Tag Archives: Ochrana osobných údajov

RFC 6189: ZRTP je konečne štandardný!

Nakoniec ZRTP bolo pridelené úradné RFC úloha, RFC6189 ZRTP: Media Path dohodu kľúče pre Unicast Secure RTP.

To malo ako závislosť SRTP s AES kľúča veľkosti 256bit, že teraz bol definovaný ako RFC6188 .

Je to vzrušujúce vidieť RFC nakoniec prepustený, pretože je to dôležitý míľnik nastaviť ZRTP ako oficiálny štandard pre end-to-end šifrovanie podobne ako PGP bol e-maily.

Teraz každá organizácia na svete, bude oficiálne schopní realizovať ZRTP pre end-to-end šifrovanie protokolu hlasu

V súčasnej dobe 3 rôzne verejné implementácie protokolu ZRTP existuje:

Každý z nich ponúka rôzne vlastnosti protokolu, ale najdôležitejšie sú známe ako interoperabilné.

Nová vlna prichádza na svet šifrovanie hovoru, irrupting do šedej zóny, kde väčšina spoločností, ktoré systémy telefónne šifrovanie bolo vykonávacím vlastné šifrovanie.

Teraz štandard bol nastavený a existuje len málo dôvodov ponechať na vykonávacie niečo iné.

Hurra pán Zimmermann a všetky komunity spoločností (ako PrivateWave ) a jednotlivcov (ako Werner Dittmann ), ktorý pracoval na tom!

Dnes je veľký deň, tento druh technológie je teraz oficiálne, a tiež s niekoľkými existujúcu implementáciu!

Philip, si to urobil znova, poklonu vašej čistého ducha a odhodlanie :-)

Podiel

Pokrok pre GSM trhlín v meste Freiburg univerzite

Vzrušujúci svet mobilných protokolov (GSM, GSM-R, TETRA, UMTS atď), hacking je stále oficiálne výskumnej činnosti vysokých škôl.

Aby investície opensource kódu úniky praskanie softvér dáva príležitosť študentom univerzity pracovať na tom, vylepšiť a urobiť silný výskum.

Univerzita vo Freiburgu práve vydala papiera Praktické cvičenia na šifrovanie GSM A5 / 1 spolu s gsmframencoder podporného nástroja pre zlepšenie šnupanie, dekódovanie a tepelného krakovania.

Otvorenie hardvér, softvér otvorení, otvorenie protokolu demonštrovať slabosť akéhokoľvek druhu patentovanej metódy alebo proces budovania komunikačných a bezpečnostných technológií.

To by malo byť cieľom všetkých vedcov, ktorí sa snažia otvoriť-up a crack akékoľvek proprietárne a uzavreté technológie prinútiť priemysel pokračuje iba s interoperabilné a otvorený prístup pri navrhovaní telekomunikačných protokolov.

Podiel

Môj TOR exit node skúsenosti sa snaží odfiltrovať hlučný prevádzku

Na začiatku tohto roka som sa rozhodol, že je čas spustiť TOR exit node, tak som priniesol VPS na hetzner.de (pretože oni sú uvedené ako dobré TOR ISP ) a nastaviť výstupné-uzol s prezývkou privacyresearch.infosecurity.ch s 100Mbit / s pripojenie pre prvý 1TB mesačných údajov, potom 10 Mbit / s plochou.

Je tiež spustiť TOR2WEB softvér http://tor.infosecurity.ch .

Aj nastaviť Exit politiky , ako navrhuje spustením exit-uzol s minimálnym obťažovaním a pripravila zneužívanie odozvy šablóny .

V prvý deň som bola spustená na uzol, ktorý som dostal ihneď DMCA sťažnosť kvôli peer to peer prevádzka.

Tak som sa rozhodol odfiltrovať niektoré P2P prevádzka pomocou OpenDPI iptables modul a podľa zákona DMCA sťažujú automaticky zmizol:

iptables-A OUTPUT-m-opendpi eDonkey-GaduGadu-FastTrack-Gnutella-DirectConnect-bittorrent-WinMX-soulseek-j REJECT

Potom, pretože som Talian, rozhodol som sa, aby sa zabránilo môj TOR uzol pre pripojenie k talianskej priestoru internetovej adrese, aby sa znížila pravdepodobnosť, že hlúpy žalobca by ma vzbudiť v dopoludňajších hodinách, pretože nechápali, že som beh TOR uzol.

Snažil som sa, s pomocou hellais ktorý napísal scenár, aby sa výstupné politiku odmietnuť tvrdenie , odmietnuť všetky talianske netblocks na základe ioError v blockfinder , ale zistili sme, že torrc konfiguračné súbory s 1000 riadkami robil TOR havárii.

Išli sme sa otvoriť lístok ohlásiť nehodu o našej snahe blokovať TOR exit politiku krajiny a zistila podobný pokus , kedy sme sa podieľali, ale stále sa zdá byť otvorenou otázkou.

Záver je, že to nie je možné, aby sa Zem výstupné politiku pre uzol výstupné TOR v čistom a zdvorilý spôsob, tak som sa rozhodol ísť špinavú cestu pomocou iptables / GeoIP . Po boji, aby bolo zostaviť správne, bol to jeden riadok iptables zablokovať prevádzku smerujúcu do Talianska:

iptables-A OUTPUT-p tcp-m state-state NEW-m GeoIP-dst-cc-j REJECT IT

Teraz z môjho výjazdu-uzla nebude pripojenie k sieťam talianskych potrebné urobiť, a ja som v bezpečí pred možno hlúpe zástupcovia nerozumie TOR (mám výnimku pre všetky TOR adresu uzla IP platili pred).

Po niekoľkých ďalších dňoch som začal prijímať sťažnosti kvôli portscan aktivít pochádza z mojej tor uzlov.

Z môjho pohľadu chcem podporiť anonymity sieti, nie anonymný hackerské pokusy, a tak chcem odfiltrovať scannování a útokmi z pochádzajúci z môjho node.That je zložité záležitosti, ktoré vyžadujú nejakú štúdiu, takže do tej doby som nainštaloval scanlogd a šnupať , pretože chcem hodnotiť, koľko útokov, aký druh útokov dostať von z mojej TOR exit uzla.
Neskôr sa budem snažiť zariadiť nejaké filtrovanie, uistite sa, že je schopný odfiltrovať veľké útoky.
Na to, čo súvisí s portscan zdá sa, že tu neexistuje žiadna verejná nástroje pre detekciu a filtrovanie odchádzajúce scannování, ale iba filtrovať prichádzajúce portscan takže asi bude musieť niečo napísať ad-hoc.
Budem o tom, ako sa veci vyvíjajú, a ak tam bude nejaký príjemný spôsob, ako realizovať takým spôsobom, Lightwave Snort inline selektívne odfiltrovať hlavný útok pokus pochádzajúce z môjho výjazdu-uzla.

Mojím cieľom je, aby výstupný uzol beží dlhodobo (aspoň 1TB prevádzky za mesiac venovaný na TVZ), zníženie úsilie spojené s ISP sťažovať a snaží sa robiť to najlepšie spustiť exit-uzol s primeranou zodpovednosť.

Podiel

Zorg, nový C + + a Java ZRTP realizácia verejnej vydania

Ahoj všetkým, dnes v PrivateWave Italia SpA, talianska spoločnosť zaoberajúca sa vývojom technológií pre ochranu súkromia a zabezpečenie informácií v hlasovej telekomunikačnej služby, kde som CTO, vydáme Zorg, nový open source implementácia protokolu ZRTP k dispozícii na stiahnutie z http://www. zrtp.org .

ZRTP [1] poskytuje end-to-end výmenu kľúčov pomocou eliptických kriviek Diffie-Hellmann 384bit AES-256 a SRTP šifrovanie.

Zorg bol pôvodne vyvinutý a realizovaný v produktoch PrivateGSM PrivateWave hlasových šifrovanie sú k dispozícii pre nasledujúce platformy: BlackBerry, Nokia a iOS (iPhone).

Zorg C + + bol integrovaný s PJSIP source open VoIP SDK [2], a to za predpokladu, ako integračný náplasti proti PJSIP 1.8.5. To bolo testované na iPhone, Symbian, Windows, Linux a Mac OS X.

Zorg Java bola integrovaná v rámci vlastnej verzii MJSIP [3] open source SDK na platforme Blackberry a to vrátane optimalizácie využitia pamäte potrebné znížiť na minimum aktivity garbage collector.

Obe platformy majú oddelené a modulárne kryptografický zadné končí tak, že šifrovacie algoritmy implementácia môže byť ľahko vymenený s ostatným.

. Zorg je licencovaný pod GNU AGPL a zdrojový kód je k dispozícii na GitHub na https://github.com/privatewave/ZORG .

Sme uvoľnenie pod open source, a to v súlade s naším prístupom k bezpečnosti [4], ako sme naozaj dúfam, že to môže byť užitočné pre open source ekosystému vytvárať nové systémy hlasovej šifrovanie na podporu slobody prejavu.

Viac ako 20 pjsip na báze open source VoIP šifrovací softvér, a niekoľko písaný v Jave môže mať priamy prospech z uvoľnenia Zorg.

Boli by sme radi prijímať návrh spolupráce, nové integrácie, nové kryptografické back-ends, chyba skautingu a čo užitočné pre zlepšenie a nechať potvrdiť ZRTP ako štandard šifrovanie hovoru.

Zorg je k dispozícii od http://www.zrtp.org .

