RFC 6189:ZRTP是最後一個標準!

最後ZRTP已分配的正式RFC分配, RFC6189 ZRTP:單播安全RTP媒體路徑的關鍵協議。

它有一個依賴的SRTP有256位的,現在已被定義為AES密鑰大小RFC6188

這是令人興奮地看到了RFC終於發布了,因為它的設置ZRTP為終端到終端加密的官方標準像的一個重要里程碑PGP已經為電子郵件。

現在在世界上的任何組織將正式能夠實現ZRTP為端 - 端協議語音加密

目前ZRTP協議的3個不同的公共實現存在:

他們每個人提供的協議的不同的功能,但最重要的是已知的可互操作的。

一個新的浪潮即將話音加密的世界,irrupting成一個灰色地帶,其中大部分企業在做手機的加密系統已經實現自定義加密。

現在標準已經建立,並有幾個原因留下來實施不同的東西。

HURRA 先生 齊默爾曼和公司(如各社區PrivateWave )和個人(如維爾納Dittmann )就可以奏效!

今天,它是一個偉大的日子,這樣的一種技術,現在官方還與多個現有的實現!

菲利普,你又做到了,我向你純粹的精神和決心:-)

對於GSM弗賴堡大學開裂進展

移動協議(GSM,GSM-R,TETRA,UMTS等)黑客令人興奮的世界,從大學得到官方的研究活動。

這項投資使開源代碼發布破解軟件是給機會學生大學進行這項工作,改進和做強的研究。

弗賴堡大學剛剛發布的文件實戰演練在GSM加密A5 / 1連同gsmframencoder支持工具,以提高嗅探,解碼和裂解過程。

開放的硬件,軟件的開放,開放的協議顯示出任何類型的專有方法或工藝打造,溝通和安全技術的弱點。

這應該是任何科學家的目標是嘗試打開行動和打擊任何形式的專有和封閉的技術與可互操作和開放的態度,同時設計電信協議迫使行業那張唯一的。

我的TOR出口節點的經驗試圖過濾掉嘈雜的交通

今年年初,我決定,是時候來跑,所以我帶來了一個VPS在TOR出口節點hetzner.de (因為它們被列為一個良好的TOR ISP ),並設置出口節點與綽號privacyresearch.infosecurity.ch了100Mbps的/ s傳輸的月度數據,然後10兆比特/秒單位的首款1TB。

它也運行TOR2WEB軟件http://tor.infosecurity.ch

我設置了退出政策的建議通過運行出口節點以最小的騷擾 ,並準備了一個濫用響應模板

在第一天我一直在運行我立刻收到的DMCA投訴,由於點對點的交通節點。

所以我決定來過濾出一些P2P流量使用OpenDPI的iptables模塊和DMCA抱怨自動消失:

的iptables -A OUTPUT -m opendpi -edonkey -gadugadu -fasttrack -gnutella -directconnect -bittorrent -winmx -soulseek -j REJECT

然後,因為我是意大利人,我決定避免我的TOR節點連接到意大利互聯網地址空間,以減少機會,一個愚蠢的檢察官會叫我起床,在早晨,因為不明白,我運行TOR節點。

我試過了,用的幫助hellais是寫了一個腳本來使退出策略拒絕聲明 ,拒絕根據意大利所有netblocks IO錯誤的 blockfinder ,但我們發現的torrc配置與千行的文件做了TOR崩潰。

我們去開一張票,匯報一下我們試圖通過國家阻止TOR退出政策的崩潰,並發現了類似的嘗試 ,我們作出了貢獻,但它似乎仍然是一個開放式的問題。

得出的結論是,這是不可能使一個國家退出政策TOR出口節點在一個乾淨和禮貌的方式,所以我決定用走的路臟的iptables / GeoIP的 戰鬥,使其正確編譯後,這是一條線的iptables堵塞交通前往意大利:

的iptables -A OUTPUT -p根據tcp -m狀態-state NEW -m geoip的-dst-CC IT -j REJECT

現在從我的退出節點意大利沒有網絡連接將被完成,我是安全的,不會有可能愚蠢的檢察官不理解TOR(我有一個例外,之前應用的所有TOR節點的IP地址)。

經過一些日子裡,我開始收到投訴,由於端口掃描活動起源於我的器節點。

從我自己的觀點,我想支持匿名的網絡,而不是匿名的黑客攻擊企圖,所以我想篩選出端口掃描和攻擊來自源於我node.That是一個複雜的問題,需要一些研究,所以在此期間,我安裝scanlogd嗤之以鼻 ,因為我要評價多少攻擊,這種攻擊都從我的TOR出口節點失控。
以後我會盡量安排一些類型的篩選,以確保能夠篩選出主要的攻擊。
對於什麼樣的相關端口掃描,似乎沒有公共的工具來檢測和篩選傳出端口掃描 ,但只能過濾進入的端口掃描這樣可能會需要寫一些東西特設。
我會將事情的進展,如果會有一些很好的方式,以光波的方式實行的snort-直列選擇性地過濾出的主要攻擊企圖從我的退出節點發起。

我的目標是保持長期(每幾個月捐贈給TOR至少1TB的流量)運行出口節點,減少與ISP的努力抱怨,並試圖盡我所能運行的出口節點與合理的賠償責任。

TETRA黑客來了:OsmocomTETRA

這是非常令人興奮地看到釋放OsmocomTETRA ,第一個開源的SDR( 軟件定義無線電 )實現TETRA解調器,PHY和MAC較低層。

它的TETRA版本的GSM airprobe該解鎖訪問數據和TETRA通信協議的幀,從而得到大的黑客機會!

現在還TETRA技術已被打開,我們應該想到,在這個2011年,看到開源TETRA嗅探器,最可能還TEA加密(利加密算法)破解!

TETRA是使用警察,應急服務和軍隊的,可以工作,即使沒有網絡覆蓋(僅移動到移動沒有基站),並提供了一些特殊的高可用性服務的可用性替代移動通信網絡。

我在幻燈片寫了TETRA 語音的主要安全協議審查

在OsmocomBB郵件列表有一些TETRA網絡狀態已經討論:

  • 比利時警方阿斯特麗德TETRA網絡:加密
  • 德國警方測試TETRA網絡中的亞琛:未加密
  • 一些前jugoslawia TETRA網絡:加密
  • 荷蘭C200 TETRA網絡:TEA2加密的靜態密鑰
  • 英國Airwave的TETRA網絡:TEA2加密TEA2

這將是真的很有趣地看到,新的警察和救援服務的黑客來從舊的模擬歲回新的數字收音機:-)

政府2.0,開放數據和維基解密

維基解密背後,OpenLeaks,GlobalLeaks,BalkanLeaks的概念不僅僅是揭示的秘密,公眾等等。

這是一個革命,是未來政府的組織,透明度與合作所謂的“網絡2.0 /維基”協作系統的一部分。

看看那些政府2.0 -簡介丹尼爾·伯格共同創辦的由安科Domscheit伯格,創新政府服務項目清單微軟德國與妻子維基解密和創始人,現在OpenLeaks

看看開放數據2.0政府主動加強政府透明度,減少腐敗,提高政府機構的績效。

那場革命,它只是比一群希望通過傳播秘密製造混亂anarco,自由主義的時髦人越多,它的​​倉促僅僅是開始通過利用完全的透明度和公民強強合作,以實現政府的新組織模式。

ZORG,新的C ++和Java ZRTP實現公開發行

大家好,今天在PrivateWave意大利SpA公司,意大利公司, 致力於開發技術,以語音通信在那裡我是CTO的隱私保護和信息安全,我們 發布ZORG,一個新的開源ZRTP協議的實現可以從下載HTTP:// WWW。 zrtp.org

ZRTP [1]提供了橢圓曲線Diffie-海爾曼384bit和AES-256加密的SRTP端至端密鑰交換。

ZORG已獨自開發,並在PrivateWave的PrivateGSM語音加密產品可用於下列平台上實現:黑莓,諾基亞和iOS(iPhone)。

Zorg C ++已經集成了PJSIP開源VoIP的SDK [2],它提供的是對PJSIP 1.8.5集成補丁。 它已經過測試的iPhone,塞班,Windows,Linux和Mac OS X的

Zorg Java已經被集成在MJSIP [3]開源SDK對黑莓平台的定制版本,它包括需要降低在最低限度垃圾回收活動內存使用的優化。

這兩個平台已經分離和模塊化加密後端,使得密碼算法的實現可以容易地互換使用其它的。

. ZORG下GNU AGPL授權,源代碼可以在GitHub上的 https://github.com/privatewave/ZORG

我們正在釋放它 ​​在開放源代碼,並與我們的安全解決方案的連貫性[4],因為我們真的希望它可以是有用的開源生態系統,以支持言論自由的創建新的語音加密系統。

超過20 PJSIP為基礎的開放源碼的VoIP加密軟件和一些Java編寫能夠直接受益於ZORG釋放。

我們很樂意接受的合作,新的整合,新的加密後端,臭蟲偵察和任何改善有益的建議,並讓ZRTP肯定,語音加密標準。

Zorg可從http://www.zrtp.org

[1] ZRTP: http://en.wikipedia.org/wiki/ZRTP
[2] PJSIP: http://www.pjsip.org
[3] MJSIP: http://www.mjsip.org
[4]安全的方法: http://www.privatewave.com/security/approch.html

加密移動座機電話與Asterisk 1.8

我們剛剛發布了一個技術HOWTO 如何建立擔保移動到固定電話的VoIP基礎設施有:

在接下來的幾個星期別人HOWTO像這樣的人會站出來用其他服務器平台,如FreeSWITCH的,都在透明度和對開源安全技術的槓桿作用的精神。

調節加密的八個史詩失敗

一個很有啟發的文章對規範加密的八大史詩失敗和普遍的誤解政府監管部門不具有對技術如何工作的一個視野開闊。

無知的政府監管不明白,嚴格的監管將有以下缺點:

  1. 這將創建安全隱患
  2. 它不會阻止壞人
  3. 它會損害創新
  4. 這將損害美國的商業
  5. 它會花費消費者
  6. 這將是違憲
  7. 這將是稅收美元的巨額支出

PrivateGSM:與ZRTP或SRTP / SDES黑莓/ iPhone /諾基亞移動語音加密

我絕對避免用我自己的個人博客做推廣任何一種產品的。

這一次,它是沒有什麼不同,但我想告訴你的產品,我的工作沒有花哨的營銷,而是留技術事實。

今天,在PrivateWave我在哪裡首席技術官和共同創始人 ,我們公開發布的移動VoIP加密產品為黑莓,iPhone和諾基亞:

  • 第一次過黑莓加密的VoIP與ZRTP - PrivateGSM的VoIP專業
  • 第一次過iPhone的VoIP加密與ZRTP - PrivateGSM的VoIP專業
  • 第一次過黑莓加密的VoIP客戶端與SRTP超過SIP / TLS SDES密鑰交換 - PrivateGSM的VoIP企業

徽標privatewave-colore.png

在PrivateWave我們用不同的方法對於大多數語音加密的公司在那裡,閱讀我們的安全解決方案

在這個產品在技術和產業關聯性景觀可概括如下:

  • 這是只使用標準安全協議的第一個語音加密公司(我們預計市場會對此作出反應,因為它清楚地表明專利技術,從懲教署的遺產來無法提供相同的值)
  • 它在語音加密的第一種方法只使用開源和標準的加密引擎
  • 它是在第一個話音加密方法使用不同技術(端-端為提供不同的安全模型ZRTP終端到現場SRTP

這些套件的移動安全客戶端,專為專業的安全使用只用最好的通信和安全技術,提供保護程度高以及良好的性能也較差的網絡條件:

該應用程序包括:

ICONA-pgsm.png

支持的移動設備有:

對於ZRTP我們決定強調,伸展所有的安全,並與一些少量的添加協議的偏執特點:

我們嚴格的通訊錄整合,超越了ZRTP RFC 規範對因為不是用戶行為的移動電話用一下手機屏幕時,可能會受到一定的攻擊。

我們paranoy使用ZRTP減輕這種情況的方式,我們會寫這個以後和/或將增加具體細節,RFC包容。

PrivateGSM專業一些單詞,終端到終端加密與ZRTP

閱讀技術資料有!

