STE WILLIAMS

Apple REVEALS how it hands YOUR data to govt, says ‘We’re not Facebook’

The business case for a multi-tenant, cloud-based Recovery-as-a-Service solution

Apple has joined Facebook, Google, Microsoft, Twitter, and Yahoo!’s transparency club, releasing a detailed report on the numbers and types of requests for personal records it has received from law enforcement and government agencies around the world.

“We have reported all the information we are legally allowed to share,” the report, issued Tuesday, states, “and Apple will continue to advocate for greater transparency about the requests we receive.”


The report’s Account Information Requests table, below (click to make readable), lists the exact number of requests received, acted upon, and other details from the 31 countries from which Apple received such requests. “Some countries are not listed in this report,” a note reads, “because Apple has not received any information requests from the government there.”

Among the 31, only one country disallows companies from revealing the exact number of requests. Yes, you guessed right: the good ol’ U.S. of A.


Account Information Requests listing from Apple transparency report

“At the time of this report,” Apple notes, “the U.S. government does not allow Apple to disclose, except in broad ranges, the number of national security orders, the number of accounts affected by the orders, or whether content, such as emails, was disclosed. We strongly oppose this gag order, and Apple has made the case for relief from these restrictions in meetings and discussions with the White House, the U.S. Attorney General, congressional leaders, and the courts.”

Account requests, Apple says, commonly involve law enforcement asking for information regarding robberies or other crimes, as well as searches for missing persons or kidnapping victims.

“In very rare cases,” the report says about account requests, “we are asked to provide stored photos or email. We consider these requests very carefully and only provide account content in extremely limited circumstances.”

In the report, Apple manages the somewhat contortionistic feat of simultaneously patting itself on the back while sticking its thumbs in the eyes of such companies as Google, Facebook, Twitter, and the like. After saying that the privacy of their customers is “a consideration from the earliest stages of design for all our products and services” and that they “work hard to deliver the most secure hardware and software in the world,” the thumbs comes out:

Perhaps most important, our business does not depend on collecting personal data. We have no interest in amassing personal information about our customers. We protect personal conversations by providing end-to-end encryption over iMessage and FaceTime. We do not store location data, Maps searches, or Siri requests in any identifiable form. … Unlike many other companies dealing with requests for customer data from government agencies, Apple’s main business is not about collecting information.

In addition to the information on requests for account information, Apple also provides details on device requests, of which they say “the vast majority” relate to lost or stolen devices. “These types of requests frequently arise when our customers ask the police to assist them with a lost or stolen iPhone, or when law enforcement has recovered a shipment of stolen devices.”

Device Information Requests listing from Apple transparency report

Apple also notes that it has never received an order to release information under Section 215 of the USA PATRIOT* Act.

That section, under challenge by such civil liberties organizations as the EFF and the ACLU, allows the FBI – and who knows what other federal authorities – to obtain secret clearance from the FISA court to obtain information from a company about you and your activities, ostensibly to “to protect against international terrorism or clandestine intelligence activities.” The company must hand over that info to the investigators under a gag order that prevents them from ever informing you+world+dog that they even received the order.

“We would expect to challenge such an order if served on us,” Apple says. However, we may never know whether or not they were so served, or if they challenged such an order. Section 215 remains the law of the the land here in the good ol’ U.S. of A. ®

Bootnote

* Do know that the USA PATRIOT Act is so capitalized because its common name is an acronym for its full name: the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001.

5 ways to reduce advertising network latency

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/11/05/apple_transparency_report_sticks_thumb_in_eyes_of_google_facebook/

Make him a wiki he can’t refuse: MafiaLeaks takes on the Godfathers

Free Regcast : Managing Multi-Vendor Devices with System Centre 2012

An anonymous group of brave – some might say suicidal – Italians has set up MafiaLeaks, an information-gathering website modeled on its wiki namesake that invites tipsters to report members of the Cosa Nostra.

“There are fewer than 10 of us – with families. Everything we do to do with MafiaLeaks, we do after work, using money from our own pockets,” one told the BBC, under the understandable cloak of anonymity.


The website seeks intelligence from victims and informers who know of mafia activity. To report information, they’ll need to download and install online privacy tool Tor and, once the information has been sent in, it will only remain on the system for 20 days before being automatically purged.

Any data that comes it will be circulated among “trusted persons,” consisting of cops investigating organized crime, teams from existing anti-Mafia groups, and journalists to publicize any confirmed information.

The site is being run using Globaleak’s latest build of its distributed information-sharing system, so there’s no central server to hack, just lots of individual nodes. The open-source software, developed by European researchers independently from WikiLeaks, is used by whistleblowing wikis around the world.

