![]() |
Security (NSA, Android app, any app, OS...)
Call me a masochist, Jolla is sitting next to me yet I still bang on the keyboard and let the 'soon' last a little longer :), still was thinking about this for a while, so here goes.
The question: How can you tell? (if your device is secure, if the app doesn't sneakily send out your private data) First thing that comes to mind: Wireshark on device -> Yamas or any other MITM tool (N900 should work nicely for this, also wireshark on it doesn't have to wait for Wayland support) -> router Compare what Wireshark gives you vs what Yamas captures, matches = no low level sneaky stuff in OS (is this positive/conclusive? can something sneak through MITM?) Verifying apps is getting a little trickier. Sure you can capture, but most apps will encode data, so even if you get same dump, you will not know what is inside (your contacts/addresses?). Yamas will help only with https, so no luck here. One way would be to provide crooked ssl.so that is decodable/predictable, though seeing what measures people put in skype vs reveng one could assume an NSA app will come with its own libraries. Play with the clock/random number generator of the device (would that be even possible or would the whole system crash/die?) so their own lib generates multiple times the same encoding (prepare contacts and all other worth stealing info on the device so you can repeat this as many times as you want and deduce the algorithm from there?) So, is there a way to really NSA-proof yourself? (even if proprietary-binary scenario with fake .so's is unrealistic, would vetting the system with Wireshark/MITM actually give some insight?) |
Re: Security (NSA, Android app, any app, OS...)
Quote:
|
Re: Security (NSA, Android app, any app, OS...)
Quote:
|
Re: Security (NSA, Android app, any app, OS...)
Well even if there are options (and yes of course it is doable :) ), the fact and the matters is, that it is really hard to convince average joe (even if average joe happens to be a family member/a good friend) to transition away from skype or application X, or just ordinary voice calls.
|
Re: Security (NSA, Android app, any app, OS...)
Quote:
|
Re: Security (NSA, Android app, any app, OS...)
The fact that we're having to think about NSA-proofing our devices is going to crest and the thoughts of "Why even use this stuff?" needs to start happening... but not at risk of hurting companies like Jolla, but to state that we're just "tired of it and we're not taking it anymore..."
I'm going to subscribe to this thread. Can't wait to see if anything actually comes out of it. |
Re: Security (NSA, Android app, any app, OS...)
I don't think there is a practical way to proof that the device is totally safe, unless you're able to make it live all the time 'sandboxed' into your own tapping monitoring: your own (portable) BTS to bridge GSM communications and similarly for WLAN.
As, what if the Qualcomm firmware every second full moon and x MB of traffic decides to 'fart out' to somewhere a concise summary of your last communications? It would be a needle in a haystack that not even the sailors who signed NDAs with their providers would know its existance. |
Re: Security (NSA, Android app, any app, OS...)
Quote:
An "one-click-safe-from-NSA-voicecalls" solution;
Quote:
Imagine that instead of having a direct voicecall between A&B subscribers you could also set up the system so that both parties have their own connection point in their own controlled networks. After each party sets up connection to their own systems, call could be routed via TOR or similar approach between the connection points :D |
Re: Security (NSA, Android app, any app, OS...)
Quote:
The main problem with phone call encryption is that you're either dealing with the restraints of mobile data latencies (eww) or the already-low bandwidth of a GSM call (eww eww). The best approach would be to implement proper, endpoints-only, key exchange and modern encryption algorithms, possibly with rekeying to prevent dictionary/hash table attacks as part of mobile standards. But the spooks won't let us have that :( It's not too late to change though - we could have this in VoLTE. Nobody uses it yet - maybe someone at ITU could propose this change? |
Re: Security (NSA, Android app, any app, OS...)
I know of only one possibly viable, practical (temporary)solution that I would be confident in.
There are 2 problems to remember when securing your Android device, #1 is that because Android is not open source, it is more likely to have backdoors in it for the NSA, just as Windows or Apple products do. For that reason it will be vulnerable even with encryption tools such as Redphone so long as Anddroid is installed. This is akin to how HTML5 video tags (and scripts etc.) can leak DNS info while you are on the TOR network, usurping the security it provides. Secondly, even if you put an open source alternative to it such as Replicant on the device, there is the fact that all network traffic is being monitored. This is where encryption comes in. Now as was previously mentioned, encryption over these networks can cause problems with call quality. So the only alternative I can think of is this: 1. Use an open source OS such as Replicant 2. Make calls via WIFI rather than the cellular network and encrypt them. Now no2 is a bit tricky because most people prefer Skype which will also allow such calls but it's a Microsoft product and will never be secure. So the trickiest part is to ditch Skype and convince your circle of colleagues to do the same, in favor of a SIP application such as linphone or CSipSimple and use something that encrypts it as securely as possible such as the FREE Ostel.co service. The details on doing this, as well as lots of excellent tips and links to securing your data from the treasonous cold war being levied on us by traitors in the NSSA can be found at: http:///prism-break.org Now this will mean that you will need to use WIFI(not 3g etc.) to make calls, but if security is important to you, then you will adapt to this or just keep it to yourself. |
All times are GMT. The time now is 04:13. |
vBulletin® Version 3.8.8