下載請點擊這裡,只是把你的電話號碼

這些是我的一切非常熟練的工作人員辛勤工作的結果(16人在這6個項目,3個不同的平台上工作)的具有挑戰性的技術(語音加密),在艱難的經營環境(骯髒的移動網絡和骯髒的移動操作系統)的詳細超過2年。

我很自豪我們的工作人員!

下一步是什麼?

在接下來的幾個星期,你會看到釋放單證,如用星號,FreeSWITCH的和其他安全啟用的PBX,以及一些令人興奮的其他安全技術的消息,我肯定會被注意到的整合主要集;)

這一直是一個艱苦的工作,更已做,但我相信,安全性和開源社區會喜歡這樣的產品,我們的透明的做法也與開放的重要版本和開源的集成,使一個非常政治中立的(後門免費)技術。

幾個漂亮的VPN供應商

這裡有很多原因,人們會需要訪問互聯網低谷VPN網絡。

例如,如果你生活在一個國家阻止某些內容(如反當地政府的網站,色情等)和/或協議(如Skype,網絡電話),你可能會想使用移動你的互聯網連接討厭的阻塞國外加密的VPN隧道。

我評估了幾種託管的VPN服務器和他們夫婦的聲音此類服務的廣泛的產品中相當不錯的:

SwissVPN

出口到瑞士的互聯網。

成本6 CHF /月

可選的公共固定的IP地址

有用的,如果你需要:

  • 剛剛繞過具有良好的高帶寬當地國家的過濾器
  • 揭露公共服務槽的VPN,可選的固定的公網IP地址。

表演過火

退出到Internet之間的20個不同國家(每次連接時)進行選擇。

有用的,如果你需要做的:

  • 對競爭對手的商業智能(出現在X國連他們什麼時候到來)
  • 看到的只是從國家知識產權web空間允許的電影/電視片
  • 看到不同國家之間的谷歌搜索結果

不是每個橢圓曲線是一樣的:線槽ECC的安全性

 我自己的曲線ECC的安全性和選擇分析

vn9jna1BdgrzDCYNBJHi09q09q.jpg

最現代的加密使用橢圓曲線加密(ECC)的是,以較小的關鍵尺寸和減少的計算能力,得到被稱為DH(的Diffie-Hellman)或RSA(Rivest,Shamir和Adleman的 )傳統的加密系統的等效的安全強度。

不是每個人都知道,ECC加密被選擇為將來的加密應用程序,而且即使TLS / SSL(用於固定網絡加密)正在向ECC。

我發現很多被遺棄而RSA和DH所謂的“專有加密產品”為雲帶ECC的替代品,這往往會隨心所欲地使用ECC位的密鑰大小,甚至沒有指明哪一種ECC的加密習慣。

但是有一個很大圍繞橢圓曲線混亂,有很多不同的名稱和密鑰大小作出困難的非加密經驗的用戶進行評估時,一些加密的東西,使自己的身影。

因為有擴散的困惑,我決定把我自己的分析,找出哪些是最好的ECC加密的曲線,右ECC密鑰長度使用。

這種分析要提供各種曲線和密鑰大小之間安全產業基礎的選擇,留下的數學和密碼分析的考慮已經已經年期間完成的,總結了幾種標準和安全協議作出的各種選擇。

首先得出的結論。

從我的分析只在後面的ECC曲線將被認為是對在加密系統中使用,因為是唯一的一個不同的機構(ANSI,美國國家安全局,凹陷,NIST ECC BrainPool),不同的安全協議標準中選擇性(IPSec,OpenPGP的,ZRTP,的Kerberos,SSL / TLS),也是唯一一個匹配的NSA Suite B加密的安全要求(事實標準也為北約的軍事環境下):

  • 橢圓曲線總理256位- P-256
  • 橢圓曲線總理384位- P-384

可選的,只為真正的偏執希望得到更多的密鑰大小位,仍然不考慮有用:

  • 橢圓曲線總理521位- P-521

我想指出,Koblitz曲線應避免任何密鑰大小(283分之163/五百七十一分之四百零九)的,因為他們沒有足夠的保修密碼分析活動,切實它們分別是:

  • 不屬於國家安全局套件-B加密的選擇
  • 不屬於的ECC Brainpool選擇
  • 不屬於的ANSI X9.62的選擇
  • 不是一部分的OpenPGP ECC擴展選擇
  • 不屬於Kerberos擴展的ECC曲線選擇

我請讀者跟隨槽我的分析理解,可即使沒有深厚的技術背景,但至少是一個良好的技術背景密碼學的一些基本的一點理解的基礎。

 在這裡,我們一起去分析
 

我的目標是讓什麼/怎麼公開的科學和安全領域選擇ECC加密系統使用由IETF RFC(那些誰在一個開放的,同行評議的方法來定義互聯網的標準)定義的安全協議和標準進行分析。

下面一組RFC引入ECC到現有的系統中得到了分析,以了解什麼是更好地使用,什麼是更好的排除:

  • RFC5639 :ECC Brainpool標準曲線與曲線生成
  • RFC4869 :NSA Suite B加密套房為IPsec
  • RFC5430 :NSA Suite B加密的檔案傳輸層安全性(TLS)
  • RFC5008 :NSA Suite B加密在安全/多用途Internet郵件擴展(S / MIME)
  • RFC3766 :確定優勢公鑰用於交換對稱密鑰
  • RFC5349 :公共密鑰加密的初始身份驗證Kerberos中(PKINIT)橢圓曲線加密(ECC)技術支持
  • RFC4492 :橢圓曲線加密(ECC)密碼套件的傳輸層安全性(TLS)
  • ZRTP語音加密由菲利普·齊 ​​默爾曼ECC曲線
  • ECC中的OpenPGP(草案D 筏jivsov-OpenPGP的-ECC-06
  • 微軟為選中曲線ECC 智能卡Kerberos登錄

我們將使用由科學家定義的Internet安全協議,使我們的評估的一部分作出的選擇。
此外,必須理解的是,該曲線的選擇來自於製作他們自己選擇的曲線,以便告訴該行業使用什麼和跳過什麼不同當局

我們將使用由科學家定義的安全要求作出的選擇在標準化機構,以使我們的評估的一部分。
此外,一些大多數人不知道,但它是非常相關的,以我們的分析,是有不同類型的ECC曲線密碼算法和他們的“尺寸”,它是根據一種曲線的不同:

  • ECC曲線在首相場(通常稱為橢圓曲線和代表的P-密鑰大小
  • ECC曲線在二進制字段(通常稱為Koblitz曲線和代表的K-密鑰大小

給定一個安全強度等價的橢圓曲線和Kobliz曲線有不同的密鑰長度,例如當我們讀ECC 571我們指的是Koblitz曲線與同等實力ECC 521總理曲線。

一個橢圓曲線和Kotbliz曲線之間的實力對比報告如下(從米奇ECC互聯網草案 ):

 | Koblitz | ECC | DH / DSA / RSA
 | 163 | 192 | 1024
 | 283 | 256 | 3072
 | 409 | 384 | 7680
 | 571 | 521​​ | 15360

下面有所有不同的實體和它們各自的名稱(從所有選定曲線的比較IETF RFC4492的ECC使用的TLS ):

由不同的標準組織所選擇的曲線名稱
 ------------ + ------ + -------------
 SECG | ANSI X9.62 | NIST
 ------------ + ------ + -------------
 sect163k1 | | NIST K-163
 sect163r1 | |
 sect163r2 | | NIST B-163
 sect193r1 | |
 sect193r2 | |
 sect233k1 | | NIST K-233
 sect233r1 | | NIST B-233
 sect239k1 | |
 sect283k1 | | NIST K-283
 sect283r1 | | NIST B-283
 sect409k1 | | NIST K-409
 sect409r1 | | NIST B-409
 sect571k1 | | NIST K-571
 sect571r1 | | NIST B-571
 secp160k1 | |
 secp160r1 | |
 secp160r2 | |
 secp192k1 | |
 secp192r1 | prime192v1 | NIST P-192
 secp224k1 | |
 secp224r1 ​​| | NIST P-224
 secp256k1 | |
 secp256r1 | prime256v1 | NIST P-256
 secp384r1 | | NIST P-384
 secp521r1 | | NIST P-521
 ------------ + ------ + -------------

什麼立刻出現的是,只有兩個被所有機構選定的曲線,並且有一個一般的反傾銷koblitz曲線由ANSI.The只有共同商定的3當局之間的有以下兩個ECC曲線:

  • secp192r1 / prime192v1 / NIST P-192
  • secp256r1 / prime256v1 / NIST P-256

那些選擇ECC曲線TLS的RFC5430跳過完全koblitz曲線,選擇僅使用:

  • P-256,P-384,P-521

ECC Brainpool跳過完全Koblitz曲線,選擇使用下面的ECC曲線:

  • P-160,P-192,P-224,P-256,P-320,P-384,P-512( 這是唯一的特別,因為它不是P-521,但P-512,唯一的關鍵尺寸的轉介ECC brainpool。TNX伊恩·西蒙斯從雅典娜SCS

對於ECC的使用PGP D中的OpenPGP的互聯網草案筏jivsov-OpenPGP的-ECC-06跳過完全Koblitz曲線,選擇下面的ECC曲線

  • P-256,P-384,P-521

Kerberos協議擴展ECC的使用,定義RFC5349和由微軟定義的智能卡登錄跳過完全Koblitz曲線,選擇了以下ECC曲線:

  • P-256,P-384,P-521

所以,聲音清晰,正確選擇的ECC是用於P-256,P-384和P-521,而Koblitz曲線已被跳過絕密使用和任何安全敏感協議(IPSec的OpenPGP的,ZRTP,Kerberos的,SSL / TLS)。

為什麼我做了這個分析?

