Showing posts with label backdoors. Show all posts
Showing posts with label backdoors. Show all posts

Thursday, April 17, 2014

Kill switch your smartphone

Read:
Kill switches are originally intended for use as a remote method of wiping data off a smart device remotely. But history has shown that if you have a kill switch installed, if discovered by hostile parties can be used against you. If an attacker manages to find a way to send the correct command to activate the kill switch, it might disrupt or even endanger whomever owns this kill switch (imagine if you were to plant a remote kill switch into smart devices and these smart devices have some sort of link to life support systems for health patients, that would be really dangerous).

Remote wiping implementations are not so straightforward in it's designs and implementations. One have to consider the fields of economics, politics, social behaviours and most importantly, the technical side of computer security.

Relating to the technical side of computer security, some remote wipe providers may offer some form of strong symmetric key or PKI infrastructure to encrypt the communication between your smart phone and the remote command tool to send the kill signal, but what is going to protect these encryption keys or passwords from falling into the wrong hands ?

Once you have given someone the access to remotely send commands to your own system, you have effectively lost control over your system. That is the basis of computer security: which is to secure your system and prevent yourself from losing control.

For the economical, social and political side of matters, who truely owns the smart device ? Is the person who bought and signed the contract for the smart device the true owner of the device ? Are there political motivations for inserting political and governmental backdoors via the remote kill switch ? Are the service providers and software providers trying to gather more user data some mechanism in the remote kill switch for their own benefits ? There are much more to consider than the outright "benefit" of simply remote wiping your smart devices if it lands in the wrong hands.

Who would know if some malicious employees or someone within the the company or organization whom you have given remote wipe command access to might not intentionally or accidentally wipe your smart device or use the security loophole(s) of the remote kill switch to remote control your smart device ?

An alternative to using a blackbox style remote kill switch which you have no access or control over the source codes and mechanisms is to look for open source alternatives which you can review the source codes to ensure that there are no backdoors in the remote kill switch and the mechanisms in place to transfer the command to remotely kill a device is sent our via secure and conscious means. The problem with such an open source implementation is not everyone knows about computer security and how to evaluate codes to ensure that the codes and kill switch mechanics are safe. People are likely to simply purchase or subscribe to a kill switch without proper inspection and trust it which can be detrimental to one's own privacy and security.

In essence, deliberately introducing a loophole (remote kill switches are considered a deliberate loophole in CS field) into a system degrades it's overall security regardless of the intention or purpose.

Here are a few tips to secure your smart devices:
  • Never leave them on the table or chair or leave them unattended even for a few minutes if these devices contain personal data (phone contacts, email, address book, PIN managers, bank transaction applications ... etc).
  • Filesystem / Volume encryption.
  • Always use a Password Manager with a Master Password and never write them down on paper or Notepad.
  • Never share passwords.
Afterall, the best device security is yourself being cautious and aware of the surrounding. Depending on some loophole technology to remote kill your device is the worse idea.

Monday, July 4, 2011

VSFTPD Backdoored

Read:

This is a very bad security mismanagement on the source code part. How did a backdoor slip into the master branch of the source codes ? No clues were given for now.

The main lesson for the day, always check the GPG signature file. ALWAYS !!!

Tuesday, September 28, 2010

Wiretapping in an Illegal way.

Read:
Imagine installing backdoors inside communications. The problem is that any sort of backdoor, no matter how secure, when a hacker finds it, it's sooner or later gonna be GG. Clipper chips... whatever have you, do not think that "SECURITY BY OBSCURITY" is gonna do any good. 


Modifying all software programs and protocols including F2F, P2P ...etc.. to have a backdoor or unscrambling capabilities is also absurd. It makes the programs and protocols even more insecure.

Most government softwares are using those tools developed by the public domain and outsourced. Imagine one of these loopholes and backdoors slipping in. If they meant that ALL protocols and softwares have to provide loopholes, how would they feel if their softwares and protocols have to abide by the same rules and have loopholes and backdoors too ? That would be absurd isn't it ?

They need to have better judgments before making such absurd laws and rules. It would not only hurt others but themselves. 

Look at this points found in the article.

¶ Foreign-based providers that do business inside the United States must install a domestic office capable of performing intercepts.

¶ Developers of software that enables peer-to-peer communication must redesign their service to allow interception.


This is pretty bleak. Seems like the once infamously free nation is sinking into some kind of "Soviet style Iron-Curtain" rule where everything is controlled and no free will is allowed.

What if non-US developers are providing softwares, e.g. open source softwares hosted on Sourceforge or those free and open source hostings ? Are they gonna get the foreign government to arrest those 'dissident developers' and send them to US for torture ? Or maybe they would send out CIA operatives to those countries to execute them ? These are purely exaggerations but according to article here, the US Govt. could do it.

The main point is, stop making those stupid rules and returning to Clinton's clipper chip era or those past eras where encryption and security is only for the military and everyone else should suffer.

Security and Free-Will are everyone's birth rights. Stop taking away security from others. Stop removing free-will of others.