![]() |
Re: Any interest in a lojack-like app for Maemo?
Tell the user to move it off the tablet. It's a private key, to deal with the possibility of the tablet being compromised, so you really don't want a copy of it sitting in the tablet... ;)
|
Re: Any interest in a lojack-like app for Maemo?
Quote:
Upon reflection, it doesn't need to be a signature though. A hash would suffice. Since scratchbox is a virtual environment, the same code, compiled with the same options, *should* produce the same executable. (This was the entire premise of the idea and I haven't tested this so feel free to yell at me if I'm wrong here and I'll shut up.) The executable can be SHA-1 hashed and hash can be stored on the server and is valid even if you compile the daemon yourself. But once the source is modified, the binary changes, the hash doesn't match and the server refuses communication. The idea was to prevent someone from adding a backdoor or changing the scope or purpose of the application and then using the 'official server' to do sneaky nasty things... To be honest, sneaky nasty things could be done anyway. The idea of using a centralized service that can communicate with law enforcement directly is meant to defeat some of them. For example- Joe X thinks his girl is cheating, so he 'accidentally' leaves his tablet in her bedroom then has it go into 'findme' mode. Joe X is far less likely to do that if he knows that the service will archive everything and can forward it to law enforcement directly should Jenny Y find out what a scumbag her boyfriend is. Because of what the program is capable of, the server should use SOME measures to keep from abetting a federal crime... If you have a better idea I'm all ears. I've been using this thread as a brainstorming session. Some of the ideas put forward have blown me away! The responses I've gotten have been amazingly well thought out and very interesting. I couldn't ask for a better group of people to bounce ideas off of. Really, everyone- Thanks!!! cheers, kernelpanic Quote:
|
Re: Any interest in a lojack-like app for Maemo?
IANAL, but...
If the tablet is in possession of the criminal when the unauthorized network access takes place (which, it can be shown, only took place because the criminal was in possession of the tablet as a direct result of a prior, connected criminal act), then it is the criminal (not the actual, true owner of the tablet) that would be liable for any criminal or civil penalties arising out of the unauthorized use (be it automatic or otherwise) of the (open or otherwise) wireless network with the tablet. ...in other words, even if the 'recovery script/program' does initiate what might, in some states, be considered an illegal network access attempt, the law will have been broken by the person in possession (albeit, criminally so) of the tablet at the time. short answer: great! that's one more charge to levy against the miscreant when he is apprehended. bring it on! |
Re: Any interest in a lojack-like app for Maemo?
Quote:
PROGRESS REPORT 2- I've been reinventing the wheel- Nokia already replaced osso-gnupg with gnupg for Diablo in CVS. I have them compiled and installed in scratchbox AND on my tablet. Plus the full version of GnuPG in diablo means NO WEIRD DEPENDENCIES!!! The ball is rolling! Cheers, kernelpanic |
Re: Any interest in a lojack-like app for Maemo?
Quote:
while I'm not a lawyer (as stated in the previous post), I would urge my lawyer to pursue this argument in court, should the situation arise -- I'm in Florida, and plan on installing and configuring your application, once it's available. :) as an aside: my loaded pistols can sometimes be found "not under my direct control", but if I can demonstrate that I showed due diligence in how/where they were stored, then I cannot be liable for anything done with them if they are stolen and/or used without my direct permission or supervision. |
Re: Any interest in a lojack-like app for Maemo?
OK, so long as you're not involved with the maemo tool-chain, I suppose that works. And I won't bother with the rant, since you clearly understand the issues. I still don't see a real need for it, though, because I can't come up with any scenario where an attacker gains by modifying the daemon.
WRT Joe's snooping ways, if it's open source (and I'm completely in favor of that), he can just rip the camera-snapping and non-light-flashing bits out and make it redirect to local storage, or (if he's on a week-long business trip and doesn't have an SD) upload with mail, sftp, or whatever -- he doesn't really gain anything by using a hacked daemon with the server. Supposing you go with the hash, there are ways different binaries would be generated (e.g. 770 vs. N8x0, linked against different libraries for different OSes), so you'd need a table of trusted hashes. And I build on the tablet, so my binaries might be different. I'm not prepared to be that untrusting, if various others are compiling and matching your binary, but I just don't like the idea, especially when I (perhaps for want of imagination) can't see any bad scenario it helps avoid... (BTW, wasn't SHA-1 broken a couple years back? Something like 2^60-something instead of 2^80 for a collision, if my memory serves well. Not sure if that result gains anything for matching an existing hash, and it's still not much of an issue if it's 2^130 for matching ;), but it might not be the best choice.) @briand: I don't think that's right, but without a good lawyer for the thief, I'd not be horribly surprised if he did get the criminal charges for it... But... then he slams you with a civil suit. And you lose. That's my prediction, but IANAL either. |
Re: Any interest in a lojack-like app for Maemo?
Quote:
Quote:
Collisions have been found in most hash functions. SHA-1 is still better than SHA-0 or MD5. There's serious debate as to whether ANY hash function is collision free. The newer ones are simply, well, newer. Which means there has been less time to test them. Honestly, this is one of the reasons I compiled GnuPG and dumped it on my tablet. I'm not a cryptographer. I'm perfectly happy leaving that kind of thing to mathematicians. I'd rather use algorithms that have been scrutinized by the best and open-source my implementation so that people smarter than me can scrutinize it also and point out my mistakes to me... I think this kind of development model produces the most robust product. Cheers, kernelpanic |
Re: Any interest in a lojack-like app for Maemo?
Broken in the cryptographic sense; we found some faster way of generating collisions than brute-force. Obviously, if I'm hashing several KB into a 160-bit number, a collision with any particular result will occur one in 2^160 times by blind luck. If I'm just looking for two things with the same hash (not matching a given one), I'll only need around 2^80 tries. Any method that actually gives you collisions faster than random guessing is considered "broken"; although it's not yet feasible to crack it, it's not as secure as a simple bit-count would suggest. I don't think it's an issue here, though. (And I'm no cryptographer either; I know just about enough to read blogs by people who understand the journals and try to put it in lay terms.)
And by the way, thanks for taking the initiative on this project; I think it's going to be very useful, and my hat's off to you for coming up with ideas and working on it, while the rest of us are just spouting off ideas. (It's come up a couple times before, I even half-jotted some pseudo-code for some scripts to accomplish it, but nobody really dug in seriously like you're doing.) |
Re: Any interest in a lojack-like app for Maemo?
Quote:
Cheers, kernelpanic |
Re: Any interest in a lojack-like app for Maemo?
There's a lojack on the iphone that uses the wifi/cell triangulation. all it does is twitter to an account you set up based on a cron job. Could be easily set up on the tablet.
|
All times are GMT. The time now is 10:20. |
vBulletin® Version 3.8.8