow basic security rules for transparency and security for cryptography you are putting people life at risk.

You are taking the responsibility of this. (I want to sleep at night, don't think SecurStar CEO/CTO care about this…)

Security research need reference and transparency

Security research have to be public, well done, always subject to public discussion and cooperation.
Security research should not be instrumentally used for marketing purpose.Security research should be done for awareness and grow of the knowledge of the worldwide security environment.

Hacking environment is neutral, should not be used instrumentally

Hackers are considered neutral, nerds, doing what they do for their pleasure and passion.

If you work in the security market you work with hackers.

If you use hackers and hacking environment for your own marketing purposes you are making something very nasty.

Hackers give you the technology and knowledge and you use them for your own commercial purpose.

Consideration on the authority of the information online

That's something that pose serious consideration on the authority of information online.An anonymous hacker, with no reference online, made a product security review that appear like an independent one. I have to say that the fake review was very well prepared, it always posed good/bad things in an indirect way. It did not appeared to me at 1st time like a fake. But going deeply i found what's going on.

However Journalists, news media and blogger went to the TRAP and reviewed their fake research. TheRegister, NetworkWorld and a lot of blogs reported it. Even if the author was completely anonymous.

What they have done is already illegal in UK

SecurStar GmbH is lucky that they are not in the UK, where doing this kind of things is illegal .

Fabio Pietrosanti (naif)

About the SecurStar GmbH Phonecrypt voice encryption analysis (criteria, errors and different results)

This article want to clarify and better explain the finding at infosecurityguard.com regaring voice encryption product evaluation.
This article want to tell you a different point of view other than infosecurityguard.com and explaining which are the rational with extensive explaination from security point of view.
Today i read news saying: “PhoneCrypt: Basic Vulnerability Found in 12 out of 15 Voice Encryption Products and went to read the website infosecurityguard .

Initially it appeared to my like a great research activity but then i started reading deeply the read about it.I found that it's not properly a security research but there is are concrete elements that's a marketing campaign well done in order to attract public media and publicize a product.
Imho they was able to cheat journalists and users because the marketing campaign was absolutely well done not to be discovered on 1st read attempt. I personally considered it like a valid one on 1st ready (they cheated me initially!).

But if you go deeply… you will understand that:
- it's a camouflage marketing initiative arranged by SecurStar GmbH and not a independent security research
- they consider a only security context where local device has been compromised (no software can be secured in that case, like saying SSL can be compromised if you have a trojan!)
- they do not consider any basic security and cryptographic security criteria

However a lot of important website reported it:

This article is quite long, if you read it you will understand better what's going on around infosecurityguard.com research and research result.

I want to to tell you why and how (imho) they are wrong.

The research missed to consider Security, Cryptography and Transparency!

Well, all this research sound much like being focused on the marketing goal to say that their PhoneCrypt product is the “super” product best of all the other ones.
Any security expert that would have as duty the “software evaluation” in order to protect the confidentiality of phone calls will evaluate other different characteristics of the product and the technology.

Yes, it's true that most of the product described by SecurStar in their anonymous marketing website called http://infosecurityguard.com have some weakness.
But the relevant weakness are others and PhoneCrypt unfortunately, like most of the described products suffer from this.
Let's review which characteristics are needed basic cryptography and security requirement (the best practice, the foundation and the basics!)

a – Security Trough Obscurity does not work

A basic rule in cryptography cames from 1883 by Auguste Kerckhoffs:

In a well-designed cryptographic system, only the key needs to be secret; there should be no secrecy in the algorithm.
Modern cryptographers have embraced this principle, calling anything else “security by obscurity.”
Read what Bruce Schneir, recognized expert and cryptographer in the world say about this
Any security expert will tell you that's true. Even a novice university student will tell you that's true. Simply because that's the only way to do cryptography.
Almost all product described in the review by SecurStar GmbH, include PhoneCrypt, does not provide precise details about their cryptographic technologies.
Precise details are:
  • Detailed specification of cryptographic algorithm (that's not just saying “we use AES “)
  • Detailed specification of cryptographic protocol (that's not just saying “we use Diffie Hellman ” )
  • Detailed specification of measuring the cryptographic strenght (that's not just saying “we have 10000000 bit key size “)

Providing precise details means having extensive documentation with theoretical and practical implications documenting ANY single way of how the algorithm works, how the protocol works with precise specification to replicate it for interoperability testing.
It means that scientific community should be able to play with the technology, audit it, hack it.
If we don't know anything about the cryptographic system in details, how can we know which are the weakness and strength points?