我已經這樣做了分析,以下的討論我不得不對某些語音加密產品,都基於定制和專用協議,即都採用橢圓曲線Diffie-Hellman 571位/ ECDH571分之571位ECDH / Koblitz 571位。
所有的人都用K-571的,如前文所述,已經從所有安全敏感的環境和協議刪除,是自己的語音加密的東西一個設計師,我認為他們的加密的選擇絕對不是最好的安全選擇。
也許有人只是為了營銷目的而進行的,因為K-571(Koblitz曲線)似乎比P-521(基於素數的橢圓曲線)更強。 如果你有“更多一點”的營銷人員可以算得上是“更安全”。 Koblitz elliptic curve are faster than the top secret enabled prime elliptic curve and so give the product manager a chance to provide “more bit” in it's own product while keeping the key exchange fast.

It's a matter of philosophical choice.

I prefer to follow the trend of scientific community with the humility of not to considering myself a cryptographic expert, knowledgable more than the overall security and scientific community itself.

I prefer instead to use only algorithms that are approved for use in highly sensitive environments (top secret classification), that have been selected by all the authorities and working group analyzing encryption algorithms existing out-there and that represent the choice of almost all standard security protocols (IPSec, OpenPGP, ZRTP, Kerberos, SSL/TLS, etc).
I prefer to count the amount of brains working on the crypto i use, that check that's really secure, that evaluate whether there's some weakness.

The number of brais working on Crypto widely diffused are of order of magnitude more than the number of brains working on crypto used by just few people (like Koblitz curve).
So i am not demonizing who use ECDH 571 using Koblitz Curve, but for sure i can affirm that they did not taken the best choice in terms of security and that any security professionals doing a security benchmarking would consider the fact that Elliptic Curve Diffie Hellman 571 bit done with Koblitz Curve is not widely diffused, it's dumped from standard security protocols and it's not certified for top secret use.

ESSOR, European Secure Software Defined Radio (SDR)

I had a look at European Defense Agency website and found the ESSOR project, a working project funded for 106mln EUR to develop strategic defense communication products based on new Software Defined Radio approach.

SDR approach is a revolutionary system that's completely changing the way scientist and industry is approach any kind of wireless technology.

Basically instead of burning hardware chip that implement most of the radio frequency protocols and techniques, they are pushed in “software” to specialized radio hardware that can work on a lot of different frequency, acting as radio interface for a lot of different radio protocols.

For example the USRP (Universal Software Radio Peripheral) from Ettus Research that cost 1000-2000USD fully loaded, trough the opensource GnuRadio framework, have seen opensource implementation of:

And a lot more protocols and transmission technologies.

That kind of new approach to Radio Transmission System is destinated to change the way radio system are implemented, giving new capability such as to upgrade the “radio protocol itself” in software in order to provide “radio protocol” improvements.

In the short terms we have also seen very strong security research using SDR technologies such as the GSM cracking and the Bluetooth Sniffing .

We can expect that other technologies, weak by design but protected by the restriction to hardware devices to hack the low level protocols, will be soon get hacked. In the first list i would really like to see the hacking of TETRA, a technology born with closed mindset and secret encryption algorithms, something i really dislike ;-)

Product management and organization

I had to better understand the concepts, roles and duties related to Product management and Product marketing management in software companies, why are needed, which are the differences and how they fit inside an organization structure.

Most person i know never interested into this specific area of work, but when you want to be a product company (and not a consulting or solution company), you start having different products on different platforms for different target customers sold trough different channels with different pricing with a installation/different delivery process and that complexity must be managed in the proper way.

You realize that in order to let the product company grow in the right direction you need to organize product management activities formally, not closing your mind in rigid organization roles such as Marketing, Sales, R&D.

When we speak about Product Management i recommend the reading of the illuminating The strategic role of Product Management (How a market-driven focus leads companies to build products people want to buy) that clarify a lot of things, even if it outlook net separation of roles in product management, something t hat’s too heavy for a small company like a startup .

Still it provide a differentiation of duties between Product Management and Product Marketing .

A good understanding of the product management related to startup i s given in the article Creating Product Management at Startup showing up different case related to the roles of the product visionary into the company.

It introduce the terms ceo of the product in the sense that the product management duties jump around into the various organization function by providing focus and effort where it's needed, independently from the fact that the internal function requiring more effort is Development, Marketing, Sales or Communication. That's means practically enhancing the product vision as it's needed across all major product-related functions making the vision corporate-wide coherent.

A good representation of product management and product marketing activities is well described with the differentiation of between Strategical, Technical and Marketing sector and is not clearly separated between Management, Marketing(and Sales) and R&D :

Triad.jpg

I read that product manager background and knowledge are different depending on the company focus ( where does product management belong in the organization? ):

  • B2C -> Marketing experience
  • B2B -> Technical experience

An illuminating (for me) and very important differentiation regarding product management duties is the differentiation between:

  • Product Management
  • Product Marketing

The specific duties belonging to Product Marketing vs Management are greatly explained in Role Definitions For Product Management and Product Marketing that i suggest to read, letting you to better define tasks and responsibilities across your organization. It also provide a good definition of job requirements if you need to look for that figure!

At the same time it's important to understand what's NOT product management, effectively Product management is not just feature prioritization .

At the same time it's important to understand which professional figure is NOT itself a product manager:

  • Product manager is not a marketing manager – while product management is usually seen as a marketing discipline, marketers are focused on the marketing plan and are usually not driving the overall product direction. In that context could however be found Product marketing manager that's the arms of the marketing of the product, especially in small organization.
  • Product manager is not a sales manager – sales manager are about finding out how to sell a product, following which sales methodology, technique and channels and they could drive the company from a market oriented company ( product) to a customer oriented company (solution and consulting)
  • Product manager is not a developer – Developers are focused on the technology and not the overall product. Some great product managers are former developers, but it is difficult to do both at once. There is a natural tension between developers and product managers that should be maintained to create a balanced product.
  • Product manager is not a software manager – the software manager is a functional manager and usually not focused on the product or the customers.
  • Product manager is not a project manager – project managers are about how and when, while the product manager is about what. Project managers work closely with product managers to ensure successful completion of different phases in the product life cycle.

The typical product management activities could be in extreme synthesis summarized as follow:

  • Strategy: Planning a product strategy
  • Technical: leading product developments
  • Marketing: providing product and technical content
  • Sales: provide pre sales support and work effectively with sales

Product management so it's not precisely development, is not precisely marketing, it's not precisely sales, so typically it's difficult to identify “where it should stay” inside the organization structure (it's even difficult to understand that's needed)?

The Silicon Valley Product Group provide a nice insight on Product Organization Structure by pointing out which are the advantages and risks of several choices. Still the Cranky Product Manager say that It doesn't matter where the product manager live in the organization .

It's relevant to be careful not to have persons that are too much technical or too much sales oriented in order to fill the gap among different organization. Too much fragmentation of assigned duties across the organization may lead to bureaucracy, too much duties on one person may lead to ineffective implementation of needed tasks in some area and to a internal competition perception respect to the traditional roles.

Check there a very nice Resume of a professional with practical experience in product management (it's an half techie/half marketing guys).

啊! Another very common misunderstanding is to confuse marketing with communication where ai found a so good definition of Marketing that i really like and understand for strict relationship with Product Management:

Marketing is know the market so well that the product sell itself

But what happen when you don't handle a product management and product marketing management process in a defined way?

A nice story is shown as example in The strategic role of Product Management :

Your founder, a brilliant technician, started the company years ago when he quit his day job to market his idea full time. He created a product that he just knew other people needed. And he was right. Pretty soon he delivered enough of the product and hired his best friend from college as VP of Sales. And the company grew. But before long, the VP of Sales complained, “We're an engineering-led company. We need to become customer-driven.” And that sounded fine. Except… every new contract seemed to require custom work. You signed a dozen clients in a dozen market segments and the latest customer's voice always dominated the product plans. You concluded that “customer-driven” meant “driven by the latest customer” and that couldn't be right.

If you want to be a product company it's relevant to precisely follow a strategy driven by product marketing and management and not by sales.

Confusion between duties of product management/marketing and sales could lead to unsuccessful product company that are not able to proceed within their strategy, simply because they getting opportunities that drive the business out-of-scope.

A product company must invest in it's own product development and marketing in order to let sales activity stay focused and guarantee that the organization is every day more effective on the market.

After this reading, my understanding is that it's relevant to identify how to create a set of flexible business process on how to handle various product management and product marketing duties separating them from sales.

Remotely intercepting snom VoIP phones

I suggest reading remotely tapping VoIp phones ” on VoIP Security Alliance Blog by Shawn Merdinger .

A concrete example on how current telephony infrastructure are getting more vulnerable to cyber attacks.

Voice communication security workshop

嗨,

i made a talk about voice communication security technologies at University of Trento following an interesting information exchange with Crypto Lab managed Professor Massimiliano Sala .

I suggest interested people to read it, especially the second part, as there is an innovative categorization of the various voice encryption technologies that get used in several sectors.

I tried to explain and get out from this widely fragmented technological sector by providing a wide overview on technologies that usually are absolutely unrelated one-each-other but practically they all apply to voice encryption following that categorization:

  • Mobile TLC Industry voice encryption standards
  • Government and Military voice encryption standards
  • Public safety voice encryption standards
  • IETF voice encryption standards
  • Misc proprietary voice encryption technologies

It's a huge slideware, 122 slides, i suggest to go reading the 2nd part skipping interception technologies overview already covered by my presentation of 2009.

Voice communication security


View more presentations from Fabio Pietrosanti .

Especially i like the concept of Chocolate grade encryption that want to provide some innovation on the Snake Oil Encryption concept.

But i need to get more in depth about the Chocolate grade encryption context, will probably do before end-of-year by providing an applied course on understanding and evaluating practically the real security context of various voice encryption technologies.

27C3 – CCC Congress CFP: We come in peace

We come in peace

189322778_8cb9af1365_m.jpg

We come in peace, said the conquerers of the New World.

We come in peace, says the government, when it comes to colonise, regulate, and militarise the new digital world.

We come in peace, say the nation-state sized companies that have set out to monetise the net and chain the users to their shiny new devices.