[1] ZRTP: http://en.wikipedia.org/wiki/ZRTP
[2] PJSIP: http://www.pjsip.org
[3] MJSIP: http://www.mjsip.org
[4] Bezpečnosť prístup: http://www.privatewave.com/security/approch.html

Podiel

Šifrované mobil pevné telefónne hovory s Asterisk 1,8

Práve sme vydali technické howto o tom, ako vybudovať bezpečné mobilné na pevnej infraštruktúre VoIP s:

V nasledujúcich týždňoch ostatné howto, ako je tento vyjde použitím iných serverových platforiem, ako je FreeSWITCH, všetko v duchu transparentnosti a pákový efekt opensource bezpečnostných technológií.

Podiel

PrivateGSM: Blackberry / iPhone / Nokia mobilné hlasové šifrovanie s ZRTP alebo SRTP / SDES

Úplne vyhnúť používať svoj vlastný osobný blog, ako zarobiť podporu akéhokoľvek druhu tovaru.

V tej dobe to nie je iné, ale chcem vám povedať fakty o produktoch som pracovať na bez zložitého marketing, ale pobyt technické.

Dnes, v PrivateWave kde som CTO a spoluzakladateľ vydala verejne mobilné VoIP šifrovacie produkty pre Blackberry, iPhone a Nokia:

  • 1. niekedy Blackberry šifrovaná VoIP s ZRTP - PrivateGSM VoIP Professional
  • 1. niekedy iPhone šifrovaná VoIP s ZRTP - PrivateGSM VoIP Professional
  • 1. niekedy Blackberry šifrovaná VoIP klient s SRTP s SDES výmene kľúčov cez SIP / TLS - PrivateGSM VoIP Enterprise

logo-privatewave-colore.png

Na PrivateWave používame iný prístup vzhľadom na väčšinu šifrovanie hovoru spoločnosti tam, prečítajte si náš prístup k bezpečnosti .

Význam týchto výrobkov v technológii a priemysel krajiny možno zhrnúť takto:

  • Je to prvý hlas šifrovanie spoločnosť iba pomocou bezpečnostných štandardov protokolov (a očakávame, že trh bude reagovať, pretože je jasné, že proprietárne technológie pochádzajúce z dedičstva ČSD nemôže poskytnúť rovnakú hodnotu)
  • Je to prvý prístup do hlasovej šifrovanie použiť iba open source a štandardné šifrovací engine
  • Je to prvý hlas šifrovanie prístup poskytnúť iný model zabezpečenia pomocou rôznych technológií (end-to-end pre ZRTP a end-to-site pre SRTP )

Tí sada Mobile Secure clients, určený pre profesionálne zabezpečenie použiť iba s použitím najlepší telekomunikačnej a bezpečnostné technológie, poskytuje vysoký stupeň ochrany spolu s dobrým výkonom i za zlých podmienok v sieti:

Aplikácie sú:

icona-pgsm.png

Podporované mobilné zariadenia sú:

Pokiaľ ide o ZRTP sme sa rozhodli zdôrazniť a pretiahnuť všetky bezpečnostné a paranoidné črtou protokolu s nejakým malým navyše:

Naše prísne adresár integrácie, presahuje ZRTP RFC špecifikácie, ktoré by mohli byť citlivé na niektoré útoky sú použité v mobilných telefónoch, pretože užívateľského správania sa nepozerať na mobilný obrazovky.

Naša Paranoá spôsob použitia ZRTP zmiernenie také podmienky, budeme písať o tom neskôr a / alebo pridá konkrétne detaily pre zaradenie RFC.

Niekoľko slov o PrivateGSM Professional s end-to-end šifrovanie s ZRTP

Prečítajte si technický list tu!

Ak chcete ho stiahnuť tu a len dať svoje telefónne číslo

To sú výsledky tvrdej práce všetkých mojich veľmi kvalifikovaných pracovníkov (16 osôb pracovalo na tomto 6 projektov, pre 3 rôzne platformy) v náročných technológií (šifrovanie hovoru) v sťaženom pracovnom prostredí (špinavé mobilných sietí a špinavé mobilné operačné systémy) pre viac ako 2 roky.

Som veľmi hrdý na našich zamestnancov!

Čo bude ďalej?

V nasledujúcich týždňoch uvidíte uvoľnení hlavného súboru dokumentácie, ako sú integrácia s hviezdičkou, freeswitch a ďalšie povolená bezpečnosť ústredne, spolu s niektorými vzrušujúce iný bezpečnostný technologické novinky, ktoré som si istý, že budú všimol ;)

Bola to tvrdá práca a viac sa musí urobiť, ale som presvedčený, že bezpečnosť a opensource komunita páči také výrobky a naše transparentný prístup tiež s otvorenými dôležitých správ a open source integrácie, ktoré tvoria veľmi politicky neutrálne (backdoor zadarmo) technológie .

Podiel

Pár pekné poskytovateľa VPN

Existuje mnoho dôvodov, prečo by človek potrebovať pre prístup k Internetu koryto VPN.

Napríklad, ak žijete v krajine, blokovanie urcitých obsah (ako anti-miestne vládne webové stránky, porno, atď) a / alebo protokolov (ako je napríklad Skype, VoIP), ktoré by pravdepodobne chcieť presunúť svoje pripojenie k internetu mimo škaredé blokovanie zemi pomocou šifrované VPN tunely.

Zhodnotila som niekoľko hostil VPN server a pár z nich znie celkom dobre medzi rozšírené ponuka takých služieb:

SwissVPN

Vstup na internete zo Švajčiarska.

Náklady 6 CHF / mesiacov

Voliteľné verejná pevná IP adresa

Užitočné, ak potrebujete:

  • Len obísť miestnej country filtre s dobrou priepustnosťou
  • Vystaviť verejných služieb koryto VPN s voliteľnou pevnú verejnú IP adresu.

Prehrávať

Vstup na internete tým, že zvolí 20 rôznych krajín (pri každom pripojení).

Užitočné, ak potrebujete urobiť:

  • business intelligence na pretekára (sa zdá, že pochádza z krajiny X pri ich pripojenie)
  • pozri filmu / Telefilm povolený iba z národných IP webových miest
  • pozri google výsledkov medzi rôznymi krajinami

Podiel

Vzdialene zachytenie SNOM VoIP telefóny

Navrhujem čítanie vzdialene kliknutím VoIP telefóny "na VoIP Security Alliance blogu Shawn Merdinger .

Konkrétnym príkladom toho, ako existujúce telefónne infraštruktúry sú čoraz viac ohrozené kybernetickým útokom.

Podiel

Hlasová komunikácia Security Workshop

Dobrý deň,

Urobil som hovoriť o hlasovej komunikácie bezpečnostných technológií na University of Trento po zaujímavej výmene informácií s Crypto Lab podarilo profesora Massimiliano Sala .

Navrhujem záujemcov čítať, najmä druhú časť, pretože tam je inovatívny kategorizácia jednotlivých technológií šifrovania hovoru, ktoré sa používajú v niekoľkých odvetviach.

Snažil som sa vysvetliť, a dostať sa von z tohto veľmi roztriešteného technologického sektora tým, že poskytuje široký prehľad o technológiách, ktoré sú obvykle absolútne nesúvisí jeden každý iný, ale prakticky všetci platia pre šifrovanie hovoru, ktorý nasleduje po zaradení:

  • Mobilné TLC Priemyselné štandardy šifrovanie hovoru
  • Vládne a vojenské štandardy šifrovanie hovoru
  • Verejné bezpečnostné štandardy šifrovanie hovoru
  • IETF štandardy šifrovanie hovoru
  • Rôzne patentovanej technológie šifrovania hovoru

Je to obrovský slideware, 122 šmykľavky, odporúčam ísť čítanie druhej časti preskakovanie detekčných technológií prehľad ktoré sa už vzťahujú svojom vystúpení roku 2009.

Hlasová komunikácia bezpečnosť


Zobraziť viac prezentácií od Fabio Pietrosanti .

Zvlášť sa mi páči koncept šifrovanie Čokoláda triedy, ktoré chcete poskytnúť nejaké inovácie na šifrovanie Snake Oil konceptu.

Ale musím sa dostať viac do hĺbky o šifrovanie Chocolate triedy súvislosti bude pravdepodobne robiť pred koncom školského roka tým, že aplikovaný kurz na pochopenie a vyhodnotenie prakticky v reálnom kontexte zabezpečenia rôznych technológií šifrovania hovoru.

Podiel

GSM praskanie metodík penetračných testov (OSSTMM)?

Pretože väčšina z tohto blogu čitateľa už viete, v posledných rokoch tam bolo veľa aktivít spojených s verejným výskumom pre kontrolu GSM a praskanie.

Avšak, keď tam bola obrovská mediálne pokrytie GSM na praskanie výsledkov výskumu, nástroje, aby sa praskanie bolo naozaj v počiatočnej fáze a stále veľmi neefektívne.

Teraz Frank Stevenson , nórsky cryptanalyst, ktoré už zlomil Content Scrambling System z disku DVD video, ktoré sa podieľajú na A51 krakovanie projekt začal Karsten Nohl , bol prepustený Kraken , nová vylepšená verzia A51 krakovania.

Je zaujímavé si všimnúť, že WiFi krakovania mal podobný príbeh ako prvý WiFi WEP praskanie objav bol celkom pomalý v predchádzajúcich techník, ale neskôr Korok, hacker pracuje na praskanie kódu, zlepšiť útok systému drammatically.

To je príbeh spolupráca bezpečnostného výskumu, začnete výskum, niekto nasledovať ho a vylepšiť, iné ho sledovať a vylepšila a na konci dostanete výsledok.