Mike Fratto, Site editor of Network Computing, made a great article on “Saying NO to proprietary cryptographic systems” .
Cerias Purdue University tell this .

b – NON peer reviewed and NON scientifically approved Cryptography does not work

In any case and in any condition you do cryptography you need to be sure that someone else will check, review, analyze, distruct and reconstract from scratch your technology and provide those information free to the public for open discussion.
That's exactly how AES was born and like US National Institute of Standard make crypto does (with public contest with public peer review where only the best evaluated win).
A public discussion with a public contest where the a lot of review by most famous and expert cryptographer in the world, hackers (with their name,surname and face, not like Notrax) provide their contribution, tell what they thinks.
That's called “peer review”.

If a cryptographic technology has an extended and important peer review, distributed in the world coming from universities, private security companies, military institutions, hackers and all coming from different part of the world (from USA to Europe to Russia to South America to Middle east to China) and all of them agree that a specific technology it's secure…
Well, in that case we can consider the technology secure because a lot of entities with good reputation and authority coming from a lot of different place in the world have publicly reviewed, analyzed and confirmed that a technology it's secure.

How a private company can even think to invent on it's own a secure communication protocol when it's scientifically stated that it's not possible to do it in a “proprietary and closed way” ?
IBM tell you that peer review it's required for cryptography .
Bruce Schneier tell you that “Good cryptographers know that nothing substitutes for extensive peer review and years of analysis.”
Philip Zimmermann will tell you to beware of Snake Oil where the story is: “Every software engineer fancies himself a cryptographer, which has led to the proliferation of really bad crypto software.”

c – Closed source cryptography does not work

As you know any kind of “serious” and with “good reputation” cryptographic technology is implemented in opensource.
There are usually multiple implementation of the same cryptographic algorithm and cryptographic protocol to be able to review all the way it works and certify the interoperability.
Supposing to use a standard with precise and extended details on “how it works”, that has been “peer reviewed” by the scientific community BUT that has been re-implemented from scratch by a not so smart programmer and the implementation it's plenty of bugs.

Well, if the implementation is “opensource” this means that it can be reviewed, improved, tested, audited and the end user will certaintly have in it's own had a piece of technology “that works safely” .

Google release opensource crypto toolkit
Mozilla release opensource crypto toolkit
Bruce Schneier tell you that Cryptography must be opensource .

Another cryptographic point of view

I don't want to convince anyone but just provide facts related to science, related to cryptography and security in order to reduce the effect of misinformation done by security companies whose only goes is to sell you something and not to do something that make the world a better.

When you do secure products, if they are not done following the proper approach people could die.
It's absolutely something irresponsible not to use best practice to do crypto stuff.

To summarize let's review the infosecurityguard.com review from a security best pratice point of view.

Product name Security Trough Obscurity Public peer review Open Source Compromise locally?
Caspertec Obscurity No public review Closed Да
CellCrypt Obscurity
No public review
Closed
Да
Cryptophone Transparency Limited public review Public Да
Gold-Lock Obscurity
No public review
Closed
Да
Illix Obscurity
No public review
Closed
Да
No1.BC Obscurity No public review
Closed
Да
PhoneCrypt Obscurity
No public review
Closed
Да
Rode&Swarz Obscurity
No public review
Closed
Да
Secure-Voice Obscurity
No public review
Closed
Да
SecuSmart Obscurity
No public review
Closed
Да
SecVoice Obscurity
No public review
Closed
Да
SegureGSM Obscurity
No public review
Closed
Да
SnapCell Obscurity
No public review
Closed
Да
Tripleton Obscurity
No public review
Closed
Да
Zfone Transparency Public review
Open Да
ZRTP Transparency Public review
Open Да

*Green means that it match basic requirement for a cryptographic secure system

* Red / Broken means that it does not match basic requirement for a cryptographic secure system
That's my analysis using a evaluation method based on cryptographic and security parameters not including the local compromise context that i consider useless.

