Эта статья хочу уточнить и лучше объяснить нахождение в infosecurityguard.com regaring оценки продукта голос шифрования.
Эта статья хочу рассказать вам другую точку зрения, кроме infosecurityguard.com и объяснения, которые являются рациональными с обширным объяснений с точки зрения безопасности.
Сегодня я прочитал новости говоря: "PhoneCrypt: Основные уязвимость найдена в 12 из 15 шифрования речи Продукты и пошел читать сайт infosecurityguard .
Первоначально казалось, вып как большой научно-исследовательской деятельности, но потом я начал читать глубоко чтения о it.I обнаружили, что это не правильно исследований в области безопасности, но есть конкретные элементы, что это маркетинговая кампания хорошо сделано с целью привлечения средств массовой информации и гласности продукт.
Имхо, они были в состоянии обмануть журналистов и пользователей, поскольку маркетинговая кампания была абсолютно хорошо сделано, чтобы не быть обнаружены на первую попытку чтения. Я лично рассматривать его как действительного один на первый готов (они обманули меня изначально!).
Но если вы идете глубоко ... вы поймете, что:
- Это инициатива камуфляж маркетинга организована SecurStar GmbH, а не независимые исследования безопасности
- Они считают только контекст безопасности, где локальное устройство было скомпрометировано (программное обеспечение не может быть обеспечено в том случае, как говорят SSL может быть нарушена, если у вас есть троян!)
- Они не считают любую элементарную безопасность и криптографические критериям безопасности
Однако много важной сайте сообщил о нем:
Эта статья довольно долго, если вы читаете это вы будете лучше понимать, что происходит вокруг infosecurityguard.com исследований и научно-исследовательской результате.
Я хочу рассказать вам, почему и как (имхо), что они неправы.
Исследование пропустил рассмотреть безопасности, криптографии и прозрачность!
Ну, все это исследование звук так же, как уделяется маркетинговой цели сказать, что их продукт PhoneCrypt является "супер" продукт лучше всех остальных.
Любой эксперт по вопросам безопасности, что бы как долг на "оценку программного обеспечения" для того, чтобы обеспечивать конфиденциальность телефонных звонков будет оценивать другие различные характеристики продукта и технологии.
Да, это правда, что большая часть продукта, описанного SecurStar в их анонимного маркетинга веб-сайт под http://infosecurityguard.com имеют некоторую слабость.
Но соответствующая слабость и другие и PhoneCrypt к сожалению, как и большинство из описанных продуктов страдают от этого.
Давайте рассмотрим, какие характеристики необходимы базовые криптографию и требований безопасности (лучшие практики, фундамент и основы!)
- Безопасность Тро Неизвестность не работает
Основное правило в криптографии АМСВО с 1883 Огюст Kerckhoffs:
В хорошо спроектированной криптографической системы, только ключ должен быть секрет; не должно быть никакой секретности в алгоритме.
Современные специалисты по шифрованию приняли этот принцип, называя нибудь еще "безопасность через маскировку."
Прочитайте то, что Брюс Schneir, признанный эксперт и криптограф в мире говорят об этом Любой эксперт по безопасности скажет вам, что это правда. Даже новичок студент скажет вам, что это правда. Просто потому, что это единственный способ сделать криптографию.
Почти все изделия описаны в обзоре по SecurStar GmbH, включают PhoneCrypt, не обеспечивает точные сведения о своих криптографических технологий.
Точные детали:
- Подробная спецификация криптографического алгоритма (что не просто говорю "мы используем AES ")
- Подробная спецификация криптографического протокола (что не просто говорю "мы используем Диффи Хеллман ")
- Подробная спецификация измерения криптографической прочность (что не просто говорю "у нас есть 10 миллионов битный размер ключа ")
Предоставление точных деталей означает иметь обширную документацию с теоретических и практических последствий документирования ЛЮБОЙ одиночный образ как алгоритм работает, как работает протокол с точным указанием, чтобы повторить его для тестирования совместимости.