The MafiaLeaks team needs volunteers to become “trusted people,” as well as help running the system. In a section of its website titled “We’re hiring!” the group said it is looking for individuals who have a working knowledge of the network analysis tool Xplico, but said the primary qualities required are “0% knowledge in Penetration Tests, 10% of knowledge in Vulnerability Assessment, 20% in Information Gathering and, 70% high ideals.”

A benefits package including life insurance or a tolerance for equine cranial bedmates isn’t mentioned. ®

Free Regcast : Microsoft Cloud OS

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/11/06/mafialeaks_web_informer/

Thales Helps Microsoft Launch BYOK (Bring Your Own Key)

Plantation, FL – November 6, 2013 – Thales, leader in information systems and communications security announces that its nShield hardware security modules (HSMs) have been deployed by Microsoft to provide enhanced security for Microsoft Rights Management service (Windows Azure RMS). The new online offering – a cloud-based digital rights management system – forms the core of a new secure collaboration service accessible from anywhere, by anyone and supporting a multitude of document formats.

Until now rights management has mainly focused on infrastructure deployed within the enterprise over which an organization had complete control. By shifting to a cloud-based model customers now have the ability to dramatically expand accessibility and ease of use – particularly when collaborating with parties outside their own network and across today’s highly dispersed organizations. However, the issue of control and security is still paramount.

The goal for any security-oriented cloud services is to convey confidence that sensitive data in the cloud is protected, confidence that different tenants are strongly segregated and that control over critical security assets such as cryptographic keys remains with the customer. Recognizing this, Microsoft went beyond simply using HSMs in the Windows Azure cloud to enhance the security of the RMS service by enabling customers to ‘bring your own key’ (BYOK). By using a Thales nShield HSM on-premise an organization can generate and securely transfer their critical Tenant Key (the customer’s master key) to Thales HSMs in Windows Azure where it is used to underpin the security of their RMS service. This gives organizations complete custody and visibility over the use of their master key and the reassurance that they can use the Microsoft service on their own terms.

Dan Plastina, Partner Group Program Manager, Microsoft says:
“The Microsoft Rights Management service helps customer safeguard their data, both inside and outside of the organization. As a result of our collaboration with Thales, our customers can generate and upload their own master keys to a cloud-based HSM and keep complete control over their keys, giving them confidence that their data is protected.”

Richard Moulds, vice president strategy at Thales e-Security says:
“The Windows Azure RMS service is a great example of where the unique properties of the cloud can be exploited to transform the usability and value of traditionally in-house security systems and therefore greatly promote their adoption. Innovative capabilities such as the ‘bring your own key’ philosophy and the use of HSMs can protect both the consumer and the cloud provider and build the confidence to trust the service with an organization’s most valuable assets. As organizations focus on moving their more sensitive data and applications to the cloud the issue of retaining control takes center stage and sound key management is an effective way of achieving that. The ability to release keys to cloud providers on a ‘need to use basis’ and to revoke them as necessary will be an increasingly powerful tool.”

Supporting resources:
Whitepaper: Hardware Key Management in the RMS Cloud www.thales-esecurity.com/msrms
Whitepaper: Microsoft Rights Management
http://blogs.technet.com/b/rms/archive/2013/07/31/the-new-microsoft-rights-m
anagement-services-whitepaper.aspx
RMS Team Blog:
http://blogs.technet.com/b/rms/archive/2013/08/29/the-new-microsoft-rms-is-l
ive-in-preview.aspx

About Thales e-Security
Thales e-Security is a leading global provider of data encryption and cyber security solutions to the financial services, high technology, manufacturing, government and technology sectors. With a 40-year track record of protecting corporate and government information, Thales solutions are used by four of the five largest energy and aerospace companies, 22 NATO countries, and secure more than 80 per cent of worldwide payment transactions. Thales e-Security has offices in Australia, France, Hong Kong, Norway, United States and the United Kingdom. www.thales-esecurity.com

About Thales
Thales is a global technology leader for the Aerospace Transportation and the Defence Security markets. In 2012, the company generated revenues of
€14.2 billion with 65,000 employees in 56 countries. With its 25,000 engineers and researchers, Thales has a unique capability to design, develop and deploy equipment, systems and services that meet the most complex security requirements. Thales has an exceptional international footprint, with operations around the world working with customers and local partners.

Positioned as a value-added systems integrator, equipment supplier and service provider, Thales is one of Europe’s leading players in the security market. The Group’s security teams work with government agencies, local authorities and civil operators to develop and deploy integrated, resilient solutions to protect citizens, sensitive data and critical infrastructure.

