RFC 6189:ZRTP是最后一个标准!

最后ZRTP已经分配的官方RFC分配, RFC6189 ZRTP:单播安全RTP媒体路径的关键协议。

它作为依赖与AES密钥大小为256位,现在已经被定义为RFC6188 SRTP

请参阅RFC终于发布了,这是令人兴奋,因为它是一个重要的里程碑,作为官方标准的终端到终端加密很像PGP已经电子邮件设置ZRTP 。

现在,任何组织将正式在世界上能够实现终端到终端的协议的语音加密ZRTP

目前有3种不同的公共实现ZRTP协议存在:

他们每个人都提供了不同的功能的协议,但最重要的是已知的可互操作的。

新一波即将进入一个灰色地带,其中大部分公司做手机加密系统已实现自定义加密语音加密的世界,irrupting。

现在标准已经建立和留下来实施不同的东西,有几个原因。

自由一台先生 齐默尔曼和所有社区公司(如PrivateWave )和个人(如维尔纳·迪特曼 )工作!

今天,它是伟大的一天,这种技术现在是官方,也与现有的多个实施!

菲利普,你做一遍,我赞美你纯粹的精神和决心:-)

共享

在弗赖堡大学为GSM进展开裂

移动协议(GSM,GSM-R,TETRA,UMTS等)的精彩世界黑客得到官方的大学研究活动。

开源代码发布破解软件的投资,使大学学生工作,提高做强大的科研机会。

弗赖堡大学刚刚发布了随着一个支持gsmframencoder工具的GSM A5 / 1加密实战演练 ,以提高嗅探,解码和开裂的过程。

打开硬件,开放软件,开放协议表现出什么样的的专有方法或工艺打造通信和安全技术的弱点。

尝试打开和打击任何形式的专有和封闭的技术,迫使该行业仅在设计电信协议的互操作和开放的态度,而它的目标应该是任何科学家。

共享

我的TOR出口节点试图过滤掉嘈杂的交通经验

今年年初,我决定,运行TOR出口节点,所以我带来了VPS在hetzner.de (因为他们被列为一个好TOR ISP )设置一个每秒100Mbit /出口节点与昵称privacyresearch.infosecurity.ch的首款1TB的月度数据,然后10兆/秒平的连接。

它也可以运行TOR2WEB软件在http://tor.infosecurity.ch

我所建议的运行出口节点以最小的骚扰,并准备了一个滥用响应模板设置退出政策

在第一天,我一直在运行的节点i立即收到DMCA抱怨由于点对点交通。

所以我决定来过滤一些P2P流量使用OpenDPI的iptables模块和DMCA抱怨自动消失:

的iptables-A OUTPUT-M opendpi电驴gadugadu FastTrack网络GNUTELLA的DirectConnect,BitTorrent的WinMX的Soulseek的-J拒绝

然后,因为我是意大利人,我决定,以避免我的Tor节点连接到意大利的互联网地址空间,以减少的机会,一个愚蠢的检察官会醒来我在早晨,因为不明白,我运行一个Tor节点。

我试过了,的帮助的hellais写了一个脚本来使退出政策拒绝声明 ,拒绝上引发IOError blockfinder的所有意大利保留的网段,但是我们发现的torrc配置文件与+1000线的TOR崩溃。

我们去开出罚单报告关于我们国家试图阻止TOR出口政策坠毁,并发现了类似的尝试 ,我们贡献,但它似乎仍然是一个开放的问题。

得出的结论是,这是不可能的,使在清洁和礼貌的方式,所以我决定去肮脏的方式,通过使用iptables的/ geoip的国家退出政策TOR出口节点。 战斗后,使其正确编译,这是一行iptables来阻止意大利流量:

的iptables-A OUTPUT-P tcp-M的态-态NEW-M geoip的DST-CC-J REJECT

现在从我的退出节点意大利网络没有连接完成,我是安全的反对可能是愚蠢的检察官不理解职责范围(TOR节点的所有IP地址申请前我有一个例外)。

其他一些天之后,我开始接收抱怨由于源于我的Tor节点的端口扫描活动。

我想从我自己的角度来看,支持匿名的网络,而不是匿名黑客企图,所以我要过滤的端口扫描和攻击源于我node.That一个复杂的问题,需要一定的研究,所以在此期间,我安装scanlogd的嗤之以鼻,因为我想评估多少攻击,这样的攻击都从我TOR出口节点。
后,我会尽量安排某种过滤,以确保能够筛选出主要攻击。
对于什么相关的端口扫描,似乎有没有公开的的传出端口扫描工具来检测和过滤,但过滤传入端口扫描,所以可能会需要写的东西特设。
我会把事情进展如何,是否会有一些不错的snort的直列光波的方式选择性地过滤出主要攻击企图从我的退出节点的方式来实现。

我的目标是保持出口节点运行在长期(至少1TB的流量,每个月捐献给TOR)涉及到ISP的努力,减少抱怨,并试图尽我所能,合理的负债运行的退出节点。

共享

TETRA黑客:OsmocomTETRA

这是非常令人兴奋地看到释放的OsmocomTETRA ,第一开源SDR( 软件定义无线电 )实现TETRA解调器,PHY和MAC层较低。

这是TETRA版本,解锁访问的TETRA通信协议的数据帧的GSM airprobe的 ,从而使伟大的黑客攻击的机会!

TETRA技术现在也已经开了,我们应该想到,在这个2011年,看到开源TETRA嗅探器,并最有可能TEA加密(利加密算法)破获!

TETRA是由警察,应急服务和军队作为一种替代的移动通信网络,可以工作,即使没有网络覆盖(仅移动手机没有基站)的可用性,并提供了一​​些特殊的高可用性服务。

我写的关于TETRA在我的幻灯片主要语音安全协议的审查

在OsmocomBB邮件列表中有已经讨论一些TETRA网络状态:

  • 比利时阿斯特丽德警方TETRA网络:加密的
  • 德国警方测试TETRA网络在亚琛:未加密
  • 一些前TETRA网络:加密的jugoslawia
  • 荷兰C200 TETRA网络:TEA2静态密钥加密
  • 英国Airwave的TETRA网络:TEA2与TEA2加密

这将是很有趣地看到,新的警察和救援服务的黑客回来从旧的模拟时代到新的数字无线电:-)

共享

政府2.0,打开数据和维基解密

维基解密,的OpenLeaks GlobalLeaks,BalkanLeaks背后的概念是远远超过只是向公众揭示秘密。

这是一场革命,未来在政府的组织下,透明度和合作,与所谓的“网络2.0 /维基协作系统的一部分。

看看那些政府2.0 -由安科Domscheit伯格介绍 ,创新政府服务项目信息微软联合创始人丹尼尔·伯格, 维基解密创始人OpenLeaks德国和妻子。

看看在开放数据政府的2.0主动执行政府的透明度,减少腐败,提高政府组织性能。

那场革命,它只是一组以上的自由主义的anarco的时髦的家伙,希望通过传播秘密制造混乱,它只是为了急于实现新的组织模式,政府利用完整的透明度和公民的强强合作的开始。

共享

卓格,新的C + +和Java ZRTP实现公开发行

大家好,今天, 我在哪里首席技术官语音通信的隐私保护和信息安全技术开发 公司,主要 从事 意大利Italia SpA的PrivateWave, 我们 释放卓格,ZRTP一个新的开源协议的实施可从http://www下载。 zrtp.org

ZRTP [1]提供端至结束椭圆曲线Diffie-384Bit的赫尔曼和AES-256 SRTP加密与密钥交换。

卓格原本已经制定并实施PrivateWave的PrivateGSM语音加密产品可用于下列平台:黑莓,诺基亚和iOS(iPhone)。

卓格C + +已经集成了PJSIP的开源VoIP的SDK [2]和它的提供一体化对PJSIP 1.8.5补丁。 它已经过测试在iPhone,塞班,Windows,Linux和Mac OS X的

卓格Java已经被集成的一个定制版本MJSIP内[3]在黑莓平台上的开源的SDK,它包括内存使用需要优化,以减少在最低的垃圾收集活动。

这两个平台已分离和模块化的加密后端加密算法实现的,可以很容易地与其他的交换。

. 卓格授权下的GNU AGPL上github上 https://github.com/privatewave/ZORG的 源代码是可用。

我们发布在开源和我们的安全方法的一致性[4]我们真的希望它可以是有用的开源生态系统,创建新的语音加密系统,以支持言论自由。

超过20个基于PJSIP开源的VoIP加密软件和一些Java编写的,可以直接受益于卓格释放。

我们将很高兴收到合作的建议,新的整合,新的加密后端,错误侦察和任何有用的改善,让ZRTP肯定语音加密标准。

卓格有http://www.zrtp.org

[1] ZRTP: http://en.wikipedia.org/wiki/ZRTP
[2] PJSIP: http://www.pjsip.org
[3] MJSIP: http://www.mjsip.org的
[4]安全的方法: http://www.privatewave.com/security/approch.html

共享

加密移动座机电话与Asterisk 1.8

我们刚刚发布了一份技术HOWTO 如何建立抵押移动座机VoIP基础设施

像这样的会在未来几周别人HOWTO使用其他服务器平台,如FreeSWITCH的透明度,并充分利用开源安全技术的所有的精神。

共享

八史诗调节加密失败

一个非常照明文章调节加密技术和常见的误区,由政府监管部门不具有广视角技术是如何工作的八个史诗失败

无知的政府监管部门不理解,严格的监管将有以下缺点:

  1. 这将创建安全风险
  2. 它不会阻止坏人
  3. 它会损害创新
  4. 这将损害美国的业务
  5. 这将花费消费者
  6. 这将是违宪
  7. 美元的税款,这将是一个庞大的支出

共享

PrivateGSM:黑莓/ iPhone /诺基亚移动语音加密ZRTP或SRTP / SDES

我绝对避免用我自己的个人博客,使任何一种产品的推广。

那个时候,它是没有什么不同,但我想告诉你,我的工作没有花哨的营销产品的事实,但坚持技术。

今天,我在哪里, 首席技术官和共同创始人 PrivateWave ,我们公开发布的黑莓,iPhone和诺基亚手机的VoIP加密的产品:

  • 有史以来第一次黑莓加密的VoIP ZRTP -的PrivateGSM VoIP专业
  • 有史以来第一次iPhone的加密VoIP ZRTP -的PrivateGSM VoIP专业
  • 有史以来第一次黑莓加密VoIP客户端与SRTP SDES密钥交换通过SIP / TLS -的 PrivateGSM VoIP企业

标志privatewave colore.png的

在PrivateWave我们使用了不同的方法对于大多数语音加密公司,在那里,阅读我们的方法的安全性

此产品的相关技术和产业景观可概括如下:

  • 它是第一款语音加密公司只使用标准安全协议(我们预计市场将作出反应,因为它清楚专有的高科技,来自惩教署的遗产不能提供相同的值)
  • 语音加密功能,这是第一种方法只使用开源的标准加密引擎
  • 它是第一款语音加密的方法来使用不同的技术,提供不同的安全模式(终端到终端的ZRTP结束到站点SRTP

这些移动安全客户端套件,专为专业的安全使用,只使用最好的电信和安全技术,以及在恶劣的网络条件下也具有良好的性能,提供了高程度的保护:

这些应用程序是:

ICONA pgsm.png的

支持的移动设备有:

关于ZRTP我们决定压力和伸展的一些小的补充协议与所有安全和偏执的功能:

我们严格的地址簿集成,超越ZRTP RFC 规范这可能是手机,因为用户的行为不看手机屏幕上使用时容易受到某些攻击。

ZRTP减轻这种条件我们paranoy的方式,我们会写和/或将添加RFC列入具体细节。

有些话在 PrivateGSM专业终端到终端加密与ZRTP

阅读技术表

下载请点击这里,只是把你的电话号码

这些更多的结果,我非常熟练的工作人员(16人曾在这6个项目3个不同的平台)上辛勤工作在艰难的经营环境(肮脏的移动网络和肮脏的移动操作系统)的具有挑战性的技术(语音加密)超过2年。

我感到非常自豪,我们的工作人员!

