* Posts by Christian Berger

4851 publicly visible posts • joined 9 Mar 2007

Wobbly Acer goes two-legged to steady itself

Christian Berger

What I don't understand...

...the only remarkable product Acer had in recent years was their netbook series. If I was Acer I'd focus on that and try to explore the market.

However what Acer did was to market it towards consumers which are now fleeing towards tablets. If Acer was to bring out a version of their netbooks for professionals, they'd have a rather lucrative niche.

So they compete with identical products on identical markets. The only thing that could count would be reputation, but that's never been particularly good with Acer.

True believers mind-meld FreeBSD with Ubuntu to burn systemd

Christian Berger

Re: Haters gonna hate

"I like that when I insert a USB thumb drive it can automatically FSCK it if needed."

You _can_ already do that without systemd with a simple shell script... however it's one of those automatisms that regularly drive people forced into using NetworkManager or other FreeDesktop users mad.

If your computer is not doing something you wanted it to do, you can always do it separately. If your computer is doing things you don't want to do it, it's a big problem.

Christian Berger

Well systemd is what you get

when people in their early formative years get bored by working systems and design complex systems for weird edge cases. This is in part caused by university courses teaching whatever fashionable technology they hear about even though it has long proven to not be as useful as it originally sounded.

Christian Berger

It highlights one point ot the Unix philosophy Poettering doesn't get

And that's that every part of your operating system should be replaceable with very little effort.

If you don't like the logging daemon, just replace it, if you don't like the file system just do the same. If you don't like the printer spooling daemon, write your own. If you want a different kernel, free free to use it.

This was simple because those pieces of software had very limited interaction. All all of that interaction was designed to be understood by both machines and people. You didn't have complex messaging services or anything like that.

iOS flaw exploited to decrypt iMessages, access iThing photos

Christian Berger

The FBI probably doesn't care

a) They likely already bought the exploit on the exploit market.

b) It's not plausible that they have problems getting to the data, at least not if they are as well equipped as the Dutch police:

https://www.youtube.com/watch?v=AVGlr5fleQA

What they want in the current case is a way to make the attack cheap enough so it can be used on large numbers of people. For a single case extracting the key out of a security chip is well within what Apple would charge for custom firmware.

Smartphones help medicos, but security is a problem

Christian Berger

We need better e-mail software

It's not like getting more secure than gmail is hard, the problem is that todays E-mail software is just horrible.

What it would need to do is to include GPG by default, even commercial vendors can include the unmodified binary without needing to open any of their code, and then apply sensible rules. If the software gets used for the first time, create a key pair. Then sign _every_ outgoing mail with your public key by default. Then store keys of incoming mail and try to make sensible suggestions to the user when sending mail to addresses you already got the key from.

Apple engineers rebel, refuse to work on iOS amid FBI iPhone battle

Christian Berger

Re: It's likely I'm missing something.

"And if it were that simple it is likely the government would do exactly that and avoid an unnecessary dispute."

You are assuming that the goal is to get to the data at all. Getting that data can be achieved by using technologies already available in that area. You can just solder out any security chip and dissolve the case to read it's internal memory. Yes this may cost you 100k, but that's also what Apple would charge them. The feasibility breaking low to medium cost physical security devices has been shown many times in the past. And the actually good ones won't fit into your phone.

The big point about the "custom firmware" approach is that it'll greatly reduce the cost of such an attack. Instead of having to essentially break the device, such an attack could be done within minutes. Suddenly you can do it at the luggage handling of an airport. You could do it as part of random bag searches.

My guess is that they didn't suspect Apple to cry out about this. However it is in Apples interest to cry out about this, even though they already complied to demands. Their goal is to claim that somehow their devices are more secure than the ones of the competition. And in the minds of their rather uncritical users they have succeeded.

Christian Berger

Re: It's likely I'm missing something.

"When you have a combination of lots of money to throw at the problem to figure it out (i.e. credit card companies and Apple)"

I cannot speak for Apple, but I can speak for credit card companies. Those don't care about fraud as they will either make profit of it (when it's undetected) or not loose money (when it's detected). That's why those companies are allowing obviously insecure technologies like biometrics or RFID.