We come in peace, we say as hackers, geeks and nerds, when we set out towards the real world and try to change it, because it has intruded into our natural habitat, the cyberspace…

Call for paper for participation to 27C3 CCC congress is open, and i never saw a so exciting payoff :-)

See you on 30 December 2010 in Berlin!

GSM cracking in penetration test methodologies (OSSTMM) ?

As most of this blog reader already know, in past years there was a lot of activities related to public research for GSM auditing and cracking.

However when there was huge media coverage to GSM cracking research results, the tools to make the cracking was really early stage and still very inefficient.

Now Frank Stevenson , norwegian cryptanalyst that already broke the Content Scrambling System of DVD video disc, participating to the A51 cracking project started by Karsten Nohl , released Kraken , a new improved version of the A51 cracking system.

It's interesting to notice that WiFi cracking had a similar story, as the first WiFi wep cracking discovery was quite slow in earlier techniques but later Korek, an hacker working on cracking code, improve the attack system drammatically.

That's the story of security research cooperation, you start a research, someone follow it and improve it, some other follow it and improved it and at the end you get the result.

Read more on the Kraken GSM Cracking software release .

And stay tuned as next week at Blackhat Conference Karsten Nohl will explain the details of the required hardware setup and detailed instructions on how to do it :-)

I would really like to see those tools incorporated into Penetration Testing Linux Distribution BackTrack with OSSTMM methodology enforcing the testing of GSM interception and man in the middle :-)

If things proceed that way and Ettus Research (The producer of USRP2 software radio used for low cost GSM signal receiving) will not be taken down, we can still see this.

Snake-oil security claims on crypto security product

Security market grow, more companies goes to the market, but how many of them are taking seriously what they do?

You know, doing security technology mean that you are personally responsible for the protection of the user's information. You must make them aware of what they need, exactly what your are doing and which kind of threat model your product protect.

A typical problem of product's security features is represented by the inability of the user to evaluate the security claims of the product itself.

So there's a lot companies doing a not-so-ethical marketing of security features, based on the facts that no user will be able to evaluate it.

The previously explained situation reside in the security topic of Snake Oil Encryption , an evolution in the scientific cryptographic environment that let us today use best of breed information protection technologies without having to worry too much about backdoors or insecurities.

Let's speak about Snake Oil Encryption

Snake Oil Cryptography : In cryptography , snake oil is a term used to describe commercial cryptographic methods and products which are considered bogus or fraudulent. Distinguishing secure cryptography from insecure cryptography can be difficult from the viewpoint of a user. Many cryptographers, such as Bruce Schneier and Phil Zimmermann , undertake to educate the public in how secure cryptography is done, as well as highlighting the misleading marketing of some cryptographic products.

The most referenced crypto security guru, Philip Zimmermann and Bruce Schneier, was the 1st to talk about Snake Oil Encryption:

Snake Oil by Philip Zimmermann

Snake Oil by Bruce Schneier

The Michigan Telecommunications and Technology Law Review also made a very good analysis related to the Security Features of Security Products, SNAKE-OIL SECURITY CLAIMS” THE SYSTEMATIC MISREPRESENTATION OF PRODUCT SECURITY . They explain about the nasty marketing tricks used to tweak users inability to evaluate the security features, including economic and legal responsibility implication.

Several snake oil security product companies does not explain and are not clear about the threat model to which the product apply. Very famous is the sentence of Russ Nelson :

“Remember, crypto without a threat model is like cookies without milk. ….. Cryptography without a threat model is like motherhood without apple pie. Can't say that enough times. More generally, security without a threat model is by definition going to fail.”

So, how to spot snake oil security products?

Check a guideline of to spot Snake Oil Encryption Products: Snake Oil Warning Signs, Encryption Software to Avoid by Matt Curtin .

You can see this very good Cryptographic Snake Oil Examples by Emility Ratliff (IBM Architect at Linux Security), that tried to make clear example on how to spot Cryptographic Snake Oil.

Here represented the basic guideline from Matt Curtin paper:


By checking that points it's possible to evaluate how serious an encryption technology or product is.

But all in all how to fix that unethical security approach?

It's very significative and it would be really useful for each kind of security product category to make some strongly and independent evaluation guideline (like OSSTMM for Penetration testing) , to make this security evaluation process really in the hands of the user.

It would be also very nice to have someone making analysis and evaluation of security product companies, publishing reports about Snake Oil signs.

Web2.0 privacy leak in Mobile apps

You know that web2.0 world it's plenty of leak of any kind (profiling, profiling, profiling) related to Privacy and users starts being concerned about it.

Users continuously download applications without knowing the details of what they do, for example iFart just because are cool, are fun and sometime are useful.

On mobile phones users install from 1000% up to 10.000% more applications than on a PC, and those apps may contain malware or other unexpected functionalities.

Recently infobyte analyzed ubertwitter client and discovered that the client was leaking and sending to their server many personal and sensitive data such as:

- Blackberry PIN

- Phone Number

- Email Address

- Geographic positioning information

Read about UbertTwitter 'spyware' features discovery here by infoByte .

It's plenty of applications leaking private and sensitive information but just nobody have a look at it.

Should mandatory data retention and privacy policies became part of application development and submission guideline for mobile application?

Imho a users must not only be warned about the application capabilities and API usage but also what will do with which kind of information it's going to handle inside the mobile phone.

Capabilities means authorizing the application to use a certain functionalities, for example to use GeoLocation API, but what the application will do and to who will provide such information once the user have authorized it?

That's a security profiling level that mobile phone manufacturer does not provide and they should, because it focus on the information and not on the application authorization/permission respect to the usage of device capabilities.

ps yes! ok! 我同意! This kind of post would require 3-4 pages long discussion as the topic is hot and quite articulated but it's saturday morning and i gotta go!

AES algorithm selected for use in space

I encountered a nice paper regarding analysis and consideration on which encryption algorithm it's best suited for use in the space by space ship and equipments.

The paper has been done by the Consultative Committee for Space Data Systems that's a consortium of all space agency around that cumulatively handled more than 400 mission to space .

topban.jpg

Read the paper Encryption Algorithm Trade Survey as it gives interesting consideration and comparison between different encryption algorithms.

Obviously the finally selected algorithm is AES , while KASUMI (used in UMTS networks) was avoided.

Blackberry Security and Encryption: Devil or Angel?

Blackberry have good and bad reputation regarding his security capability, depending from which angle you look at it.

This post it's a summarized set of information to let the reader the get picture, without taking much a position as RIM and Blackberry can be considered, depending on the point of view, an extremely secure platform or an extremely dangerous one .

bblock.jpg

Let's goes on.

在一邊黑莓是一個平台大量的加密功能,安全功能無處不在,設備加密(使用自定義密碼),通信加密(使用自定義的私有協議 ,如IPPP)而來,很不錯的高級安全設置,加密框架Certicom公司現歸RIM )。

在另一邊,他們不僅提供設備,但覆蓋接入網絡,被稱為BIS( 黑莓網絡服務 ),這是一個全球性的全球廣域網在您的黑莓輸入,當你瀏覽或checkmail使用blackberry.net AP。

當你,或者一個應用程序,使用blackberry.net APN你不只是連接到與運營商的互聯網連接互聯網,但你進入RIM的網絡,將代理並作為內部網關訪問Internet。

當你有一個企業使用同樣的發生:無論是BB的設備和企業BES連接到作為排序的RIM網絡的VPN集中的網絡

所以基本上所有的通信加密格式跨槽RIM服務基礎設施的一組專有加密和通信協議。

Just as a notice, think that google to provide gtalk over blackberry.net APN, made an agreement in order to offer service inside the BB network to the BB users. When you install gtalk you get added 3 service books that point to GTALKNA01 that's the name of GTALK gateway inside the RIM network to allow intra-BIS communication and act as a GTALK gateway to the internet.

The mobile operators usually are not even allowed to inspect the traffic between the Blackberry device and the Blackberry Network.

So RIM and Blackberry are somehow unique for their approach as they provide a platform, a network and a service all bundled together and you cannot just “get the device and the software” but the user and the corporate are always bound and connected to the service network.

That's good and that's bad, because it means that RIM provide extremely good security features and capabilities to protect information, device and access to information at various level against third party .

But it's always difficult to estimate the threat and risk related to RIM itself and who could make political pressure against RIM.

Please consider that i am not saying “RIM is looking at your data” but making an objective risk analysis: for how the platform is done RIM have authority on the device, on the information on-the-device and on the information that cross the network. (Read my Mobile Security Slides ).

For example let's consider the very same context for Nokia phones.

Once the Nokia device is sold, Nokia does not have authority on the device, nor on the information on-the-device nor on the information that cross the network. But it's also true that Nokia just provide the device and does not provide the value added services such as the Enterprise integration (The RIM VPN tunnel), the BIS access network and all the local and remote security provisioned features that Blackberry provide.

So it's a matter of considering the risk context in the proper way when choosing the platform, with an example very similar to choosing Microsoft Exchange Server (on your own service) or whether getting a SaaS service like Google Apps.

In both case you need to trust the provider, but in first example you need to trust Microsoft that does not put a backdoor on the software while in the 2nd example you need to trust Google, as a platform and service provider, that does not access your information.

So it's a different paradigm to be evaluated depending on your threat model.

If your threat model let you consider RIM as a trusted third party service provider (much like google) than it's ok. If you have a very high risk context, like top-secret one, then let's consider and evaluate carefully whether it's not better to keep the Blackberry services fully isolated from the device or use another system without interaction with manufacturer servers and services.

Now, let's get back to some research and some facts about blackberry and blackberry security itself.

First of all several governments had to deal with RIM in order to force them to provide access to the information that cross their service networks while other decided to directly ban Blackberry usage for high officials because of servers located in UK and USA, while other decided to install their own backdoors.

There's a lot of discussion when the topics are RIM Blackberry and Governments for various reasons.

Below a set of official Security related information on RIM blackberry platform:

And here a set of unofficial Security and Hacking related information on RIM Blackberry platform:

Because it's 23.32 (GMT+1), i am tired, i think that this post will end up here.

I hope to have provided the reader a set of useful information and consideration to go more in depth in analyzing and considering the overall blackberry security (in the good and in the bad, it always depends on your threat model!).

乾杯

Fabio Pietrosanti (naif)

ps i am managing security technology development (voice encryption tech) on Blackberry platform, and i can tell you that from the development point of view it's absolutely better than Nokia in terms of compatibility and speed of development, but use only RIMOS 5.0+ !

Celebrating “Hackers” after 25 years

A cult book , ever green since 25 years.