接下来是什么?

在接下来的几个星期,你会看到释放重大一套单证,如整合FreeSWITCH的星号,并启用其他安全交换机,以及其他一些令人兴奋的安全技术新闻,我相信会注意到;)

它一直是一个艰苦的工作和更多有许多工作要做,但我深信,此类产品的安全性和开源社区会喜欢和透明的做法,也与开放的重要发布和开放源码的集成,使一个非常政治中立的(后门)技术。

共享

一对夫妇很好的VPN供应商

有很多的原因,为什么人会需要访问互联网低谷的VPN。

For example if you live in a country blocking certain contents (like anti-local-government website, porn, etc) and/or protocols (like skype, voip) you would probably want to move your internet connectivity outside the nasty blocking country by using encrypted VPN tunnels.

I evaluated several hosted VPN server and a couple of them sounds quite good among the widespread offering of such services:

SwissVPN

Exit to the internet from Switzerland.

Cost 6 CHF / months

Optional public fixed IP address

Useful if you need:

  • Just bypass local country filters with good high bandwidth
  • 公开公共服务,通过VPN与可选的固定公网IP地址。

表演过火

退出到互联网20个不同国家(每次连接时)之间进行选择。

有用的,如果你需要做的:

  • 对竞争对手的商业智能(出现连接时,它们来自X国)
  • 看电影/电视片只允许从国家知识产权web空间
  • 不同国家之间,看到谷歌的结果

共享

并不是每一个椭圆曲线ECC的安全性是一样的:低谷

 我自己的的ECC曲线的安全性和选择分析

vn9jna1BdgrzDCYNBJHi09q09q.jpg

大多数现代加密使用椭圆曲线加密(ECC),一个较小的密钥大小并降低计算能力,传统的密码系统被称为DH(的Diffie-Hellman)或RSA(Rivest,Shamir和艾德曼 )给予同等安全强度。

不是每个人都知道,未来任何应用程序的加密和TLS / SSL(加密用于固定网络),即使是移动ECC ECC加密被选中。

我发现很多所谓的“专有加密产品”放弃了RSA和DH带ECC的替代品,甚至没有指定哪一种ECC加密习惯,往往会随心所欲地使用ECC位密钥大小。

不过有一个很多围绕椭圆曲线的混乱,有很多不同的名称和密钥大小非加密有经验的用户很难使自己的数字进行评估时,一些加密的东西。

由于扩散混乱,我决定把我自己的分析,找出哪些是最好的ECC加密曲线和使用正确的ECC密钥大小。

这种分析想提供安全行业选择,在各种曲线和密钥大小,离开数学和密码分析的考虑,已年期间已经完成,总结在一些标准和安全协议采取的各种选择。

首先的结论。

从我分析只有以下的的ECC曲线是在加密系统中使用,因为要考虑的唯一一个选择在不同的部门(ANSI,NSA,凹陷,NIST,ECC BrainPool),不同的安全协议标准(IPSEC,OpenPGP的,ZRTP Kerberos验证,SSL / TLS)和唯一一个匹配NSA Suite B的安全要求(事实上的标准也为北约的军事环境):

  • 椭圆总理曲线256位- P-256
  • 的椭圆总理曲线384位- P-384

与可选的,就真的偏执,想要得到更多的密钥大​​小位,仍然不认为是有用的:

  • 椭圆总理曲线521位- P-521

我想声明Koblitz曲线应该是可以避免的 ,在任何关键尺寸(163/283/409/571),因为他们不具备足够的保修加密分析活动,有效地:

  • 不属于NSA套件B加密选择
  • 不属于ECC的Brainpool选择
  • 不属于ANSI X9.62选择
  • 不属于OpenPGP的ECC扩展选择
  • 不属于的Kerberos扩展ECC曲线选择

我请读者跟随槽我的分析的基础知识,是可以理解的,即使没有深厚的技术背景,但至少具有良好的技术背景的一些基本位加密。

 在这里,我们一起去分析
 

我的目标是什么/如何分析公开的科学和安全社区选择ECC加密系统使用安全协议和IETF RFC定义的标准(在一个开放和同行评审的方式定义互联网标准)。

下面一组RFC引入ECC到现有系统得到分析,以了解什么是更好地使用,什么是更好的排除:

  • RFC5639 :ECC Brainpool标准曲线和曲线生成
  • RFC4869 :NSA的Suite B加密的IPsec套房
  • RFC5430 :NSA Suite B的配置文件传输层安全(TLS)
  • RFC5008 :NSA Suite B的安全/多用途Internet邮件扩展(S / MIME)
  • RFC3766 :确定公共密钥用于交换对称密钥的优势
  • RFC5349 :椭圆曲线加密(ECC)支持公共密钥加密Kerberos初始验证(PKINIT)
  • RFC4492 :椭圆曲线加密(ECC)的密码套件传输层安全(TLS)
  • 由菲利普·齐默尔曼ECC曲线 ZRTP语音加密
  • ECC的OpenPGP(吃水d 筏jivsov的OpenPGP的ECC-06
  • ECC曲线选择微软为智能卡Kerberos登录

由科学家定义互联网安全协议,以使我们的评估的一部分,我们将使用选择。
此外,它必须被理解, 曲线选择来自不同的主管部门 ,作出自己的选择曲线,以告诉跳过使用什么什么行业:

由科学家定义安全要求的标准化机构,使我们的评估的一部分,我们将使用选择。
此外,大多数人不知道,但我们的分析,这是非常相关的东西,是有别样的ECC曲线加密算法和他们的“大小”是不同的,这取决于什么样的曲线上:

  • ECC曲线超过首相场(通常被称为椭圆曲线代表的P-密钥长度
  • ECC曲线的二进制字段(Koblitz曲线 ,通常被称为K-密钥长度为代表)

由于安全强度等价的椭圆曲线和Kobliz曲线有不同的密钥大小,例如,当我们读到ECC 571 Koblitz曲线是指具有同等的强度,521 ECC总理曲线。

强度,之间椭圆曲线和Kotbliz的曲线的比较报道如下(从米奇ECC互联网草案 ):

 | Koblitz | ECC | DH / DSA / RSA
 | 163 | 192 | 1024
 | 283 | 256 | 3072
 | 409 | 384 | 7680
 | 571 | 521​​ | 15360

下面有一个所有的各种实体和它们各自的名字( IETF RFC4492 ECC用法为TLS )的所有选定的曲线比较:

不同的标准组织所选择的曲线名称
 ------------ + --------------- + -------------
 SECG | | NIST ANSI X9.62
 ------------ + --------------- + -------------
 sect163k1 | | NIST的K-163
 sect163r1 | |
 sect163r2 | | NIST B-163
 sect193r1 | |
 sect193r2 | |
 sect233k1 | | NIST的K-233
 sect233r1 | | NIST B-233
 sect239k1 | |
 sect283k1 | | NIST的K-283
 sect283r1 | | NIST B-283
 sect409k1 | | NIST的K-409
 sect409r1 | | NIST B-409
 sect571k1 | | NIST的K-571
 sect571r1 | | NIST B-571
 secp160k1 | |
 secp160r1 | |
 secp160r2 | |
 secp192k1 | |
 secp192r1 | prime192v1 NIST P-192
 secp224k1 | |
 secp224r1 ​​| | NIST P-224
 secp256k1 | |
 secp256r1 | prime256v1 NIST P-256
 secp384r1 | | NIST P-384
 secp521r1 | | NIST P-521
 ------------ + --------------- + -------------

立即出现的是,有所有当局只选择两条曲线,并且有倾倒的koblitz曲线之间的3个部门共同商定由ANSI.The一般有以下两个ECC曲线:

  • secp192r1号/ prime192v1 / NIST的P-192
  • secp256r1号/ prime256v1 / NIST的P-256

这些选择的ECC曲线TLS RFC5430完全跳过koblitz的,曲线和选择仅供用法:

  • P-256,P-384,P-521

,ECC Brainpool完全跳过Koblitz曲线,并选择使用以下的ECC曲线:

  • P-160,P-192,P-224,P-256,P-320,P-384,P-512( 即是唯一的尤其是因为它是不是P-521,但P-512,简称的唯一密钥大小ECC brainpool。TNX伊恩·西蒙斯从雅典娜SCS

OpenPGP的互联网ECC用法草案PGPð 筏jivsov的OpenPGP-ECC-06完全跳过了Koblitz曲线和选择了以下ECC曲线

  • P-256,P-384,P-521

The Kerberos protocol extension for ECC use, defined in RFC5349 and defined by Microsoft for smartcard logon skipped completely Koblitz curves and selected the following ECC curves:

  • P-256, P-384, P-521

So, sounds clear that the right selection of ECC is for P-256, P-384 and P-521 while the Koblitz curve have been skipped for Top Secret use and for any security sensitive protocol (IPSec, OpenPGP, ZRTP, Kerberos, SSL/TLS).

Why i made this analysis?

I have done this analysis following a discussion i had regarding certain voice encryption products, all based on custom and proprietary protocols, that are all using Elliptic Curve Diffie Hellman 571 bit / ECDH 571 / 571-bit ECDH / Koblitz 571 bits .
All them are using the K-571 that, as described before, has been removed from all security sensitive environment and protocols and being myself a designer of voice encryption stuff i think that their cryptographic choice is absolutely not the best security choice.
Probably it has been done just for marketing purpose, because K-571 (Koblitz curve) seems stronger than P-521 (Elliptic curve based on Prime number). If you have “more bit” your marketing guys can claim to be “more secure”. Koblitz elliptic curve are faster than the top secret enabled prime elliptic curve and so give the product manager a chance to provide “more bit” in it's own product while keeping the key exchange fast.