In the IT security market, the Group is one of the world leaders in cryptographic security solutions for critical government and military infrastructure, satellite constellations, enterprise customers and financial institutions. Thales’s unique positioning in the marketplace derives from its ability to address every link in the security chain and deliver end-to-end security and asset protection assurance.

Article source: http://www.darkreading.com/management/thales-helps-microsoft-launch-byok-bring/240163647

Visualization Engine Provides Security Insight

CHICAGO – November 5th – North Nine today announced updates to their SOLVE product. SOLVE (Simple On-Line Visualization Engine) allows users to see security threats as they occur, track malicious activity in real time and provides users with actionable data and intelligence so they can fight back. Major changes in this update include even faster performance and expanded reporting for Symantec Endpoint Protection (SEP). Conventus, a leading national security consultancy, will bring the product to market as the exclusive reseller.

SOLVE closes the gaps in enterprise security quickly and efficiently and connects directly to Symantec Endpoint Protection, Symantec Critical System Protection and Symantec Data Loss Prevention, and other security products to generate a comprehensive view of security. Without installing new hardware or manual copying, SOLVE consolidates security data to show a real time view and provide actionable data. Users can see if security products are properly configured and deployed in a visual interface, and can take a closer look at individual products through drill-down views.

The North Nine team improved SOLVE by expanding reporting capabilities for Symantec Endpoint Protection (SEP) as well as introducing a new feature that allows users to add notes to charts. The update also brings a new printer-friendly view for dashboards and even faster performance than previous versions.

“There is no extensive back-end infrastructure required, it’s easy to install, easy to configure, and infinitely easier to get the RIGHT data out in order to answer ‘big data’ questions” said Sarah Isaacs, Managing Partner of Conventus.

Conventus worked closely in conjunction with North Nine to provide tools that help identify suspicious behavior and illuminate security risks. A Symantec National Platinum Partner, Conventus specializes in endpoint and server security, compliance and data loss prevention. Thought leaders in cyber security, the firm’s management team has spoken and written widely on IT security.

To learn more about Conventus security solutions, visit www.conventus-sei.com

About Conventus Corporation

Conventus is a national information security consulting firm that protects companies from security attacks and data breaches. Founded in 2006, Conventus specializes in optimizing the performance and use of endpoint and server security software. The company also offers incident management as well as PCI, HIPAA, and SOX security compliance consulting. Conventus maintains close relationships as registered partners with several security software providers including Symantec, Palo Alto Networks (enterprise network firewalls), and Sourcefire (intrusion protection systems). Additionally, numerous Conventus senior consultants are nationally-recognized leaders in security program technologies and are actively involved with the Information Systems Security Association and (ISC)2, a global not-for-profit leader in educating and certifying information security professionals. In 2012, Conventus was ranked #581 overall and eighth in the Security sector of Inc. magazine’s sixth annual Inc. 500|5000 listing. For more information, visit http://www.conventus-sei.com or call 312.421.3270.

About North Nine, LLC.

North Nine, LLC. was founded to pursue a critical gap in information security, compliance and risk management: enable access to business platform data in the form of machine, user and application data. Collecting, organizing and analyzing business platform data is one of the key activities organizations are undertaking to get a real picture of the risk the business faces from its IT environment. By monitoring and analyzing everything from server security data to server health data to compliance completeness–and more–North Nine turns business platform data into valuable insights no matter what business you’re in. It’s what we call Business Platform Intelligence. North Nine was founded in 2012 and has two primary product families; the SOLVE platform for data visualization, analysis and reporting and the NorthStar platform for business platform intelligence. For more information, visit http://www.northnine.com

Article source: http://www.darkreading.com/management/visualization-engine-provides-security-i/240163648

Prototype Encyrpts Data Before Shipping It To The Cloud

Researchers at Georgia Tech have built a prototype that encrypts files before they are sent to the cloud for storage.

The so-called “CloudCapsule” system can be used with cloud storage services such as Dropbox and Google Drive for locking down files prior to their storage in the cloud and for accessing them without a proxy. The technology can be used for desktops, laptops, and mobile devices, but the researchers initially have built a prototype for just mobile devices.

“We thought its greatest utility would be in the mobile space,” given the explosion in BYOD, says Paul Royal, associate director of the Georgia Tech Information Security Center (GTISC), where the prototype was created.

“This lets us combine some of the reasonable process-isolation present in mobile OSes with a seamless and transparent way of encrypting data you want to place into the cloud,” he says.