201007010924.jpg

It's been 25 years since “Hackers” was published. Author Steven Levy reflects on the book and the movement.

http://radar.oreilly.com/2010/06/hackers-at-25.html 
Steven Levy wrote a book in the mid-1980s that introduced the term "hacker" -- the positive connotation -- to a wide audience. In the ensuing 25 years, that word and its accompanying community have gone through tremendous change. The book itself became a mainstay in tech libraries.
O'Reilly recently released an updated 25th anniversary edition of "Hackers," so I checked in with Levy to discuss the book's development, its influence, and the role hackers continue to play.

Botnet for RSA cracking?

I read an interesting article about putting 1.000.000 computers, given the chance for a serious botnet owner to get it, to crack RSA.

The result is that in such context attacking an RSA 1024bit key would take only 28 years, compared to theoretical 19 billion of years.

Reading of this article , is extremely interesting because it gives our very important consideration on the cryptography strength respect to the computation power required to carry on cracking attempt, along with industry approach to “default security level”.

I would say a must read .

Patent rights and opensource: can they co-exist?

How many of you had to deal with patented technologies?

How many of the patented technologies you dealed with was also “secrets” in their implementation?

Well, there's a set of technologies whose implementation is open source ( copyright) but that are patented ( intellectual property right) .

A very nice paper about the topic opensource & patents that i suggest to read is from Fenwick & West and can be downloaded here (pdf) .

China Encryption Regulations

Hi all,

i found this very interesting paper on China Encryption Import/Export/Domestic Regulations done by Baker&Mckenzie in the US.

It's strongly business and regulatory oriented giving a very well done view on how china regulations works and how it may behave in future.

Read here Decrypting China Encryption's Regulations (form Bakernet website) .

IOScat – a Port of Netcat to Cisco IOS

A porting of famous netcat to Cisco IOS router operating system: IOSCat

The only main limit is that it does not support UDP, but that's a very cool tool!

A very good txt to read is Netcat hacker Manual .

The (old) Crypto AG case and some thinking about it

In the '90, closed source and proprietary cryptography was ruling the world.

That's before open source and scientifically approved encrypted technologies went out as a best practice to do crypto stuff.

I would like to remind when, in 1992, USA along with Israel was, together with switzerland, providing backdoored (proprietary and secret) technologies to Iranian government to tap their communications, cheating them to think that the used solution was secure , making also some consideration on this today in 2010.

caq63crypto.t.jpg

That's called The Crypto AG case , an historical fact involving the United States National Security Agency along with Signal Intelligence Division of Israel Ministry of Defense that are strongly suspected to had made an agreement with the Swiss cryptography producer company Crypto AG .

Basically those entities placed a backdoor in the secure crypto equipment that they provided to Iran to intercept Iranian communications.

Their crypto was based on secret and proprietary encryption algorithms developed by Crypto AG and eventually customized for Iranian government.

You can read some other facts about Crypto AG backdoor related issues:

The demise of global telecommunication security

The NSA-Crypto AG sting

Breaking codes: an impossible task? By BBC

Der Spiegel Crypto AG (german) article

Now, in 2010, we all know and understand that secret and proprietary crypto does not work.

Just some reference by top worldwide cryptographic experts below:

Secrecy, Security, Obscurity by Bruce Schneier

Just say No to Proprietary cryptographic Algorithms by Network Computing (Mike Fratto)

Security Through Obscurity by Ceria Purdue University

Unlocking the Secrets of Crypto: Cryptography, Encryption and Cryptology explained by Symantec

Time change the way things are approached.

I like very much the famous Philip Zimmermann assertion:

“Cryptography used to be an obscure science, of little relevance to everyday life. Historically, it always had a special role in military and diplomatic communications. But in the Information Age, cryptography is about political power, and in particular, about the power relationship between a government and its people. It is about the right to privacy, freedom of speech, freedom of political association, freedom of the press, freedom from unreasonable search and seizure, freedom to be left alone.”

Any scientist today accept and approve the Kerckhoffs' Principle that in 1883 in the Cryptographie Militaire paper stated:

The security of a cryptosystem should not depend on keeping the algorithm secret, but only on keeping the numeric key secret.

It's absolutely clear that the best practice for doing cryptography today obbly any serious person to do open cryptography, subject to public review and that follow the Kerckhoff principle.

So, what we should think about closed source, proprietary cryptography that's based on security trough obscurity concepts?

I was EXTREMELY astonished when TODAY, in 2010, in the age of information society i read some paper on Crypto AG website.

I invite all to read the Crypto AG security paper called Sophisticated Security Architecture designed by Crypto AG of which you can get a significant excerpt below:

The design of this architecture allows Crypto AG to provide a secret proprietary algorithm that can be specified for each customer to assure the perfect degree of cryptographic security and optimum support for the customer's security policy. In turn, the Security Architecture gives you the influence you need to be fully independent in respect of your encryption solution. You can determine all areas that are covered by cryptography and verify how the algorithm works. The original secret proprietary algorithm of Crypto AG is the foundation of the Security Architecture .

I have to say that their architecture is absolutely good from TLC point of view. Also they have done a very good job in making the design of the overall architecture in order to make a tamper-proof resistant crypto system by using dedicated crypto processor .
However there is still something missing:

T he overall cryptographic concept is misleading, based on wrong encryption concepts .

You may think that i am a troll telling this, but given the history of Crypto AG and given the fact that all the scientific and security community does not approve security trough obscurity concepts , it would legitimate to ask ourself:

Why they are still doing security trough obscurity cryptography with secret and proprietary algorithms ?



Hey, i think that they have very depth knowledge on telecommunication and security, but given that the science tell us not to follow the secrecy of algorithms, i really have serious doubt on why they are still providing proprietary encryption and does not move to standard solutions (eventually with some kind of custom enhancement).

Missiles against cyber attacks?

The cyber conflicts are really reaching a point where war and cyberwar merge together.

NATO countries have the right to use the force against attacks on computer networks .

Mobile Security talk at WHYMCA conference

I want to share some slides i used to talk about mobile security at whymca mobile conference in Milan.

Read here my slides on mobile security .

The slides provide a wide an in-depth overview of mobile security related matters, i should be doing some slidecast about it putting also audio. Maybe will do, maybe not, it depends on time that's always a insufficient resource.

iPhone PIN: useless encryption

I recently switched one of my multiple mobile phones with which i go around to iPhone.

I am particularly concerned about data protection in case of theft and so started having a look around about the iPhone provided protection system.

There is an interesting set of iPhone Business Security Features that make me think that iPhone is moving in the right path for security protection of the phone, but still a lot of things has to be done, especially for serious Enterprise and Government users.

201006011551.jpg

For example it turned out that the iPhone PIN protection is useless and it can be broken just plugging the iPhone to a Linux machine and accessing the device like a USB stick.

That's something disturbing my paranoid mindset that make me think not to use sensitive data on my iPhone if i cannot protect my data.

Probably an iPhone independent disk encryption product would be very useful in order to let the market create protection schemas that fit the different risk contexts that different users may have.

Probably a general consumer is not worried about this PIN vulnerability but for me, working within highly confidential envirnonment such as intelligence, finance and military, it's something that i cannot accept.

I need strong disk encryption on my mobile phone.

I do strong voice encryption for it , but it would be really nice to have also something to protect the whole iPhone data and not just phone calls.

Who extract Oil in Iran? Business and UN sanction together

I like geopolitic and i am following carefully iran issues.

I went to National Iranian Oil Company website and have seen “ Exploration & Production ” section where are listed all the companies and their country of origin that are allowed to make Exploration of oil in Iran.

On that list we find the list of countries along with the data of signing of exploration agreement:

  • Norway/Russia (2000)
  • Australia/Spain/Chile (2001)
  • India (2002)
  • China (2001)
  • Brazil (2004)
  • Spain (2004)
  • Thailand (2005)
  • China x 2 (2005)
  • Norway (2006)
  • Italy (2008)
  • Vietnam (2008)

Those countries's oil companies are allowed to do oil extraction in Iran and i would like to point out that Iran is the 2nd world Oil Reserve just after Saudi Arabia.

As you can see there's NO USA company doing extraction.

Of European Countries the only one doing business with IRAN are:

IRAN Norway Relationship

IRAN ITALY Relationship

IRAN SPAIN Relationship

While of the well known non-US-simpatizing countries, the one doing Oil business with Iran are:

IRAN RUSSIA Relationship

IRAN BRAZIL Relationship

IRAN China Relationship

Don't missing some Asian involvement.

IRAN India Relationship

IRAN Vietnam Relationship

As you can see Iran is doing Oil business with most big south America and Far Asia countries, with some little exception in Europe for what apply to Norway, Italy and Spain.

To me it sounds that those European countries are going to face serious trouble whether they will accept and subscribe UN sanction against Iran.

Or some of them, like Italy, are protected by the strenghtening cooperation they are doing with Russia on Energy matters?

Well, i don't know how things will end up, but it's possible the most hypocrit countries like the European ones doing business in Iran while applying Sanctions will be the only European winning in the international competition for Iran Oil (Unless France did not drop a nuclear bomb on theran ;) ).

Exploit code against SecurStar DriveCrypt published

It seems that the hacking community somehow like to target securstar products, maybe because hacking community doesn't like the often revealed unethical approach already previously described in this blog by articles and user's comments.

Rumors say that also PhoneCrypt binaries are getting analyzed and the proprietary encryption system could reveal something fun…

Quantum cryptography broken

Quantum cryptography it's something very challenging, encryption methods that leverage the law of phisycs to secure communications over fiber lines.

To oversimplify the system is based on the fact that if someone cut the fiber, put a tap in the middle, and joint together the other side of the fiber, the amount of “errors” that will be on the communications path will be higher than 20% .

So if QBER (Quantum Bit Error Rate) goes above 20% then it's assumed that the system is intercepted.

Researcher at university of toronto was able to cheat the system with a staying below the 20%, at 19.7% , thus tweaking the threshold used by the system to consider the communication channel secure vs compromised.

The product found vulnerable is called Cerberis Layer2 and produced by the Swiss ID Quantique .

Some possibile approach to detect the attack has been provided but probably, imho, such kind of systems does not have to be considered 100% reliable until the technology will be mature enough.

Traditional encryption has to be used together till several years, eventually bundled with quantum encryption whether applicable.

When we will see a quantum encryption systems on an RFC like we have seen for ZRTP , PGP and SSL ?

-naif

FUN! Infosecurity consideration on some well known films

Please read it carefully Film that needed better infosec .

One the the review, imho the most fun one on film Star Wars :

The scene

Death star getting blown up

Infosec Analysis

Darth Vader must be heralded as the prime example of a chief executive who really didn't care about information security. The entire board was unapproachable and clearly no system testing was undertaken. The network security was so poor that it was hacked into and the designs for the death star were stolen without anyone knowing.