It's a matter of philosophical choice.

I prefer to follow the trend of scientific community with the humility of not to considering myself a cryptographic expert, knowledgable more than the overall security and scientific community itself.

I prefer instead to use only algorithms that are approved for use in highly sensitive environments (top secret classification), that have been selected by all the authorities and working group analyzing encryption algorithms existing out-there and that represent the choice of almost all standard security protocols (IPSec, OpenPGP, ZRTP, Kerberos, SSL/TLS, etc).
I prefer to count the amount of brains working on the crypto i use, that check that's really secure, that evaluate whether there's some weakness.

The number of brais working on Crypto widely diffused are of order of magnitude more than the number of brains working on crypto used by just few people (like Koblitz curve).
So i am not demonizing who use ECDH 571 using Koblitz Curve, but for sure i can affirm that they did not taken the best choice in terms of security and that any security professionals doing a security benchmarking would consider the fact that Elliptic Curve Diffie Hellman 571 bit done with Koblitz Curve is not widely diffused, it's dumped from standard security protocols and it's not certified for top secret use.

共享

ESSOR,欧洲安全软件定义无线电(SDR)

I had a look at European Defense Agency website and found the ESSOR project, a working project funded for 106mln EUR to develop strategic defense communication products based on new Software Defined Radio approach.

SDR approach is a revolutionary system that's completely changing the way scientist and industry is approach any kind of wireless technology.

Basically instead of burning hardware chip that implement most of the radio frequency protocols and techniques, they are pushed in “software” to specialized radio hardware that can work on a lot of different frequency, acting as radio interface for a lot of different radio protocols.

For example the USRP (Universal Software Radio Peripheral) from Ettus Research that cost 1000-2000USD fully loaded, trough the opensource GnuRadio framework, have seen opensource implementation of:

And a lot more protocols and transmission technologies.

That kind of new approach to Radio Transmission System is destinated to change the way radio system are implemented, giving new capability such as to upgrade the “radio protocol itself” in software in order to provide “radio protocol” improvements.

In the short terms we have also seen very strong security research using SDR technologies such as the GSM cracking and the Bluetooth Sniffing .

We can expect that other technologies, weak by design but protected by the restriction to hardware devices to hack the low level protocols, will be soon get hacked. In the first list i would really like to see the hacking of TETRA, a technology born with closed mindset and secret encryption algorithms, something i really dislike ;-)

共享

产品管理和组织

I had to better understand the concepts, roles and duties related to Product management and Product marketing management in software companies, why are needed, which are the differences and how they fit inside an organization structure.

Most person i know never interested into this specific area of work, but when you want to be a product company (and not a consulting or solution company), you start having different products on different platforms for different target customers sold trough different channels with different pricing with a installation/different delivery process and that complexity must be managed in the proper way.

You realize that in order to let the product company grow in the right direction you need to organize product management activities formally, not closing your mind in rigid organization roles such as Marketing, Sales, R&D.

When we speak about Product Management i recommend the reading of the illuminating The strategic role of Product Management (How a market-driven focus leads companies to build products people want to buy) that clarify a lot of things, even if it outlook net separation of roles in product management, something t hat’s too heavy for a small company like a startup .

Still it provide a differentiation of duties between Product Management and Product Marketing .

A good understanding of the product management related to startup i s given in the article Creating Product Management at Startup showing up different case related to the roles of the product visionary into the company.

It introduce the terms ceo of the product in the sense that the product management duties jump around into the various organization function by providing focus and effort where it's needed, independently from the fact that the internal function requiring more effort is Development, Marketing, Sales or Communication. That's means practically enhancing the product vision as it's needed across all major product-related functions making the vision corporate-wide coherent.

A good representation of product management and product marketing activities is well described with the differentiation of between Strategical, Technical and Marketing sector and is not clearly separated between Management, Marketing(and Sales) and R&D :

Triad.jpg

I read that product manager background and knowledge are different depending on the company focus ( where does product management belong in the organization? ):

  • B2C -> Marketing experience
  • B2B -> Technical experience

An illuminating (for me) and very important differentiation regarding product management duties is the differentiation between:

  • 产品管理
  • 产品营销

The specific duties belonging to Product Marketing vs Management are greatly explained in Role Definitions For Product Management and Product Marketing that i suggest to read, letting you to better define tasks and responsibilities across your organization. It also provide a good definition of job requirements if you need to look for that figure!

At the same time it's important to understand what's NOT product management, effectively Product management is not just feature prioritization .

At the same time it's important to understand which professional figure is NOT itself a product manager:

  • Product manager is not a marketing manager – while product management is usually seen as a marketing discipline, marketers are focused on the marketing plan and are usually not driving the overall product direction. In that context could however be found Product marketing manager that's the arms of the marketing of the product, especially in small organization.
  • Product manager is not a sales manager – sales manager are about finding out how to sell a product, following which sales methodology, technique and channels and they could drive the company from a market oriented company ( product) to a customer oriented company (solution and consulting)
  • Product manager is not a developer – Developers are focused on the technology and not the overall product. Some great product managers are former developers, but it is difficult to do both at once. There is a natural tension between developers and product managers that should be maintained to create a balanced product.
  • Product manager is not a software manager – the software manager is a functional manager and usually not focused on the product or the customers.
  • Product manager is not a project manager – project managers are about how and when, while the product manager is about what. Project managers work closely with product managers to ensure successful completion of different phases in the product life cycle.

The typical product management activities could be in extreme synthesis summarized as follow:

  • Strategy: Planning a product strategy
  • Technical: leading product developments
  • Marketing: providing product and technical content
  • Sales: provide pre sales support and work effectively with sales

Product management so it's not precisely development, is not precisely marketing, it's not precisely sales, so typically it's difficult to identify “where it should stay” inside the organization structure (it's even difficult to understand that's needed)?

The Silicon Valley Product Group provide a nice insight on Product Organization Structure by pointing out which are the advantages and risks of several choices. Still the Cranky Product Manager say that It doesn't matter where the product manager live in the organization .

It's relevant to be careful not to have persons that are too much technical or too much sales oriented in order to fill the gap among different organization. Too much fragmentation of assigned duties across the organization may lead to bureaucracy, too much duties on one person may lead to ineffective implementation of needed tasks in some area and to a internal competition perception respect to the traditional roles.

Check there a very nice Resume of a professional with practical experience in product management (it's an half techie/half marketing guys).

啊! Another very common misunderstanding is to confuse marketing with communication where ai found a so good definition of Marketing that i really like and understand for strict relationship with Product Management:

Marketing is know the market so well that the product sell itself

But what happen when you don't handle a product management and product marketing management process in a defined way?

A nice story is shown as example in The strategic role of Product Management :

Your founder, a brilliant technician, started the company years ago when he quit his day job to market his idea full time. He created a product that he just knew other people needed. And he was right. Pretty soon he delivered enough of the product and hired his best friend from college as VP of Sales. And the company grew. But before long, the VP of Sales complained, “We're an engineering-led company. We need to become customer-driven.” And that sounded fine. Except… every new contract seemed to require custom work. You signed a dozen clients in a dozen market segments and the latest customer's voice always dominated the product plans. You concluded that “customer-driven” meant “driven by the latest customer” and that couldn't be right.

If you want to be a product company it's relevant to precisely follow a strategy driven by product marketing and management and not by sales.

Confusion between duties of product management/marketing and sales could lead to unsuccessful product company that are not able to proceed within their strategy, simply because they getting opportunities that drive the business out-of-scope.

A product company must invest in it's own product development and marketing in order to let sales activity stay focused and guarantee that the organization is every day more effective on the market.

After this reading, my understanding is that it's relevant to identify how to create a set of flexible business process on how to handle various product management and product marketing duties separating them from sales.

共享

远程拦截SNOM VoIP电话

I suggest reading remotely tapping VoIp phones ” on VoIP Security Alliance Blog by Shawn Merdinger .

A concrete example on how current telephony infrastructure are getting more vulnerable to cyber attacks.

共享

Voice communication security workshop

您好!

特伦托大学,我做了一个语音通信的安全技术谈一个有趣的信息交换与加密实验室管理Massimiliano撒拉族的教授。

我建议有兴趣的人读它,尤其是第二部分,因为习惯在几个部门的各种语音加密技术是一种创新的分类。

我试图解释,并从这种广泛分散的技术部门提供广泛的技术通常是完全没有关系的每个其他的,但实际上它们都适用于语音加密后的分类概述:

  • 手机的TLC产业语音加密标准
  • 政府和军方的语音加密标准
  • 公共安全语音加密标准
  • IETF语音加密标准
  • 杂项专有的语音加密技术

这是一个巨大的slideware,122张幻灯片,我建议去阅读第二部分跳跃拦截技术已经涵盖了2009年我的介绍概述。

语音通信的安全性

尤其是我喜欢巧克力级加密的概念,希望提供一些的蛇油加密概念的创新。

But i need to get more in depth about the Chocolate grade encryption context, will probably do before end-of-year by providing an applied course on understanding and evaluating practically the real security context of various voice encryption technologies.

共享

27C3 - CCC国会CFP:我们为和平而来

We come in peace

189322778_8cb9af1365_m.jpg

We come in peace, said the conquerers of the New World.

We come in peace, says the government, when it comes to colonise, regulate, and militarise the new digital world.

We come in peace, say the nation-state sized companies that have set out to monetise the net and chain the users to their shiny new devices.

We come in peace, we say as hackers, geeks and nerds, when we set out towards the real world and try to change it, because it has intruded into our natural habitat, the cyberspace…

Call for paper for participation to 27C3 CCC congress is open, and i never saw a so exciting payoff :-)

See you on 30 December 2010 in Berlin!

共享

GSM cracking in penetration test methodologies (OSSTMM) ?

As most of this blog reader already know, in past years there was a lot of activities related to public research for GSM auditing and cracking.

However when there was huge media coverage to GSM cracking research results, the tools to make the cracking was really early stage and still very inefficient.

Now Frank Stevenson , norwegian cryptanalyst that already broke the Content Scrambling System of DVD video disc, participating to the A51 cracking project started by Karsten Nohl , released Kraken , a new improved version of the A51 cracking system.

It's interesting to notice that WiFi cracking had a similar story, as the first WiFi wep cracking discovery was quite slow in earlier techniques but later Korek, an hacker working on cracking code, improve the attack system drammatically.

That's the story of security research cooperation, you start a research, someone follow it and improve it, some other follow it and improved it and at the end you get the result.

Read more on the Kraken GSM Cracking software release .