It’s the classic conundrum with the cloud: balancing utility with security. According to a new report published today by GTISC, corporate information stored in the cloud is typically secured solely with what the cloud storage provider offers. And encrypting data in the cloud via private-key encryption typically makes the cloud less useful, the report says.

CloudCapsule basically uses a virtual machine instance that lets a user from the same machine go into encrypted mode and to access encrypted files stored in the cloud. The operating system and malware have no “knowledge” of the data, according to GTISC, nor can the cloud provider read the files.

“CloudCapsule is an interesting approach and from the details available … it seems specific to DHS, which may not be ideal for other users. A potential issue that enterprises might encounter is in the deployment,” says Paige Leidig, senior vice president at CipherCloud, a cloud security firm.

Leidig says CloudCapsule would be difficult to scale compared with a single gateway model–the approach CipherCloud takes–because it’s deployed on endpoints. “The other potential problem for the endpoint approach is key management — if the user loses the keys, they would need to be revoked and replaced, which adds more complexity, especially for large enterprises with hundreds of thousands of users,” Leidig said an email interview.

But searching encrypted information remains problematic. GTISC researchers also have been working on techniques for “searchable encryption” so users can more easily find their protected data and files in the cloud. “We are trying to design types of encryption that support … performance requirements” of real-world users, GTISC’s Royal says.

“You do need to encrypt data before it goes into the cloud, but you would still like to do basic keyword searches over that data. That’s something we’ve been working on at Tech,” he says. Striking a balance between securing the data and indexing or searching it is complicated, he says.

“There are going to be fundamental tradeoffs between security and efficiency. In some cases, there’s a desire not to introduce significant overhead, so for example in some cases, we are turning the problem on its head and asking a person who would use this in the real world what they consider acceptable performance,” he says.

[The cyberespionage gang out of China who recently hacked into media outlet networks is now using Dropbox and WordPress in its attacks rather than via traditional email phishing attacks and server compromise. See Dropbox, WordPress Used As Cloud Cover In New APT Attacks .]

Georgia Tech researchers also have built an email encryption prototype called “Very Good Privacy,” a more user-friendly option than the existing Pretty Good Privacy email encryption tool. Very Good Privacy software sits atop the user interface and can be used with cloud-based email services. The tool intercepts and encrypts the text as it’s typed in before it gets to the email service. “Plain text never gets entered into an application,” Royal says. But the look and feel of the process remains unchanged for the user, so it’s transparent, he says.

The full Georgia Tech Emerging Cyber Threats Report for 2014 is available here (PDF) for download.

Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.

Article source: http://www.darkreading.com/authentication/prototype-encyrpts-data-before-shipping/240163657

1,000 alleged paedophiles identified via 10-year-old Filipina CGI girl ‘Sweetie’

The alleged paedophile wanted 15 minutes of what he thought would be a 10-year-old naked Filipina girl giving him a sex performance in front of a webcam.

He didn’t want to pay too much, though.

The “girl” – a CGI character named “Sweetie” created by researchers from the Netherlands charity Terre des Hommes – asked for $15 (£9), but the alleged predator talked her down to $10 (£6).

Making Sweetie

A sample of the conversation was reproduced in the charity’s PDFwriteup of a mass paedophile sting undertaken to battle webcam sex tourism.

It took place on 26 April between a researcher, who posed as Sweetie using an application – “Sweetie1000” – that relies on cutting-edge, Hollywood-style animation, and the predator, identified as a 35-year-old father of two from Atlanta, Georgia, in the US.

The predator was only one of 1,000 identified by Terre des Hommes researchers after the alleged child abusers were caught in the act of soliciting webcam sex performances from Filipino children.

The number of alleged predators who have been identified is, in turn, only a small percentage of the 20,172 predators from 71 countries who responded to the researchers’ lure, asking for webcam sex performances.

The researchers identified the suspects using information available in public online databases and data provided by predators, they said:

No computer hacking or illegal methods were applied. Instead, we just asked predators to provide identifying information under the fictional pretext – a technique known as “social hacking.”

Four researchers spent a combined total of 1,600 hours over the course of 10 weeks posing as prepubescent Filipina girls in 19 public online chat rooms.

Details of the suspects’ identities and activities have been submitted to Interpol.

The researchers gave these details in an FAQ to depict how the extremely convincing character of Sweetie came to life:

First, her face and body were modeled to resemble a 10-year-old Filipina girl. In that model, specific points were marked at which her joins [sic] and muscles move. Then we used motion sensors to record the exact sequence of motions that a person performs while chatting with people online – typing, smiling, frowning, looking up, down, and side to side. Those motions were captured and recorded from a human model wearing motion sensors and the motion sequences were programed into an application that controls the way Sweetie moves on command. We used a control board that had pre-programmed motions and facial expressions, so while the researchers chatted with predators, predators would see Sweetie typing while the researchers typed to ensure precise timing.