However, to be clear, those are only basic parameters to be used when considering a voice encryption product (just to avoid being in a situation that appears like i am promoting other products). So it may absolutely possible that a product with good crypto ( transparency, peer reviewed and opensource) is absolutely a not secure product because of whatever reason (badly written, not usable causing user not to use it and use cleartext calls, politically compromised, etc, etc).
I think i will prepare a broader criteria for voice crypto technologies and voice crypto products, so it would be much easier and much practical to have a full transparent set of criterias to evaluate it.

But those are really the basis of security to be matched for a good voice encryption system!
Read some useful past slides on security protocols used in voice encryption systems (2nd part).

Now read below some more practical doubt about their research.

The security concept of the review is misleading: any hacked device can be always intercepted!

I think that the guys completely missed the point: ANY KIND OF SOFTWARE RUNNING ON A COMPROMISED OPERATING SYSTEM CAN BE INTERCEPTED

Now they are pointing out that also Zfone from Philip Zimmermann is broken (a pc software), just because they install a trojan on a PC like in a mobile phone?
Any security software rely on the fact that the underlying operating system is somehow trusted and preserve the integrity of the environment where the software run.

  • If you have a disk encryption system but your PC if infected by a trojan, the computer is already compromised.
  • If you have a voice encryption system but your PC is infected by a trojan, the computer is already compromised.
  • If you have a voice encryption system but your mobile phone is infected by a trojan, the mobile phone is already compromised.

No matter which software you are running, in such case the security of your operating environment is compromised and in one way or another way all the information integrity and confidentiality is compromised.

Like i explained above how to intercept PhoneCrypt.

The only things that can protect you from this threat is running in a closed operating system with Trust Computing capability, implementing it properly.
For sure on any “Open” operating system such us Windows, Windows Mobile, Linux, iPhone or Android there's no chance to really protect a software.
On difficult operating system such as Symbian OS or RimOS maybe the running software can be protected (at least partially)

That's the reason for which the security concept that guys are leveraging to carry on their marketing campaign has no clue.
It's just because they control the environment, they know Flexispy software and so they adjusted their software not to be interceptable when Flexispy is installed.
If you develop a trojan with the other techniques i described above you will 100% intercept PhoneCrypt.

On that subject also Dustin Tamme l, Security researcher of BreakPoint Systems , pointed on on VoIP Security Alliance mailing lists that the security analysis is based on wrong concepts .

The PhoneCrypt can be intercepted: it's just that they don't wanted to tell you!

PhoneCrypt can be intercepted with “on device spyware”.
Зошто?
Because Windows Mobile is an unsecure operating environment and PhoneCrypt runs on Windows Mobile.
Windows Mobile does not use Trusted Computing and so any software can do anything.
The platform choice for a secure telephony system is important.
How?
I quickly discussed with some knowledgeable windows mobile hackers about 2 different way to intercept PhoneCrypt with an on-device spyware (given the unsecure Windows Mobile Platform).