And stay tuned as next week at Blackhat Conference Karsten Nohl will explain the details of the required hardware setup and detailed instructions on how to do it :-)

I would really like to see those tools incorporated into Penetration Testing Linux Distribution BackTrack with OSSTMM methodology enforcing the testing of GSM interception and man in the middle :-)

If things proceed that way and Ettus Research (The producer of USRP2 software radio used for low cost GSM signal receiving) will not be taken down, we can still see this.

共享

Snake-oil security claims on crypto security product

安防市场的增长,越来越多的企业进入市场,但有多少人认真考虑他们做了什么?

你知道吗,这样做安全技术是什么意思, 你是亲自负责保护用户的信息。 你必须让他们知道他们需要什么,你究竟在做什么,哪种威胁模型产品保护。

用户无法评估安全要求产品本身所代表的产品的安全功能的一个典型的问题。

所以有很多公司做一个不那么道德营销的安全功能,基于的事实,任何用户都将能够评估它。

The previously explained situation reside in the security topic of Snake Oil Encryption , an evolution in the scientific cryptographic environment that let us today use best of breed information protection technologies without having to worry too much about backdoors or insecurities.

Let's speak about Snake Oil Encryption

Snake Oil Cryptography : In cryptography , snake oil is a term used to describe commercial cryptographic methods and products which are considered bogus or fraudulent. 辨不安全的加密技术的安全加密从用户的观点出发,可以是困难的。 ,如布鲁斯菲尔齐默尔曼的 ,许多密码学家,承担教育公众如何做安全加密,以及突出的误导销售的一些加密产品。

最有参考价值的加密安全大师,菲利普·齐默尔曼和布鲁斯,是第一次谈论蛇油加密:

由菲利普·齐默尔曼 蛇油

蛇油由Bruce Schneier

密歇根电信和科技法律评论“也取得了很好的分析有关安全产品的安全特性, 蛇油安全声称“产品安全系统的误传他们解释讨厌的营销技巧用来调整用户无法评估安全功能,包括经济和法律责任的含义。

Very famous is the sentence of Russ Nelson : 几种蛇油的安全产品公司不解释,不清除的威胁模型产品适用。非常有名的是一句拉斯尼尔森

“Remember, crypto without a threat model is like cookies without milk. ..... Cryptography without a threat model is like motherhood without apple pie. 不能说足够的时间。 更一般地,安全无威胁模型是通过定义要失败的。“

So, how to spot snake oil security products?

检查发现蛇油加密产品: 蛇油警告标志,加密软件,以避免马特·柯廷的指导方针。

由Emility拉特利夫(IBM Linux安全架构师),试图使如何识别加密蛇油明显的例子,你可以看到这个非常好的加密蛇油范例

在这里代表马特·柯廷纸的基本方针:


通过检查点,它可能以评估加密技术或产品是多么严重。

但所有的一切,不道德的安全方法如何解决?

这是非常有意义的,这将是非常有益的各种安全产品类别做出一些强烈的独立评估指引(如渗透测试OSSTMM ),使这个安全评价过程中,真正的用户手中。

It would be also very nice to have someone making analysis and evaluation of security product companies, publishing reports about Snake Oil signs.

共享

Web2.0 privacy leak in Mobile apps

你知道web2.0的世界,它是大量泄漏任何形式(剖析,分析,剖析)有关隐私和用户开始关注它。

用户持续下载应用程序不知道的细节,只是因为他们做了什么,例如IFART是很酷,很有趣,有时是有用的。

thumb.php.jpg

On mobile phones users install from 1000% up to 10.000% more applications than on a PC, and those apps may contain malware or other unexpected functionalities.

最近infobyte分析ubertwitter的客户 ,发现客户端漏水,发送到他们的服务器许多个人和敏感数据,比如:

- 黑莓PIN

- 电话号码

- 电子邮件地址

- Geographic positioning information

了解UbertTwitter '间谍'功能发现这里infoByte

It's plenty of applications leaking private and sensitive information but just nobody have a look at it.

强制性数据保留和隐私政策应该成为应用开发和移动应用的提交方针的一部分?

恕我直言,一个用户必须不仅被警告有关应用程序的功能和API的使用,但同时会做什么样的信息要处理手机里面。

能力是指授权使用某个功能的应用程序,例如使用地理定位API,但应用程序会做什么,谁提供此类信息,一旦用户授权?

这是一个安全分析级别,手机制造商不提供,他们应该的,因为它关注的信息,而不是在应用设备功能的使用授权/许可。

ps yes! ok了! 我同意! This kind of post would require 3-4 pages long discussion as the topic is hot and quite articulated but it's saturday morning and i gotta go!

共享

AES algorithm selected for use in space

I encountered a nice paper regarding analysis and consideration on which encryption algorithm it's best suited for use in the space by space ship and equipments.

The paper has been done by the Consultative Committee for Space Data Systems that's a consortium of all space agency around that cumulatively handled more than 400 mission to space .

topban.jpg

Read the paper Encryption Algorithm Trade Survey as it gives interesting consideration and comparison between different encryption algorithms.

Obviously the finally selected algorithm is AES , while KASUMI (used in UMTS networks) was avoided.

共享

Blackberry Security and Encryption: Devil or Angel?

Blackberry have good and bad reputation regarding his security capability, depending from which angle you look at it.

This post it's a summarized set of information to let the reader the get picture, without taking much a position as RIM and Blackberry can be considered, depending on the point of view, an extremely secure platform or an extremely dangerous one .

bblock.jpg

Let's goes on.

On one side Blackberry it's a platform plenty of encryption features, security features everywhere, device encrypted (with custom crypto), communication encrypted (with custom proprietary protocols such as IPPP), very good Advanced Security Settings, Encryption framework from Certicom ( now owned by RIM ).

On the other side they does not provide only a device but an overlay access network, called BIS ( Blackberry Internet Service ), that's a global worldwide wide area network where your blackberry enter while you browse or checkmail using blackberry.net AP.

When you, or an application, use the blackberry.net APN you are not just connecting to the internet with the carrier internet connection, but you are entering inside the RIM network that will proxy and act as a gateway to reach the internet.

The very same happen when you have a corporate use: Both the BB device and the corporate BES connect to the RIM network that act as a sort of vpn concentration network .

So basically all the communications cross trough RIM service infrastructure in encrypted format with a set proprietary encryption and communication protocols.

正如通知,认为谷歌提供的gtalk超过blackberry.net APN,为了达成了协议,里面的BB网络的BB用户提供服务。 当你安装的gtalk得到补充服务的书籍这一点GTALKNA01的 GTALK网关内部的RIM网络,让国际清算银行内部的沟通和行为作为GTALK到互联网网关的名称。

移动运营商通常甚至没有允许检查黑莓设备之间的流量和黑莓网络。

因此,RIM和黑莓不知何故他们的做法唯一的为他们提供一个平台,网络和所有捆绑在一起的服务和你可以不只是“得到设备和软件”,但用户和企业都始终约束和连接到服务网络。

这是很好的,这是很糟糕,因为这意味着,RIM提供了极其良好的安全特性和功能来保护信息,设备和访问在不同层面对第三方的信息。

但它总是很难估计RIM本身可以使政治压力反对RIM相关的威胁和风险。

请考虑,我不是说“RIM正在寻找你的数据”,但一个客观的风险分析:该平台是如何做RIM有权在设备上,设备上的信息和信息跨越网络。 (阅读我的移动安全幻灯片 )。

例如,让我们考虑一下诺基亚手机非常相同的背景。

一旦诺基亚设备被出售,诺基亚不会有权力在设备上,也不在设备上的信息,也没有跨网络的信息。 但它也是真实的,诺基亚只是提供设备,不提供增值服务,如企业集成(RIM VPN隧道),BIS接入网络和所有的本地和远程安全配置的功能,黑莓提供。

所以这是一个问题的选择平台时考虑的风险范围内以适当的方式,用一个例子非常相似,选择Microsoft Exchange服务器(在自己的服务),或得到一个SaaS服务是否像谷歌应用程序。

在这两种情况下,你需要信任的供应商,但在第一个例子中,你需要相信微软不把后门的软件,而在第二个例子中,你需要信任作为一个平台和服务提供商,谷歌,不访问您的信息。

所以这是一个不同的模式进行评估取决于您的威胁模型。

如果您的威胁模型让你认为RIM作为一个值得信赖的第三方服务提供商(就像谷歌)比它的确定。 如果你有一个非常高风险的背景下,像绝密的,接下来就让我们仔细考虑和评估,不管它是不是更好地保持黑莓服务完全隔离的设备或使用另一个制造商的服务器和服务的交互系统,无需。

现在,让我们回到关于黑莓和黑莓的安全性本身的一些研究和一些事实。

First of all several governments had to deal with RIM in order to force them to provide access to the information that cross their service networks while other decided to directly ban Blackberry usage for high officials because of servers located in UK and USA, while other decided to install their own backdoors.

There's a lot of discussion when the topics are RIM Blackberry and Governments for various reasons.

Below a set of official Security related information on RIM blackberry platform:

And here a set of unofficial Security and Hacking related information on RIM Blackberry platform:

Because it's 23.32 (GMT+1), i am tired, i think that this post will end up here.

I hope to have provided the reader a set of useful information and consideration to go more in depth in analyzing and considering the overall blackberry security (in the good and in the bad, it always depends on your threat model!).

干杯

:法比奥Pietrosanti(纳伊夫)

ps i am managing security technology development (voice encryption tech) on Blackberry platform, and i can tell you that from the development point of view it's absolutely better than Nokia in terms of compatibility and speed of development, but use only RIMOS 5.0+ !

共享

Celebrating “Hackers” after 25 years

A cult book , ever green since 25 years.

201007010924.jpg

It's been 25 years since “Hackers” was published. Author Steven Levy reflects on the book and the movement.

http://radar.oreilly.com/2010/06/hackers-at-25.html 
Steven Levy wrote a book in the mid-1980s that introduced the term "hacker" -- the positive connotation -- to a wide audience. In the ensuing 25 years, that word and its accompanying community have gone through tremendous change. The book itself became a mainstay in tech libraries.
O'Reilly recently released an updated 25th anniversary edition of "Hackers," so I checked in with Levy to discuss the book's development, its influence, and the role hackers continue to play.
共享

Botnet for RSA cracking?

I read an interesting article about putting 1.000.000 computers, given the chance for a serious botnet owner to get it, to crack RSA.

The result is that in such context attacking an RSA 1024bit key would take only 28 years, compared to theoretical 19 billion of years.

Reading of this article , is extremely interesting because it gives our very important consideration on the cryptography strength respect to the computation power required to carry on cracking attempt, along with industry approach to “default security level”.

I would say a must read .

共享

Patent rights and opensource: can they co-exist?

你们有多少人不得不处理专利技术?

How many of the patented technologies you dealed with was also “secrets” in their implementation?