Terre des Hommes’s research suggests that predators will pay between $10 and $100 per show, depending on whether transactions are made through a pimp or a middleman, how long the show lasts, and the nature of the performance.

The suspected predators will only be prosecuted if police manage to gather their own evidence.

The biggest problem in battling this type of child abuse is that police don’t investigate predation until a crime is reported, the charity says.

But in the case of webcam sex tourism, victims don’t usually report the crimes for a number of reasons, whether it’s financial dependency or that they’re trafficked slaves held captive in “dens” where they may also endure physical abuse and neglect, the charity says.

Often … children are intimidated and fearful of consequences or they and their families depend on the income generated through webcam sex performances.

How is this not entrapment?

Terre des Hommes explains:

[Avoiding entrapment] is done by using as little overt “influence” as possible and luring individuals rather than targeting them based on suspicion. Luring individuals with an opportunity to commit a specific crime is a passive method of identifying people who are already inclined to commit that crime.

For example, researchers lured individuals via chat names that suggested that they were prepubescent girls, the charity said:

The opportunity to commit a crime was presented when adults in chat rooms were faced with a supposed minor whom they had the option to respect or abuse. Individuals who contacted the supposed minor were presumed innocent until they actually committed a crime on their own volition.

Terre des Hommes regards individuals who initiate contact and request a sexual webcam show from someone claiming to be a child as predators actively attempting to abuse children.

Such individuals are, in fact, considered to be inclined or predisposed to committing the crime, the charity says.

I agree with Terre des Hommes.

Do you? Let us know in the comments section below.

Terres des Hommes is offering law enforcement agencies a toolkit that explains its method of finding and identifying online predators. It’s also offering operational Sweetie1000 software and training in its use.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/kLo8jMQnfpM/

Death threats sent to woman who dressed as Boston Marathon bombing victim for Halloween

Alicia Ann LynchFor Halloween, Alicia Ann Lynch, a 22-year-old US woman from Michigan, went to work dressed as a victim of the Boston Marathon bombings, clad in sneakers, running shorts, and a race number, splattered with fake blood.

Then, she tweeted and Instagrammed photos of herself.

The costume was, as she quickly admitted, tasteless.

The ensuing backlash, however, has been vicious.

BuzzFeed reached Ms. Lynch on the phone on Sunday.

She confirmed to the site that she has been fired and that both she and her family have received death threats:

I’ve had voicemails where they want to slit my throat and they want to hang me and tear off my face. … I’m just, like, ‘I don’t even know how to respond to this right now.’

Unfortunately, the infuriated online mob soon discovered that the young woman had once posted a photo of her driver’s license.

The mob then used that information to further attack Lynch, promising to anonymously send excrement through the mail, contacting her family, and posting nude photos and videos, allegedly of her, that were taken from Tumblr.

The mob found and disseminated her parents’ home phone number along with Ms. Lynch’s home address. They also tracked down what they thought was her employer and her father’s company.

Ms. Lynch told BuzzFeed that strangers reached out to her parents and told her best friend “they’re going to blow up her house and hang her child.”

Not all commenters were blood-crazed.

As BuzzFeed’s replicated tweets show, some commenters tried to get the mob to calm down and back off:

@HanzBuhnanz:
@SomeSKANKinMI You guys, stop. Cyber bullying another human being is not going to undo her actions. She has apologized.

Hannah@HanzBuhnanz:
@SomeSKANKinMI As someone who ran the marathon, I know that violent, angry responses are exactly what fueled the bombings to begin with.

Ms. Lynch is maintaining a positive attitude, telling BuzzFeed that she made a mistake but has no fears about getting rehired if future employers Google her:

Yeah, I don’t think I’ll have an issue with that. … It doesn’t really bother me. … I have nothing to hide. It happened, I made a mistake. I just have to learn from it. I’m not a terrible person.

As a Bostonian myself, and as somebody who has written up far too many (of course, even one would be too many) stories about cyber-bullied suicide victims, I side with the commenter who forgave Ms. Lynch:

@TheTwidster:
@SomeSKANKinMI As a Bostonian, I forgive you. I am glad that you have not killed yourself, and I seriously hope you learned your lesson.

I hope Ms. Lynch is right – I hope she can learn from this and move on.

Unfortunately, getting rehired won’t necessarily be all that easy.

