cross pond high tech
159.9K views | +0 today
Follow
cross pond high tech
light views on high tech in both Europe and US
Your new post is loading...
Your new post is loading...
Rescooped by Philippe J DEWOST from Digital Sovereignty & Cyber Security
Scoop.it!

There's a Jailbreak Out for all Versions of iOS from 11 to 13.5, the current release.

There's a Jailbreak Out for all Versions of iOS from 11 to 13.5, the current release. | cross pond high tech | Scoop.it

Over the years, Apple has made it prohibitively difficult to install unapproved software on its locked-down devices. But on Saturday, a hacker group called Unc0ver released a tool that will "jailbreak" all versions of iOS from 11 to 13.5. It's been years since a jailbreak has been available for a current version of iOS for more than a few days—making this yet another knock on Apple's faltering security image.

Unc0ver says that its jailbreak, which you can install using the longtime jailbreaking platforms AltStore and Cydia (but maybe don't unless you're absolutely sure you know what you're doing), is stable and doesn't drain battery life or prevent use of Apple services like iCloud, Apple Pay, or iMessage. And the group claims that it preserves Apple's user data protections and doesn't undermine iOS' sandbox security, which keeps programs running separately so they can't access data they shouldn't.

"This jailbreak basically just adds exceptions to the existing rules," Unc0ver's lead developer, who goes by Pwn20wnd, told WIRED. "It only enables reading new jailbreak files and parts of the file system that contain no user data."

Philippe J DEWOST's insight:

The cat and mouse game around Apple's iOS closed garden has resumed and this time it means something again.

Philippe J DEWOST's curator insight, May 26, 2020 4:31 PM

Impressive exploit given Apple's increased fortress walls thickness. Yet (why) should you jailbreak ?

Scooped by Philippe J DEWOST
Scoop.it!

"Security is a tax on the honests" - Time to review Bruce Schneier USI 2013 keynote

Society doesn't work without trust

Human being is the only species with trust. We trust hundreds of strangers without even thinking about it.

 

How do we enable trust?

 

How does security enable trust. How do we induce trust?

  • Trusting friends is about who they are as persons.
  • Trusting strangers is about their actions

 

Trust: confidence, consistence, compliancy. It's about cooperation.

  • We trust people, companies and systems
  • We trust systems to produce expected behaviors

 

All complex ecosystems require cooperation. In any cooperative system, there is a way to subvert the system for personal interests.

 

These are called defectors in game theory. They are parasites. They can survive if they are contained. If too many parasites the body dies and the parasites die too.

 

Society doesn't work if everybody steals. Security can be defined as a tax on the honests.

 

Social species: individual competition plus group competition.

 

Security is to keep defection level at an acceptable minimum that is not zero.

 

NSA defector Edward Snowden raises moral debates but the point is that he is a defector. How group enforce the norm. Even mafia groups.

It is about societal pressure.

 

4 types of societal pressure

 

  1. moral: we don't steal because we know stealing is wrong.
  2. reputation: also in our heads but link to other's reactions. Humans are the only species to transmit reputation.
    Experiment: coffee machine + honesty box. Putting a photograph of a pair of eyes in the box bottom decreased the cheat rate dramatically
  3. laws: formalizing reputation, and focusing only on penalties (because of the cost implied by rewarding the majority of honest people). With exceptions in the shape of tax breaks
  4. technology: security systems. Door locks, alarms, ... Some of them extending globally. ATM cards are protected globally.

 

Example: eBay feedback mechanism is a reputational security system that worked remarkably for years as the main security system.

 

How does technology affects us?

Technology is what allows society to scale. It is neutral.

Filesharing: social pressure vs technology

Attackers have a first mover advantage and are more adaptive.

 

Mid 90's Internet going commercial: hackers used it immediately while it took 10 years to the police to figure out how to address it

Such delay is the main security gap

 

Our society is at a point where technology is faster than social changes which means that the security gap widens.

Before: buy this and you'll be safe

Now: when you've been attacked, please talk to us and we'll help

 

It's the antivirus history

Smart paradigm: detect unknown viruses including false positives

Stupid paradigm: check for signatures and update once or twice a day

 

The stupid paradigm seems to have won.

 

So technology will always favor defectors? True, but large organizations can now use technology in a much more effective manner.

Our society has the most technology and the largest institutions.