Это означает, что научное сообщество должно быть в состоянии играть с технологией, аудит его, взломать его.
Если мы ничего о криптографической системы в деталях не знаю, как мы можем знать, которые являются слабость и прочностные точки?
Майк Фрэтто, редактор сайта Network Computing, сделал большую статью на "Сказать НЕТ собственных криптографических систем" .
Cerias Университет Пердью сказать это .
б - NON рецензируемых и NON научно проверенных криптография не работает
В любом случае и в любом состоянии вы криптографии вы должны быть уверены, что кто-то будет проверить, отзыв, анализировать, distruct и reconstract с нуля вашу технологию и обеспечить те информацию бесплатно для публики для открытого обсуждения.
Именно так AES родился и как американского Национального института Standard сделать крипто делает (с публичного конкурса с отзывом общественного сверстников, где только лучшее оценивается Win).
Общественное обсуждение с публичного конкурса, где много рассмотрения самых известных и экспертной криптографом в мире, хакеры (с их фамилии, имени и лица, не нравится NoTrax) обеспечить свой вклад, рассказать, что они думают.
Это называется "экспертной оценки".
Если криптографический технология имеет расширенный и важную экспертную оценку, распределенных в катится мир от университетов, частных охранных предприятий, военных учреждений, хакеров и все приходящие из самых разных уголков мира (от США до Европы в Россию в Южную Америку на Ближний Восток в Китай), и все они согласны, что конкретная технология это безопасно ...
Ну, в таком случае мы можем рассматривать технологии безопасной, потому что много лиц с хорошей репутацией и авторитетом, прибывающего из многих другом месте в мире публично отзывы, проанализированы и подтвердил, что технология это безопасно.
Как частная компания может даже думать, чтобы придумать на это собственный протокол безопасной передачи данных, когда это научно заявил, что это не возможно, чтобы сделать это в "служебной и закрытым способом"?
IBM вам сказать, что рецензирование это необходимое для криптографии .
Bruce Schneier tell you that “Good cryptographers know that nothing substitutes for extensive peer review and years of analysis.”
Philip Zimmermann will tell you to beware of Snake Oil where the story is: “Every software engineer fancies himself a cryptographer, which has led to the proliferation of really bad crypto software.”
c – Closed source cryptography does not work
As you know any kind of “serious” and with “good reputation” cryptographic technology is implemented in opensource.
There are usually multiple implementation of the same cryptographic algorithm and cryptographic protocol to be able to review all the way it works and certify the interoperability.
Supposing to use a standard with precise and extended details on “how it works”, that has been “peer reviewed” by the scientific community BUT that has been re-implemented from scratch by a not so smart programmer and the implementation it's plenty of bugs.
Well, if the implementation is “opensource” this means that it can be reviewed, improved, tested, audited and the end user will certaintly have in it's own had a piece of technology “that works safely” .
Google release opensource crypto toolkit
Mozilla release opensource crypto toolkit
Bruce Schneier tell you that Cryptography must be opensource .
Another cryptographic point of view
I don't want to convince anyone but just provide facts related to science, related to cryptography and security in order to reduce the effect of misinformation done by security companies whose only goes is to sell you something and not to do something that make the world a better.
When you do secure products, if they are not done following the proper approach people could die.
It's absolutely something irresponsible not to use best practice to do crypto stuff.
To summarize let's review the infosecurityguard.com review from a security best pratice point of view.