a) Inject a malicious DLL into the software and intercept from within the Phonecrypt itself.
In Windows Mobile any software can be subject to DLL code injection.
What an attacker can do is to inject into the PhoneCrypt software (or any software running on the phone), hooking the Audio related functions acting as a “function proxy” between the PhoneCrypt and the real API to record/play audio.
It's a matter of “hooking” only 2 functions, the one that record and the one that play audio.
Read the official Microsoft documentation on how to do DLL injection on Windows Mobile processes. or forum discussing the technique of injecting DLL on windows mobile processes.
That's simple, any programmer will tell you to do so.
They simply decided that's better not to make any notice about this.
b) Create a new audio driver that simply act as a proxy to the real one and intercept PhoneCrypt
In Windows Mobile you can create new Audio Drivers and new Audio Filters.
What an attacker can do is to load a new audio driver that does not do anything else than passing the real audio driver function TO/FROM the realone. In the meantime intercept everything recorded and everything played :-)
Here there is an example on how to do Audio driver for Windows Mobile .
Here a software that implement what i explain here for Windows “Virtual Audio Cable” .
The very same concept apply to Windows Mobile. Check the book “Mobile Malware Attack and Defense” at that link explaining techniques to play with those techniques.
They simply decided that's better not to make any notice to that way of intercepting phone call on PhoneCrypt .
Those are just 2 quick ideas, more can be probably done.

Sounds much like a marketing activity – Not a security research.

I have to tell you. I analyzed the issue very carefully and on most aspects. All this things about the voice encryption analisys sounds to me like a marketing campaign of SecurStar GmbH to sell PhoneCrypt and gain reputation. A well articulated and well prepared campaign to attract the media saying, in an indirect way cheating the media, that PhoneCrypt is the only one secure. You see the press releases of SecurStar and of the “Security researcher Notrax telling that PhoneCrypt is the only secure product” . SecurStar PhoneCrypt is the only product the anonymous hacker “Notrax” consider secure of the “software solutions”.
The only “software version” in competition with:

SnapCell – No one can buy it. A security company that does not even had anymore a webpage. The company does not almost exist anymore.
rohde-schawarz – A company that have in his list price and old outdated hardware secure phone . No one would buy it, it's not good for genera use.

Does it sounds strange that only those other products are considered secure along with PhoneCrypt .

Also… let's check the kind of multimedia content in the different reviews available of Gold-Lock, Cellcrypt and Phonecrypt in order to understand how much the marketing guys pressed to make the PhoneCrypt review the most attractive:

Application Screenshots of application Video with demonstration of interception Network demonstration
PhoneCrypt 5 0 1
CellCrypt 0 2 0
GoldLock 1 2 0

It's clear that PhoneCrypt is reviewed showing more features explicitly shown and major security features product description than the other.

Too much difference between them, should we suspect it's a marketing tips?

But again other strange things analyzing the way it was done…
If it was “an impartial and neutral review” we should see good and bad things on all the products right?

Ok, see the table below regarding the opinion indicated in each paragraph of the different reviews available of Gold-Lock, CellCrypt and Phonecrypt (are the only available) to see if are positive or negative.

Application Number of paragraphs Positive paragraphs Negative paragraphs Neutral paragraphs
PhoneCrypt 9 9 0 0
CellCrypt 12 0 10 2
GoldLock 9 0 8 1

Detailed paragraphs opinion analysis of Phonecrypt
Paragraph of review Opinion expressed
From their website Positive Marketing feedback
Apple iPhone Positive Marketing feedback
Disk Encryption or voice Encryption Positive Marketing feedback
PBX Compatibility? Really Positive Marketing feedback
Cracking <10. Not. Positive Marketing feedback
Good thinking! Positive Marketing feedback
A little network action Positive Marketing feedback
UI Positive Marketing feedback
Good Taste Positive Marketing feedback
Detailed paragraphs opinion analysis of Gold-Lock 3G
Paragraph of review Opinion expressed
From their website Negative Marketing feedback
Licensed by The israeli Ministry of Denfese Negative Marketing feedback
Real Company or Part Time hobby Negative Marketing feedback
16.000 bit authentication Negative Marketing feedback
DH 256 Negative Marketing feedback
Downad & Installation! Neutral Marketing feedback
Cracking it <10 Negative Marketing feedback
Marketing BS101 Negative Marketing feedback
Cool video stuff Negative Marketing feedback
Detailed paragraphs opinion analysis of CellCrypt
Paragraph of review Opinion expressed
From their website Neutral Marketing feedback
A little background about cellcrypt Negative Marketing feedback
Master of Marketing Negative Marketing feedback
Secure Voice calling Negative Marketing feedback
Who's buying their wares Negative Marketing feedback
Downad & Installation! Neutral Marketing feedback
My Demo environment Negative Marketing feedback
Did they forget some code Negative Marketing feedback
Cracking it <5 Negative Marketing feedback
Room Monitoring w/ FlexiSpy Negative Marketing feedback
Cellcrypt unique features.. Negative Marketing feedback
Plain old interception Negative Marketing feedback
The Haters out there Negative Marketing feedback