 

The battle is amplifying between agile defectors and slower yet more effective institutions. Losers are those of us in the middle.

 

To him it is not even clear how there is a balance nor how it will evolve.

 

As a conclusion

 

  1. there will always be defectors
  2. ourselves are not 100% cooperative, we all defect some time in a way
  3. law of diminishing returns
  4. there are good and bad defectors and history decided afterwards. That will be the case for Edward Snowden
  5. society need defectors. This is how we evolve. Defectors are at the forefront of social change: freeing the slaves, giving women voting rights

 

Philippe J DEWOST's insight:

Digiworld Summit 2016 is on "The Digital Trust Economy" - Time to remember Bruce Schneier's remarkable words of wisdom at USI 3 years ago - I have added my on the fly notes to the video link for those who prefer reading

Philippe J DEWOST's curator insight, November 15, 2016 2:01 AM

Digiworld Summit 2016 is on "The Digital Trust Economy" - Time to remember Bruce Schneier's remarkable words of wisdom at USI 3 years ago - I have added my on the fly notes to the video link for those who prefer reading

Scooped by Philippe J DEWOST
Scoop.it!

(Xcode)Ghost in the Machine: Apple, Developers Unwittingly Aid App Store Malware

(Xcode)Ghost in the Machine: Apple, Developers Unwittingly Aid App Store Malware | cross pond high tech | Scoop.it

Tens, if not hundreds of thousands of non-jailbroken devices are believed infected after a Trojan compiler malware struck in China.


It involves a maliciously modified version of the XCode integrated development environment (IDE) -- a nasty trick that places it among a family of malware known as "compiler malware".  While not a wholly new strategy, this is the first time that we've seen proof of such a strategy being used to target the iOS crowd.  It's also remarkable in its ability not only to threaten users of non-jailbroken devices but every version of iOS, as well.


And by the looks of it, it's a very succesful indeed as it in effect transforms Apple's walled garden and singular source -- an approach that for so long helped to secure Apple's userbase -- into a digital weapon to attack users.  After all developers trust XCode -- they have to because they have no other choice.  But if they get their copy of Apple's software from a third party (as many even in the U.S. do) they may find their apps secretly Trojanized.


And to make matters worst, in this case Apple is the Trojan dealer, not some sketchy piracy site.  iOS users trust the App Store -- because they have to.  Officially, Apple contends any other source of apps for the iPhone is illegal.  But in this recent breach Apple was very cleverly -- and some would say alarmingly easily -- tricked into distributing malware to 25,000+ iPhone owners.

Philippe J DEWOST's insight:

Babel minute 6 : Very interesting piece putting Apple iOS security in context, and explaining what lead Apple to currently clean its Appstore from infected apps.

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Does your Heartbleed ?

Does your Heartbleed ? | cross pond high tech | Scoop.it

"The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop communications, steal data directly from the services and users and to impersonate services and users.

 

Basically, an attacker can grab 64K of memory from a server.  The attack leaves no trace, and can be done multiple times to grab a different random 64K of memory.  This means that anything in memory -- SSL private keys, user keys, anything -- is vulnerable.  And you have to assume that it is all compromised.  All of it.

"Catastrophic" is the right word.  On the scale of 1 to 10, this is an 11.

Philippe J DEWOST's insight:

I have been used to see BT's Security Chief more softtoned. This OpenSSL bug must be very serious.

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Hackers allegedly exploit Snapchat security hole and leak 4.6m usernames and phone numbers online

Hackers allegedly exploit Snapchat security hole and leak 4.6m usernames and phone numbers online | cross pond high tech | Scoop.it
If you're a Snapchat user, then you might be interested to know that someone may have found a way to save the usernames and phone numbers for 4.6 million accounts. The website SnapchatDB.info ...
Philippe J DEWOST's insight:

Content vanishes (supposedly) yet identity seems more resilient (and less protected)

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

'Biggest ever attack' slows internet

'Biggest ever attack' slows internet | cross pond high tech | Scoop.it

The internet around the world has been slowed down in what security experts are describing as the biggest cyber-attack of its kind in history.

A row between a spam-fighting group and hosting firm has sparked retaliation attacks affecting the wider internet.

It is having an impact on popular services like Netflix - and experts worry it could escalate to affect banking and email systems.

Five national cyber-police-forces are investigating the attacks.