Well, there's a set of technologies whose implementation is open source ( copyright) but that are patented ( intellectual property right) .

一个很漂亮的纸的话题开源与专利,我建议你去看看离Fenwick&西,可以在这里下载(PDF) 。

共享

China Encryption Regulations

大家好,

i found this very interesting paper on China Encryption Import/Export/Domestic Regulations done by Baker&Mckenzie in the US.

It's strongly business and regulatory oriented giving a very well done view on how china regulations works and how it may behave in future.

Read here Decrypting China Encryption's Regulations (form Bakernet website) .

共享

IOScat – a Port of Netcat to Cisco IOS

A porting of famous netcat to Cisco IOS router operating system: IOSCat

The only main limit is that it does not support UDP, but that's a very cool tool!

A very good txt to read is Netcat hacker Manual .

共享

The (old) Crypto AG case and some thinking about it

In the '90, closed source and proprietary cryptography was ruling the world.

That's before open source and scientifically approved encrypted technologies went out as a best practice to do crypto stuff.

I would like to remind when, in 1992, USA along with Israel was, together with switzerland, providing backdoored (proprietary and secret) technologies to Iranian government to tap their communications, cheating them to think that the used solution was secure , making also some consideration on this today in 2010.

caq63crypto.t.jpg

That's called The Crypto AG case , an historical fact involving the United States National Security Agency along with Signal Intelligence Division of Israel Ministry of Defense that are strongly suspected to had made an agreement with the Swiss cryptography producer company Crypto AG .

Basically those entities placed a backdoor in the secure crypto equipment that they provided to Iran to intercept Iranian communications.

Their crypto was based on secret and proprietary encryption algorithms developed by Crypto AG and eventually customized for Iranian government.

You can read some other facts about Crypto AG backdoor related issues:

The demise of global telecommunication security

The NSA-Crypto AG sting

Breaking codes: an impossible task? By BBC

Der Spiegel Crypto AG (german) article

Now, in 2010, we all know and understand that secret and proprietary crypto does not work.

Just some reference by top worldwide cryptographic experts below:

Secrecy, Security, Obscurity by Bruce Schneier

Just say No to Proprietary cryptographic Algorithms by Network Computing (Mike Fratto)

Security Through Obscurity by Ceria Purdue University

Unlocking the Secrets of Crypto: Cryptography, Encryption and Cryptology explained by Symantec

Time change the way things are approached.

I like very much the famous Philip Zimmermann assertion:

“Cryptography used to be an obscure science, of little relevance to everyday life. Historically, it always had a special role in military and diplomatic communications. But in the Information Age, cryptography is about political power, and in particular, about the power relationship between a government and its people. It is about the right to privacy, freedom of speech, freedom of political association, freedom of the press, freedom from unreasonable search and seizure, freedom to be left alone.”

Any scientist today accept and approve the Kerckhoffs' Principle that in 1883 in the Cryptographie Militaire paper stated:

The security of a cryptosystem should not depend on keeping the algorithm secret, but only on keeping the numeric key secret.

It's absolutely clear that the best practice for doing cryptography today obbly any serious person to do open cryptography, subject to public review and that follow the Kerckhoff principle.

So, what we should think about closed source, proprietary cryptography that's based on security trough obscurity concepts?

I was EXTREMELY astonished when TODAY, in 2010, in the age of information society i read some paper on Crypto AG website.

I invite all to read the Crypto AG security paper called Sophisticated Security Architecture designed by Crypto AG of which you can get a significant excerpt below:

The design of this architecture allows Crypto AG to provide a secret proprietary algorithm that can be specified for each customer to assure the perfect degree of cryptographic security and optimum support for the customer's security policy. In turn, the Security Architecture gives you the influence you need to be fully independent in respect of your encryption solution. You can determine all areas that are covered by cryptography and verify how the algorithm works. The original secret proprietary algorithm of Crypto AG is the foundation of the Security Architecture .

I have to say that their architecture is absolutely good from TLC point of view. Also they have done a very good job in making the design of the overall architecture in order to make a tamper-proof resistant crypto system by using dedicated crypto processor .
However there is still something missing:

T he overall cryptographic concept is misleading, based on wrong encryption concepts .

You may think that i am a troll telling this, but given the history of Crypto AG and given the fact that all the scientific and security community does not approve security trough obscurity concepts , it would legitimate to ask ourself:

Why they are still doing security trough obscurity cryptography with secret and proprietary algorithms ?



Hey, i think that they have very depth knowledge on telecommunication and security, but given that the science tell us not to follow the secrecy of algorithms, i really have serious doubt on why they are still providing proprietary encryption and does not move to standard solutions (eventually with some kind of custom enhancement).

共享

Missiles against cyber attacks?

The cyber conflicts are really reaching a point where war and cyberwar merge together.

NATO countries have the right to use the force against attacks on computer networks .

共享

Mobile Security talk at WHYMCA conference

I want to share some slides i used to talk about mobile security at whymca mobile conference in Milan.

Read here my slides on mobile security .

The slides provide a wide an in-depth overview of mobile security related matters, i should be doing some slidecast about it putting also audio. Maybe will do, maybe not, it depends on time that's always a insufficient resource.

共享

iPhone PIN: useless encryption

I recently switched one of my multiple mobile phones with which i go around to iPhone.

I am particularly concerned about data protection in case of theft and so started having a look around about the iPhone provided protection system.

There is an interesting set of iPhone Business Security Features that make me think that iPhone is moving in the right path for security protection of the phone, but still a lot of things has to be done, especially for serious Enterprise and Government users.

201006011551.jpg

For example it turned out that the iPhone PIN protection is useless and it can be broken just plugging the iPhone to a Linux machine and accessing the device like a USB stick.

That's something disturbing my paranoid mindset that make me think not to use sensitive data on my iPhone if i cannot protect my data.

Probably an iPhone independent disk encryption product would be very useful in order to let the market create protection schemas that fit the different risk contexts that different users may have.

Probably a general consumer is not worried about this PIN vulnerability but for me, working within highly confidential envirnonment such as intelligence, finance and military, it's something that i cannot accept.

I need strong disk encryption on my mobile phone.

I do strong voice encryption for it , but it would be really nice to have also something to protect the whole iPhone data and not just phone calls.

共享

Who extract Oil in Iran? Business and UN sanction together

I like geopolitic and i am following carefully iran issues.

I went to National Iranian Oil Company website and have seen “ Exploration & Production ” section where are listed all the companies and their country of origin that are allowed to make Exploration of oil in Iran.

On that list we find the list of countries along with the data of signing of exploration agreement:

  • Norway/Russia (2000)
  • Australia/Spain/Chile (2001)
  • India (2002)
  • China (2001)
  • Brazil (2004)
  • Spain (2004)
  • Thailand (2005)
  • China x 2 (2005)
  • Norway (2006)
  • Italy (2008)
  • Vietnam (2008)

Those countries's oil companies are allowed to do oil extraction in Iran and i would like to point out that Iran is the 2nd world Oil Reserve just after Saudi Arabia.

As you can see there's NO USA company doing extraction.

Of European Countries the only one doing business with IRAN are:

IRAN Norway Relationship

IRAN ITALY Relationship

IRAN SPAIN Relationship

While of the well known non-US-simpatizing countries, the one doing Oil business with Iran are:

IRAN RUSSIA Relationship

IRAN BRAZIL Relationship

IRAN China Relationship

Don't missing some Asian involvement.

IRAN India Relationship

IRAN Vietnam Relationship

As you can see Iran is doing Oil business with most big south America and Far Asia countries, with some little exception in Europe for what apply to Norway, Italy and Spain.

To me it sounds that those European countries are going to face serious trouble whether they will accept and subscribe UN sanction against Iran.

Or some of them, like Italy, are protected by the strenghtening cooperation they are doing with Russia on Energy matters?

Well, i don't know how things will end up, but it's possible the most hypocrit countries like the European ones doing business in Iran while applying Sanctions will be the only European winning in the international competition for Iran Oil (Unless France did not drop a nuclear bomb on theran ;) ).

共享

Exploit code against SecurStar DriveCrypt published

It seems that the hacking community somehow like to target securstar products, maybe because hacking community doesn't like the often revealed unethical approach already previously described in this blog by articles and user's comments.

In 2004 a lot of accusation against Hafner of SecurStar went out because of alleged intellectual property theft regarding opensource codes such as Encryption 4 the masses and legal advert also against the Free and opensource TrueCrypt project .

In 2008 there was a pre-boot authentication hacking against DriveCrypt Plus posted on Full-Disclosure.

Early 2010 it was the time of the fake infosecurity research secretly sponsored by securstar at http://infosecurityguard.com (that now they tried to remove from the web because of embarrassing situation, but backup of the story are available, hacking community still wait for apologies) .

Now, mid 2010, following a research published in December 2009 about Disk Encryption software vulnerabilities made by Neil Kettle (mu-b), Security researcher at digit-labs and Penetration tester at Convergent Network Solutions , DriveCrypt was found to be vulnerable and exploitable breaking on-device security of the system and exploit code has been just released.

Exploit code reported below (thanks Neil for the code release!):

  • Arbitrary kernel code execution security exploit of DriveCrypt: drivecrypt-dcr.c
  • Arbitrary file reading/writing security exploit via unchecked user-definable parameters to ZxCreateFile/ReadFile/ WriteFile: drivecrypt-fopen.c

The exploit code has been tested against DriveCrypt 5.3, currently released DriveCrypt 5.4 is reported to be vulnerable too as it has just minor changes related to win7 compatibility. Can anyone make a double check and report a comment here?

Very good job Neil!

In the meantime the Free Truecrypt is probably the preferred choice for disk encryption, given the fact that it's difficult to trust DriveCrypt, PGP has been acquired by Symantec and there are very bad rumors about the trust that people have in Symantec and there are not many widely available alternatives.

Rumors say that also PhoneCrypt binaries are getting analyzed and the proprietary encryption system could reveal something fun…

共享

Quantum cryptography broken

Quantum cryptography it's something very challenging, encryption methods that leverage the law of phisycs to secure communications over fiber lines.

To oversimplify the system is based on the fact that if someone cut the fiber, put a tap in the middle, and joint together the other side of the fiber, the amount of “errors” that will be on the communications path will be higher than 20% .

So if QBER (Quantum Bit Error Rate) goes above 20% then it's assumed that the system is intercepted.

Researcher at university of toronto was able to cheat the system with a staying below the 20%, at 19.7% , thus tweaking the threshold used by the system to consider the communication channel secure vs compromised.

The product found vulnerable is called Cerberis Layer2 and produced by the Swiss ID Quantique .

Some possibile approach to detect the attack has been provided but probably, imho, such kind of systems does not have to be considered 100% reliable until the technology will be mature enough.