Research has uncovered a discrepancy between what young people think is OK to post online and the high percentage of recruiters – 69% – who report finding candidates whom they wouldn’t let step through the door, thanks to social media evidence of drinking, drugs, bad-mouthing previous employers, lying on their resumes or a host of other sins.

Posting tawdry material online is career-threatening.

But posting an image of your driver’s license and personal information is just not necessary and could be dangerous.

Don’t do it, ever. Don’t hand the mob the tools it needs to target you or your loved ones.

Image of jack-o-lantern courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/mp9KdxDgGjs/

Anatomy of a file format problem – yet another code verification bypass in Android

Four months ago, the Android platform was stirred, though fortunately not too badly shaken in the end, by a pair of code verification holes.

Simply put, you could add malware to a legitimate app – one from the Play Store, if you liked, complete with icons, branding and reputation – in such a way that Android’s digital signature verification would consider it unaltered.

From the helpless user’s point of view, Google wouldn’t just fail to warn about the app possibly being dodgy, it would actively assert that it was the a validated and unaltered item from the original, legitimate vendor.

Google, developers, users: everyone lost out except the crooks.

Sloppy coding

Both of those earlier holes came about as a consequence of sloppy coding to do with Android Package (APK) files, the format used for delivering apps.

It turns out that there was a third bug of a similar sort, found at around the same time as the others, but only publicly patched this month, when the open source code from Android 4.4, better known as Kit Kat, was released.

→ Android and iOS low level code maestro Jay Freeman (better known as @saurik), amongst others, found this bug mid-2013 but forbore from writing it up until the patch was officially out.

It’s the sort of mistake that a company with the self-professed security smarts of Google really ought not to have made, not least in one of Android’s much-vaunted security linchpins, namely the compulsory validation of digital signatures when installing new software.

So this is a story worth telling, because it is a powerful reminder of how backward compatibility, multi-language programming, and the re-use of code libraries not designed with security in mind can get in the way of correctness.

Here’s what went wrong.

The how and why of APK files

For reasons I don’t know, but presumably because the format was well-established, Google settled on ZIP files as the storage containers for Android Packages (APKs).

APKs are just ZIPs containing a special subdirectory, called META-INF, that holds signed checksums for all the other files in the package.

Unfortunately, the ZIP file format came out in the late 1980s, aimed at convenience and efficiency, not security.

→ The reason that APKs need a special META-INF directory for cryptographic metadata is that ZIP files were designed to support only the most basic non-cryptographic validation, such as checking that a shareware download wasn’t corrupted by your 0.0012 Mbit/sec modem. Verifying the identity of the original creator was not a consideration.

A ZIP file, also known as an archive, is effectively a special-purpose filing system.

ZIPs can store multiple files in a directory structure, with each file and directory individually named, timestamped, compressed and, optionally (albeit insecurely) encrypted.

Today, of course, despite the giant size of many software distributions, removable storage devices are usually larger than the files you’re downloading – OS X Mavericks, at a whopping 5.3GB, for example, fits easily onto all but the very cheapest and smallest USB sticks on the market.

But that wasn’t true in the 1980s and 1990s, when downloads often ran to several megabytes, while a regular floppy diskette could store just 720KB.

ZIP files, therefore, were not only compressed to save space, but also laid out so that they could easily be split across multiple diskettes.

Better yet, they could be restored – file by file, if necessary – without requiring you to insert every diskette one-by-one to work out the directory structure before starting.

As a result, the ZIP format is deliberately redundant, and its internal directory structure is recorded twice.

The file and directory names are stored first as a series of individual local headers interleaved with the data for each file, and then stored again in the curiously-named central directory tacked on the end.

By keeping the central directory to the end, the ZIP program never needs to ask you to reinsert an earlier floppy disk to rewrite it when building the archive.

And by interleaving file headers throughout, ZIP files can still be recovered, at least in part, even if the last floppy in the set is lost or damaged.

The downside of redundancy

This sort of redundancy is handy in an emergency, but can be dangerously distracting during routine operations.

There’s a famous nautical adage (or if there isn’t, there should be) that says, “When you set to sea, take three chronometers. If one of them breaks, throw one of the remaining two overboard.”

I made that up, but the reasoning is sound: with three clocks, you still have a majority vote if one goes wrong.

But if you have two, and they read differently, what are you going to do to resolve the dilemma?

You face a similar problem with ZIP file metadata.

What Google really ought to do – or ought to have done when the first two APK holes surfaced – is to break this dilemma permanently by treating APK files in one or both of these ways:

  • Pick one of the two file metadata systems in the ZIP format, and use it exclusively when decompressing APKs, deliberately removing or avoiding any library code that might read and rely on the alternative metadata and thus harm security.
  • As part of validation, before trusting any file objects inside an APK, check that the two directory structures are identical, giving the same filenames, timestamps, sizes, and so forth. If not, assume corruption or malevolence.