Prečítajte si viac na krakovanie Kraken GSM verziu softvéru .

A zostaňte naladení budúci týždeň na konferencii Karsten Nohl blackhat vysvetlí podrobnosti požadované nastavenie hardvéru a podrobný návod, ako to urobiť :-)

Naozaj by som si prial, aby tieto nástroje začlenené do distribúcie BackTrack Linux Penetračné testovanie s OSSTMM metodiky vymáhanie testovania odposluchu GSM a muža v strednom :-)

Ak sa veci postupovať týmto spôsobom a Ettus výskum (výrobca USRP2 softvéru rádia používané pre nízkonákladové GSM signálu prijímacie) nebude strhnutý, môžeme stále vidieť.

Podiel

Hadí olej zabezpečenie pohľadávky kryptografické zabezpečenia produktu

Bezpečnosť rast trhu, viac spoločností ide na trh, ale koľko z nich sú vážne brať to, čo robia?

Viete, robiť bezpečnostné technológie znamená, že ste osobne zodpovedný za ochranu informácií o užívateľovi. Musíte si je vedomý toho, čo potrebujú, čo presne vaše robíte a aký druh modelu ohrozenia váš produkt chrániť.

Typickým problémom funkciami zabezpečenia produktu predstavuje neschopnosť užívateľa na vyhodnotenie bezpečnostné nároky samotného výrobku.

Takže tam je veľa spoločností, ktoré nie-tak-etický marketing bezpečnostných prvkov, na základe faktov, že žiadny užívateľ bude môcť hodnotiť.

Bolo vysvetlené skôr situácia umiestnené v bezpečnostnej problematike šifrovanie Snake Oil, evolúcia vo vedeckej kryptografických prostredí, ktorý nám dnes používajú najkvalitnejších technológií pre ochranu informácií, bez toho aby museli príliš starať o zadné vrátka a neistoty.

Poďme hovoriť o Snake Oil Encryption

Snake Oil Kryptografia : V kryptografiu , hadí olej je termín používaný na opis komerčné kryptografické metódy a produkty, ktoré sú považované za falošné alebo podvodné. Rozlišovanie bezpečné šifrovanie z neistého kryptografia môže byť ťažké z hľadiska užívateľa. Mnoho dešifranti, ako sú Bruce Schneier a Phil Zimmermann , sa zaväzujú, že vzdelávať verejnosť v tom, ako bezpečné šifrovanie sa vykonáva, rovnako ako zdôraznenie zavádzajúce uvádzanie niektorých kryptografických produktov.

Najpoužívanejšie odkazy crypto bezpečnostný guru, Philip Zimmermann a Bruce Schneier, bol prvý hovoriť o šifrovanie Snake Oil:

Snake Oil Philip Zimmermann

Snake Oil Bruce Schneier

Michigan Telekomunikácie a technológie Law Review tiež veľmi dobrú analýzu týkajúcu sa bezpečnostných prvkov bezpečnostných produktov, SNAKE OIL-SECURITY tvrdí, že "systematické skresľovania Zabezpečenie produktu . Vysvetľujú o škaredé marketingové triky používané na vyladenie užívateľom neschopnosť vyhodnotiť bezpečnostné funkcie, vrátane ekonomickej a právnu zodpovednosť implikácie.

Very famous is the sentence of Russ Nelson : Niekoľko had ropnej spoločnosti bezpečnostných produktov nevysvetľuje, a nie je jasné, o modeli ohrozenia, ku ktorému je výrobok vzťahujú Veľmi známa je veta. Russ Nelson :

"Pamätaj si, crypto bez modelu ohrozenia je ako sušienky bez mlieka. ..... Kryptografia bez modelu ohrozenia je ako materstvo bez jablkový koláč. Nemožno povedať, že toľkokrát. Viac všeobecne, bezpečnosti bez modelu ohrozenia je podľa svojej definície bude na neúspech. "

Tak, ako rozpoznať výrobky, hadí olej zabezpečenia?

Pozrite sa na pokyn na mieste had ropných výrobkov Šifrovanie: Had Znamenie olej varovanie, šifrovací softvér sa vyhnúť tým, Matt Curtin .

Môžete vidieť tento veľmi dobré Cryptographic Príklady hadí olej podľa Emility Ratliff (IBM Architect v Linux Security), ktorý sa snažil, aby sa jasný príklad o tom, ako rozpoznať Cryptographic hadí olej.

Tu predstavuje základné vodítko od Matt Curtin papiera:


Kontrolou, že body je možné zhodnotiť, ako vážny technológia šifrovania alebo produkt.

Ale koniec koncov, ako to opraviť, že neetické bezpečnostný prístup?

Je to veľmi signifikantné, a to by bolo naozaj užitočné pre každého druhu kategóriu bezpečnostných produktov, aby niektoré silne a nezávislé hodnotenie smernice (ako OSSTMM pre testovanie penetrácia), aby sa tento bezpečnostný hodnotiaci proces skutočne v rukách užívateľa.

Bolo by tiež veľmi príjemné mať niekoho, robiť analýzu a vyhodnotenie bezpečnostných produktov spoločností, zverejňovanie správ o znamení hadí olej.

Podiel

Web2.0 súkromie úniku v mobilných aplikáciách

Viete, že web2.0 svete je veľa úniku akéhokoľvek druhu (profilovanie, profilovanie, profilovanie), týkajúce sa ochrany súkromia a užívatelia začína byť obavy o tom.

Užívatelia priebežne sťahovať aplikácie bez znalosti podrobností o tom, čo robia, napríklad iFart len preto, že sú v pohode, sú zábavné a niekedy sú užitočné.

thumb.php.jpg

Na používateľov mobilných telefónov inštalovať z 1000% až do výšky 10,000% viac aplikácií, než na PC, a tieto aplikácie môžu obsahovať škodlivý softvér alebo iné neočakávané funkcie.

Nedávno infobyte analyzované UberTwitter klienta a zistil, že sa klient úniku a odosielanie svojich serverových veľa osobných a citlivých údajov, ako sú:

- Blackberry PIN

- Telefónne číslo

- E-mailová adresa

- Geografická poloha informácie

Prečítajte si o UbertTwitter "spyware" funkcia objavu tu o infoByte .

Je to veľa aplikácií úniku súkromných a citlivých informácií, ale jednoducho nikto sa na neho pozrieť.

Ak povinné uchovávanie údajov a zásady ochrany osobných údajov sa stala súčasťou vývoja aplikácií a podanie vodítko pre mobilnú aplikáciu?

IMHO a užívatelia musia nielen byť upozornení aplikačných možnostiach a využitie API, ale tiež to, čo bude robiť s druh informácie, že to bude riešiť vnútri mobilného telefónu.

Možnosti znamená povolenie aplikácie pre použitie určitej funkcie, napríklad pre použitie Geolocation API, ale čo bude aplikácia robiť a kto bude poskytovať tieto informácie, akonáhle si užívateľ oprávnený ju?

To je bezpečnostná profilovanie úroveň, ktorá výrobca mobilných telefónov neposkytuje a mali by, pretože sa zameriavajú na informácie, a nie na žiadosti o registráciu / povolenie, pokiaľ ide o použitie zariadenia schopností.

ps áno! ok! Súhlasím! Tento druh príspevku bude vyžadovať 3-4 str dlhú diskusiu, ako je horúce tému a celkom kĺbové, ale je to v sobotu ráno a ja musím ísť!

Podiel

AES algoritmus vybrané pre použitie vo vesmíre

Stretol som sa s peknou papier o analýzu a zváženie, na ktoré šifrovací algoritmus je to najvhodnejšie pre použitie v priestore od kozmickej lode a zariadení.

Papier bol vykonaný podľa poradného výboru pre systémy dátového priestoru , ktorý je konzorcium všetkých vesmírnou agentúrou okolo tohto súhrnu sa ovládal viac než 400 misií do vesmíru .

topban.jpg

Prečítajte papiera šifrovací algoritmus obchodný prieskum , pretože dáva zaujímavú úvahy a porovnávanie medzi rôznymi šifrovacími algoritmami.

Je zrejmé, že nakoniec vybralo algoritmus AES , zatiaľ čo KASUMI (používa sa iba v sieťach UMTS) sa vyhnúť.

Podiel

Blackberry Bezpečnosť a šifrovanie: Diabol alebo anjel?

Blackberry majú dobré a zlé povesti, pokiaľ ide o jeho bezpečnostné schopnosti podľa toho, z ktorého uhla sa na neho pozeráte.

Tento príspevok je zhrnúť súbor informácií, aby čitatelia get obraz, bez veľa pozíciu RIM Blackberry a možno považovať, v závislosti na uhle pohľadu, veľmi bezpečnú platformu alebo extrémne nebezpečný.

bblock.jpg

Poďme pokračuje.

Na jednej strane Blackberry je to platforma, veľa šifrovacích funkcií, funkcie zabezpečenia všade, zariadenie šifrovaný (s vlastnou crypto), komunikácia šifrovaná (s vlastnou proprietárne protokoly ako IVSP), veľmi dobre Rozšírené nastavenie zabezpečenia šifrovací systém od Certicom ( teraz vo vlastníctve RIM ).

Na druhej strane sa neposkytuje len zariadenia, ale s pretlačou prístupovú sieť s názvom BIS ( BlackBerry Internet Service ), ktorý je po celom svete globálnej Wide Area Network, kde sa vaše BlackBerry zadajte pri prechádzaní alebo CheckMail pomocou blackberry.net AP.