Philippe J DEWOST's insight:

Dooo yoouu feeeel the sloooow doooown?

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

how to check if your Apple device UDID has been compromised by the AntiSec leak

how to check if your Apple device UDID has been compromised by the AntiSec leak | cross pond high tech | Scoop.it
If you're worried that you might own one of the 1 million Apple devices that have had their UDIDs leaked by AntiSec, reportedly from a breach of an FBI agent's laptop, our rockstar ...
No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

DNS-over-HTTPS will eventually roll out in all major browsers, despite ISP opposition

DNS-over-HTTPS will eventually roll out in all major browsers, despite ISP opposition | cross pond high tech | Scoop.it

All six major browser vendors have plans to support DNS-over-HTTPS (or DoH), a protocol that encrypts DNS traffic and helps improve a user's privacy on the web.

The DoH protocol has been one of the year's hot topics. It's a protocol that, when deployed inside a browser, it allows the browser to hide DNS requests and responses inside regular-looking HTTPS traffic.

Doing this makes a user's DNS traffic invisible to third-party network observers, such as ISPs. But while users love DoH and have deemed it a privacy boon, ISPs, networking operators, and cyber-security vendors hate it.

A UK ISP called Mozilla an "internet villain" for its plans to roll out DoH, and a Comcast-backed lobby group has been caught preparing a misleading document about DoH that they were planning to present to US lawmakers in the hopes of preventing DoH's broader rollout.

However, this may be a little too late. ZDNet has spent the week reaching out to major web browser providers to gauge their future plans regarding DoH, and all vendors plan to ship it, in one form or another.

Philippe J DEWOST's insight:

Moving up the stack and the value chain.

Encrypting DNS traffic into HTTPS helps improve user's #privacy on the Internet, and this rather technical piece explains how to activate it in most major browsers, except Apple's Safari.

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

University of Cambridge study finds 87% of Android devices are insecure

University of Cambridge study finds 87% of Android devices are insecure | cross pond high tech | Scoop.it

It's easy to see that the Android ecosystem currently has a rather lax policy toward security, but a recent study from the University of Cambridge put some hard numbers to Android's security failings. The conclusion finds that "on average 87.7% of Android devices are exposed to at least one of 11 known critical vulnerabilities."

Data for the study was collected through the group's "Device Analyzer" app, which has been available for free on the Play Store since May 2011. After the participants opted into the survey, the University says it collected daily Android version and build number information from over 20,400 devices. The study then compared this version information against 13 critical vulnerabilities (including the Stagefright vulnerabilities) dating back to 2010. Each individual device was then labeled "secure" or "insecure" based on whether or not its OS version was patched against these vulnerabilities or placed in a special "maybe secure" category if it could have gotten a specialized, backported fix.

Philippe J DEWOST's insight:

OEMs seems to be the core issue while Google's own Nexus hardware  looks more secure (or less vulnerable depending on how you look at this)

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

USB has a huge security problem that could take years to fix

USB has a huge security problem that could take years to fix | cross pond high tech | Scoop.it

In July, researchers Karsten Nohl and Jakob Lell announced that they'd found a critical security flaw they called BadUSB, allowing attackers to smuggle malware on the devices effectively undetected. Even worse, there didn't seem to be a clear fix for the attack. Anyone who plugged in a USB stick was opening themselves up to the attack, and because the bad code was residing in USB firmware, it was hard to protect against it without completely redesigning the system. The only good news was that Nohl and Lell didn't publish the code, so the industry had some time to prepare for a world without USB.

"YOU HAVE TO PROVE TO THE WORLD THAT IT'S PRACTICAL."

 

As of this week, that's no longer true. In a joint talk at DerbyCon, Adam Caudill and Brandon Wilson announced they had successfully reverse-engineered BadUSB, and they didn't share Nohl and Lell's concerns about publishing the code. The pair has published the code on GitHub, and demonstrated various uses for it, including an attack that takes over a user's keyboard input and turns control over to the attacker. According to Caudill, the motive for the release was to put pressure on manufacturers. "If the only people who can do this are those with significant budgets, the manufacturers will never do anything about it," he told Wired's Andy Greenberg. "You have to prove to the world that it’s practical, that anyone can do it."