The latest flaw

The ZIP file ambiguity exploit patched in Android 4.4 abuses the filename length field in a ZIP file’s metadata.

This tells you how many bytes to skip forward in the local file header to get past the filename in the header itself to the actual file data, and how many bytes to skip forward in the central directory to get past the filename to the next directory entry. (There is no file data in the central directory, only file metadata.)

You can probably guess what’s coming next.

The Java code in Android 4.3 and earlier that extracts the file data to verify it uses the filename length from the central directory.

But the C code that extracts the file to install and execute it uses the filename length in the local header.

So you can deliberately craft a a file that is laid out as shown above, with the local header filename length deliberately set so large that it points past both the filename and the original file data.

This presents one file to the verifier, and a different file to the operating system loader.

Very simply put: the loader can be fed malware but the verifier will never see it.

How can that work?

At this point you may be wondering how this subterfuge can possibly work, unless the dodgy file is the last in the archive and Android doesn’t check for a neat conclusion to its file-by-file processing of the APK.

After all, in the above diagram, surely the C code will see an absurd and deeply suspicious filename?

The filename length is so big that the C code will see the real filename with the raw binary content of the original file (shaded green) tacked on the end, and that won’t match anything in the META-INF security database.

And surely the Java code that does the verification will get lost when moving forward in the APK?

The data that follows the original file data is supposed to be the next local file header, recognisable by its PKx3x4 “magic” string, but in our example, the file data is followed by yet more data – the imposter file (shaded pink).

Saurik explains this very simply in his coverage of the bug: the C code ignores the filename from the local header; and the Java code uses file offsets from the central directory to navigate through the archive.

So neither of the giveway “something’s gone wrong” conditions described above arises.

→ The central directory includes a file offset for each local header, so that once the Java code has finished verifying a file, it can jump directly to the next one, thus avoiding the local header data that would cause it to skip forward incorrectly. The imposter data, squeezed between the legitimate file and the next local header, is simply ignored.

What to do

Google doesn’t seem to have gone for a holistic fix, such as either or both of those listed above.

But the Android maintainers have made a small but apparently effective adjustment by altering the Java-based validation code so that it follows a similar path through the data to that used by the loader.

By forcing the Java code to rely on the local header data to find its way to the file data, the verifier will check what the loader is going to run, not merely what an attacker wants it to see.

I still think that disallowing APK files altogether if they contain discrepancies between the two streams of file metadata would be a more solid and satisfying approach, but we shall have to take what Google has given us.

And given the comment in the old code noting that the “extra field” data could vary from the central directory (the cause of the previous verification hole), you’d have thought that the programmer might have thought ahead and applied the same logic proactively to the filename length.

But the laconic variable name localExtraLenOrWhatever in the old code suggests that the programmer didn’t have security on his mind when he wrote that snippet, so the proactive fix didn’t happen, thus retaining the filename length vulnerability.

So, until your device gets upgraded to Android 4.4, you’re at risk.

We offer these three tips:

  • Stick to the Google Play Store, where we hope that Google has taken a holistic approach and is rejecting submissions with fishy-looking metadata in their APK files.
  • Use an Android anti-virus (yes, Sophos just happens to have a good one, and it’s free from the Play Store) that can scan newly-installed packages automatically before you run them.
  • If you’re a programmer, don’t follow Google’s lead here – code with security on your mind all the time.

Neither the Play Store nor your favourite anti-virus can guarantee to keep all unwanted apps off your device, but together they will come close.

sav-for-android-ad-480

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/6UVLwRO_RdM/

Apple REVEALS how it slips fanboi data to govt, says ‘we’re better than Facebook, though’

The business case for a multi-tenant, cloud-based Recovery-as-a-Service solution

Apple has joined Facebook, Google, Microsoft, Twitter, and Yahoo!’s transparency club, releasing a detailed report on the numbers and types of requests for personal records it has received from law enforcement and government agencies around the world.

“We have reported all the information we are legally allowed to share,” the report, issued Tuesday, states, “and Apple will continue to advocate for greater transparency about the requests we receive.”


The report’s Account Information Requests table, below (click to make readable), lists the exact number of requests received, acted upon, and other details from the 31 countries from which Apple received such requests. “Some countries are not listed in this report,” a note reads, “because Apple has not received any information requests from the government there.”