Now it's clear that from their point of view on PhoneCrypt there is no single bad point while the other are always described in a negative way.
No single good point. Strange?
All those considerations along with the next ones really let me think that's very probably a marketing review and not an independent review.

Other similar marketing attempt from SecurStar

SecurStar GmbH is known to have used in past marketing activity leveraging this kind of “technical speculations”, abusing of partial information and fake unconfirmed hacking stuff to make marketing/media coverage.
Imho a rare mix of unfairness in leveraging the difficult for people to really understand the complexity of security and cryptography.

They already used in past Marketing activities like the one about creating a trojan for Windows Mobile and saying that their software is secure from the trojan that they wrote.
Read about their marketing tricks of 2007

They developed a Trojan (RexSpy) for Windows Mobile, made a demonstration capability of the trojan and later on told that they included “Anti-Trojan” capability to their PhoneCrypt software.They never released informations on that trojan, not even proved that it exists.

The researcher Collin Mulliner told at that time that it sounds like a marketing tips (also because he was not able to get from SecurStar CEO Hafner any information about that trojan):

“This makes you wonder if this is just a marketing thing.”

Now, let's try to make some logical reassignment.
It's part of the way they do marketing, an very unfriendly and unpolite approach with customers, journalist and users trying to provide wrong security concepts for a market advantage. Being sure that who read don't have all the skills to do in depth security evaluation and find the truth behind their marketing trips.

Who is the hacker notrax?

It sounds like a camouflage of a fake identity required to have an “independent hacker” that make an “independent review” that is more strong on reputation building.
Read about his bio:

¾ Human, ¼ Android (Well that would be cool at least.) I am just an enthusiast of pretty much anything that talks binary and if it has a RS232 port even better. During the day I masquerade as an engineer working on some pretty cool projects at times, but mostly I do the fun stuff at night. I have been thinking of starting an official blog for about 4.5 years to share some of the things I come across, can't figure out, or just cross my mind. Due to my day job and my nighttime meddling, I will update this when I can. I hope some find it useful, if you don't, well you don't.

There are no information about this guy on google.
Almost any hacker that get public have articles online, post in mailing archive and/or forum or some result of their activity.
For notrax, nothing is available.

Additionally let's look at the domain…
The domain infosecurityguard.com is privacy protected by domainsbyproxy to prevent understanding who is the owner.
The domain has been created 2 months ago on 01-Dec-09 on godaddy.com registrar.

What's also very interesting to notice that this “unknown hacker with no trace on google about him that appeared on December 2009 on the net” is referred on SecurStar GmbH Press Release as a “An IT security expert”.

Maybe they “know personally” who's this anonymous notrax? :)

Am i following my own conspiracy thinking or maybe there's some reasonable doubt that everything was arrange in that funny way just for a marketing activity?

Social consideration

If you are a security company you job have also a social aspects, you should also work to make the world a better place (sure to make business but “not being evil”). You cannot cheat the skills of the end users in evaluating security making fake misleading information.

You should do awareness on end users, to make them more conscious of security issues, giving them the tools to understand and decide themselves.

Hope you had fun reading this article and you made your own consideration about this.

Fabio Pietrosanti (naif)

ps Those are my personal professional opinion, let's speak about technology and security, not marketing.
pps i am not that smart in web writing, so sorry for how the text is formatted and how the flow of the article is unstructured!