Ak vy alebo aplikácie, použite blackberry.net APN nie ste len pripojenie k internetu s pripojením na internet dopravcu, ale zadávate vnútri RIM siete, ktorá bude proxy server a pôsobí ako brána k dosiahnutiu na internete.

The very same happen when you have a corporate use: Both the BB device and the corporate BES connect to the RIM network that act as a sort of vpn concentration network .

So basically all the communications cross trough RIM service infrastructure in encrypted format with a set proprietary encryption and communication protocols.

Just as a notice, think that google to provide gtalk over blackberry.net APN, made an agreement in order to offer service inside the BB network to the BB users. When you install gtalk you get added 3 service books that point to GTALKNA01 that's the name of GTALK gateway inside the RIM network to allow intra-BIS communication and act as a GTALK gateway to the internet.

The mobile operators usually are not even allowed to inspect the traffic between the Blackberry device and the Blackberry Network.

So RIM and Blackberry are somehow unique for their approach as they provide a platform, a network and a service all bundled together and you cannot just “get the device and the software” but the user and the corporate are always bound and connected to the service network.

That's good and that's bad, because it means that RIM provide extremely good security features and capabilities to protect information, device and access to information at various level against third party .

But it's always difficult to estimate the threat and risk related to RIM itself and who could make political pressure against RIM.

Please consider that i am not saying “RIM is looking at your data” but making an objective risk analysis: for how the platform is done RIM have authority on the device, on the information on-the-device and on the information that cross the network. (Read my Mobile Security Slides ).

For example let's consider the very same context for Nokia phones.

Once the Nokia device is sold, Nokia does not have authority on the device, nor on the information on-the-device nor on the information that cross the network. But it's also true that Nokia just provide the device and does not provide the value added services such as the Enterprise integration (The RIM VPN tunnel), the BIS access network and all the local and remote security provisioned features that Blackberry provide.

So it's a matter of considering the risk context in the proper way when choosing the platform, with an example very similar to choosing Microsoft Exchange Server (on your own service) or whether getting a SaaS service like Google Apps.

In both case you need to trust the provider, but in first example you need to trust Microsoft that does not put a backdoor on the software while in the 2nd example you need to trust Google, as a platform and service provider, that does not access your information.

So it's a different paradigm to be evaluated depending on your threat model.

If your threat model let you consider RIM as a trusted third party service provider (much like google) than it's ok. If you have a very high risk context, like top-secret one, then let's consider and evaluate carefully whether it's not better to keep the Blackberry services fully isolated from the device or use another system without interaction with manufacturer servers and services.

Now, let's get back to some research and some facts about blackberry and blackberry security itself.

First of all several governments had to deal with RIM in order to force them to provide access to the information that cross their service networks while other decided to directly ban Blackberry usage for high officials because of servers located in UK and USA, while other decided to install their own backdoors.

There's a lot of discussion when the topics are RIM Blackberry and Governments for various reasons.

Below a set of official Security related information on RIM blackberry platform:

And here a set of unofficial Security and Hacking related information on RIM Blackberry platform:

Because it's 23.32 (GMT+1), i am tired, i think that this post will end up here.

I hope to have provided the reader a set of useful information and consideration to go more in depth in analyzing and considering the overall blackberry security (in the good and in the bad, it always depends on your threat model!).

Na zdravie

Fabio Pietrosanti (naif)

ps i am managing security technology development (voice encryption tech) on Blackberry platform, and i can tell you that from the development point of view it's absolutely better than Nokia in terms of compatibility and speed of development, but use only RIMOS 5.0+ !

Podiel

Botnet for RSA cracking?

I read an interesting article about putting 1.000.000 computers, given the chance for a serious botnet owner to get it, to crack RSA.

The result is that in such context attacking an RSA 1024bit key would take only 28 years, compared to theoretical 19 billion of years.

Reading of this article , is extremely interesting because it gives our very important consideration on the cryptography strength respect to the computation power required to carry on cracking attempt, along with industry approach to “default security level”.

I would say a must read .

Podiel

Čína šifrovanie poriadok

Hi all,

i found this very interesting paper on China Encryption Import/Export/Domestic Regulations done by Baker&Mckenzie in the US.

It's strongly business and regulatory oriented giving a very well done view on how china regulations works and how it may behave in future.

Čítajte tu Dešifrovanie Čína šifrovanie v nariadení (forma Bakernet webové stránky).

Podiel

Mobile Security talk at WHYMCA conference

I want to share some slides i used to talk about mobile security at whymca mobile conference in Milan.

Read here my slides on mobile security .

The slides provide a wide an in-depth overview of mobile security related matters, i should be doing some slidecast about it putting also audio. Maybe will do, maybe not, it depends on time that's always a insufficient resource.

Podiel

iPhone PIN: useless encryption

I recently switched one of my multiple mobile phones with which i go around to iPhone.

I am particularly concerned about data protection in case of theft and so started having a look around about the iPhone provided protection system.

There is an interesting set of iPhone Business Security Features that make me think that iPhone is moving in the right path for security protection of the phone, but still a lot of things has to be done, especially for serious Enterprise and Government users.

201006011551.jpg

For example it turned out that the iPhone PIN protection is useless and it can be broken just plugging the iPhone to a Linux machine and accessing the device like a USB stick.

That's something disturbing my paranoid mindset that make me think not to use sensitive data on my iPhone if i cannot protect my data.

Probably an iPhone independent disk encryption product would be very useful in order to let the market create protection schemas that fit the different risk contexts that different users may have.

Probably a general consumer is not worried about this PIN vulnerability but for me, working within highly confidential envirnonment such as intelligence, finance and military, it's something that i cannot accept.

I need strong disk encryption on my mobile phone.

I do strong voice encryption for it , but it would be really nice to have also something to protect the whole iPhone data and not just phone calls.

Podiel

Exploit code against SecurStar DriveCrypt published

It seems that the hacking community somehow like to target securstar products, maybe because hacking community doesn't like the often revealed unethical approach already previously described in this blog by articles and user's comments.

In 2004 a lot of accusation against Hafner of SecurStar went out because of alleged intellectual property theft regarding opensource codes such as Encryption 4 the masses and legal advert also against the Free and opensource TrueCrypt project .

In 2008 there was a pre-boot authentication hacking against DriveCrypt Plus posted on Full-Disclosure.

Early 2010 it was the time of the fake infosecurity research secretly sponsored by securstar at http://infosecurityguard.com (that now they tried to remove from the web because of embarrassing situation, but backup of the story are available, hacking community still wait for apologies) .

Now, mid 2010, following a research published in December 2009 about Disk Encryption software vulnerabilities made by Neil Kettle (mu-b), Security researcher at digit-labs and Penetration tester at Convergent Network Solutions , DriveCrypt was found to be vulnerable and exploitable breaking on-device security of the system and exploit code has been just released.

Exploit code reported below (thanks Neil for the code release!):

  • Arbitrary kernel code execution security exploit of DriveCrypt: drivecrypt-dcr.c
  • Arbitrary file reading/writing security exploit via unchecked user-definable parameters to ZxCreateFile/ReadFile/ WriteFile: drivecrypt-fopen.c

The exploit code has been tested against DriveCrypt 5.3, currently released DriveCrypt 5.4 is reported to be vulnerable too as it has just minor changes related to win7 compatibility. Can anyone make a double check and report a comment here?

Very good job Neil!

In the meantime the Free Truecrypt is probably the preferred choice for disk encryption, given the fact that it's difficult to trust DriveCrypt, PGP has been acquired by Symantec and there are very bad rumors about the trust that people have in Symantec and there are not many widely available alternatives.

Rumors say that also PhoneCrypt binaries are getting analyzed and the proprietary encryption system could reveal something fun…

Podiel

Quantum cryptography broken

Quantum cryptography it's something very challenging, encryption methods that leverage the law of phisycs to secure communications over fiber lines.

To oversimplify the system is based on the fact that if someone cut the fiber, put a tap in the middle, and joint together the other side of the fiber, the amount of “errors” that will be on the communications path will be higher than 20% .

So if QBER (Quantum Bit Error Rate) goes above 20% then it's assumed that the system is intercepted.

Researcher at university of toronto was able to cheat the system with a staying below the 20%, at 19.7% , thus tweaking the threshold used by the system to consider the communication channel secure vs compromised.

The product found vulnerable is called Cerberis Layer2 and produced by the Swiss ID Quantique .

Some possibile approach to detect the attack has been provided but probably, imho, such kind of systems does not have to be considered 100% reliable until the technology will be mature enough.

Traditional encryption has to be used together till several years, eventually bundled with quantum encryption whether applicable.

When we will see a quantum encryption systems on an RFC like we have seen for ZRTP , PGP and SSL ?

-naif

Podiel

great point of view

Because security of a cryptographic system it's not a matter of “how many bits do i use” but using the right approach to do the right thing to mitigate the defined security risk in the most balanced way.

security.png

Podiel

Encryption is not scrambling: be aware of scrambler!

Most of us know about voice scrambler that can be used across almost any kind of voice based communication technology.

Extremely flexible approach: works everything

Extreme performance: very low latency

but unfortunately…

Extremely weak: Scrambling cannot be considered secure.

Only encryption can be considered secure under the Kerckoff's principle .

So please don't even consider any kind of analog scrambler if you need real security.

Read deeply the paper Implementation of a real-time voice encryption system ” by Markus Brandau, especially the cryptoanalysis paragraph.

Podiel

SecurStar GmbH Phonecrypt answers on the Infosecurityguard/Notrax case: absolutely unreasonable! :-)

UPDATE 20.04.2010: http://infosecurityguard.com has been disabled. Notrax identity became known to several guys in the voice security environments (cannot tell, but you can imagine, i was right!) and so our friends decided to trow away the website because of legal responsibility under UK and USA laws.