Among the 31, only one country disallows companies from revealing the exact number of requests. Yes, you guessed right: the good ol’ U.S. of A.


Account Information Requests listing from Apple transparency report

“At the time of this report,” Apple notes, “the U.S. government does not allow Apple to disclose, except in broad ranges, the number of national security orders, the number of accounts affected by the orders, or whether content, such as emails, was disclosed. We strongly oppose this gag order, and Apple has made the case for relief from these restrictions in meetings and discussions with the White House, the U.S. Attorney General, congressional leaders, and the courts.”

Account requests, Apple says, commonly involve law enforcement asking for information regarding robberies or other crimes, as well as searches for missing persons or kidnapping victims.

“In very rare cases,” the report says about account requests, “we are asked to provide stored photos or email. We consider these requests very carefully and only provide account content in extremely limited circumstances.”

In the report, Apple manages the somewhat contortionistic feat of simultaneously patting itself on the back while sticking its thumbs in the eyes of such companies as Google, Facebook, Twitter, and the like. After saying that the privacy of their customers is “a consideration from the earliest stages of design for all our products and services” and that they “work hard to deliver the most secure hardware and software in the world,” the thumbs comes out:

Perhaps most important, our business does not depend on collecting personal data. We have no interest in amassing personal information about our customers. We protect personal conversations by providing end-to-end encryption over iMessage and FaceTime. We do not store location data, Maps searches, or Siri requests in any identifiable form. … Unlike many other companies dealing with requests for customer data from government agencies, Apple’s main business is not about collecting information.

In addition to the information on requests for account information, Apple also provides details on device requests, of which they say “the vast majority” relate to lost or stolen devices. “These types of requests frequently arise when our customers ask the police to assist them with a lost or stolen iPhone, or when law enforcement has recovered a shipment of stolen devices.”

Device Information Requests listing from Apple transparency report

Apple also notes that it has never received an order to release information under Section 215 of the USA PATRIOT* Act.

That section, under challenge by such civil liberties organizations as the EFF and the ACLU, allows the FBI – and who knows what other federal authorities – to obtain secret clearance from the FISA court to obtain information from a company about you and your activities, ostensibly to “to protect against international terrorism or clandestine intelligence activities.” The company must hand over that info to the investigators under a gag order that prevents them from ever informing you+world+dog that they even received the order.

“We would expect to challenge such an order if served on us,” Apple says. However, we may never know whether or not they were so served, or if they challenged such an order. Section 215 remains the law of the the land here in the good ol’ U.S. of A. ®

Bootnote

* Do know that the USA PATRIOT Act is so capitalized because its common name is an acronym for its full name: the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001.

5 ways to reduce advertising network latency

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/11/05/apple_transparency_report_sticks_thumb_in_eyes_of_google_facebook/

Barracuda Announces Pricing Of Initial Public Offering

CAMPBELL, Calif., Nov. 6, 2013 /PRNewswire/ — Barracuda Networks, Inc. (NYSE:

CUDA), a leading provider of cloud-connected security and storage solutions, today announced the pricing of its initial public offering of 4,140,000 shares of its common stock at a price to the public of $18 per share. All of the shares are being offered by Barracuda. In addition, Barracuda has granted the underwriters a 30-day option to purchase up to an additional 621,000 shares of common stock to cover over-allotments, if any. The shares are expected to begin trading on the New York Stock Exchange on November 6, 2013, under the symbol “CUDA.”

Morgan Stanley Co. LLC, J.P. Morgan Securities LLC and BofA Merrill Lynch are acting as lead joint bookrunners for the offering. William Blair Company L.L.C., Pacific Crest Securities LLC and JMP Securities LLC are acting as co-managers for the offering.

A registration statement relating to these securities has been filed with, and declared effective by, the Securities and Exchange Commission. This press release shall not constitute an offer to sell or the solicitation of an offer to buy, nor shall there be any sale of these securities in any state or jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of any such state or jurisdiction.

The offering is being made only by means of a prospectus. A copy of the final prospectus related to the offering may be obtained, when available, from Morgan Stanley Co. LLC, Attention: Prospectus Department, 180 Varick Street, 2nd Floor, New York, NY 10014, telephone: 1-866-718-1649, or email:

[email protected]; from J.P. Morgan Securities LLC, c/o Broadridge Financial Solutions, 1155 Long Island Avenue, Edgewood, NY 11717, or by telephone at (866) 803-9204; or from BofA Merrill Lynch, Attention: Prospectus Department, 222 Broadway, New York, New York 10038 or by email at [email protected].

Article source: http://www.darkreading.com/perimeter/barracuda-announces-pricing-of-initial-p/240163613