Ohh and with credit cards there's also a different threat model. They want to keep out the "casual" skimmer. Even when you completely clone a credit card you are not likely to get more than a couple of thousand dollars. So all you need is to raise the bar above that level.

Christian Berger

Re: It's likely I'm missing something.

"The chip in a chip'n'pin does this."

Yes, but a) those chips cost nearly an Euro.

b) The same technology has been broken multiple times, by rivalling Pay-TV companies.

Here's a talk about the forensic abilities of the Dutch police:

https://www.youtube.com/watch?v=AVGlr5fleQA

http://bofh.nikhef.nl/events/OHM/video/

Essentially you can uncap the chip and get the data out directly. Sure this is to expensive to be worth for Chip and Pin or Pay-TV, but it's certainly within the budget of large investigations...

...and that's the actual point about this. It is not to hard to do this, but it is far to hard to do it within the scope of "random bag searches". It's not about being able to unlock that device at all, it's about making it cheap enough so it can be done repeatedly.

Christian Berger

Re: It's likely I'm missing something.

"When something seems that obvious, then it's likely that I've either completely misunderstood the problem at hand, or else there are shenanigans going on."

Well yes, but I do understand a fair bit about embedded computers, I know what can and cannot be done on an iPhone budget... however I cannot find a way how Apple could plausibly have built a device which would somehow store it's keys in a way that cannot be easily circumvented by physical access... particularly given the fact that the only "secret" the device can get is a PIN.

The discussion just assumes that Apple somehow magically has solved the problem of physical security on a budget, without giving any evidence on how that could work.

"Extraordinary claims require extraordinary evidence." However we are seeing none of those. The hypothesis that this is all just an elaborate PR stunt seems much more plausible, particularly since it puts Apple in a good light.

Please prove me wrong by telling me how the data is actually encrypted and how it is using things you cannot read out on a crime investigation budget.

Microsoft sets date for SQL Server on Linux

Christian Berger

This is actually largely irrelevant

MS-SQL for Windows only serves one purpose, and that's to calm down their customers and users by telling them that even if Windows Server would disappear tomorrow, they could still run their SQL-Server. So there's no need to switch to new fangled web stuff like PHP and MySQL or whatever.

There's virtually no practical use for this, as Linux users won't switch to MS-SQL (there are better free alternatives out there), and MS-SQL users won't switch to Linux.

Biometrics not a magic infosec bullet for web banking, warns GCHQ bloke

Christian Berger

The bizarre point is...

...that in many Hollywood films it is shown how to break biometrics. In many cases even rather realistically.

One in five PCs will be a tablet with detachable keyboard by 2020

Christian Berger

Yes, but that's not because people want those

It's because in the portable <13" area you can barely get anything else than those things where the keyboard falls off when you want to hold them. So everyone who wants a <13" laptop can only get one of those and will have to live with that bug.

Of course hardware manufactureres will see that as demand for keyboards that fall off, and produce more, perhaps even extending that design flaw into larger laptops.

It's one of the big missunderstandings about the economy. Demand does not drive supply. Supply facilitates demand as you cannot buy things, and therefore cannot express your demand, which aren't offered on the market. So if you only offer X, people will buy X since they have little other chance. Things that aren't offered don't show up as demand in your numbers.

IEEE delivers Ethernet-for-cars standard

Christian Berger

It's not weight they are optimising for

It's cost, that's of course heavily correlated to weight as the heavy stuff of a cable is also the expensive stuff.

Your unpatchable, insecure Android mobe will feel right at home in the Internet of Stuff era

Christian Berger

Sorry, but we are far beyond that

Since classes of exploits like Rowhammer(JS) we know that sandboxes are only an illusion. It may help against errors, but effectively it cannot help against malevolent code. This is why it's so important that we prevent malevolent code from running at all. In short if you are running malware, you are doomed. The complex layers upon layers of code in modern mobile and desktop OSes do nothing meaningful to mitigate against this, they only introduce new security critical bugs.

The far bigger problem is of course that those bugs found here potentially could be used from the network side.

Better mobe antennas a stretch goal for radiocomm boffins

Christian Berger

Yeah you can do that...

... at least in principle. Radio hams often have a device called a "tuner" which loads the antenna in a way to change it's resonant frequency. However to make use of this you also need to change the frequency you are transmitting at... and the antenna can always just have one resonant frequency... so I don't quite see how that could be something practically.