Philippe J DEWOST's insight:

Repeat after me : "I will not accept any USB drive from strangers"

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

TidBITS: How to Protect Your iCloud Keychain from the NSA

TidBITS: How to Protect Your iCloud Keychain from the NSA | cross pond high tech | Scoop.it

Apple has released a massive update to its “iOS Security” white paper for IT professionals. It contains more information on iOS security than Apple has ever shared publicly before, including extensive details on Touch ID, Data Protection, network security, application security, and nearly all security-related features, options, and protective controls.

For the first time, we have extensive details on iCloud security. For security professionals like myself, this is like waking up and finding a pot of gold sitting on my keyboard. Along with some of the most impressive security I’ve ever seen, Apple has provided a way to make it impossible for agencies like the NSA to obtain your iCloud Keychain passwords.

Philippe J DEWOST's insight:

This is getting very serious even if I start worrying for Dashlane

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Researchers can slip an undetectable trojan into Intel’s Ivy Bridge CPUs

Researchers can slip an undetectable trojan into Intel’s Ivy Bridge CPUs | cross pond high tech | Scoop.it

Scientists have developed a technique to sabotage the cryptographic capabilities included in Intel's Ivy Bridge line of microprocessors. The technique works without being detected by built-in tests or physical inspection of the chip.

The proof of concept comes eight years after the US Department of Defense voiced concern that integrated circuits used in crucial military systems might be altered in ways that covertly undermined their security or reliability. The report was the starting point for research into techniques for detecting so-called hardware trojans. But until now, there has been little study into just how feasible it would be to alter the design or manufacturing process of widely used chips to equip them with secret backdoors.

 

In a recently published research paper, scientists devised two such backdoors they said adversaries could feasibly build into processors to surreptitiously bypass cryptographic protections provided by the computer running the chips. The paper is attracting interest following recent revelations the National Security Agency is exploiting weaknesses deliberately built-in to widely used cryptographic technologies so analysts can decode vast swaths of Internet traffic that otherwise would be unreadable.

Philippe J DEWOST's insight:

Oops

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

SSH Backdoors Found in Barracuda Networks Gear

SSH Backdoors Found in Barracuda Networks Gear | cross pond high tech | Scoop.it

A variety of the latest firewall, spam filter and VPN appliances sold by Campbell, Calif. based Barracuda Networks Inc. contain undocumented backdoor accounts, the company disclosed today. Worse still, while the backdoor accounts are apparently set up so that they would only be accessible from Internet addresses assigned to Barracuda, they are in fact accessible to potentially hundreds of other companies and network owners.


Barracuda’s hardware devices are broadly deployed in corporate environments, including the Barracuda Web Filter, Message Archiver, Web Application Firewall, Link Balancer, and SSL VPN. Stefan Viehböck, a security researcher at Vienna, Austria-based SEC Consult Vulnerability Lab., discoveredin November 2012 that these devices all included undocumented operating system accounts that could be used to access the appliances remotely over the Internet via secure shell (SSH).

 

Viehböck found that the username “product” could be used to login and gain access to the device’s MySQL database (root@localhost) with no password, which he said would allow an attacker to add new users with administrative privileges to the appliances. SEC Consult found a password file containing a number of other accounts and hashed passwords, some of which were uncomplicated and could be cracked with little effort.

Philippe J DEWOST's insight:

Oops. Looks like some have been around for almost 10 years...

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Babel phish: In which languages are internet passwords easiest to crack?

Babel phish: In which languages are internet passwords easiest to crack? | cross pond high tech | Scoop.it
In which languages are internet passwords easiest to crack?

DESPITE entreaties not to, many people choose rather predictable passwords to protect themselves online. "12345"; "password"; and the like are easy to remember but also easy for attackers to guess, especially with programs that automate the process using lists ("dictionaries") of common choices. Cambridge University computer scientist Joseph Bonneau has recently published an analysis of the passwords chosen by almost 70m (anonymised) Yahoo! users. One interesting result is shown below. The chart shows what percentage of accounts could be cracked after 1,000 attempts using such a dictionary. Amateur linguists can have fun speculating on why the Chinese do so well and the Indonesians do not. But one particularly interesting twist is how little difference using language-specific dictionaries makes. It is possible to crack roughly 4% of Chinese accounts using a Chinese dictionary; using a generic dictionary containing the most common terms from many languages, that figure drops only slightly, to 2.9%. Speakers of every language, it seems, have fairly similar preferences.
No comment yet.