Even worse than that, the death star had a major design flaw where by dropping a bomb thingy into a big hole on the outside, it actually blew up the entire thing!

Darth Vader needed to employ a good Security Consultant to sit on the executive board and promise not to force choke him. Should have commissioned a full risk assessment of the death star followed by a full penetration test. Only then should the death star have been released into the production environment.

great point of view

Because security of a cryptographic system it's not a matter of “how many bits do i use” but using the right approach to do the right thing to mitigate the defined security risk in the most balanced way.

security.png

Encryption is not scrambling: be aware of scrambler!

Most of us know about voice scrambler that can be used across almost any kind of voice based communication technology.

Extremely flexible approach: works everything

Extreme performance: very low latency

but unfortunately…

Extremely weak: Scrambling cannot be considered secure.

Only encryption can be considered secure under the Kerckoff's principle .

So please don't even consider any kind of analog scrambler if you need real security.

Read deeply the paper Implementation of a real-time voice encryption system ” by Markus Brandau, especially the cryptoanalysis paragraph.

SecurStar GmbH Phonecrypt answers on the Infosecurityguard/Notrax case: absolutely unreasonable! :-)

UPDATE 20.04.2010: http://infosecurityguard.com has been disabled. Notrax identity became known to several guys in the voice security environments (cannot tell, but you can imagine, i was right!) and so our friends decided to trow away the website because of legal responsibility under UK and USA laws.

UPDATE: Nice summary of the whole story (i know, it's long and complicated to read at 1st time) on SIPVicious VoIP security blog by Sandro Gauci .

Following my discoveries, Mr. Hafner, SecurStar chief exec, tried to ultimately defend their actions, citing absolutely unreasonable excuses to The Reg instead of publicly apologizing for what they have done: creating a fake independent security research to promote their PhoneCrypt product .

He tried to convince us that the person behind IP 217.7.213.59, used by the author of infosecurityguard.com and pointing to their office DSL line, was this hacker Notrax, using their anonymous surfing service and not one of their employees at their office:

“SecurStar chief exec Wilfried Hafner denied any contact with Notrax. Notrax, he said, must have been using his firm's anonymous browsing service, SurfSolo, to produce the results reported by Pietrosanti”

Let's reflect a moment on this sentence… Would really an hacker looking for anonymity spend 64 EUR to buy their anonymity surfing service called surfsolo instead of using the free and much more secure TOR (the onion router) ?Then let's reflect on this other piece of information:

  • The IP 217.7.213.59 is SecurStar GmbH's office DSL line
  • On 217.7.213.59 they have installed their VoIP/Asterisk PBX and internet gateway
  • They promote their anonymous proxy service for “Anonymous p2p use” ( http://www.securstar.com/products_ssolo.php ). Who would let users do p2p from the office dsl line where they have installed their corporate VoIP PBX ? If you do VoIP you can't let third party flood your line w/ p2p traffic, your phone calls would became obviously unreliable (yes, yes, you can do QoS, but you would not place an anonymous navigation proxy on your company office DSL line…).
  • Which company providing an anonymous navigation service would ever use their own office IP address? Just think how many times you would have the police knocking at your door and your employees as the prime suspects. (In past i used to run a TOR node, i know the risks…). Also think how many times you would find yourself blacklisted on google as a spyware bot.
  • Mr. Hafner also says “We have two million people using this product. Or he may have been an old customer of ours”. 2M users on a DSL line, really?
  • I don't use Surfsolo service, however their proxies are probably these ones:

surfsolo.securstar.net – 67.225.141.74

surfsolo.securstar.com – 69.16.211.133

Frankly speaking I can easily understand that Mr. Hafner is going do whatever he can to protect his company from the scandal, but the “anonymous proxy” excuse is at the very least suspicious.

How does the fact that the “independent research” was semantically a product review of PhoneCrypt, along with the discovery that the author come from the SecurStar GmbH IP address offices, along with the anonymity of this Notrax guy (SecurStar calls him a “well known it security professional” in their press release..) sound to you?

It's possible that earth will get an attack from outer space that's going to destroy our life?

Statistically extremely difficult, but yes, possible. More or less like the “anonymous proxy” story told by Mr. Hafner to cover the fact that they are the ones behind the infosecurityguard.com fake “independent security review”.

Hey, I don't need anything else to convince myself or to let the smart person have his own thoughts on this.

I just think that the best way for SecurStar to get out of this mess would probably be to provide public excuses to the hacking community for abusing the name and reputation of real independent security researches, for the sake of a marketing stunt.

此致,

Fabio Pietrosanti

ps I am currently waiting for some other infos that will more precisely confirm that what Mr. Hafner is saying is not properly true. 敬請關注。

Evidence that infosecurityguard.com/notrax is SecurStar GmbH Phonecrypt – A fake independent research on voice crypto

Below evidence that the security review made by an anonymous hacker on http://infosecurityguard.com is in facts a dishonest marketing plan by the SecurStar GmbH to promote their voice crypto product.

I already wrote about that voice crypto analysis that appeared to me very suspicious.

Now it's confirmed, it's a fake independent hacker security research by SecurStar GmbH, its just a marketing trick!

How do we know that Infosecurityguard.com, the fake independent security research, is a marketing trick from SecurStar GmbH?

1) I posted on http://infosecurityguard.com a comments to a post with a link to my blog to that article on israelian ministry of defense certification

2) The author of http://infosecurityguard.com went to approve the comment and read the link on my own blog http://infosecurity.ch

3) Reaching my blog he leaked the IP address from which he was coming 217.7.213.59 (where i just clicked on from wordpress statistic interface)

4) On http:// 217.7.213.59/panel there is the IP PBX interface of the SecurStar GmbH corporate PBX (openly reachable trough the internet!)

5) The names of the internal PBX confirm 100% that it's the SecurStar GmbH:

6) There is 100% evidence that the anonymous hacker of http://infosecurityguard.com is from SecurStar GmbH

Below the data and reference that let us discover that it's all but a dishonest marketing tips and not an independent security research.

Kudos to Matteo Flora for it's support and for his article in Debunking Infosecurityguard identity !

The http referral tricks

When you read a link going from a website to another one there is an HTTP protocol header, the “Referral”, that tell you from which page someone is going to another webpage.

The referral demonstrated that the authors of http://infosecurityguard.com read my post, because it was coming from http://infosecurityguard.com/wp-admin/edit-comments.php that's the webpage you use as a wordpress author/editor to approve/refuse comments. And here there was the link.

That's the log entry:

217.7.213.59 – - [30/Jan/2010:02:56:37 -0700] “GET /20100129/licensed-by-israel-ministry-of-defense-how-things-really-works/ HTTP/1.0″ 200 5795 “ http://infosecurityguard.com/wp-admin/edit-comments.php ” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”

The PBX open on the internet tell us that's SecurStar GmbH

The SecurStar GmbH PBX is open on the internet, it contains all the names of their employee and confirm us that the author of http:/infosecurityguard.com is that company and is the anonymous hacker called Notrax.

Here there is their forum post where the SecurStar GmbH guys are debugging IPCOPfirewall & Asterisk together (so we see also details of what they use) where there is the ip 217.7.213.59 .

SecurStarproof.png

That's also really fun!

They sell secure telephony but their company telephony system is openly vulnerable on the internet . :-)

I was thinking to call the CEO, Hafner, via SIP on his internal desktop PBX to announce we discovered him tricks.. :->

They measured their marketing activity

Looking at the logs of my website i found that they was sensing the google distribution of information for the following keywords, in order to understand how effectively they was able to attack competing products. It's reasonable, if you invest money in a marketing campaign you want to see the results :-)

They reached my blog and i logged their search:

infosecurityguard+cryptophone

infosecurityguard+gold-lock

217.7.213.59 – - [30/Jan/2010:02:22:42 -0700] “GET / HTTP/1.0″ 200 31057 “http://www.google.de/search?sourceid=navclient&ie=UTF-8&rlz=1T4SKPB_enDE350DE350&q=infosecurityguard+cryptophone” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”

217.7.213.59 – - [30/Jan/2010:04:15:07 -0700] “GET /20100130/about-the-voice-encryption-analysis-phonecrypt-can-be-intercepted-serious-security-evaluation-criteria/ HTTP/1.0″ 200 15774 “http://www.google.de/search?sourceid=navclient&ie=UTF-8&rlz=1T4SKPB_enDE350DE350&q=gold-lock+infosecurityguard” “Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.3; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; InfoPath.2)”


The domain registration data

The domain have been registered on 1st December 2009, just two months to start preparing the dishonest marketing campaign:

Domain Name: INFOSECURITYGUARD.COM

Registrar: GODADDY.COM, INC.

Updated Date: 01-dec-2009

Creation Date: 01-dec-2009

The domain is anonymously privacy protected trough a whois privacy service:

Administrative Contact: Private, Registration INFOSECURITYGUARD.COM@domainsbyproxy.com , Domains by Proxy, Inc. DomainsByProxy.com

Notrax hacker does not exist on google
As you know any hacker that get public usually have presence of it's activity on google, attending mailinglists, forum, homepage, past research, participation to conferences, etc, etc.
The fake hacker that they wanted us to to think was writing an independent blog does NOT have any trace on google. Only some hit about an anonymous browser called Notrax but nothing about that hacker.
Maybe when SecurStar provided the anonymity tool to their marketing agency, to help them protecting anonymity for the fake research, their provided them the anonymous browser notrax.So the marketing guy thinking about the nickname of this fake hackers used what? Notrax! :-)

The “independent review”completely oriented in publicizing PhoneCrypt

Of the various review don the phonecrypt review is only positive and amazing good feedback, while the other are only bad feedback and no single good point.

As you can imagine, in any kind of independent product evaluation, for all products there are goods and bad points. No. In this one there are only product that are good and product that are bad.

They missed to consider the security of the technology used by the products

They completely avoided to speak about cryptography and security of the products.

They do not evaluated basic security features that must be in that kind of products.That's in order not to let anyone see that they did not followed basic security rules in building up their PhoneCrypt.
The technology is closed source, no transparency on algorithms and protocols, no peer review.Read my new comparison (from the basic cryptographic requirement point of view) About the voice encryption analysis (criteria, errors and different results) .
The results are somehow different than their one .

UPDATE: Who's Wilfried Hafner (SecurStar founder) ?

I got a notice from a reader regarding Wilfred Hafner, SecurStar founder, CEO and security expert.

He was arrested in 1997 for telephony related fraud (check 2nd article on Phrack) earning from telephony fraud 254.000 USD causing damages to local telcos trough blueboxing for 1.15 Million USD.

He was not doing “Blueboxing” for the pleasure of phreaking and connecting with other hackers, but to earn money.

Hacking for profit (and not for fun) in 1997… brrr…. No hacker's ethic at all!