UPDATE: Nice summary of the whole story (i know, it's long and complicated to read at 1st time) on SIPVicious VoIP security blog by Sandro Gauci .

Following my discoveries, Mr. Hafner, SecurStar chief exec, tried to ultimately defend their actions, citing absolutely unreasonable excuses to The Reg instead of publicly apologizing for what they have done: creating a fake independent security research to promote their PhoneCrypt product .

He tried to convince us that the person behind IP 217.7.213.59, used by the author of infosecurityguard.com and pointing to their office DSL line, was this hacker Notrax, using their anonymous surfing service and not one of their employees at their office:

“SecurStar chief exec Wilfried Hafner denied any contact with Notrax. Notrax, he said, must have been using his firm's anonymous browsing service, SurfSolo, to produce the results reported by Pietrosanti”

Let's reflect a moment on this sentence… Would really an hacker looking for anonymity spend 64 EUR to buy their anonymity surfing service called surfsolo instead of using the free and much more secure TOR (the onion router) ?Then let's reflect on this other piece of information:

  • The IP 217.7.213.59 is SecurStar GmbH's office DSL line
  • On 217.7.213.59 they have installed their VoIP/Asterisk PBX and internet gateway
  • They promote their anonymous proxy service for “Anonymous p2p use” ( http://www.securstar.com/products_ssolo.php ). Who would let users do p2p from the office dsl line where they have installed their corporate VoIP PBX ? If you do VoIP you can't let third party flood your line w/ p2p traffic, your phone calls would became obviously unreliable (yes, yes, you can do QoS, but you would not place an anonymous navigation proxy on your company office DSL line…).
  • Which company providing an anonymous navigation service would ever use their own office IP address? Just think how many times you would have the police knocking at your door and your employees as the prime suspects. (In past i used to run a TOR node, i know the risks…). Also think how many times you would find yourself blacklisted on google as a spyware bot.
  • Mr. Hafner also says “We have two million people using this product. Or he may have been an old customer of ours”. 2M users on a DSL line, really?
  • I don't use Surfsolo service, however their proxies are probably these ones:

surfsolo.securstar.net – 67.225.141.74

surfsolo.securstar.com – 69.16.211.133

Frankly speaking I can easily understand that Mr. Hafner is going do whatever he can to protect his company from the scandal, but the “anonymous proxy” excuse is at the very least suspicious.

How does the fact that the “independent research” was semantically a product review of PhoneCrypt, along with the discovery that the author come from the SecurStar GmbH IP address offices, along with the anonymity of this Notrax guy (SecurStar calls him a “well known it security professional” in their press release..) sound to you?

It's possible that earth will get an attack from outer space that's going to destroy our life?

Statistically extremely difficult, but yes, possible. More or less like the “anonymous proxy” story told by Mr. Hafner to cover the fact that they are the ones behind the infosecurityguard.com fake “independent security review”.

Hey, I don't need anything else to convince myself or to let the smart person have his own thoughts on this.

I just think that the best way for SecurStar to get out of this mess would probably be to provide public excuses to the hacking community for abusing the name and reputation of real independent security researches, for the sake of a marketing stunt.

S pozdravom,

Fabio Pietrosanti

ps I am currently waiting for some other infos that will more precisely confirm that what Mr. Hafner is saying is not properly true. Stay tuned.

Podiel

Evidence that infosecurityguard.com/notrax is SecurStar GmbH Phonecrypt – A fake independent research on voice crypto

Below evidence that the security review made by an anonymous hacker on http://infosecurityguard.com is in facts a dishonest marketing plan by the SecurStar GmbH to promote their voice crypto product.

I already wrote about that voice crypto analysis that appeared to me very suspicious.

Now it's confirmed, it's a fake independent hacker security research by SecurStar GmbH, its just a marketing trick!

How do we know that Infosecurityguard.com, the fake independent security research, is a marketing trick from SecurStar GmbH?

1) I posted on http://infosecurityguard.com a comments to a post with a link to my blog to that article on israelian ministry of defense certification

2) The author of http://infosecurityguard.com went to approve the comment and read the link on my own blog http://infosecurity.ch

3) Reaching my blog he leaked the IP address from which he was coming 217.7.213.59 (where i just clicked on from wordpress statistic interface)

4) On http:// 217.7.213.59/panel there is the IP PBX interface of the SecurStar GmbH corporate PBX (openly reachable trough the internet!)

5) The names of the internal PBX confirm 100% that it's the SecurStar GmbH:

6) There is 100% evidence that the anonymous hacker of http://infosecurityguard.com is from SecurStar GmbH

Below the data and reference that let us discover that it's all but a dishonest marketing tips and not an independent security research.

Kudos to Matteo Flora for it's support and for his article in Debunking Infosecurityguard identity !

The http referral tricks

When you read a link going from a website to another one there is an HTTP protocol header, the “Referral”, that tell you from which page someone is going to another webpage.

The referral demonstrated that the authors of http://infosecurityguard.com read my post, because it was coming from http://infosecurityguard.com/wp-admin/edit-comments.php that's the webpage you use as a wordpress author/editor to approve/refuse comments. And here there was the link.

That's the log entry:

217.7.213.59 – - [30/Jan/2010:02:56:37 -0700] “GET /20100129/licensed-by-israel-ministry-of-defense-how-things-really-works/ HTTP/1.0″ 200 5795 “ http://infosecurityguard.com/wp-admin/edit-comments.php ” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”

The PBX open on the internet tell us that's SecurStar GmbH

The SecurStar GmbH PBX is open on the internet, it contains all the names of their employee and confirm us that the author of http:/infosecurityguard.com is that company and is the anonymous hacker called Notrax.

Here there is their forum post where the SecurStar GmbH guys are debugging IPCOPfirewall & Asterisk together (so we see also details of what they use) where there is the ip 217.7.213.59 .

SecurStarproof.png

That's also really fun!

They sell secure telephony but their company telephony system is openly vulnerable on the internet . :-)

I was thinking to call the CEO, Hafner, via SIP on his internal desktop PBX to announce we discovered him tricks.. :->

They measured their marketing activity

Looking at the logs of my website i found that they was sensing the google distribution of information for the following keywords, in order to understand how effectively they was able to attack competing products. It's reasonable, if you invest money in a marketing campaign you want to see the results :-)

They reached my blog and i logged their search:

infosecurityguard+cryptophone

infosecurityguard+gold-lock

217.7.213.59 – - [30/Jan/2010:02:22:42 -0700] “GET / HTTP/1.0″ 200 31057 “http://www.google.de/search?sourceid=navclient&ie=UTF-8&rlz=1T4SKPB_enDE350DE350&q=infosecurityguard+cryptophone” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”

217.7.213.59 – - [30/Jan/2010:04:15:07 -0700] “GET /20100130/about-the-voice-encryption-analysis-phonecrypt-can-be-intercepted-serious-security-evaluation-criteria/ HTTP/1.0″ 200 15774 “http://www.google.de/search?sourceid=navclient&ie=UTF-8&rlz=1T4SKPB_enDE350DE350&q=gold-lock+infosecurityguard” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”


The domain registration data

The domain have been registered on 1st December 2009, just two months to start preparing the dishonest marketing campaign:

Domain Name: INFOSECURITYGUARD.COM

Registrar: GODADDY.COM, INC.

Updated Date: 01-dec-2009

Creation Date: 01-dec-2009

The domain is anonymously privacy protected trough a whois privacy service:

Administrative Contact: Private, Registration INFOSECURITYGUARD.COM@domainsbyproxy.com , Domains by Proxy, Inc. DomainsByProxy.com

Notrax hacker does not exist on google
As you know any hacker that get public usually have presence of it's activity on google, attending mailinglists, forum, homepage, past research, participation to conferences, etc, etc.
The fake hacker that they wanted us to to think was writing an independent blog does NOT have any trace on google. Only some hit about an anonymous browser called Notrax but nothing about that hacker.
Maybe when SecurStar provided the anonymity tool to their marketing agency, to help them protecting anonymity for the fake research, their provided them the anonymous browser notrax.So the marketing guy thinking about the nickname of this fake hackers used what? Notrax! :-)

The “independent review”completely oriented in publicizing PhoneCrypt

Of the various review don the phonecrypt review is only positive and amazing good feedback, while the other are only bad feedback and no single good point.

As you can imagine, in any kind of independent product evaluation, for all products there are goods and bad points. No. In this one there are only product that are good and product that are bad.

They missed to consider the security of the technology used by the products

They completely avoided to speak about cryptography and security of the products.

They do not evaluated basic security features that must be in that kind of products.That's in order not to let anyone see that they did not followed basic security rules in building up their PhoneCrypt.
The technology is closed source, no transparency on algorithms and protocols, no peer review.Read my new comparison (from the basic cryptographic requirement point of view) About the voice encryption analysis (criteria, errors and different results) .
The results are somehow different than their one .

UPDATE: Who's Wilfried Hafner (SecurStar founder) ?

I got a notice from a reader regarding Wilfred Hafner, SecurStar founder, CEO and security expert.

He was arrested in 1997 for telephony related fraud (check 2nd article on Phrack) earning from telephony fraud 254.000 USD causing damages to local telcos trough blueboxing for 1.15 Million USD.

He was not doing “Blueboxing” for the pleasure of phreaking and connecting with other hackers, but to earn money.

Hacking for profit (and not for fun) in 1997… brrr…. No hacker's ethic at all!