LG builds a DAB+ digital radio radio into a smartmobe

Christian Berger

DAB would have some great potential if you get propper equipment

I mean audio takes rather little data, so how about building a radio that just records everything that's on? Such a radio would use the DAB EPG and Radiotext information to make the programme available to you just like an audio on demand service would do...

... however there would be one crucial difference and that's licensing. You would have the comfort of a download service, but the station would only have to pay the cost of broadcasting. So eventually you'd build a library of songs and other programmes on your device, completely legally and at a tiny fraction of what CDs or official downloads cost.

DARPA to geeks: Weaponize your toasters … for America!

Christian Berger

Re: Toasters

Then of course there's this:

https://www.youtube.com/watch?v=bpGLpD25dpU

Obama puts down his encrypted phone long enough to tell us: Knock it off with the encryption

Christian Berger

Re: The underlying point is deeper

First of all starting a comment with "You are a fucking idiot" automatically weakens your point as it means that you obviously haven't thought about the issue. Otherwise you wouldn't use that kind of language.

Then look at the facts. We are already doing a very decent job at securing servers. Particularly since servers are at secure locations and run operating systems designed to do their job, we can trust them way more than any mobile device.

For a server operating system "vendor" security is one of the prime concerns, for a mobile operating system vendor it's largely irrelevant.

So securing the operating system on the server is _much_ easier than securing the system on the client. Plus since you control the update process on your server, and typically you download everything from a rather transparent 3rd party server, it's much harder to push special updates to you.

Securing a simple "terminal" operating system is also much simpler than securing a mobile telephone. You can, for example, start by using network ACLs, raising the complexity of any attack. Then you can have an additional layer of encryption with a pre-shared key. Since you are only dealing with one server (ideally your own) you can greatly lower the risk of anybody messing with your protocol as the actual cryptographic protocol will only see garbage. You don't need a full operating system for that, so your attack surface becomes minimal.

Bandwidth is not really the issue here as most websites are now so badly made, screen shots of them are smaller than the actual website.... often by a factor of a hundred or more.

In any case, trusting your "smart phone" also means trusting the cloud service it syncs to or talks to. And that's run on servers, lots of servers. You already need to worry about several different operating systems... most of which you have _absolutely_ no control over.

Christian Berger

The underlying point is deeper

Well first of all, this particular case is just for show. Clearly if you have physical possession of the device, you can just read out the flash chips and RAM. You can probably do that via JTAG in minutes... so that's not really an issue.

The deeper issue is that Apple, just like virtually all mobile phone manufacturers, is actually able to comply to not just this, but even much more invasive methods of surveillance. The operating system on modern smartphones is so complex that it's so buggy that you actually need over the air updates. Once you do have such updates, it's trivial to put one specific update to one specific telephone. Disabling automatic updates is no option either as many of those bugs being fixed are security holes.

Maybe we need to rethink "smart" phones. There is little need for a full blown operating system and loads of libraries making everything needlessly complex. Why not make devices that are "smart terminals". Essentially machines which do have some local processing capability (e.g. a text editor), but mostly are terminals to a server you might rent some space at, or even own yourself. In fact running a browser remotely and just sending over the image probably is faster and takes less data than displaying it on a local browser. With LTE we are now down to single digit latency, with protocols like mosh we can work with multi second latency. So it's certainly feasible.

0day remote code exec holes in mobile modems can read SMS and HTTP

Christian Berger

Well that's just a scratch on the surface...

... those modems are also connected via radio to mobile phone networks. Those are _extremely_ complex protocols implemented by very few companies with no security audits at all. So it's very likely that your modem can be compromised with a fake base station.

Such an exploit would be highly valuable as you can make it exploit a large chunk of the market, as those chipsets all run more or less the same code, probably even the same binary code. While on PCs you are still limited by what you can do via USB, on smart phones you have direct access to the RAM of your "Application Processor".

Don't fear PC-pocalypse, Chromebooks, two-in-ones 'will save us'

Christian Berger

There's an underlying point to this

The remaining PC market is becoming more professional. While previously people bought PCs to play games or listen to music, or, in the office, use it as a glorified typewriter, things are changing now.

PC people now want their hardware separate from their software. They don't want "complete packages" they want tools.