All in all, is that lawful?

Badmouthing a competitor amounts to an unfair competition practice in most jurisdictions, so it is arguable (to say the least) that SecurStar is right on a legally sound ground here.
Moreover, there are some specific statutes in certain jurisdictions which provide for a straightforward ban on the practice we are talking about. For example in the UK the British Institute of Practitioners in Advertising - in compliance with the Consumer protection from Unfair Trading regulation – ruled that:

”falsely claiming or creating the impression that the trader is not acting for the purposes relating to his trade, business, craft or profession, or falsely representing oneself as a consumer” is a criminal offense .

We have no doubt that PRPR (which is the UK-based *PR company for SecurStar GmbH, led by Peter Rennison and Allie Andrews as stated in SecurStar Press Release ) did provide their client with this information. Heck, they *are* in the UK, they simply cannot ignore that!

IANAL, but I would not be surpised if someone filed a criminal complaint or start civil litigation for unfair competition against SecurStar GmbH.
Whether this is going to be a matter for criminal and/or civil Courts or not is not that important. However, it is clear enough that SecurStar GmbH appears to be at least ethically questionable and not really worth of trust.

Nice try, gentlemen… however, next time just do it right (whether “right” for them means “in a honest manner” or “in a fashion not to be caught” I will let them choose)”

Fabio Pietrosanti (naif)

Dishonest security: The SecurStart GmbH Phonecrypt case

I would like to provide considerations on the concept of ethics that a security company should have respect to the users, the media and the security environment.

SecurStar GmbH made very bad things making that infosecuriguard.com fake independent research.

It's unfair approach respect to hacking community.

It's unfair marketing to end user. They should not be tricking by creating fake independent review.

It's unfair competition in the security market.

Let's make some more important consideration on this.

Must be serious on cryptographic products. They are not toys

When you do cryptographic tools you should be really aware of what you are doing, you must be really serious.

If you do bad crypto people could die.

If you don't follow basic security rules for transparency and security for cryptography you are putting people life at risk.

You are taking the responsibility of this. (I want to sleep at night, don't think SecurStar CEO/CTO care about this…)

Security research need reference and transparency

Security research have to be public, well done, always subject to public discussion and cooperation.
Security research should not be instrumentally used for marketing purpose.Security research should be done for awareness and grow of the knowledge of the worldwide security environment.

Hacking environment is neutral, should not be used instrumentally

Hackers are considered neutral, nerds, doing what they do for their pleasure and passion.

If you work in the security market you work with hackers.

If you use hackers and hacking environment for your own marketing purposes you are making something very nasty.

Hackers give you the technology and knowledge and you use them for your own commercial purpose.

Consideration on the authority of the information online

That's something that pose serious consideration on the authority of information online.An anonymous hacker, with no reference online, made a product security review that appear like an independent one. I have to say that the fake review was very well prepared, it always posed good/bad things in an indirect way. It did not appeared to me at 1st time like a fake. But going deeply i found what's going on.

However Journalists, news media and blogger went to the TRAP and reviewed their fake research. TheRegister, NetworkWorld and a lot of blogs reported it. Even if the author was completely anonymous.

What they have done is already illegal in UK

SecurStar GmbH is lucky that they are not in the UK, where doing this kind of things is illegal .

Fabio Pietrosanti (naif)

About the SecurStar GmbH Phonecrypt voice encryption analysis (criteria, errors and different results)

This article want to clarify and better explain the finding at infosecurityguard.com regaring voice encryption product evaluation.
This article want to tell you a different point of view other than infosecurityguard.com and explaining which are the rational with extensive explaination from security point of view.
Today i read news saying: “PhoneCrypt: Basic Vulnerability Found in 12 out of 15 Voice Encryption Products and went to read the website infosecurityguard .

Initially it appeared to my like a great research activity but then i started reading deeply the read about it.I found that it's not properly a security research but there is are concrete elements that's a marketing campaign well done in order to attract public media and publicize a product.
Imho they was able to cheat journalists and users because the marketing campaign was absolutely well done not to be discovered on 1st read attempt. I personally considered it like a valid one on 1st ready (they cheated me initially!).

But if you go deeply… you will understand that:
- it's a camouflage marketing initiative arranged by SecurStar GmbH and not a independent security research
- they consider a only security context where local device has been compromised (no software can be secured in that case, like saying SSL can be compromised if you have a trojan!)
- they do not consider any basic security and cryptographic security criteria

However a lot of important website reported it:

This article is quite long, if you read it you will understand better what's going on around infosecurityguard.com research and research result.

I want to to tell you why and how (imho) they are wrong.

The research missed to consider Security, Cryptography and Transparency!

Well, all this research sound much like being focused on the marketing goal to say that their PhoneCrypt product is the “super” product best of all the other ones.
Any security expert that would have as duty the “software evaluation” in order to protect the confidentiality of phone calls will evaluate other different characteristics of the product and the technology.

Yes, it's true that most of the product described by SecurStar in their anonymous marketing website called http://infosecurityguard.com have some weakness.
But the relevant weakness are others and PhoneCrypt unfortunately, like most of the described products suffer from this.
Let's review which characteristics are needed basic cryptography and security requirement (the best practice, the foundation and the basics!)

a – Security Trough Obscurity does not work

A basic rule in cryptography cames from 1883 by Auguste Kerckhoffs:

In a well-designed cryptographic system, only the key needs to be secret; there should be no secrecy in the algorithm.
Modern cryptographers have embraced this principle, calling anything else “security by obscurity.”
Read what Bruce Schneir, recognized expert and cryptographer in the world say about this
Any security expert will tell you that's true. Even a novice university student will tell you that's true. Simply because that's the only way to do cryptography.
Almost all product described in the review by SecurStar GmbH, include PhoneCrypt, does not provide precise details about their cryptographic technologies.
Precise details are:
  • Detailed specification of cryptographic algorithm (that's not just saying “we use AES “)
  • Detailed specification of cryptographic protocol (that's not just saying “we use Diffie Hellman ” )
  • Detailed specification of measuring the cryptographic strenght (that's not just saying “we have 10000000 bit key size “)

Providing precise details means having extensive documentation with theoretical and practical implications documenting ANY single way of how the algorithm works, how the protocol works with precise specification to replicate it for interoperability testing.
It means that scientific community should be able to play with the technology, audit it, hack it.
If we don't know anything about the cryptographic system in details, how can we know which are the weakness and strength points?

Mike Fratto, Site editor of Network Computing, made a great article on “Saying NO to proprietary cryptographic systems” .
Cerias Purdue University tell this .

b – NON peer reviewed and NON scientifically approved Cryptography does not work

In any case and in any condition you do cryptography you need to be sure that someone else will check, review, analyze, distruct and reconstract from scratch your technology and provide those information free to the public for open discussion.
That's exactly how AES was born and like US National Institute of Standard make crypto does (with public contest with public peer review where only the best evaluated win).
A public discussion with a public contest where the a lot of review by most famous and expert cryptographer in the world, hackers (with their name,surname and face, not like Notrax) provide their contribution, tell what they thinks.
That's called “peer review”.

If a cryptographic technology has an extended and important peer review, distributed in the world coming from universities, private security companies, military institutions, hackers and all coming from different part of the world (from USA to Europe to Russia to South America to Middle east to China) and all of them agree that a specific technology it's secure…
Well, in that case we can consider the technology secure because a lot of entities with good reputation and authority coming from a lot of different place in the world have publicly reviewed, analyzed and confirmed that a technology it's secure.

How a private company can even think to invent on it's own a secure communication protocol when it's scientifically stated that it's not possible to do it in a “proprietary and closed way” ?
IBM tell you that peer review it's required for cryptography .
Bruce Schneier tell you that “Good cryptographers know that nothing substitutes for extensive peer review and years of analysis.”
Philip Zimmermann will tell you to beware of Snake Oil where the story is: “Every software engineer fancies himself a cryptographer, which has led to the proliferation of really bad crypto software.”

c – Closed source cryptography does not work

As you know any kind of “serious” and with “good reputation” cryptographic technology is implemented in opensource.
There are usually multiple implementation of the same cryptographic algorithm and cryptographic protocol to be able to review all the way it works and certify the interoperability.
Supposing to use a standard with precise and extended details on “how it works”, that has been “peer reviewed” by the scientific community BUT that has been re-implemented from scratch by a not so smart programmer and the implementation it's plenty of bugs.

Well, if the implementation is “opensource” this means that it can be reviewed, improved, tested, audited and the end user will certaintly have in it's own had a piece of technology “that works safely” .

Google release opensource crypto toolkit
Mozilla release opensource crypto toolkit
Bruce Schneier tell you that Cryptography must be opensource .

Another cryptographic point of view

I don't want to convince anyone but just provide facts related to science, related to cryptography and security in order to reduce the effect of misinformation done by security companies whose only goes is to sell you something and not to do something that make the world a better.

When you do secure products, if they are not done following the proper approach people could die.
It's absolutely something irresponsible not to use best practice to do crypto stuff.

To summarize let's review the infosecurityguard.com review from a security best pratice point of view.

Product name Security Trough Obscurity Public peer review Open Source Compromise locally?
Caspertec Obscurity No public review Closed 是的
CellCrypt Obscurity
No public review
Closed
是的
Cryptophone Transparency Limited public review Public 是的
Gold-Lock Obscurity
No public review
Closed
是的
Illix Obscurity
No public review
Closed
是的
No1.BC Obscurity No public review
Closed
是的
PhoneCrypt Obscurity
No public review
Closed
是的
Rode&Swarz Obscurity
No public review
Closed
是的
Secure-Voice Obscurity
No public review
Closed
是的
SecuSmart Obscurity
No public review
Closed
是的
SecVoice Obscurity
No public review
Closed
是的
SegureGSM Obscurity
No public review
Closed
是的
SnapCell Obscurity
No public review
Closed
是的
Tripleton Obscurity
No public review
Closed
是的
Zfone Transparency Public review
Open 是的
ZRTP Transparency Public review
Open 是的

*Green means that it match basic requirement for a cryptographic secure system

* Red / Broken means that it does not match basic requirement for a cryptographic secure system
That's my analysis using a evaluation method based on cryptographic and security parameters not including the local compromise context that i consider useless.

However, to be clear, those are only basic parameters to be used when considering a voice encryption product (just to avoid being in a situation that appears like i am promoting other products). So it may absolutely possible that a product with good crypto ( transparency, peer reviewed and opensource) is absolutely a not secure product because of whatever reason (badly written, not usable causing user not to use it and use cleartext calls, politically compromised, etc, etc).
I think i will prepare a broader criteria for voice crypto technologies and voice crypto products, so it would be much easier and much practical to have a full transparent set of criterias to evaluate it.