Traditional encryption has to be used together till several years, eventually bundled with quantum encryption whether applicable.

When we will see a quantum encryption systems on an RFC like we have seen for ZRTP , PGP and SSL ?

-naif

共享

FUN! Infosecurity consideration on some well known films

Please read it carefully Film that needed better infosec .

One the the review, imho the most fun one on film Star Wars :

The scene

Death star getting blown up

Infosec Analysis

Darth Vader must be heralded as the prime example of a chief executive who really didn't care about information security. The entire board was unapproachable and clearly no system testing was undertaken. The network security was so poor that it was hacked into and the designs for the death star were stolen without anyone knowing.

Even worse than that, the death star had a major design flaw where by dropping a bomb thingy into a big hole on the outside, it actually blew up the entire thing!

Darth Vader needed to employ a good Security Consultant to sit on the executive board and promise not to force choke him. Should have commissioned a full risk assessment of the death star followed by a full penetration test. Only then should the death star have been released into the production environment.

共享

great point of view

Because security of a cryptographic system it's not a matter of “how many bits do i use” but using the right approach to do the right thing to mitigate the defined security risk in the most balanced way.

security.png

共享

Encryption is not scrambling: be aware of scrambler!

Most of us know about voice scrambler that can be used across almost any kind of voice based communication technology.

Extremely flexible approach: works everything

Extreme performance: very low latency

but unfortunately…

Extremely weak: Scrambling cannot be considered secure.

Only encryption can be considered secure under the Kerckoff's principle .

So please don't even consider any kind of analog scrambler if you need real security.

Read deeply the paper Implementation of a real-time voice encryption system ” by Markus Brandau, especially the cryptoanalysis paragraph.

共享

SecurStar GmbH Phonecrypt answers on the Infosecurityguard/Notrax case: absolutely unreasonable! :-)

They promote their anonymous proxy service for “Anonymous p2p use” ( http://www.securstar.com/products_ssolo.php ). Who would let users do p2p from the office dsl line where they have installed their corporate VoIP PBX ? If you do VoIP you can't let third party flood your line w/ p2p traffic, your phone calls would became obviously unreliable (yes, yes, you can do QoS, but you would not place an anonymous navigation proxy on your company office DSL line…).

  • Which company providing an anonymous navigation service would ever use their own office IP address? Just think how many times you would have the police knocking at your door and your employees as the prime suspects. (In past i used to run a TOR node, i know the risks…). Also think how many times you would find yourself blacklisted on google as a spyware bot.
  • Mr. Hafner also says “We have two million people using this product. Or he may have been an old customer of ours”. 2M users on a DSL line, really?
  • I don't use Surfsolo service, however their proxies are probably these ones:
  • surfsolo.securstar.net – 67.225.141.74

    surfsolo.securstar.com – 69.16.211.133

    Frankly speaking I can easily understand that Mr. Hafner is going do whatever he can to protect his company from the scandal, but the “anonymous proxy” excuse is at the very least suspicious.

    How does the fact that the “independent research” was semantically a product review of PhoneCrypt, along with the discovery that the author come from the SecurStar GmbH IP address offices, along with the anonymity of this Notrax guy (SecurStar calls him a “well known it security professional” in their press release..) sound to you?

    It's possible that earth will get an attack from outer space that's going to destroy our life?

    Statistically extremely difficult, but yes, possible. More or less like the “anonymous proxy” story told by Mr. Hafner to cover the fact that they are the ones behind the infosecurityguard.com fake “independent security review”.

    Hey, I don't need anything else to convince myself or to let the smart person have his own thoughts on this.

    I just think that the best way for SecurStar to get out of this mess would probably be to provide public excuses to the hacking community for abusing the name and reputation of real independent security researches, for the sake of a marketing stunt.

    的问候,

    Fabio Pietrosanti

    ps I am currently waiting for some other infos that will more precisely confirm that what Mr. Hafner is saying is not properly true. 敬请关注。

    共享

    Evidence that infosecurityguard.com/notrax is SecurStar GmbH Phonecrypt – A fake independent research on voice crypto

    Below evidence that the security review made by an anonymous hacker on http://infosecurityguard.com is in facts a dishonest marketing plan by the SecurStar GmbH to promote their voice crypto product.

    I already wrote about that voice crypto analysis that appeared to me very suspicious.

    Now it's confirmed, it's a fake independent hacker security research by SecurStar GmbH, its just a marketing trick!

    How do we know that Infosecurityguard.com, the fake independent security research, is a marketing trick from SecurStar GmbH?

    1) I posted on http://infosecurityguard.com a comments to a post with a link to my blog to that article on israelian ministry of defense certification

    2) The author of http://infosecurityguard.com went to approve the comment and read the link on my own blog http://infosecurity.ch

    3) Reaching my blog he leaked the IP address from which he was coming 217.7.213.59 (where i just clicked on from wordpress statistic interface)

    4) On http:// 217.7.213.59/panel there is the IP PBX interface of the SecurStar GmbH corporate PBX (openly reachable trough the internet!)

    5) The names of the internal PBX confirm 100% that it's the SecurStar GmbH:

    6) There is 100% evidence that the anonymous hacker of http://infosecurityguard.com is from SecurStar GmbH

    Below the data and reference that let us discover that it's all but a dishonest marketing tips and not an independent security research.

    Kudos to Matteo Flora for it's support and for his article in Debunking Infosecurityguard identity !

    The http referral tricks

    When you read a link going from a website to another one there is an HTTP protocol header, the “Referral”, that tell you from which page someone is going to another webpage.

    The referral demonstrated that the authors of http://infosecurityguard.com read my post, because it was coming from http://infosecurityguard.com/wp-admin/edit-comments.php that's the webpage you use as a wordpress author/editor to approve/refuse comments. And here there was the link.

    That's the log entry:

    217.7.213.59 – - [30/Jan/2010:02:56:37 -0700] “GET /20100129/licensed-by-israel-ministry-of-defense-how-things-really-works/ HTTP/1.0″ 200 5795 “ http://infosecurityguard.com/wp-admin/edit-comments.php ” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”

    The PBX open on the internet tell us that's SecurStar GmbH

    The SecurStar GmbH PBX is open on the internet, it contains all the names of their employee and confirm us that the author of http:/infosecurityguard.com is that company and is the anonymous hacker called Notrax.

    Here there is their forum post where the SecurStar GmbH guys are debugging IPCOPfirewall & Asterisk together (so we see also details of what they use) where there is the ip 217.7.213.59 .

    SecurStarproof.png

    That's also really fun!

    They sell secure telephony but their company telephony system is openly vulnerable on the internet . :-)

    I was thinking to call the CEO, Hafner, via SIP on his internal desktop PBX to announce we discovered him tricks.. :->

    They measured their marketing activity

    Looking at the logs of my website i found that they was sensing the google distribution of information for the following keywords, in order to understand how effectively they was able to attack competing products. It's reasonable, if you invest money in a marketing campaign you want to see the results :-)

    They reached my blog and i logged their search:

    infosecurityguard+cryptophone

    infosecurityguard+gold-lock

    217.7.213.59 – - [30/Jan/2010:02:22:42 -0700] “GET / HTTP/1.0″ 200 31057 “http://www.google.de/search?sourceid=navclient&ie=UTF-8&rlz=1T4SKPB_enDE350DE350&q=infosecurityguard+cryptophone” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”

    217.7.213.59 – - [30/Jan/2010:04:15:07 -0700] “GET /20100130/about-the-voice-encryption-analysis-phonecrypt-can-be-intercepted-serious-security-evaluation-criteria/ HTTP/1.0″ 200 15774 “http://www.google.de/search?sourceid=navclient&ie=UTF-8&rlz=1T4SKPB_enDE350DE350&q=gold-lock+infosecurityguard” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”


    The domain registration data

    The domain have been registered on 1st December 2009, just two months to start preparing the dishonest marketing campaign:

    Domain Name: INFOSECURITYGUARD.COM

    Registrar: GODADDY.COM, INC.

    Updated Date: 01-dec-2009

    Creation Date: 01-dec-2009

    The domain is anonymously privacy protected trough a whois privacy service:

    Administrative Contact: Private, Registration INFOSECURITYGUARD.COM@domainsbyproxy.com , Domains by Proxy, Inc. DomainsByProxy.com

    Notrax hacker does not exist on google
    As you know any hacker that get public usually have presence of it's activity on google, attending mailinglists, forum, homepage, past research, participation to conferences, etc, etc.
    The fake hacker that they wanted us to to think was writing an independent blog does NOT have any trace on google. Only some hit about an anonymous browser called Notrax but nothing about that hacker.
    Maybe when SecurStar provided the anonymity tool to their marketing agency, to help them protecting anonymity for the fake research, their provided them the anonymous browser notrax.So the marketing guy thinking about the nickname of this fake hackers used what? Notrax! :-)

    The “independent review”completely oriented in publicizing PhoneCrypt

    Of the various review don the phonecrypt review is only positive and amazing good feedback, while the other are only bad feedback and no single good point.

    As you can imagine, in any kind of independent product evaluation, for all products there are goods and bad points. No. In this one there are only product that are good and product that are bad.

    They missed to consider the security of the technology used by the products

    They completely avoided to speak about cryptography and security of the products.

    They do not evaluated basic security features that must be in that kind of products.That's in order not to let anyone see that they did not followed basic security rules in building up their PhoneCrypt.
    The technology is closed source, no transparency on algorithms and protocols, no peer review.Read my new comparison (from the basic cryptographic requirement point of view) About the voice encryption analysis (criteria, errors and different results) .
    The results are somehow different than their one .

    UPDATE: Who's Wilfried Hafner (SecurStar founder) ?

    I got a notice from a reader regarding Wilfred Hafner, SecurStar founder, CEO and security expert.

    He was arrested in 1997 for telephony related fraud (check 2nd article on Phrack) earning from telephony fraud 254.000 USD causing damages to local telcos trough blueboxing for 1.15 Million USD.

    He was not doing “Blueboxing” for the pleasure of phreaking and connecting with other hackers, but to earn money.

    Hacking for profit (and not for fun) in 1997… brrr…. No hacker's ethic at all!

    All in all, is that lawful?

    Badmouthing a competitor amounts to an unfair competition practice in most jurisdictions, so it is arguable (to say the least) that SecurStar is right on a legally sound ground here.
    Moreover, there are some specific statutes in certain jurisdictions which provide for a straightforward ban on the practice we are talking about. For example in the UK the British Institute of Practitioners in Advertising - in compliance with the Consumer protection from Unfair Trading regulation – ruled that:

    ”falsely claiming or creating the impression that the trader is not acting for the purposes relating to his trade, business, craft or profession, or falsely representing oneself as a consumer” is a criminal offense .