All in all, is that lawful?

Badmouthing a competitor amounts to an unfair competition practice in most jurisdictions, so it is arguable (to say the least) that SecurStar is right on a legally sound ground here.
Moreover, there are some specific statutes in certain jurisdictions which provide for a straightforward ban on the practice we are talking about. For example in the UK the British Institute of Practitioners in Advertising - in compliance with the Consumer protection from Unfair Trading regulation – ruled that:

”falsely claiming or creating the impression that the trader is not acting for the purposes relating to his trade, business, craft or profession, or falsely representing oneself as a consumer” is a criminal offense .

We have no doubt that PRPR (which is the UK-based *PR company for SecurStar GmbH, led by Peter Rennison and Allie Andrews as stated in SecurStar Press Release ) did provide their client with this information. Heck, they *are* in the UK, they simply cannot ignore that!

IANAL, but I would not be surpised if someone filed a criminal complaint or start civil litigation for unfair competition against SecurStar GmbH.
Whether this is going to be a matter for criminal and/or civil Courts or not is not that important. However, it is clear enough that SecurStar GmbH appears to be at least ethically questionable and not really worth of trust.

Nice try, gentlemen… however, next time just do it right (whether “right” for them means “in a honest manner” or “in a fashion not to be caught” I will let them choose)”

Fabio Pietrosanti (naif)

Podiel

Dishonest security: The SecurStart GmbH Phonecrypt case

I would like to provide considerations on the concept of ethics that a security company should have respect to the users, the media and the security environment.

SecurStar GmbH made very bad things making that infosecuriguard.com fake independent research.

It's unfair approach respect to hacking community.

It's unfair marketing to end user. They should not be tricking by creating fake independent review.

It's unfair competition in the security market.

Let's make some more important consideration on this.

Must be serious on cryptographic products. They are not toys

When you do cryptographic tools you should be really aware of what you are doing, you must be really serious.

If you do bad crypto people could die.

If you don't follow basic security rules for transparency and security for cryptography you are putting people life at risk.

You are taking the responsibility of this. (I want to sleep at night, don't think SecurStar CEO/CTO care about this…)

Security research need reference and transparency

Security research have to be public, well done, always subject to public discussion and cooperation.
Security research should not be instrumentally used for marketing purpose.Security research should be done for awareness and grow of the knowledge of the worldwide security environment.

Hacking environment is neutral, should not be used instrumentally

Hackers are considered neutral, nerds, doing what they do for their pleasure and passion.

If you work in the security market you work with hackers.

If you use hackers and hacking environment for your own marketing purposes you are making something very nasty.

Hackers give you the technology and knowledge and you use them for your own commercial purpose.

Consideration on the authority of the information online

That's something that pose serious consideration on the authority of information online.An anonymous hacker, with no reference online, made a product security review that appear like an independent one. I have to say that the fake review was very well prepared, it always posed good/bad things in an indirect way. It did not appeared to me at 1st time like a fake. But going deeply i found what's going on.

However Journalists, news media and blogger went to the TRAP and reviewed their fake research. TheRegister, NetworkWorld and a lot of blogs reported it. Even if the author was completely anonymous.

What they have done is already illegal in UK

SecurStar GmbH is lucky that they are not in the UK, where doing this kind of things is illegal .

Fabio Pietrosanti (naif)

Podiel

About the SecurStar GmbH Phonecrypt voice encryption analysis (criteria, errors and different results)

This article want to clarify and better explain the finding at infosecurityguard.com regaring voice encryption product evaluation.
This article want to tell you a different point of view other than infosecurityguard.com and explaining which are the rational with extensive explaination from security point of view.
Today i read news saying: “PhoneCrypt: Basic Vulnerability Found in 12 out of 15 Voice Encryption Products and went to read the website infosecurityguard .

Initially it appeared to my like a great research activity but then i started reading deeply the read about it.I found that it's not properly a security research but there is are concrete elements that's a marketing campaign well done in order to attract public media and publicize a product.
Imho they was able to cheat journalists and users because the marketing campaign was absolutely well done not to be discovered on 1st read attempt. I personally considered it like a valid one on 1st ready (they cheated me initially!).

But if you go deeply… you will understand that:
- it's a camouflage marketing initiative arranged by SecurStar GmbH and not a independent security research
- they consider a only security context where local device has been compromised (no software can be secured in that case, like saying SSL can be compromised if you have a trojan!)
- they do not consider any basic security and cryptographic security criteria

However a lot of important website reported it:

This article is quite long, if you read it you will understand better what's going on around infosecurityguard.com research and research result.

I want to to tell you why and how (imho) they are wrong.

The research missed to consider Security, Cryptography and Transparency!

Well, all this research sound much like being focused on the marketing goal to say that their PhoneCrypt product is the “super” product best of all the other ones.
Any security expert that would have as duty the “software evaluation” in order to protect the confidentiality of phone calls will evaluate other different characteristics of the product and the technology.

Caspertec Nejasnosť No public review Closed Áno CellCrypt Obscurity
No public review
Closed
Áno Cryptophone Transparency Limited public review Public Áno Gold-Lock Obscurity
No public review
Closed
Áno Illix Obscurity
No public review
Closed
Áno No1.BC Obscurity No public review
Closed
Áno PhoneCrypt Obscurity
No public review
Closed
Áno Rode&Swarz Obscurity
No public review
Closed
Áno Secure-Voice Obscurity
No public review
Closed
Áno SecuSmart Obscurity
No public review
Closed
Áno SecVoice Obscurity
No public review
Closed
Áno SegureGSM Obscurity
No public review
Closed
Áno SnapCell Obscurity
No public review
Closed
Áno Tripleton Obscurity
No public review
Closed
Áno Zfone Transparency Public review
Open Áno ZRTP Transparency Public review
Open Áno

*Green means that it match basic requirement for a cryptographic secure system

* Red / Broken means that it does not match basic requirement for a cryptographic secure system
That's my analysis using a evaluation method based on cryptographic and security parameters not including the local compromise context that i consider useless.

However, to be clear, those are only basic parameters to be used when considering a voice encryption product (just to avoid being in a situation that appears like i am promoting other products). So it may absolutely possible that a product with good crypto ( transparency, peer reviewed and opensource) is absolutely a not secure product because of whatever reason (badly written, not usable causing user not to use it and use cleartext calls, politically compromised, etc, etc).
I think i will prepare a broader criteria for voice crypto technologies and voice crypto products, so it would be much easier and much practical to have a full transparent set of criterias to evaluate it.

But those are really the basis of security to be matched for a good voice encryption system!
Read some useful past slides on security protocols used in voice encryption systems (2nd part).

Now read below some more practical doubt about their research.

The security concept of the review is misleading: any hacked device can be always intercepted!

I think that the guys completely missed the point: ANY KIND OF SOFTWARE RUNNING ON A COMPROMISED OPERATING SYSTEM CAN BE INTERCEPTED

Now they are pointing out that also Zfone from Philip Zimmermann is broken (a pc software), just because they install a trojan on a PC like in a mobile phone?
Any security software rely on the fact that the underlying operating system is somehow trusted and preserve the integrity of the environment where the software run.

  • If you have a disk encryption system but your PC if infected by a trojan, the computer is already compromised.
  • If you have a voice encryption system but your PC is infected by a trojan, the computer is already compromised.
  • If you have a voice encryption system but your mobile phone is infected by a trojan, the mobile phone is already compromised.

No matter which software you are running, in such case the security of your operating environment is compromised and in one way or another way all the information integrity and confidentiality is compromised.

Like i explained above how to intercept PhoneCrypt.

The only things that can protect you from this threat is running in a closed operating system with Trust Computing capability, implementing it properly.
For sure on any “Open” operating system such us Windows, Windows Mobile, Linux, iPhone or Android there's no chance to really protect a software.
On difficult operating system such as Symbian OS or RimOS maybe the running software can be protected (at least partially)

That's the reason for which the security concept that guys are leveraging to carry on their marketing campaign has no clue.
It's just because they control the environment, they know Flexispy software and so they adjusted their software not to be interceptable when Flexispy is installed.
If you develop a trojan with the other techniques i described above you will 100% intercept PhoneCrypt.

On that subject also Dustin Tamme l, Security researcher of BreakPoint Systems , pointed on on VoIP Security Alliance mailing lists that the security analysis is based on wrong concepts .

The PhoneCrypt can be intercepted: it's just that they don't wanted to tell you!

PhoneCrypt can be intercepted with “on device spyware”.
Prečo?
Because Windows Mobile is an unsecure operating environment and PhoneCrypt runs on Windows Mobile.
Windows Mobile does not use Trusted Computing and so any software can do anything.
The platform choice for a secure telephony system is important.
Ako na to?
I quickly discussed with some knowledgeable windows mobile hackers about 2 different way to intercept PhoneCrypt with an on-device spyware (given the unsecure Windows Mobile Platform).

a) Inject a malicious DLL into the software and intercept from within the Phonecrypt itself.
In Windows Mobile any software can be subject to DLL code injection.
What an attacker can do is to inject into the PhoneCrypt software (or any software running on the phone), hooking the Audio related functions acting as a “function proxy” between the PhoneCrypt and the real API to record/play audio.
It's a matter of “hooking” only 2 functions, the one that record and the one that play audio.
Read the official Microsoft documentation on how to do DLL injection on Windows Mobile processes. or forum discussing the technique of injecting DLL on windows mobile processes.
That's simple, any programmer will tell you to do so.
They simply decided that's better not to make any notice about this.
b) Create a new audio driver that simply act as a proxy to the real one and intercept PhoneCrypt
In Windows Mobile you can create new Audio Drivers and new Audio Filters.
What an attacker can do is to load a new audio driver that does not do anything else than passing the real audio driver function TO/FROM the realone. In the meantime intercept everything recorded and everything played :-)
Here there is an example on how to do Audio driver for Windows Mobile .
Here a software that implement what i explain here for Windows “Virtual Audio Cable” .
The very same concept apply to Windows Mobile. Check the book “Mobile Malware Attack and Defense” at that link explaining techniques to play with those techniques.
They simply decided that's better not to make any notice to that way of intercepting phone call on PhoneCrypt .
To sú len dva rýchle nápady, viac sa asi stalo.