But those are really the basis of security to be matched for a good voice encryption system!
Read some useful past slides on security protocols used in voice encryption systems (2nd part).

Now read below some more practical doubt about their research.

The security concept of the review is misleading: any hacked device can be always intercepted!

I think that the guys completely missed the point: ANY KIND OF SOFTWARE RUNNING ON A COMPROMISED OPERATING SYSTEM CAN BE INTERCEPTED

Now they are pointing out that also Zfone from Philip Zimmermann is broken (a pc software), just because they install a trojan on a PC like in a mobile phone?
Any security software rely on the fact that the underlying operating system is somehow trusted and preserve the integrity of the environment where the software run.

  • If you have a disk encryption system but your PC if infected by a trojan, the computer is already compromised.
  • If you have a voice encryption system but your PC is infected by a trojan, the computer is already compromised.
  • If you have a voice encryption system but your mobile phone is infected by a trojan, the mobile phone is already compromised.

No matter which software you are running, in such case the security of your operating environment is compromised and in one way or another way all the information integrity and confidentiality is compromised.

Like i explained above how to intercept PhoneCrypt.

The only things that can protect you from this threat is running in a closed operating system with Trust Computing capability, implementing it properly.
For sure on any “Open” operating system such us Windows, Windows Mobile, Linux, iPhone or Android there's no chance to really protect a software.
On difficult operating system such as Symbian OS or RimOS maybe the running software can be protected (at least partially)

That's the reason for which the security concept that guys are leveraging to carry on their marketing campaign has no clue.
It's just because they control the environment, they know Flexispy software and so they adjusted their software not to be interceptable when Flexispy is installed.
If you develop a trojan with the other techniques i described above you will 100% intercept PhoneCrypt.

On that subject also Dustin Tamme l, Security researcher of BreakPoint Systems , pointed on on VoIP Security Alliance mailing lists that the security analysis is based on wrong concepts .

The PhoneCrypt can be intercepted: it's just that they don't wanted to tell you!

PhoneCrypt can be intercepted with “on device spyware”.
為什麼呢?
Because Windows Mobile is an unsecure operating environment and PhoneCrypt runs on Windows Mobile.
Windows Mobile does not use Trusted Computing and so any software can do anything.
The platform choice for a secure telephony system is important.
How?
I quickly discussed with some knowledgeable windows mobile hackers about 2 different way to intercept PhoneCrypt with an on-device spyware (given the unsecure Windows Mobile Platform).

a) Inject a malicious DLL into the software and intercept from within the Phonecrypt itself.
In Windows Mobile any software can be subject to DLL code injection.
What an attacker can do is to inject into the PhoneCrypt software (or any software running on the phone), hooking the Audio related functions acting as a “function proxy” between the PhoneCrypt and the real API to record/play audio.
It's a matter of “hooking” only 2 functions, the one that record and the one that play audio.
Read the official Microsoft documentation on how to do DLL injection on Windows Mobile processes. or forum discussing the technique of injecting DLL on windows mobile processes.
That's simple, any programmer will tell you to do so.
They simply decided that's better not to make any notice about this.
b) Create a new audio driver that simply act as a proxy to the real one and intercept PhoneCrypt
In Windows Mobile you can create new Audio Drivers and new Audio Filters.
What an attacker can do is to load a new audio driver that does not do anything else than passing the real audio driver function TO/FROM the realone. In the meantime intercept everything recorded and everything played :-)
Here there is an example on how to do Audio driver for Windows Mobile .
Here a software that implement what i explain here for Windows “Virtual Audio Cable” .
The very same concept apply to Windows Mobile. Check the book “Mobile Malware Attack and Defense” at that link explaining techniques to play with those techniques.
They simply decided that's better not to make any notice to that way of intercepting phone call on PhoneCrypt .
Those are just 2 quick ideas, more can be probably done.

Sounds much like a marketing activity – Not a security research.

I have to tell you. I analyzed the issue very carefully and on most aspects. All this things about the voice encryption analisys sounds to me like a marketing campaign of SecurStar GmbH to sell PhoneCrypt and gain reputation. A well articulated and well prepared campaign to attract the media saying, in an indirect way cheating the media, that PhoneCrypt is the only one secure. You see the press releases of SecurStar and of the “Security researcher Notrax telling that PhoneCrypt is the only secure product” . SecurStar PhoneCrypt is the only product the anonymous hacker “Notrax” consider secure of the “software solutions”.
The only “software version” in competition with:

SnapCell – No one can buy it. A security company that does not even had anymore a webpage. The company does not almost exist anymore.
rohde-schawarz – A company that have in his list price and old outdated hardware secure phone . No one would buy it, it's not good for genera use.

Does it sounds strange that only those other products are considered secure along with PhoneCrypt .

Also… let's check the kind of multimedia content in the different reviews available of Gold-Lock, Cellcrypt and Phonecrypt in order to understand how much the marketing guys pressed to make the PhoneCrypt review the most attractive:

應用 Screenshots of application Video with demonstration of interception Network demonstration
PhoneCrypt 0 1
CellCrypt 0 2 0
GoldLock 1 2 0

It's clear that PhoneCrypt is reviewed showing more features explicitly shown and major security features product description than the other.

Too much difference between them, should we suspect it's a marketing tips?

But again other strange things analyzing the way it was done…
If it was “an impartial and neutral review” we should see good and bad things on all the products right?

Ok, see the table below regarding the opinion indicated in each paragraph of the different reviews available of Gold-Lock, CellCrypt and Phonecrypt (are the only available) to see if are positive or negative.

應用 Number of paragraphs Positive paragraphs Negative paragraphs Neutral paragraphs
PhoneCrypt 9 9 0 0
CellCrypt 12 0 10 2
GoldLock 9 0 8 1

Detailed paragraphs opinion analysis of Phonecrypt
Paragraph of review Opinion expressed
From their website Positive Marketing feedback
Apple iPhone Positive Marketing feedback
Disk Encryption or voice Encryption Positive Marketing feedback
PBX Compatibility? Really Positive Marketing feedback
Cracking <10. Not. Positive Marketing feedback
Good thinking! Positive Marketing feedback
A little network action Positive Marketing feedback
UI Positive Marketing feedback
Good Taste Positive Marketing feedback
Detailed paragraphs opinion analysis of Gold-Lock 3G
Paragraph of review Opinion expressed
From their website Negative Marketing feedback
Licensed by The israeli Ministry of Denfese Negative Marketing feedback
Real Company or Part Time hobby Negative Marketing feedback
16.000 bit authentication Negative Marketing feedback
DH 256 Negative Marketing feedback
Downad & Installation! Neutral Marketing feedback
Cracking it <10 Negative Marketing feedback
Marketing BS101 Negative Marketing feedback
Cool video stuff Negative Marketing feedback
Detailed paragraphs opinion analysis of CellCrypt
Paragraph of review Opinion expressed
From their website Neutral Marketing feedback
A little background about cellcrypt Negative Marketing feedback
Master of Marketing Negative Marketing feedback
Secure Voice calling Negative Marketing feedback
Who's buying their wares Negative Marketing feedback
Downad & Installation! Neutral Marketing feedback
My Demo environment Negative Marketing feedback
Did they forget some code Negative Marketing feedback
Cracking it <5 Negative Marketing feedback
Room Monitoring w/ FlexiSpy Negative Marketing feedback
Cellcrypt unique features.. Negative Marketing feedback
Plain old interception Negative Marketing feedback
The Haters out there Negative Marketing feedback

Now it's clear that from their point of view on PhoneCrypt there is no single bad point while the other are always described in a negative way.
No single good point. Strange?
All those considerations along with the next ones really let me think that's very probably a marketing review and not an independent review.

Other similar marketing attempt from SecurStar

SecurStar GmbH is known to have used in past marketing activity leveraging this kind of “technical speculations”, abusing of partial information and fake unconfirmed hacking stuff to make marketing/media coverage.
Imho a rare mix of unfairness in leveraging the difficult for people to really understand the complexity of security and cryptography.

They already used in past Marketing activities like the one about creating a trojan for Windows Mobile and saying that their software is secure from the trojan that they wrote.
Read about their marketing tricks of 2007

They developed a Trojan (RexSpy) for Windows Mobile, made a demonstration capability of the trojan and later on told that they included “Anti-Trojan” capability to their PhoneCrypt software.They never released informations on that trojan, not even proved that it exists.

The researcher Collin Mulliner told at that time that it sounds like a marketing tips (also because he was not able to get from SecurStar CEO Hafner any information about that trojan):

“This makes you wonder if this is just a marketing thing.”

Now, let's try to make some logical reassignment.
It's part of the way they do marketing, an very unfriendly and unpolite approach with customers, journalist and users trying to provide wrong security concepts for a market advantage. Being sure that who read don't have all the skills to do in depth security evaluation and find the truth behind their marketing trips.

Who is the hacker notrax?

It sounds like a camouflage of a fake identity required to have an “independent hacker” that make an “independent review” that is more strong on reputation building.
Read about his bio:

¾ Human, ¼ Android (Well that would be cool at least.) I am just an enthusiast of pretty much anything that talks binary and if it has a RS232 port even better. During the day I masquerade as an engineer working on some pretty cool projects at times, but mostly I do the fun stuff at night. I have been thinking of starting an official blog for about 4.5 years to share some of the things I come across, can't figure out, or just cross my mind. Due to my day job and my nighttime meddling, I will update this when I can. I hope some find it useful, if you don't, well you don't.

There are no information about this guy on google.
Almost any hacker that get public have articles online, post in mailing archive and/or forum or some result of their activity.
For notrax, nothing is available.

Additionally let's look at the domain…
The domain infosecurityguard.com is privacy protected by domainsbyproxy to prevent understanding who is the owner.
The domain has been created 2 months ago on 01-Dec-09 on godaddy.com registrar.

What's also very interesting to notice that this “unknown hacker with no trace on google about him that appeared on December 2009 on the net” is referred on SecurStar GmbH Press Release as a “An IT security expert”.

Maybe they “know personally” who's this anonymous notrax? :)

Am i following my own conspiracy thinking or maybe there's some reasonable doubt that everything was arrange in that funny way just for a marketing activity?

Social consideration

If you are a security company you job have also a social aspects, you should also work to make the world a better place (sure to make business but “not being evil”). You cannot cheat the skills of the end users in evaluating security making fake misleading information.

You should do awareness on end users, to make them more conscious of security issues, giving them the tools to understand and decide themselves.

Hope you had fun reading this article and you made your own consideration about this.

Fabio Pietrosanti (naif)

ps Those are my personal professional opinion, let's speak about technology and security, not marketing.
pps i am not that smart in web writing, so sorry for how the text is formatted and how the flow of the article is unstructured!