Blah Blah blah ... I don't care! To hell with your tech marketing bull

Christian Berger

Actually it's not

You just need to learn to use some heuristics. For example how is it presented to you. Is it presented by some corporate droid or is it something you've learned about at a conference? If there's a company behind it, how hipster like is their webpage? Sure those things can be misleading, but it'll remove perhaps 70% of the junk and just a bit of the good stuff. You will see the good stuff again later anyhow.

Then you need to look into detail at what's being offered. Who backs that solution, do they have a track record of abandoning their projects (like Microsoft or Poettering), do they have a track record of over inflating their projects so they will just be bloat with a tiny bit that's of any use?

Then there's the issue of complexity. Will it reduce total complexity? Does it add complexity? Is the added complexity justified by the added functionality you actually need?

Those questions don't take long to ask. And after that you will have eliminated most of the junk. In fact if you have some experience you can even cut it down to "how is this better (i.e. simpler) than the currently best solution I've found that's used by the smart people?"

Boffins bust biometrics with inkjet printer

Christian Berger

No, much earlier than that

September 22, 1986 MacGyver demonstrated unlocking a hand print scanner by using a latent handprint. He sprinkled some ground up wall paint onto it and used his jacket to press down the plate... Even in the late 1990s some fingerprint scanners were vulnerable to the same attack... though you had to breathe onto them to get some moisture for it to work.

Biometrics is one of those things that can be logically deduced to be unsuitable for authentication. Your biometric key is not changeable (unlike a password), it cannot be read 100% accurately so you cannot deviate keys from it (imagine a password prompt with auto correct!), and it's impossible to keep secret.

Microsoft has made SQL Server for Linux. Repeat, Microsoft has made SQL Server 2016 for Linux

Christian Berger

One should note that Microsoft isn't a homogeneous company

Just like any company of that size they have lots of departments fighting against each other. And the SQL-Server department is seeing that a whole new generation of developers isn't using MS-SQL any more. MS-SQL became popular because it was one of the servers used by the VB and Delphi community in the 1990s. The spiritual successor of those people are the web developers... and those people are almost exclusively using some unixoid system. So it's only logical for them to also offer a Linux version. They obviously don't care about the department that makes the operating system, just as that department doesn't care about the rest of the company (see Windows 8 and Windows 10).

It's nothing surprising at all. Parts of Microsoft see Windows as a sinking ship, that's normal and happens in most companies. In fact it's even healthy to diversify a bit.

10 Gbps fibre-to-the-home signed off, ITU eyes 100 Gbps future

Christian Berger

Re: Router throughput...

"Most domestic routers can barely handle 100Mb/s throughput."

Yes, but that's because they are limited by the $10 mark, if you allow your hardware to cost more, you can do more.

Also the concept of a domestic router might disappear soon anyhow. Currently it's needed for NAT, but that's not much of an issue once you've completely moved to IPv6. So even today you could just have a little box that would switch IPv6 traffic, and do NAT on the little bit of IPv4 that's left. Your box would then just have some bog standard switch chip-set and re-program it so it'll be aware of protocols. I wouldn't be surprised if even the ones in dirt cheap routers could do that.

Hardcoded god-mode code found in RSA 2016 badge-scanning app

Christian Berger

They install apps from known bad sources on their telephones?

I mean seriously, RSA can be considered as a known bad source by now, but even installing any additional software from a source you don't _fully_ trust essentially violates the integrity of your device.

Yes some mobile operating systems claim to provide sandboxes your programs are separated in, but new developments like Rowhammer or Cachebleed show that sandboxes can only save you from simple mistakes, but not from a determined attacker. I would expect everyone at a computer security conference to have reached that point of insight.

NSA boss reveals top 3 security nightmares that keep him awake at night

Christian Berger

If the NSA would actually see that as a problem...

... they would mandate for minimal security standards when it comes to SCADA systems. They would, for example, lobby for mandatory code reviews of such systems, including the source of the operating system they use. (That would lead to simpler operating systems as code reviews get more expensive the more code you've got. Less code leads to less bugs and less security vulnerabilities)

Instead the NSA wastes our money for spying on everybody, claiming that it would help them catch that one stupid "terrorist" using hotmail to communicate.