Product name | Security Trough Obscurity | Public peer review | Open Source | Compromise locally? |
Caspertec | Obscurity | No public review | Closed | Да |
CellCrypt | Obscurity | No public review | Closed | Да |
Cryptophone | Transparency | Limited public review | Public | Да |
Gold-Lock | Obscurity | No public review | Closed | Да |
Illix | Obscurity | No public review | Closed | Да |
No1.BC | Obscurity | No public review | Closed | Да |
PhoneCrypt | Obscurity | No public review | Closed | Да |
Rode&Swarz | Obscurity | No public review | Closed | Да |
Secure-Voice | Obscurity | No public review | Closed | Да |
SecuSmart | Obscurity | No public review | Closed | Да |
SecVoice | Obscurity | No public review | Closed | Да |
SegureGSM | Obscurity | No public review | Closed | Да |
SnapCell | Obscurity | No public review | Closed | Да |
Tripleton | Obscurity | No public review | Closed | Да |
Zfone | Transparency | Public review | Open | Да |
ZRTP | Transparency | Public review | Open | Да |
*Green means that it match basic requirement for a cryptographic secure system
* Red / Broken means that it does not match basic requirement for a cryptographic secure system
That's my analysis using a evaluation method based on cryptographic and security parameters not including the local compromise context that i consider useless.
However, to be clear, those are only basic parameters to be used when considering a voice encryption product (just to avoid being in a situation that appears like i am promoting other products). So it may absolutely possible that a product with good crypto ( transparency, peer reviewed and opensource) is absolutely a not secure product because of whatever reason (badly written, not usable causing user not to use it and use cleartext calls, politically compromised, etc, etc).
I think i will prepare a broader criteria for voice crypto technologies and voice crypto products, so it would be much easier and much practical to have a full transparent set of criterias to evaluate it.
But those are really the basis of security to be matched for a good voice encryption system!
Read some useful past slides on security protocols used in voice encryption systems (2nd part).
Now read below some more practical doubt about their research.
The security concept of the review is misleading: any hacked device can be always intercepted!
I think that the guys completely missed the point: ANY KIND OF SOFTWARE RUNNING ON A COMPROMISED OPERATING SYSTEM CAN BE INTERCEPTED
Now they are pointing out that also Zfone from Philip Zimmermann is broken (a pc software), just because they install a trojan on a PC like in a mobile phone?
Any security software rely on the fact that the underlying operating system is somehow trusted and preserve the integrity of the environment where the software run.
- If you have a disk encryption system but your PC if infected by a trojan, the computer is already compromised.
- If you have a voice encryption system but your PC is infected by a trojan, the computer is already compromised.
- If you have a voice encryption system but your mobile phone is infected by a trojan, the mobile phone is already compromised.
No matter which software you are running, in such case the security of your operating environment is compromised and in one way or another way all the information integrity and confidentiality is compromised.
Like i explained above how to intercept PhoneCrypt.
The only things that can protect you from this threat is running in a closed operating system with Trust Computing capability, implementing it properly.
For sure on any “Open” operating system such us Windows, Windows Mobile, Linux, iPhone or Android there's no chance to really protect a software.
On difficult operating system such as Symbian OS or RimOS maybe the running software can be protected (at least partially)
That's the reason for which the security concept that guys are leveraging to carry on their marketing campaign has no clue.
It's just because they control the environment, they know Flexispy software and so they adjusted their software not to be interceptable when Flexispy is installed.
If you develop a trojan with the other techniques i described above you will 100% intercept PhoneCrypt.
On that subject also Dustin Tamme l, Security researcher of BreakPoint Systems , pointed on on VoIP Security Alliance mailing lists that the security analysis is based on wrong concepts .
The PhoneCrypt can be intercepted: it's just that they don't wanted to tell you!
PhoneCrypt can be intercepted with “on device spyware”.
Why?
Because Windows Mobile is an unsecure operating environment and PhoneCrypt runs on Windows Mobile.
Windows Mobile does not use Trusted Computing and so any software can do anything.
The platform choice for a secure telephony system is important.
How?
I quickly discussed with some knowledgeable windows mobile hackers about 2 different way to intercept PhoneCrypt with an on-device spyware (given the unsecure Windows Mobile Platform).
a) Inject a malicious DLL into the software and intercept from within the Phonecrypt itself.
In Windows Mobile any software can be subject to DLL code injection.
What an attacker can do is to inject into the PhoneCrypt software (or any software running on the phone), hooking the Audio related functions acting as a “function proxy” between the PhoneCrypt and the real API to record/play audio.
