511 Followers
56 Following
704 Posts
A scrappy group of folks focused on metadata security and privacy. Builders of PGPP mobile privacy, Multi-Party Relay, and Booth metadata-secure video conferencing. Most posts by Barath.
invisv.comhttps://invisv.com
booth.videohttps://booth.video

Unfortunately we are shutting down PGPP and Relay service by mid-June due to technical issues outside of our control. We hope to offer these services in a different form again in the future.

https://invisv.com/articles/service_shutdown.html

PGPP and Relay Shutdown

PGPP and Relay Service Shutdown.

invisv.com

What happens when we can *only* see the world through the lenses our technologies afford us?

What are the risks of doing so?

How can we build better tools -- not machines -- that enable human-scale understanding and interaction with each other and the complex, nuanced, nebulous reality we actually live in?

That's what this essay explores.

The story of the industrial revolution was one of using technology to control nature and structure society. We shaped the world with our tools, and in turn they shaped us and society with it.

Computational technologies, for the last few decades, have taken that a step further, and made it so we see the world through the lens of our tools.

In previous threads, I've written about how the security community has been able to move beyond "rationalist" ways of looking at systems, and even beyond the nihilism that comes from realizing that everything is potentially insecure, to a recognition of context and nuance and practicality.

https://ioc.exchange/@invisv/109740474201888576

What if we apply that thinking more broadly, to the way we use technology in society?

INVISV (@[email protected])

Some security thoughts on a super strange topic: how rationalists and nihilists have it wrong, and why the infosec community is ahead of the curve. This is going to be a weird thread tying together an epic James Mickens USENIX Security keynote, Ken Thompson's classic Turing Award speech, Chapman's insights on the failure of modernity and rationalism and postmodernity, and more. So, let's begin.

IOC.exchange

New long essay from me and Bruce that we've been working on for over two years. It's tricky to even summarize -- beyond saying that it's about the past, present, and ideal future of technology in society -- but I'll try to do so in the following thread. First, the link:

https://www.belfercenter.org/publication/seeing-data-structure

Seeing Like a Data Structure

Our data-centric way of seeing the world isn't serving us well. Barath Raghavan and Bruce Schneier argue that we need new socio-technical systems that leave room for the inherent messiness of reality.

Belfer Center for Science and International Affairs

From a post I just made elsewhere, about Recall:

Because Recall is "default allow" (it relies on a list of things not to record) ... it's going to vacuum up huge volumes and heretofore unknown types of data, most of which are ephemeral today. The "we can't avoid saving passwords if they're not masked" warning Microsoft included is only the tip of that iceberg. There's an ocean of data that the security ecosystem assumes is "out of reach" because it's either never stored, or it's encrypted in transit. All of that goes out the window if the endpoint is just going to ... turn around and write it to disk. (And local encryption at rest won't help much here if the data is queryable in the user's own authentication context!)

Put another way: no one has been writing their apps or libraries assuming that this data might be captured somewhere. Some suuuuper deep assumptions about that will only come to light once they've been painfully exploited - and may take a ton of time to remediate.

Most {organizational, ecosystem, societal} threat models don't include "run infostealers on steroids on every endpoint that anyone in the user's authentication context can query".

Ransomware of unprecedentedly juicy exfil (enabled by maliciously configuring it to strip out any "do not record" exceptions for a while) will have a field day. PCI / GDPR / etc implications are mind-boggling.

And Recall's users and Microsoft are going to learn all this the hard way.

We are now a few weeks into our trial of INVISV Relay in Vivaldi Privacy Guard.

How is the service working for you? Let us know -- click the Privacy Guard icon in the toolbar and open the survey, or go directly to the survey with the link below.

https://vivaldi.com/bk/shield-survey

Privacy Guard Survey

Turn data collection into an experience with Typeform. Create beautiful online forms, surveys, quizzes, and so much more. Try it for FREE.

The FCC announces it has fined wireless carriers for illegally sharing access to customers’ location information without consent and failing to protect that information against unauthorized disclosure. Sprint and T-Mobile – which have merged since the investigation began – face fines of $12+ million and $91 million, respectively. AT&T being fined $57+ million and Verizon told to pay nearly $47 million.

I implemented Ken Thompson’s Reflections on Trusting Trust (1984 Turing Award Lecture) compiler #backdoor for the GNU Compiler Collection (GCC). The backdoor maintains persistence by re-injecting itself to any new versions of the compiler built. The secondary payload modifies a test application by adding a backdoor password to allow authentication bypass:

$ cat testapp.c
#include <string.h>
#include <stdio.h>
#include <stdlib.h>

int main(int argc, char **argv)
{
if (argc == 2 && !strcmp(argv[1], "secret"))
{
printf("access granted!\n");
return EXIT_SUCCESS;
}
else
{
printf("access denied!\n");
return EXIT_FAILURE;
}
}
$ gcc -Wall -O2 -o testapp.c -o testapp
$ ./testapp kensentme
access granted!
$

I spent most time (around two hours) writing the generalized tooling that produces the final quine version of the malicious payload. Now that this is done, the actual code can be adjusted trivially to exploit more target code without any need to adjust the self-reproducing section of the code. This method of exploitation could be extended to target various binaries: SSH Server, Linux Kernel, Setuid binaries and similar. While itself written in C, the secondary payloads can target any programming languages supported by GCC.

It should be noted that GCC build checks for malicious compiler changes such as this. This check can – of course – also be bypassed. However, most serious projects have measures in place to avoid hacks of this nature.

Some links:
- Ken Thompson's "Reflections on Trusting Trust" paper: https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf
- David A. Wheeler: "Fully Countering Trusting Trust through Diverse Double-Compiling (DDC) - Countering Trojan Horse attacks on Compilers" https://dwheeler.com/trusting-trust/

#hacking #exploitdevelopment #kenthompson #infosec #cybersecurity @vegard

Seeing like a CEO

drafts @ interfluidity