NASA funds new supersonic airliner research

Christian Berger

Now if there was a way to talk to people in far away places...

... without actually having to travel, that would render such aerocrafts largely obsolete.

Then you could just meet people via that way... such as it was predicted in science fiction movies like this one:

https://www.youtube.com/watch?v=yqRj3lvvg7Y

Surprise! British phone wins Best Product at Mobile World Congress

Christian Berger

I'd hope for that...

... unfortunately it looks like future operating systems will become _much_ worse from what we have right now. There's a strong downward trend when it comes to mobile operating systems and the hardware running it.

These Chicago teens can't graduate until they learn some compsci

Christian Berger

It's a shame we don't see programming as a basic skill

We now live in a world where we have nearly as many computers as we have pens. We see writing as a basic skill with literacy rates usually way above 90%.

To make the analogy from books to computers: We live in a world full of books, yet reading or writing is left to a few chosen ones. We see books as magical items which many people think they will never be able to see. At the same time, the literary class is actually widening the gap by making systems harder and harder to understand by making them more complex. UEFI, HTTP/2 and Systemd are just some examples for that.

We need widespread computer literacy!

Don't take a Leaf out of this book: Nissan electric car app has ZERO authentication

Christian Berger

Don't put microcomputers into cars...

I know we all have been promised KITT, but in reality it only leads to exhaust scandals and car hacking.

Though the car hacking part was already predicted in the 1980s.

https://www.youtube.com/watch?v=kDMLPvBWvpo

This video is in German, but shows off the hacking parts better:

https://www.youtube.com/watch?v=nNKS1rzPkA8

Your xenophobia is killing us, Silicon Valley warns US Congress

Christian Berger

Are there even engineering jobs left in Silicon Valley...

... or to be more precise, such jobs that do not involve killing or exploiting people?

I mean you usually don't need much technical expertise to start a start-up, and even if you don't have that, you can easily outsource it.

As for larger companies, why are you even in a place where education about science and engineering is as bad as in the US? Just open up a new development centre in a country where people aren't scared of digital clocks.

Interception clouds Deutsche Telekom's pan-Euro network utopia

Christian Berger

This comes from the company...

...which does not peer with others and charges twice as much as the competition to get to their network. Hosters in Germany already offer you direct traffic under the name of "double paid traffic".

Black Monday: Office 365 down and out in Europe

Christian Berger

It's getting needlessly complex

Any sane person would just get a couple of large computers enable what ever kind of remote access (either remote desktop or ssh) and just run the already working software that way. Have your home directories stored on some file servers you regularly back up so you can switch to standby servers in short amounts of time.

You don't have to go all "cloud" to offer a centralized service. Offering computing services via remote lines is something that works, reliably, since the 1960s. Even Windows, which was one of the last large operating systems to do so, offers multi-user capability with networked terminals since about 2000. Just set up a hardened Windows 2000 box somewhere and let people log into it.

Imagination unfurls blueprints to 2017's TV, car dashboard chips: the PowerVR Series 8XE

Christian Berger

Managers don't see technology as something important for success

All the big "hype" companies of the last decade and a half have not been successful because of technology, but because of marketing hype. Apple doesn't have any kind of special technological magic. Google has vast data centres, but their basic designs are obvious to LISP programmers.

Some "tech" companies, like Netflix even outsource their technology to companies like Amazon.

Christian Berger

If the TV market was so brutal?

Why don't they build "video monitors", essentially TVs without all the tuner and "Smart TV" crap. There's a big market for that as with most manufacturers those parts will get replaced by external versions anyhow.

BBC Trust candidate defends licence fee, says evaders are CRIMINALS

Christian Berger

Would have been the perversion of the idea of Television

Since with a subscription model comes DRM which essentially tries hard to push back television to the 1970s where you couldn't even record it.

I pay the German equivalent of the "TV Tax", and I would gladly pay for the UK one as well if I could get the programming, however I also pay so _everyone_ can receive it without any additional hurdles.

UK carrier Three in network-wide ad-block shock

Christian Berger

What's funny is...

...that mobile carriers are messing with their customers traffic for years. Usually they downscale images or add their own tracking stuff, even adding your telephone number into the HTTP request header.

Now they actually do something which has the side effect of being useful for some users there's some discussion.

