A review of 34c3 talks
14 Feb 2018This is my personal review/notes of the 34c3 talks.
- I haven’t watched all of them, and i don’t intend to do so
- the selection is just based on my personal taste and opinion on what interests me at the moment.
Enjoy !
Favorites
Gamified Control
I’m starting by this talk since it’s a must watch in my opinion.
China has implemented their new Social Credit System (SCS
) throught the use of big data and surveillance.
This system will rate the online and offline behavior of the citizen to assess them and give them a score.
Depending how well you perform, you will get bonuses or penalities. More important, the score is determined by
you friend’s score.
China has gamified being an obedient citizen, using social pressure.
Notes:
- SCS will be mandatory for every citizen in 2020
- the BAT (Baidu, Alibaba, Tencent) are collaborating with the governement
- what pushes your score up
- retweeting the governement propaganda (economy, etc)
- buying local products
- having obedient friends
- whats pushes your score down
- posting stuff about the tiananmen massacre…
- buying foreign product (anime from japan, etc..)
- having non-obedient friends…
- bonuses:
- faster administration paperwork and procedures (travel papers)
- penalties:
- lower internet
- filtered access to the jobmarket
- anybody can check your score
- and which friends are dragging your score down
- it’s the most powerful oppression tool, since it doesn’t rely on violence or fear, but on social pressure, which is maintained by the individual themselves
- in preparation since 2005, the Chinese gov understood from the beginning the potential of social media and big data
- borader spectrum than China: a tendency to answer social problems with tehcnological solutions
Forensic Architecture
An independant research agency investigating new methods in forensics to undertake human rights abuse.
They reconstructed a 3D scene from pictures, and videos from multiples angles to determine exactly when and where a missile hit the floor, which building were affected, etc
Really impressive !
Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Detection
What’s the status of security research to detect hidden spy microphones ?
The researchers present a state-of-the-art study of microphone bugs, as well as
a tool called Salamandra
to detect and locate hidden microphones !
Notes:
- The Thing: a microphone bug, batteryless, was installed in a US ambassy
- You can plant a bug in an appartment and listen to the audio just fine from 300m.
Bringing Linux back to server boot ROMs with NERF and Heads
Replacing proprietary vendor boot firmware by an open source Linux runtime.
Notes:
- servers are using UEFI, we can replace this with
LinuxBoot
- during
DXE
(Direct Execution Environement) phases of UEFI, lot of drivers are loaded- full network stack
- displaying the vendor logo
- legacy device drivers (floppy)
- same of them have contained buffer overflows…
- UEFI has a network device driver
- GRUB has a network device driver
- Linux ….
- same for USB
- all these components are vulnerable
- reduced the boot time from 8min -> 20sec !!
- linuxboot.org
How to drift with any car
They describe how the various electronic components that control your car are communicating with each over, and how you can listen to the BUS and send your own messages.
The funny part was when they plugged this with a XBox controller, and played a video game using the car’s wheel as a controler input… :)
Notes:
- various parts of your cars are controller by ECU
- ABS, Transmission, Engine, etc…
- ECU:
Electronic Control Unit
- more than 70 in a modern car
- they talk to each other through a CAN bus
- you can talk to the CAN bus with a special diagnostic mode known as
OBD-II
Briar
Briar is a new P2P, resilient messaging system.
And it works even without internet (Wifi, Bluetooth, etc…)
I loved the talk, very good speaker and presentation.
OONI: Let’s Fight Internet Censorship, Together!
Another talk that i really appreciated, the OONI project aims to watch internet censorship by probing websites availability in different countries in the world.
Anyone can install an OONI probe and contribute !
How risky is the software you use ?
What’s the real state of the software security you use everyday ?
Can we evaluate it, and give it a score ?
CITL: Improve the state of software security by providing the public with accurate reporting on the security of popular software
Notes:
- provide a security label/grade/score, for consumer software
- there are lots of things that affects the security of a software
- Microsoft Excel, executables/libraries are 32 bits !
- no heap protection
- do you have the right compilation flags to protect the binaries that you release ?
- scores and histogram for a complete operating system (all libraries and components)
- smart TV, IOT devices, etc…
- statically analyze all binaries
- fuzzing to discover bugs
- Firefox on OSX was missing ALSR
Protecting Your Privacy at the Border
What could happen to your digital devices if you cross a border.
You better be prepared, upload everything to the cloud in case the border patrols seize your laptop, and know your rights !
Notes:
- What is a border ?