It's a matter of “hooking” only 2 functions, the one that record and the one that play audio.
That's simple, any programmer will tell you to do so.
They simply decided that's better not to make any notice about this.
b) Create a new audio driver that simply act as a proxy to the real one and intercept PhoneCrypt
In Windows Mobile you can create new Audio Drivers and new Audio Filters.
What an attacker can do is to load a new audio driver that does not do anything else than passing the real audio driver function TO/FROM the realone. In the meantime intercept everything recorded and everything played :-)
They simply decided that's better not to make any notice to that way of intercepting phone call on PhoneCrypt .
Those are just 2 quick ideas, more can be probably done.
Sounds much like a marketing activity – Not a security research.
I have to tell you. I analyzed the issue very carefully and on most aspects. All this things about the voice encryption analisys sounds to me like a marketing campaign of SecurStar GmbH to sell PhoneCrypt and gain reputation. A well articulated and well prepared campaign to attract the media saying, in an indirect way cheating the media, that PhoneCrypt is the only one secure. You see the press releases of SecurStar and of the “Security researcher Notrax telling that PhoneCrypt is the only secure product” . SecurStar PhoneCrypt is the only product the anonymous hacker “Notrax” consider secure of the “software solutions”.
The only “software version” in competition with:
–
SnapCell – No one can buy it. A security company that does not even had anymore a webpage. The company does not almost exist anymore.
Does it sounds strange that only those other products are considered secure along with PhoneCrypt .
Also… let's check the kind of multimedia content in the different reviews available of Gold-Lock, Cellcrypt and Phonecrypt in order to understand how much the marketing guys pressed to make the PhoneCrypt review the most attractive:
Применение | Скриншоты приложения | Видео с демонстрацией перехвата | Сеть демонстрация |
PhoneCrypt | 5 | 0 | 1 | |
CellCrypt | 0 | 2 | 0 |
GoldLock | 1 | 2 | 0 |
It's clear that PhoneCrypt is reviewed showing more features explicitly shown and major security features product description than the other.
Too much difference between them, should we suspect it's a marketing tips?
But again other strange things analyzing the way it was done…
If it was “an impartial and neutral review” we should see good and bad things on all the products right?
Ok, see the table below regarding the opinion indicated in each paragraph of the different reviews available of Gold-Lock, CellCrypt and Phonecrypt (are the only available) to see if are positive or negative.
Применение | Number of paragraphs | Positive paragraphs | Negative paragraphs | Neutral paragraphs |
PhoneCrypt | 9 | 9 | 0 | 0 |
CellCrypt | 12 | 0 | 10 | 2 |
GoldLock | 9 | 0 | 8 | 1 |
Detailed paragraphs opinion analysis of Phonecrypt Paragraph of review | Opinion expressed |
From their website | Positive Marketing feedback |
Apple iPhone | Positive Marketing feedback |
Disk Encryption or voice Encryption | Positive Marketing feedback |
PBX Compatibility? Really | Positive Marketing feedback |
Cracking <10. Not. | Positive Marketing feedback |
Good thinking! | Positive Marketing feedback |
A little network action | Positive Marketing feedback |
UI | Positive Marketing feedback |
Good Taste | Positive Marketing feedback |
Paragraph of review | Opinion expressed |
From their website | Negative Marketing feedback |
Licensed by The israeli Ministry of Denfese | Negative Marketing feedback |
Real Company or Part Time hobby | Negative Marketing feedback |
16.000 bit authentication | Negative Marketing feedback |
DH 256 | Negative Marketing feedback |
Downad & Installation! | Neutral Marketing feedback |
Cracking it <10 | Negative Marketing feedback |
Marketing BS101 | Negative Marketing feedback |
Cool video stuff | Negative Marketing feedback |
Detailed paragraphs opinion analysis of
CellCrypt Paragraph of review | Opinion expressed |
From their website | Neutral Marketing feedback |
A little background about cellcrypt | Negative Marketing feedback |
Master of Marketing | Negative Marketing feedback |
Secure Voice calling | Negative Marketing feedback |
Who's buying their wares | Negative Marketing feedback |
Downad & Installation! | Neutral Marketing feedback |
My Demo environment | Negative Marketing feedback |
Did they forget some code | Negative Marketing feedback |
Cracking it <5 | Negative Marketing feedback |
Room Monitoring w/ FlexiSpy | Negative Marketing feedback |
Cellcrypt unique features.. | Negative Marketing feedback |
Plain old interception | Negative Marketing feedback |
The Haters out there | Negative Marketing feedback |
Now it's clear that from their point of view on PhoneCrypt there is no single bad point while the other are always described in a negative way.