Eurovision Song Contest uncorks 1975 vote shocker: No 'Nul point'!

Christian Berger

Re: I like it how the ESC brings people from all kinds of countries together...

Well except for the US... who had 525 lines and switched from 60 Hz field frequency to 60000/1001 Hz when they went to colour.

Christian Berger

I like it how the ESC brings people from all kinds of countries together...

... in order to complain about it.

But on a more technical note. If you watch the early ones from the 1950s you can sense what a technical achievement this was. After all it originally was meant as a tech demo, showing that trans European programme exchange was possible, despite of countries having vastly different TV standards and no satellites or VTRs being available. Back then recording a TV show meant pointing a film camera to a monitor. Getting a video image from Germany (626 lines) to France (819? lines) meant pointing a video camera pointing at a monitor (and some trickery to get them synchronised).

In fact in the 2nd contest, the first entry had to be repeated as the Eurovision network broke down. And in the end, when the votes were phoned in, you could actually hear the distance on the telephone with some countries being barely readable.

BTW there's some rather cool stuff given out by the EBU for free. For example they have a technical phasebook, listing the words for expressions like "disk access time" or "interlacing artefact" in several languages.

Black Hat 2015: 32 SCADA, mobile zero-day vulns will drop

Christian Berger

The problem is that even if you wanted to build a "secure" industrial system...

... the industry will throw their spanner in the works. Essentially you will get industrial systems which can only be controlled by OPC (OLE for Process Control) or if you are lucky OPC-UA, it's cousin which drops DCOM for SOAP.

Seriously, there is no way any of those companies is ever going to correctly implement those systems. There is no way you can run those systems without them having huge attack surfaces.

What we'd need would be regulations limiting the maximum complexity of those systems. The simpler they are the easier they are to understand and that gives people a chance at securing them.

Tandy 102 proto-laptop still alive and beeping after 30 years, complete with AA batteries

Christian Berger

The ZX81 one was even worse than the ZX80 one since it was connected via a flexible foil cable which tends to break while the ZX80 had an integrated keyboard. At least the ZX81 keyboard was easier to replace.

Computer Science grads still finding it hard to get a job

Christian Berger

Re: The point is not to match skills

"Drop the buzz words, and show them you can reason and think."

Well unfortunately some universities see their jobs as teaching buzz words.

Christian Berger

The problem with a track record in "Open Source" is...

... that it means that lots and lots of people will work on "Open Source" projects because they see it as a career move, not because they have any interest in Free Software. An employer usually cannot tell good from bad software, so essentially there is a strong motivation to churn out lots and lots of badly designed code, and make it appear as important as possible.

In a way as an employer you want the candidate who turns out as little code as possible and still turn out well working solutions. Every line of code will cost you money for years to come.

Big Brother's pet unicorn Palantir closes the Kimono

Christian Berger

Yeah, but hopefully...

...they won't keep the engineering. Those people know very well that working for a company like Palantir is highly unethical, and Palantir is one of the companies people recognize the name.

So whenever you are talking to "normal people" (e.g. the ones who speak at least 2 programming languages) they will back away or try to argue with you when you mention where you work.

Now those people at Kimono still have the possibility of getting out. This will get harder and harder as the bubble deflates.

IP freely? Your VoIP phone can become a covert spy tool...

Christian Berger

Re: Doesn't give any details

Well there isn't actually a problem. Snom Phones have a feature called "Auto Answer" which will answer your call automatically on speakerphone. It'll beep and if you get regular calls you'll notice it rather quickly.

Christian Berger

One should note...

That snom telephones show a big fat warning on their display when you have no password set. You have to acknownledge it to get it away and it'll return every time you reboot your telephone.

PBX phone system hacking nets crooks $50 million over four years

Christian Berger

Re: PABX

Yes, but IP-PBXes are now commonly designed and administered by idiots. Internal telephones on outside IP-Addresses is actually a feature many of them explicitly have. The really bad ones even run on some badly maintained Windows system which is probably open to lots of exploits.

Plus there are things like the cleaning staff getting to a phone to do fraud.

iPhones clock-blocked and crocked by setting date to Jan 1, 1970

Christian Berger

Well they run NTP

Apple products today run NTP by default so they can enforce DRM. NTP is comparatively easily spoofed so you can just set the time for someone else.