- a point of entry
- schengen zone
- airports are borders
- European union: “minimum check”
- first line checks
- second line check (clarification needed)
- triggers for second line check
- communications difficulties
- irregularities in documentation
- database mismatches
- a search for criminal activity will be used as a base for device check
- Canada
- claims a right to examine laptops and smartphone without a warrant
- can ask for password on the device
- not the cloud
- authoritarian regimes
- Russia, China, Turkey
- No Human Rights norms
- Turkey arrested 75 people for having an encrypted app on their phones (only installed)
- maximum precautions
- US
- ask you to unlock device
- provide password
- social media handles for OSINT
- non US citizen: can deny entry
- 2015-2016: 5x increase in device search
- password != fingerprint
- border agents can force your finger on the phone
- threat models
- travel history
- tolerance for hassle and delay vs standup for your rights
- sensitivty of the data your carry
- don’t bring your device, leave it at home
- temporary device
- Plan ahead, have an idea of the scenarios
- don’t make decision on the fly, under pressure
- Don’t lie to the border agent
- document everything
- Consent ?
- always ask explicitely if it’s an order or request
Surveillance
Uncovering British spies’ web of sockpuppet social media personas
The JTRIG (GCHQ) had to create sockpuppet accounts and fake content on social media for their missions.
How easy it is to unmask them ? :)
Policing in the age of data exploitation
How the police and law enforcement are collecting data and exploiting them for their investigations
Notes:
- Using the data generated by smart cities
- predictive policing
- if you map where crimes happens, you can predict
- PredPol is an example
- Hawkes process (earthquakes, same events will happen shortly after)
- they even use moon phases in their crime prediction !
- if a crime happens, every person in the network will be arrested, preventively
- Cellebrite overs a toolkit
- law does not ensure protection
- the police can extract all the data they want
- IOT is the new crime scene
- the police extract every possible information on all the devices they can find on a crime scene, so your data might be in their database !
Security
Inside Intel Management Engine
The Intel ME vulnerability to run unsigned code
I have to go throught the presentation again, because i didn’t catch everything on my first watch …
Notes:
- Intel ME is poorly documented
- but the root of trust for
- PAVP
- PTT
- TPM
- Boot Guard
- full access to many devices
- hardware capabilities to intercept user activity
- independant 32 bit processor, x86
- custom MINIX
- contains a Java Runtime Machine
- operates when main CPU is powered down (M3 mode)
- Intel JTAG (Joint Test Actions Group)
- mechanism for debugging electronic chips
- Since Intel Skylake
Intel ME: Myths and reality
Clear the FUD and understanding the true purposes of Intel ME.
Notes:
- multiple names
- Manageability Engine
- Management Engine
- Converged Security and Manageability Engine (CSME)
- Converged Security Engine (CSE)
- Trusted Execution Engine (TXE) for embedded/mobile
- Server Platform Services (SPS)
- Myth: NSA backdoor ? US gov ?
- ME was initially created to solve IT problems
- history of PC remote management (PXE, Alert on LAN, ASF)
- history of ME evolutions
- ME has power states
- M0 host is up
- M1 host is down, ME partially functional
- M-Off, everything is powered off, but can still process network packets
- it can the PC with a command yes but need the TDT (anti theft module), but it was removed
- it can read all data on the PC complicated, can access host memory
- it can’t be audited black box audited the firmware is available on the flash and throught software updates you just need to extract it and make sense of it
- user can’t do anything about it
Are all BSDs created equally?
A survey of BSD vulnerablities.
Destroying the myth, that because it’s BSD, it’s more secure and there no vulnerabilities compared to Linux
Notes:
- whats the kernel attack surface ?
- syscalls
- TCP/IP stack
- ioctls, drivers
- filesystems (FUSE)
- syscalls should be tested
- assomption is false, bugs in syscall implementation occur regularly
- OpenBSD was the winner
- no loadable modules
- no compat code
- removed the entire bluetooth stack
- less syscalls (200+)
- cut support for older architectures
- code quality
Hardening Open Source Development
It’s really easy to use a software developer environement and transform it into an attack vector.
This talk review the possible vulnerabilities and how to exploit the everyday tools that software developers uses
Notes:
- Editors
- shell integrations and terminals
- versioning
- client side git hooks !
- Releasing
- your CDN might get compromised
- Package registries (NPM….)
- package manager free the package name, someone will take the name and upload something else
- a maintainer might step down, and leave the commit right to a random person
- a maintainer’s credentials might leak
- Underhanding code
- phishing URL
- invisible code in browser, just copy paste !
- hiding characters from
cat
- hiding code from
git diff
!
AI
Deep-learning blindspots
The state of the art research of adversarial learning and how to fool them.
Researchers have found blindspots.
Example: a turtle recognized as … a rifle.
Arts
Humans as software extensions
Notes:
- humans today can be employed for a 10 mins work (design, video, etc..)
- work will become fragmented again and again
- post work world ?
Misc
Organisational Structures for Sustainable Free Software Development
How to manage your free software project ?
What organizational structures exists to sustain the development ?
What about the funding ?
Notes:
- heartbleed, 7 April 2014
- OpenSSL can’t find the funds to sustain the project
- The art of community building
- the essence of community
- belonging
- share belief
- creating opportunity to contribute
- Funding is dangerous !
- you need a legal entity
- the funds cannot go through one individual
- you need explicitely documented decision process, to deal with conflicts