Sounds much like a marketing activity – Not a security research.

I have to tell you. I analyzed the issue very carefully and on most aspects. All this things about the voice encryption analisys sounds to me like a marketing campaign of SecurStar GmbH to sell PhoneCrypt and gain reputation. A well articulated and well prepared campaign to attract the media saying, in an indirect way cheating the media, that PhoneCrypt is the only one secure. You see the press releases of SecurStar and of the “Security researcher Notrax telling that PhoneCrypt is the only secure product” . SecurStar PhoneCrypt is the only product the anonymous hacker “Notrax” consider secure of the “software solutions”.
The only “software version” in competition with:

SnapCell – No one can buy it. A security company that does not even had anymore a webpage. The company does not almost exist anymore.
rohde-schawarz – A company that have in his list price and old outdated hardware secure phone . No one would buy it, it's not good for genera use.

Does it sounds strange that only those other products are considered secure along with PhoneCrypt .

Also… let's check the kind of multimedia content in the different reviews available of Gold-Lock, Cellcrypt and Phonecrypt in order to understand how much the marketing guys pressed to make the PhoneCrypt review the most attractive:

Application Screenshots of application Video with demonstration of interception Network demonstration
PhoneCrypt 5 0 1
CellCrypt 0 2 0
GoldLock 1 2 0

It's clear that PhoneCrypt is reviewed showing more features explicitly shown and major security features product description than the other.

Too much difference between them, should we suspect it's a marketing tips?

But again other strange things analyzing the way it was done…
If it was “an impartial and neutral review” we should see good and bad things on all the products right?

Ok, see the table below regarding the opinion indicated in each paragraph of the different reviews available of Gold-Lock, CellCrypt and Phonecrypt (are the only available) to see if are positive or negative.

Application Number of paragraphs Positive paragraphs Negative paragraphs Neutral paragraphs
PhoneCrypt 9. 9. 0 0
CellCrypt 12 0 10 2
GoldLock 9. 0 8 1

Detailed paragraphs opinion analysis of Phonecrypt
Paragraph of review Opinion expressed
From their website Positive Marketing feedback
Apple iPhone Positive Marketing feedback
Disk Encryption or voice Encryption Positive Marketing feedback
PBX Compatibility? Really Positive Marketing feedback
Cracking <10. Not. Positive Marketing feedback
Skvelý nápad! Positive Marketing feedback
A little network action Positive Marketing feedback
UI Positive Marketing feedback
Good Taste Positive Marketing feedback
Detailed paragraphs opinion analysis of Gold-Lock 3G
Paragraph of review Opinion expressed
From their website Negative Marketing feedback
Licensed by The israeli Ministry of Denfese Negative Marketing feedback
Real Company or Part Time hobby Negative Marketing feedback
16.000 bit authentication Negative Marketing feedback
DH 256 Negative Marketing feedback
Downad & Installation! Neutral Marketing feedback
Cracking it <10 Negative Marketing feedback
Marketing BS101 Negative Marketing feedback
Cool video stuff Negative Marketing feedback
Detailed paragraphs opinion analysis of CellCrypt
Paragraph of review Opinion expressed
From their website Neutral Marketing feedback
A little background about cellcrypt Negative Marketing feedback
Master of Marketing Negative Marketing feedback
Secure Voice calling Negative Marketing feedback
Who's buying their wares Negative Marketing feedback
Downad & Installation! Neutral Marketing feedback
My Demo environment Negative Marketing feedback
Did they forget some code Negative Marketing feedback
Cracking it <5 Negative Marketing feedback
Room Monitoring w/ FlexiSpy Negative Marketing feedback
Cellcrypt unique features.. Negative Marketing feedback
Plain old interception Negative Marketing feedback
The Haters out there Negative Marketing feedback

Now it's clear that from their point of view on PhoneCrypt there is no single bad point while the other are always described in a negative way.
No single good point. Strange?
All those considerations along with the next ones really let me think that's very probably a marketing review and not an independent review.

Other similar marketing attempt from SecurStar

SecurStar GmbH is known to have used in past marketing activity leveraging this kind of “technical speculations”, abusing of partial information and fake unconfirmed hacking stuff to make marketing/media coverage.
Imho a rare mix of unfairness in leveraging the difficult for people to really understand the complexity of security and cryptography.

They already used in past Marketing activities like the one about creating a trojan for Windows Mobile and saying that their software is secure from the trojan that they wrote.
Read about their marketing tricks of 2007

They developed a Trojan (RexSpy) for Windows Mobile, made a demonstration capability of the trojan and later on told that they included “Anti-Trojan” capability to their PhoneCrypt software.They never released informations on that trojan, not even proved that it exists.

The researcher Collin Mulliner told at that time that it sounds like a marketing tips (also because he was not able to get from SecurStar CEO Hafner any information about that trojan):

“This makes you wonder if this is just a marketing thing.”

Now, let's try to make some logical reassignment.
It's part of the way they do marketing, an very unfriendly and unpolite approach with customers, journalist and users trying to provide wrong security concepts for a market advantage. Being sure that who read don't have all the skills to do in depth security evaluation and find the truth behind their marketing trips.

Who is the hacker notrax?

It sounds like a camouflage of a fake identity required to have an “independent hacker” that make an “independent review” that is more strong on reputation building.
Read about his bio:

¾ Human, ¼ Android (Well that would be cool at least.) I am just an enthusiast of pretty much anything that talks binary and if it has a RS232 port even better. During the day I masquerade as an engineer working on some pretty cool projects at times, but mostly I do the fun stuff at night. I have been thinking of starting an official blog for about 4.5 years to share some of the things I come across, can't figure out, or just cross my mind. Due to my day job and my nighttime meddling, I will update this when I can. I hope some find it useful, if you don't, well you don't.

There are no information about this guy on google.
Almost any hacker that get public have articles online, post in mailing archive and/or forum or some result of their activity.
For notrax, nothing is available.

Ďalej sa pozrime na doméne ...
The domain infosecurityguard.com is privacy protected by domainsbyproxy to prevent understanding who is the owner.
The domain has been created 2 months ago on 01-Dec-09 on godaddy.com registrar.

What's also very interesting to notice that this “unknown hacker with no trace on google about him that appeared on December 2009 on the net” is referred on SecurStar GmbH Press Release as a “An IT security expert”.

Maybe they “know personally” who's this anonymous notrax? :)

Am i following my own conspiracy thinking or maybe there's some reasonable doubt that everything was arrange in that funny way just for a marketing activity?

Social consideration

If you are a security company you job have also a social aspects, you should also work to make the world a better place (sure to make business but “not being evil”). You cannot cheat the skills of the end users in evaluating security making fake misleading information.

You should do awareness on end users, to make them more conscious of security issues, giving them the tools to understand and decide themselves.

Hope you had fun reading this article and you made your own consideration about this.

Fabio Pietrosanti (naif)

ps Those are my personal professional opinion, let's speak about technology and security, not marketing.
pps i am not that smart in web writing, so sorry for how the text is formatted and how the flow of the article is unstructured!

Podiel

Licensed by Israel Ministry of Defense? Ako to naozaj funguje!

You should know that Israel is a country where if a company need to develop encryption product they must be authorized by the government.

The government don't want that companies doing cryptography can do anything bad to them and what they can do of good for the government, so they have to first be authorized.

Companies providing interception and encryptio n m ust apply to a license because Israel law on this is so restrictive to be similar to china law .

That's because those kind of technologies are considered fundamental for the intelligence and espionage capabilities of Israel country.

To give some example of “Licensed by Israel Ministry of Defense” companies:

GSM šifrovacie produkty "Licencované Izraelom Ministerstva obrany" - Gold-lock

Interception of communication products “Licensed by Israel Ministry of Defense” – Verint

HF encrypted Radio “Licensed by Israel Ministry of Defense” – Kavit

Surveillance services and equipment “Licensed by Israel Ministry of Defense” – Multi Tier Solutions

Napríklad ako žiadať o licenciu, "Izrael Ministerstva obrany", ak si šifrovacích technológií v Izraeli?

Be sure to be an israeli company, click here and fill the forms.

Someone will contact you from encryption-control@mod.gov.il and will discuss with you whether to give you or not the license to sell.

What does the department of defense will require from an israeli company in order to provide them the authorization to make and sell interception and encryption products?

Well, what they want and what they really ask nobody knows.

It's a secret dealing of Israel Ministry of Defense with each “licensed” company.

What we know for sure is that Verint, a “Licensed by Israel Ministry of Defense”, placed a backdoor to intercept companies and governments in the US and Netherland into the interception systems they was selling.

Verint, a Licensed by Israel Ministry of Defense Company, provided to Israel government eavesdropped communications of private and government users in the United States and in the Netherland .

CIA officier reported that Israel Ministry of Defense was known to pay Verint a reimbursement of 50% of their costs in order to have from Verint espionage services trough their commercial activity on selling “backdoored” interception equipment to spy foreign users.


