Stories
Slash Boxes
Comments

SoylentNews is people

posted by cmn32480 on Sunday March 06 2016, @02:47AM   Printer-friendly
from the so-simple-that-a-gov't-employee-could-do-it dept.

Russia Today reports

The US public doesn't need a Digital Security Commission; they need the FBI to stop deceiving everyone and tell the truth that it wants to spy on Americans, John McAfee, developer of the first commercial anti-virus program told RT's Ed Schultz.

[...] "The FBI wants Apple to change their software so that it removes the check for security, so that we don't check for security anymore. Once it has that software, they can use that software on any phone. But they say they only need it for one phone."

[...] "You need a hardware engineer and a [software] engineer. The hardware engineer takes the phone apart and copies the instruction set, which are the iOS and applications, and your memory. And then you run a program called a disassembler, which takes all the ones and zeros and gives you readable instructions. Then the coder sits down and he reads through. What he is looking for is the first access to the keypad, because that is the first thing you do when you input your pad. It'll take half an hour. When you see that, then he reads the instructions for where in memory this secret code is stored. It is that trivial--a half an hour.
...The FBI knows this, Apple knows this."

[...] "In either case, if they (the FBI) don't know, that is tragic; if they do know it, then they are deceiving the American public and Apple and everyone else by asking for a universal key."
Video

Do you see any flaws in McAffee's explanation?

Previous: Apple Wants Court To Rule If It Can Be Forced To Unlock iPhones
Seems Like Everyone has an Opinion About Apple vs. the FBI
Update: TPP-Exposing Journalist Ed Schultz Lands on His Feet at RT
John McAfee Announces He Will Run For President of the United States


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 1) by anubi on Sunday March 06 2016, @09:35AM

    by anubi (2828) on Sunday March 06 2016, @09:35AM (#314415) Journal

    But I doubt that even the same person can generate the same key again with that method.

    I'm counting on that! Even the guy who made the key can't duplicate it.

    So it's only good for creating it one time to use as a system key..

    Yup, the only thing this is good for.... a generator of an absolutely unique block of numbers.

    If it can be eavesdropped...

    Even if you got an exact recording of the guy marrying his phone... even in a precision recording studio, it wouldn't help. Not the same digitizer. Not the same microphone.

    Now, as far as the phone leaking out its system key, once it has been assigned by its purchaser by "marriage vow"... that's out of my league.

    What I had in mind is "how do I easily generate some string of random stuff, easily, without possibility of anyone recreating the generation - given any "eavesdropping" while the key generation was taking place?"

    With this technique, I could marry my phone right at the point of purchase, with anyone taping me, photographing me, whatever. After I marry my phone, it has a key unique to me, and no-one, no matter what technology they used to watch me do it, could re-create the same key. Even I couldn't. All I could do is re-create a new key, which could be used to protect new content, but could not be used to decrypt anything encoded with the old key.

    --
    "Prove all things; hold fast that which is good." [KJV: I Thessalonians 5:21]
  • (Score: 1) by bitstream on Sunday March 06 2016, @10:33AM

    by bitstream (6144) on Sunday March 06 2016, @10:33AM (#314421) Journal

    My thoughts on eavesdropping was when moving bits inside the device itself in digital form. Like from the CPU to memory etc.

    • (Score: 1) by anubi on Sunday March 06 2016, @10:58AM

      by anubi (2828) on Sunday March 06 2016, @10:58AM (#314427) Journal

      That's where it starts getting snicky.... where system-on-chip comes into play. Gotta keep that golden nugget completely under wraps where no one - even armed with a logic analyzer on all circuit paths to the chip - can deduce the key.

      I have come to the conclusion its impossible to really secure my stuff... so I mostly do open-source Arduino-based stuff. I can generally harden it against outside attack ( my stuff is way too dumb to execute anything coming in - if its not the right format, it just gets confused and ignores it. ). But if the attacker ever gets physical possession of my stuff... game over. Its wide open.

      When I was in Aerospace, it was an interest of mine to secure stuff, but it was almost impossible to have other people take me seriously. I could rant and rave till I was blue in the face about mixing code and data - and all it would get me is a high ranking on a layoff list.

      --
      "Prove all things; hold fast that which is good." [KJV: I Thessalonians 5:21]
      • (Score: 1) by bitstream on Sunday March 06 2016, @11:49AM

        by bitstream (6144) on Sunday March 06 2016, @11:49AM (#314439) Journal

        My tip: When "idiots" wants to be just that. Let them! You job is the get the cash ;)

        The downside is that one accommodate bad habits so it's a good idea to look for a new job. Being able to be proud of ones work is a life quality by itself.

        And the reason is just as you pointed out. Negative feedback and nothing to compensate for it. Even if you would get a bonus for a secure product but would be sacked for trying to correct errors. The cost of being without a salary would negate the bonus very easily. The laws of perverted incentives are quite pervert.

        Regarding security. One have to take a cost/benefit analysis.

  • (Score: 2) by q.kontinuum on Sunday March 06 2016, @10:48AM

    by q.kontinuum (532) on Sunday March 06 2016, @10:48AM (#314424) Journal

    Basically you'd try to find a new way to generate "random" numbers. Only the input is not 100% random really. It might work due to the longer key, but other than that you wouldn't need to reproduce the exact sound patterns, you'd just have to narrow down the key -space by finding the right assumptions for possible samples. If that is possible, start brute forcing.

    You trade good random/short length against poor random/long key. Not sure this is safer or unsafer, or how it impacts performance. But one ground-rule of Cryptography is afaik "never role out your own crypto".

    --
    Registered IRC nick on chat.soylentnews.org: qkontinuum
    • (Score: 1) by anubi on Sunday March 06 2016, @11:21AM

      by anubi (2828) on Sunday March 06 2016, @11:21AM (#314433) Journal

      Cryptography is afaik "never role out your own crypto".

      So true! That's why I won't even try to generate the numbers mathematically.

      And also why I posted.

      Personally, I think - given the lack of any deterministic procedure for generating the numbers - it would be extremely difficult, if not impossible, to generate a duplicate key.

      Except, of course, brute forcing. And a several kilobyte key is gonna be pretty hard to brute force.

      I am looking at a one-time generation from about the noisiest thing I can think of that's part of a phone. Something that can generate a prodigious amount of data, quickly, and not likely ever generate it again. ( statistically speaking ). So its gonna be the microphone or the camera.

      Another way of getting a bunch of numbers that you will not likely ever see again involves streaming data from the camera while twirling it around....

      My feeling is this is something the customer has to do to marry his device, to make damn sure no hanky panky takes place before purchase.

      If the customer ever needs to wipe his device, he is free at any time to re-do his marriage vow and start off anew. He does not lose his device, but all the files within are now permanently lost - to be treated as available memory for new files.

      Like Bitstream noted above... this is for generating a system key. Even the person generating the key won't be able to generate the same key again. The only reason I would ask the customer to do it is to make sure its a fresh key.

      --
      "Prove all things; hold fast that which is good." [KJV: I Thessalonians 5:21]