    We have no doubt that PRPR (which is the UK-based *PR company for SecurStar GmbH, led by Peter Rennison and Allie Andrews as stated in SecurStar Press Release ) did provide their client with this information. Heck, they *are* in the UK, they simply cannot ignore that!

    IANAL, but I would not be surpised if someone filed a criminal complaint or start civil litigation for unfair competition against SecurStar GmbH.
    Whether this is going to be a matter for criminal and/or civil Courts or not is not that important. However, it is clear enough that SecurStar GmbH appears to be at least ethically questionable and not really worth of trust.

    Nice try, gentlemen… however, next time just do it right (whether “right” for them means “in a honest manner” or “in a fashion not to be caught” I will let them choose)”

    :法比奥Pietrosanti(纳伊夫)

    共享

    Dishonest security: The SecurStart GmbH Phonecrypt case

    我想提供道德的概念,证券公司应当尊重用户,媒体和安全环境 ​​的考虑。

    联系Securstar公司做了非常糟糕的事情,infosecuriguard.com假的自主研发。

    It's unfair approach respect to hacking community.

    这是不公平的营销给最终用户。 他们不应该欺骗通过创建假独立审查。

    It's unfair competition in the security market.

    Let's make some more important consideration on this.

    Must be serious on cryptographic products. 他们不是玩具

    当你这样做的加密工具,你应该真的知道你在做什么,你一定要认认真真的。

    If you do bad crypto people could die.

    如果你不遵守基本的安全规则的透明度和安全性的加密,你是把人的生命处于危险之中。

    You are taking the responsibility of this. (我想在晚上睡觉,不要认为Securstar公司CEO / CTO护理的有关...)

    安全研究需要参考和透明度

    安全研究必须予以公示,做得很不错,总是受到公众的讨论和合作。
    安全研究不应仪器用于应该做营销purpose.Security研究的意识和成长的全球安全环境的知识。

    Hacking environment is neutral, should not be used instrumentally

    黑客被认为是中性的,书呆子,做什么,他们做他们的快乐和激情。

    如果你工作在安全市场,你的工作与黑客。

    如果您使用自己的营销目的的黑客和黑客的环境,你非常讨厌的东西。

    Hackers give you the technology and knowledge and you use them for your own commercial purpose.

    网上信息的权威思考

    这件事情,造成严重的代价的权威信息online.An匿名黑客,网上没有参考,做了一个看起来像是一个独立的产品安全审查。 我不得不说,假检讨是非常充分的准备,它总是以间接的方式带来了好/坏的东西。 它没有出现,我在第一时间像假的。 但是,深深,我发现这是怎么回事。

    然而,记者,新闻媒体和博客去的陷阱,他们的假研究检讨。 TheRegister, NetworkWorld and a lot of blogs reported it. 即使是完全匿名的。

    他们所做的一切,已经是非法在英国

    Securstar公司GmbH是幸运的,他们不是在英国,在那里做这种事情是违法的

    :法比奥Pietrosanti(纳伊夫)

    共享

    About the SecurStar GmbH Phonecrypt voice encryption analysis (criteria, errors and different results)

    This article want to clarify and better explain the finding at infosecurityguard.com regaring voice encryption product evaluation.
    This article want to tell you a different point of view other than infosecurityguard.com and explaining which are the rational with extensive explaination from security point of view.
    Today i read news saying: “PhoneCrypt: Basic Vulnerability Found in 12 out of 15 Voice Encryption Products and went to read the website infosecurityguard .

    Initially it appeared to my like a great research activity but then i started reading deeply the read about it.I found that it's not properly a security research but there is are concrete elements that's a marketing campaign well done in order to attract public media and publicize a product.
    Imho they was able to cheat journalists and users because the marketing campaign was absolutely well done not to be discovered on 1st read attempt. I personally considered it like a valid one on 1st ready (they cheated me initially!).

    But if you go deeply… you will understand that:
    - it's a camouflage marketing initiative arranged by SecurStar GmbH and not a independent security research
    - they consider a only security context where local device has been compromised (no software can be secured in that case, like saying SSL can be compromised if you have a trojan!)
    - they do not consider any basic security and cryptographic security criteria

    However a lot of important website reported it:

    This article is quite long, if you read it you will understand better what's going on around infosecurityguard.com research and research result.

    I want to to tell you why and how (imho) they are wrong.

    The research missed to consider Security, Cryptography and Transparency!

    Well, all this research sound much like being focused on the marketing goal to say that their PhoneCrypt product is the “super” product best of all the other ones.
    Any security expert that would have as duty the “software evaluation” in order to protect the confidentiality of phone calls will evaluate other different characteristics of the product and the technology.

    Yes, it's true that most of the product described by SecurStar in their anonymous marketing website called http://infosecurityguard.com have some weakness.
    But the relevant weakness are others and PhoneCrypt unfortunately, like most of the described products suffer from this.
    Let's review which characteristics are needed basic cryptography and security requirement (the best practice, the foundation and the basics!)

    a – Security Trough Obscurity does not work

    A basic rule in cryptography cames from 1883 by Auguste Kerckhoffs:

    In a well-designed cryptographic system, only the key needs to be secret; there should be no secrecy in the algorithm.
    Modern cryptographers have embraced this principle, calling anything else “security by obscurity.”
    Read what Bruce Schneir, recognized expert and cryptographer in the world say about this
    Any security expert will tell you that's true. Even a novice university student will tell you that's true. Simply because that's the only way to do cryptography.
    Almost all product described in the review by SecurStar GmbH, include PhoneCrypt, does not provide precise details about their cryptographic technologies.
    Precise details are:
    • Detailed specification of cryptographic algorithm (that's not just saying “we use AES “)
    • Detailed specification of cryptographic protocol (that's not just saying “we use Diffie Hellman ” )
    • Detailed specification of measuring the cryptographic strenght (that's not just saying “we have 10000000 bit key size “)

    Providing precise details means having extensive documentation with theoretical and practical implications documenting ANY single way of how the algorithm works, how the protocol works with precise specification to replicate it for interoperability testing.
    It means that scientific community should be able to play with the technology, audit it, hack it.
    If we don't know anything about the cryptographic system in details, how can we know which are the weakness and strength points?

    Mike Fratto, Site editor of Network Computing, made a great article on “Saying NO to proprietary cryptographic systems” .
    Cerias Purdue University tell this .

    b – NON peer reviewed and NON scientifically approved Cryptography does not work

    In any case and in any condition you do cryptography you need to be sure that someone else will check, review, analyze, distruct and reconstract from scratch your technology and provide those information free to the public for open discussion.
    That's exactly how AES was born and like US National Institute of Standard make crypto does (with public contest with public peer review where only the best evaluated win).
    A public discussion with a public contest where the a lot of review by most famous and expert cryptographer in the world, hackers (with their name,surname and face, not like Notrax) provide their contribution, tell what they thinks.
    That's called “peer review”.

    If a cryptographic technology has an extended and important peer review, distributed in the world coming from universities, private security companies, military institutions, hackers and all coming from different part of the world (from USA to Europe to Russia to South America to Middle east to China) and all of them agree that a specific technology it's secure…
    Well, in that case we can consider the technology secure because a lot of entities with good reputation and authority coming from a lot of different place in the world have publicly reviewed, analyzed and confirmed that a technology it's secure.

    How a private company can even think to invent on it's own a secure communication protocol when it's scientifically stated that it's not possible to do it in a “proprietary and closed way” ?
    IBM tell you that peer review it's required for cryptography .
    Bruce Schneier tell you that “Good cryptographers know that nothing substitutes for extensive peer review and years of analysis.”
    Philip Zimmermann will tell you to beware of Snake Oil where the story is: “Every software engineer fancies himself a cryptographer, which has led to the proliferation of really bad crypto software.”

    c – Closed source cryptography does not work

    As you know any kind of “serious” and with “good reputation” cryptographic technology is implemented in opensource.
    There are usually multiple implementation of the same cryptographic algorithm and cryptographic protocol to be able to review all the way it works and certify the interoperability.
    Supposing to use a standard with precise and extended details on “how it works”, that has been “peer reviewed” by the scientific community BUT that has been re-implemented from scratch by a not so smart programmer and the implementation it's plenty of bugs.

    Well, if the implementation is “opensource” this means that it can be reviewed, improved, tested, audited and the end user will certaintly have in it's own had a piece of technology “that works safely” .

    Google release opensource crypto toolkit
    Mozilla release opensource crypto toolkit
    Bruce Schneier tell you that Cryptography must be opensource .

    Another cryptographic point of view

    I don't want to convince anyone but just provide facts related to science, related to cryptography and security in order to reduce the effect of misinformation done by security companies whose only goes is to sell you something and not to do something that make the world a better.

    When you do secure products, if they are not done following the proper approach people could die.
    It's absolutely something irresponsible not to use best practice to do crypto stuff.

    To summarize let's review the infosecurityguard.com review from a security best pratice point of view.

    产品名称 Security Trough Obscurity Public peer review Open Source Compromise locally?
    Caspertec Obscurity No public review 关闭
    CellCrypt Obscurity
    No public review
    关闭
    Cryptophone Transparency Limited public review Public
    Gold-Lock Obscurity
    No public review
    关闭
    Illix Obscurity
    No public review
    关闭
    No1.BC Obscurity No public review
    关闭
    PhoneCrypt Obscurity
    No public review
    关闭
    Rode&Swarz Obscurity
    No public review
    关闭
    Secure-Voice Obscurity
    No public review
    关闭
    SecuSmart Obscurity
    No public review
    关闭
    SecVoice Obscurity
    No public review
    关闭
    SegureGSM Obscurity
    No public review
    关闭
    SnapCell Obscurity
    No public review
    关闭
    Tripleton Obscurity
    No public review
    关闭
    Zfone软件 Transparency Public review
    Open
    ZRTP Transparency Public review
    Open

    *Green means that it match basic requirement for a cryptographic secure system

    * Red / Broken means that it does not match basic requirement for a cryptographic secure system
    That's my analysis using a evaluation method based on cryptographic and security parameters not including the local compromise context that i consider useless.

    However, to be clear, those are only basic parameters to be used when considering a voice encryption product (just to avoid being in a situation that appears like i am promoting other products). So it may absolutely possible that a product with good crypto ( transparency, peer reviewed and opensource) is absolutely a not secure product because of whatever reason (badly written, not usable causing user not to use it and use cleartext calls, politically compromised, etc, etc).
    I think i will prepare a broader criteria for voice crypto technologies and voice crypto products, so it would be much easier and much practical to have a full transparent set of criterias to evaluate it.

    But those are really the basis of security to be matched for a good voice encryption system!
    Read some useful past slides on security protocols used in voice encryption systems (2nd part).

    Now read below some more practical doubt about their research.

    The security concept of the review is misleading: any hacked device can be always intercepted!