To môže byť legitímna pochybnosť, že spolupráca v rámci izraelského ministerstva obrany môže byť problematické pre izraelské spoločnosti, ktoré chcú predať odpočúvania a šifrovanie produkt zahraničia.

Those companies may be forced to make the interests of Israel Ministry of Defense and not the interests of the customers (like Verint scandal is a real-world example).

So, how would a “Licensed by Israel Ministry of Defense” be a good things to promote?

It represent the risk that the “Israel Ministry of Defense”, like is publicly known that it has already have done with Verint, will interfere with what the company do.

To predstavuje riziko, že "Izrael ministerstvo obrany" možno rozumne poskytnúť "náhradu" nákladov platiacich spoločnosť a dostať to, čo by pravdepodobne chceli získať.

So, what does really “Israel Ministry of Defense” want from Israel companies doing encryption and interception technologies?

Mali by sme sa pýtať sami seba, či izraelskej spoločnosti robia šifrovanie a zberných podniky majú väčší záujem podnikať alebo robiť "outsourcingu špionážne služby" pre ich stále platiaci zákazník, "Izrael Ministerstvo obrany".

Isté je, že v čase finančnej krízy, Izrael Ministerstvo obrany je platiaci zákazník, ktorý nemá problém rozpočtu ...

Strict control, strict rules, strong government strategic and military cooperation.

Be careful.

Ak si chcete prečítať viac o tejto záležitosti, o tom, ako technológie z niektorých krajín je zvyčajne znečistený ich vládami a vojenskými tajnými službami stratégie zostaňte naladení ako ja chystám príspevok o tom.

Budete oveľa lepšie pochopiť, o ktoré subjekty na "licencované Izrael Ministerstva obrany".

Podiel

Location Based Services: the big brother thanks you ;-)

Do you use your iphone, google phone, blackberry or nokia smartphone with cool built-in GPS?

Well law enforcement can now know even better where you are, at any time, even with historical data and much better than BTS based location systems.

Sprint has given 8 million times customer's GPS information to law enforcement (sound something like a semi-automatic request).

Read here .

Nice extract is:

Sprint Nextel provided law enforcement agencies with its customers' (GPS) location information over 8 million times between September 2008 and October 2009. This massive disclosure of sensitive customer information was made possible due to the roll-out by Sprint of a new, special web portal for law enforcement officers.

The informations was provided at wiretapping and interception industry conference ISS WASH in Washingtown.

If you want see directly the video:


Sprint: 50 million customers, 8 million law enforcement GPS requests in 1 year from Christopher Soghoian on Vimeo .


Then you know that “big brother” is watching you only because you let him to watch you.

Podiel

Zlato-Lock Zabezpečenie Šifrovanie Súťaž: buďte opatrní!

Tento príspevok je hovoriť o "nespravodlivé" marketingový prístup Gold-Lock, izraelská spoločnosť robí mobilné hlasové šifrovanie autorizované izraelského ministerstva obrany.

Following an announcement seen on Linkedin “Information Security Community” group:

GoldLock ponúka US 100,000 dolárov a prácu pre unencryption

GoldLock, izraelskej šifrovanie a bezpečnostná agentúra ponúka US 100,000 dolárov a prácu pre každého, ktorý je schopný dešifrovať bunkový konverzácie obsiahnuté v súbore poskytované na ich stránkach ( https://www.gold-lock.com/app/en/? bránka: interface =: 8 ::::).
Prepis musí byť poslaný späť do GoldLock do 01.02.2010.
The contest is open to all and any tools or technology may be used.
Prajeme všetkým veľa šťastia!

I commented:

Not having a public protocol specification is not even scientifically serious to make a marketing tricks like this.
I would say to gold-lock, let's release the source code and let anyone compile the cryptographic engine if you trust not to to have something nasty inside… ;)

Toni Koivunen z F-Secure , povedal:

So… They will pay $100k if you get through the AES and the hassle with keys.
If someone would pull it off they would certainly make a truckload more money elsewhere.
Navyše by bola zachovaná práva s kódovým / technológie, ktoré vytvorili, čo nie je tento prípad, ak idú na $ 100k, pretože licencie celkom jasne hovorí, že:
# Priradenie list Gold Line vo forme vyhovujúci GOLD LINE svoje technológie a pracovný plán (ďalej len "technológia"). Such assignment form shall enable Gold Line to transfer the rights on the Technology to Gold Line, including the right to register patents and all other rights.
# Prepustenie a upustenie forme, vo forme uspokojivé Gold Line riadne vykonaný vás a všetkých ostatných účastníkov akýchkoľvek práv k technológii.
Plus of course Gold Line retains the right to change the rules of the game with prior notice.
Alebo ste museli oznámiť neskôr jeden.
Sounds fair :)

Michel Scovetta from Computer Associates said:

Vyzerá to, že účelom je získať nejaké lacné testovanie z nej a byť schopný povedať niečo ako: "Najlepší kryptografické odborníkmi z celého sveta sa pokúsil zlomiť to, a neboli schopní."

According to some of the docs on Gold Lock's website, they use ECC-256 and a “modified DH key exchange” (which tingles my spidey senses), SHA-256, and then XOR for the actual data encryption. Oni používajú prakticky rúhanie jazyk ako: "Každá súčasť Enterprise Gold Lock riešenie je testovaná a preukázaná zaistite proti ľubovoľnému útoku."

* Osvedčený * bezpečná? * Všetky mysliteľné * útok? Och!

V ďalšom dokumente na svojich stránkach, hovorí o svojej prvej vrstvy sa dovoláva 1024-bit RSA. GoDaddy doesn't even allow 1024-bit keys to be used anymore when generating $20 SSL certificates. Citujú 300000000000 MIPS rokov rozbiť, ale keď je moja matematika je správne, že príde až o 52 dní na hornom superpočítača práve teraz. Not trivial, but this is an offline attack, so time is on the side of the attacker.

The description then talks about the device generating 16k keys when you register the device. If the protocol is “secure”, then it should be “secure” with only a single key. If it's not secure with a single key, then generating 16k keys could only make it 16k times more secure, which is far off from a proof of security.

Súhlasím s Fabio - veľtrh súťaž bude zahŕňať zdrojový kód a šifrovacie špecifikácie. Also, as other contests have proven (eg SecureWebMail), the weakest point isn't usually the cryptography. Je to všetko na iné veci, a to nevyzerá ako nič z toho sa zverejní pre súťaže.

http://xkcd.com/538/

Mike

I would say that all those considerations from security experts from well known and established security companies bring us to consider that:

  • Zlato-lock nie je transparentný na ich šifrovanie vôbec a prepracovať sa zlou praxi neznáma bezpečnosti žľabu (nikto vedieť, čo je vo vnútri produktu)
  • Gold-lock is not playing a fair game by proposing this 'security contest'
  • Gold-lock being certified by Israeli ministry of defence may raise doubt related to possible relationship with the intelligence… Read by post Certified by Israeli MInistry of Defense .

Voice Bezpečnosť je rozumné veci a chýba transparentnosť a vládne vzťahy pre kryptografické voľby obyčajne neposkytuje nič dobrého ...

Think about it…

Podiel

Disk encryption sometimes 'works'

I am one of the person convinced that a computer disk encryption system will not protect you from public authorities if they are convinced enough and the case is very important.

There are a lot of way to convince a person to release a password.

However there's a case in Australia where not revealing the disk password resulted in a successful way to avoid going in jail:

Secret code saves man who spied on flatmates

My opinion is just that spying flatmates is not a so relevant and particular crime and that law enforcement did not used 'convincing systems' to get the password of encrypted disk.

UPDATE 29.06.2010: It also worked for Daniel Dantas against FBI .

Podiel

Political conflict in Turkey between Prosecutors and Wiretappers

It seems that in Turkey the Telecommunication Directorate (TIB), in charge of managing the wiretapping, intercepted the president of the Judge and Prosecutors Associations.

Prosecutors and Judge usually does not like being tapped, and so the 1st High Criminal Court ordered an audit of all the recording done by the TIB since 2006.

Read more here .

Podiel

UAE government placing backdoors into Blackberry devices

Nice attempt to place backdoors inside Blackberry devices.

It seems that UAE government wanted to do something nasty placing backdoors trough software upgrades in Etilsat (local mobile operator) blackberry devices, obviously with the cooperation of the mobile operator itself.

Fortunately, the power of the security community discovered and unveiled the facts. Pozrite sa na to.

Etisat patch designed for surveillance

Wired magazine: Blackberry spies

Bezpečnosť existuje iba s priehľadnosťou.

Podiel

Voice encryption in government sectors

Budem robiť nejaké do hĺbky články o tom, ako skutočne funguje šifrovanie hovoru vo vládnych prostredí.

The open standards and open source still have to reach the military and government environments for what's related to secure speech.

To give you an idea of the complexity and kind of particular issues that exists, look at the USA 3G Wireless Security: A Government Perspective and the A Waveform Architecture to Support Security and Interoperability in Multi-National Wireless Networks for Tactical Communication .

They are using so-custom protocols like Secure Communications Interoperability Protocol that require the use of patented MELPe ultra-narrowband codec that there's not a real market of application and equipment using this. Only a small elite of government controlled companies from few countries manage this de-facto lobby.

Should we change this bringing open standards also to government sectors?

Podiel

Voice Security and Privacy slides

Below my slides on voice security and privacy from Security Summit 2009 .

mmm, yes i am working in this area from 2005, will write again about it.

sux

Podiel