No single good point. Strange?
All those considerations along with the next ones really let me think that's very probably a marketing review and not an independent review.
Other similar marketing attempt from SecurStar
SecurStar GmbH is known to have used in past marketing activity leveraging this kind of “technical speculations”, abusing of partial information and fake unconfirmed hacking stuff to make marketing/media coverage.
Imho a rare mix of unfairness in leveraging the difficult for people to really understand the complexity of security and cryptography.
They already used in past Marketing activities like the one about creating a trojan for Windows Mobile and saying that their software is secure from the trojan that they wrote.
Read about their marketing tricks of 2007
They developed a Trojan (RexSpy) for Windows Mobile, made a demonstration capability of the trojan and later on told that they included “Anti-Trojan” capability to their PhoneCrypt software.They never released informations on that trojan, not even proved that it exists.
The researcher Collin Mulliner told at that time that it sounds like a marketing tips (also because he was not able to get from SecurStar CEO Hafner any information about that trojan):
“This makes you wonder if this is just a marketing thing.”
Now, let's try to make some logical reassignment.
It's part of the way they do marketing, an very unfriendly and unpolite approach with customers, journalist and users trying to provide wrong security concepts for a market advantage. Being sure that who read don't have all the skills to do in depth security evaluation and find the truth behind their marketing trips.
Who is the hacker notrax?
It sounds like a camouflage of a fake identity required to have an “independent hacker” that make an “independent review” that is more strong on reputation building.
Read about his bio:
¾ Human, ¼ Android (Well that would be cool at least.) I am just an enthusiast of pretty much anything that talks binary and if it has a RS232 port even better. During the day I masquerade as an engineer working on some pretty cool projects at times, but mostly I do the fun stuff at night. I have been thinking of starting an official blog for about 4.5 years to share some of the things I come across, can't figure out, or just cross my mind. Due to my day job and my nighttime meddling, I will update this when I can. I hope some find it useful, if you don't, well you don't.
There are no information about this guy on google.
Almost any hacker that get public have articles online, post in mailing archive and/or forum or some result of their activity.
For notrax, nothing is available.
Additionally let's look at the domain…
The domain infosecurityguard.com is privacy protected by domainsbyproxy to prevent understanding who is the owner.
The domain has been created 2 months ago on 01-Dec-09 on godaddy.com registrar.
What's also very interesting to notice that this “unknown hacker with no trace on google about him that appeared on December 2009 on the net” is referred on SecurStar GmbH Press Release as a “An IT security expert”.
Maybe they “know personally” who's this anonymous notrax? :)
Am i following my own conspiracy thinking or maybe there's some reasonable doubt that everything was arrange in that funny way just for a marketing activity?
Social consideration
If you are a security company you job have also a social aspects, you should also work to make the world a better place (sure to make business but “not being evil”). You cannot cheat the skills of the end users in evaluating security making fake misleading information.
You should do awareness on end users, to make them more conscious of security issues, giving them the tools to understand and decide themselves.
Hope you had fun reading this article and you made your own consideration about this.
Fabio Pietrosanti (naif)
ps Those are my personal professional opinion, let's speak about technology and security, not marketing.
pps i am not that smart in web writing, so sorry for how the text is formatted and how the flow of the article is unstructured!