    I think that the guys completely missed the point: ANY KIND OF SOFTWARE RUNNING ON A COMPROMISED OPERATING SYSTEM CAN BE INTERCEPTED

    Now they are pointing out that also Zfone from Philip Zimmermann is broken (a pc software), just because they install a trojan on a PC like in a mobile phone?
    Any security software rely on the fact that the underlying operating system is somehow trusted and preserve the integrity of the environment where the software run.

    • If you have a disk encryption system but your PC if infected by a trojan, the computer is already compromised.
    • If you have a voice encryption system but your PC is infected by a trojan, the computer is already compromised.
    • If you have a voice encryption system but your mobile phone is infected by a trojan, the mobile phone is already compromised.

    No matter which software you are running, in such case the security of your operating environment is compromised and in one way or another way all the information integrity and confidentiality is compromised.

    Like i explained above how to intercept PhoneCrypt.

    The only things that can protect you from this threat is running in a closed operating system with Trust Computing capability, implementing it properly.
    For sure on any “Open” operating system such us Windows, Windows Mobile, Linux, iPhone or Android there's no chance to really protect a software.
    On difficult operating system such as Symbian OS or RimOS maybe the running software can be protected (at least partially)

    That's the reason for which the security concept that guys are leveraging to carry on their marketing campaign has no clue.
    It's just because they control the environment, they know Flexispy software and so they adjusted their software not to be interceptable when Flexispy is installed.
    If you develop a trojan with the other techniques i described above you will 100% intercept PhoneCrypt.

    On that subject also Dustin Tamme l, Security researcher of BreakPoint Systems , pointed on on VoIP Security Alliance mailing lists that the security analysis is based on wrong concepts .

    The PhoneCrypt can be intercepted: it's just that they don't wanted to tell you!

    PhoneCrypt can be intercepted with “on device spyware”.
    为什么呢?
    Because Windows Mobile is an unsecure operating environment and PhoneCrypt runs on Windows Mobile.
    Windows Mobile does not use Trusted Computing and so any software can do anything.
    The platform choice for a secure telephony system is important.
    怎么样?
    I quickly discussed with some knowledgeable windows mobile hackers about 2 different way to intercept PhoneCrypt with an on-device spyware (given the unsecure Windows Mobile Platform).

    a) Inject a malicious DLL into the software and intercept from within the Phonecrypt itself.
    In Windows Mobile any software can be subject to DLL code injection.
    What an attacker can do is to inject into the PhoneCrypt software (or any software running on the phone), hooking the Audio related functions acting as a “function proxy” between the PhoneCrypt and the real API to record/play audio.
    It's a matter of “hooking” only 2 functions, the one that record and the one that play audio.
    Read the official Microsoft documentation on how to do DLL injection on Windows Mobile processes. or forum discussing the technique of injecting DLL on windows mobile processes.
    That's simple, any programmer will tell you to do so.
    They simply decided that's better not to make any notice about this.
    b) Create a new audio driver that simply act as a proxy to the real one and intercept PhoneCrypt
    In Windows Mobile you can create new Audio Drivers and new Audio Filters.
    What an attacker can do is to load a new audio driver that does not do anything else than passing the real audio driver function TO/FROM the realone. In the meantime intercept everything recorded and everything played :-)
    Here there is an example on how to do Audio driver for Windows Mobile .
    Here a software that implement what i explain here for Windows “Virtual Audio Cable” .
    The very same concept apply to Windows Mobile. Check the book “Mobile Malware Attack and Defense” at that link explaining techniques to play with those techniques.
    They simply decided that's better not to make any notice to that way of intercepting phone call on PhoneCrypt .
    Those are just 2 quick ideas, more can be probably done.

    Sounds much like a marketing activity – Not a security research.

    I have to tell you. I analyzed the issue very carefully and on most aspects. All this things about the voice encryption analisys sounds to me like a marketing campaign of SecurStar GmbH to sell PhoneCrypt and gain reputation. A well articulated and well prepared campaign to attract the media saying, in an indirect way cheating the media, that PhoneCrypt is the only one secure. You see the press releases of SecurStar and of the “Security researcher Notrax telling that PhoneCrypt is the only secure product” . SecurStar PhoneCrypt is the only product the anonymous hacker “Notrax” consider secure of the “software solutions”.
    The only “software version” in competition with:

    SnapCell – No one can buy it. A security company that does not even had anymore a webpage. The company does not almost exist anymore.
    rohde-schawarz – A company that have in his list price and old outdated hardware secure phone . No one would buy it, it's not good for genera use.

    Does it sounds strange that only those other products are considered secure along with PhoneCrypt .

    Also… let's check the kind of multimedia content in the different reviews available of Gold-Lock, Cellcrypt and Phonecrypt in order to understand how much the marketing guys pressed to make the PhoneCrypt review the most attractive:

    应用 Screenshots of application Video with demonstration of interception Network demonstration
    PhoneCrypt 5 0 1
    CellCrypt 0 2 0
    GoldLock 1 2 0

    It's clear that PhoneCrypt is reviewed showing more features explicitly shown and major security features product description than the other.

    Too much difference between them, should we suspect it's a marketing tips?

    But again other strange things analyzing the way it was done…
    If it was “an impartial and neutral review” we should see good and bad things on all the products right?

    Ok, see the table below regarding the opinion indicated in each paragraph of the different reviews available of Gold-Lock, CellCrypt and Phonecrypt (are the only available) to see if are positive or negative.

    应用 Number of paragraphs Positive paragraphs Negative paragraphs Neutral paragraphs
    PhoneCrypt 9 9 0 0
    CellCrypt 12 0 10 2
    GoldLock 9 0 8 1

    Detailed paragraphs opinion analysis of Phonecrypt
    Paragraph of review Opinion expressed
    From their website Positive Marketing feedback
    Apple iPhone Positive Marketing feedback
    Disk Encryption or voice Encryption Positive Marketing feedback
    PBX Compatibility? Really Positive Marketing feedback
    Cracking <10. Not. Positive Marketing feedback
    Good thinking! Positive Marketing feedback
    A little network action Positive Marketing feedback
    UI Positive Marketing feedback
    Good Taste Positive Marketing feedback
    Detailed paragraphs opinion analysis of Gold-Lock 3G
    Paragraph of review Opinion expressed
    From their website Negative Marketing feedback
    Licensed by The israeli Ministry of Denfese Negative Marketing feedback
    Real Company or Part Time hobby Negative Marketing feedback
    16.000 bit authentication Negative Marketing feedback
    DH 256 Negative Marketing feedback
    Downad & Installation! Neutral Marketing feedback
    Cracking it <10 Negative Marketing feedback
    Marketing BS101 Negative Marketing feedback
    Cool video stuff Negative Marketing feedback
    Detailed paragraphs opinion analysis of CellCrypt
    Paragraph of review Opinion expressed
    From their website Neutral Marketing feedback
    A little background about cellcrypt Negative Marketing feedback
    Master of Marketing Negative Marketing feedback
    Secure Voice calling Negative Marketing feedback
    Who's buying their wares Negative Marketing feedback
    Downad & Installation! Neutral Marketing feedback
    My Demo environment Negative Marketing feedback
    Did they forget some code Negative Marketing feedback
    Cracking it <5 Negative Marketing feedback
    Room Monitoring w/ FlexiSpy Negative Marketing feedback
    Cellcrypt unique features.. Negative Marketing feedback
    Plain old interception Negative Marketing feedback
    The Haters out there Negative Marketing feedback

    Now it's clear that from their point of view on PhoneCrypt there is no single bad point while the other are always described in a negative way.
    No single good point. 奇怪吗?
    All those considerations along with the next ones really let me think that's very probably a marketing review and not an independent review.

    Other similar marketing attempt from SecurStar

    SecurStar GmbH is known to have used in past marketing activity leveraging this kind of “technical speculations”, abusing of partial information and fake unconfirmed hacking stuff to make marketing/media coverage.
    Imho a rare mix of unfairness in leveraging the difficult for people to really understand the complexity of security and cryptography.

    They already used in past Marketing activities like the one about creating a trojan for Windows Mobile and saying that their software is secure from the trojan that they wrote.
    Read about their marketing tricks of 2007

    They developed a Trojan (RexSpy) for Windows Mobile, made a demonstration capability of the trojan and later on told that they included “Anti-Trojan” capability to their PhoneCrypt software.They never released informations on that trojan, not even proved that it exists.

    The researcher Collin Mulliner told at that time that it sounds like a marketing tips (also because he was not able to get from SecurStar CEO Hafner any information about that trojan):

    “This makes you wonder if this is just a marketing thing.”

    Now, let's try to make some logical reassignment.
    It's part of the way they do marketing, an very unfriendly and unpolite approach with customers, journalist and users trying to provide wrong security concepts for a market advantage. Being sure that who read don't have all the skills to do in depth security evaluation and find the truth behind their marketing trips.

    Who is the hacker notrax?

    It sounds like a camouflage of a fake identity required to have an “independent hacker” that make an “independent review” that is more strong on reputation building.
    Read about his bio:

    ¾ Human, ¼ Android (Well that would be cool at least.) I am just an enthusiast of pretty much anything that talks binary and if it has a RS232 port even better. During the day I masquerade as an engineer working on some pretty cool projects at times, but mostly I do the fun stuff at night. I have been thinking of starting an official blog for about 4.5 years to share some of the things I come across, can't figure out, or just cross my mind. Due to my day job and my nighttime meddling, I will update this when I can. I hope some find it useful, if you don't, well you don't.

    There are no information about this guy on google.
    Almost any hacker that get public have articles online, post in mailing archive and/or forum or some result of their activity.
    For notrax, nothing is available.

    Additionally let's look at the domain…
    The domain infosecurityguard.com is privacy protected by domainsbyproxy to prevent understanding who is the owner.
    The domain has been created 2 months ago on 01-Dec-09 on godaddy.com registrar.

    What's also very interesting to notice that this “unknown hacker with no trace on google about him that appeared on December 2009 on the net” is referred on SecurStar GmbH Press Release as a “An IT security expert”.

    Maybe they “know personally” who's this anonymous notrax? :)

    Am i following my own conspiracy thinking or maybe there's some reasonable doubt that everything was arrange in that funny way just for a marketing activity?

    Social consideration

    If you are a security company you job have also a social aspects, you should also work to make the world a better place (sure to make business but “not being evil”). You cannot cheat the skills of the end users in evaluating security making fake misleading information.

    You should do awareness on end users, to make them more conscious of security issues, giving them the tools to understand and decide themselves.

    Hope you had fun reading this article and you made your own consideration about this.

    :法比奥Pietrosanti(纳伊夫)

    ps Those are my personal professional opinion, let's speak about technology and security, not marketing.
    pps i am not that smart in web writing, so sorry for how the text is formatted and how the flow of the article is unstructured!

    共享