|
2012-07-12
, 20:15
|
Posts: 155 |
Thanked: 315 times |
Joined on Jun 2010
@ DE
|
#1212
|
smscon -alarm [ref] filename
smscon -add imsi
smscon -remove imsi
smscon provides a new command line option to supply a password-B to access encrypted data (e.g. mount container or partition). This password-B is generated from a password-A (provided by regular user) which is somehow modified/signed using the IMSI (and perhaps IMEI). Password-A may be stored plain text on phone. It is needless without having entered the correct SIM PIN because IMSI is only available with SIM PIN.
Given this, the correct SIM PIN could open the phone completely including access to TrueCrypt data. Without PIN the phone offers only irrelevant or encrypted data.
Since IMSI in this concept becomes a key to encrypted data, smscon 0.10.6-1 will no longer store IMSI codes to detect authorized SIM cards.
The Following 10 Users Say Thank You to yablacky For This Useful Post: | ||
|
2012-07-12
, 21:51
|
|
Posts: 1,648 |
Thanked: 2,122 times |
Joined on Mar 2007
@ UNKLE's Never Never Land
|
#1213
|
|
2012-07-13
, 15:58
|
|
Posts: 5,028 |
Thanked: 8,613 times |
Joined on Mar 2011
|
#1214
|
The Following User Says Thank You to Estel For This Useful Post: | ||
|
2012-07-13
, 17:06
|
Posts: 155 |
Thanked: 315 times |
Joined on Jun 2010
@ DE
|
#1215
|
yablacky, while idea of using IMSI as an de-facto key for truecrypt - isn't it offering too low security? It's numbers only - I don't have hard data with me, but bruteforcing it would be orders of magnitude easier, than any TrueCrypt password should be - yep?
Isn't it becoming security through obscurity (i.e. relying on fact, that attacker doesn't know - usually - way used to deliver password from PIN and IMSI)?
|
2012-07-13
, 21:12
|
|
Posts: 5,028 |
Thanked: 8,613 times |
Joined on Mar 2011
|
#1216
|
|
2012-07-14
, 16:01
|
Posts: 155 |
Thanked: 315 times |
Joined on Jun 2010
@ DE
|
#1218
|
...
But, I fail to understand, how it helps us to avoid need for lock code kicking in every 5, 15, or 30 minutes? If we have our device in use without lock code auto-lock feature, thief can access our encrypted data, because it's mounted on boot, anyway. OTOH, if we use auto-lock code, we can't use smsCON after reboot. That was the deal.
I'm too slow, or it is not this stage yet?
|
2012-07-14
, 16:47
|
|
Posts: 548 |
Thanked: 562 times |
Joined on Aug 2011
@ Germany
|
#1219
|
Any chance this awsome app would be ported to N9(50) someday? I may really miss it someday if my N9 get lost/stolen. :/
The Following User Says Thank You to willi6868 For This Useful Post: | ||
|
2012-07-14
, 20:39
|
Posts: 1,341 |
Thanked: 708 times |
Joined on Feb 2010
|
#1220
|
The IMSI is a 15-digit number, appox. 50 bits. I agree, this nowadays is not very secure against brute force attacks.
I tried a lot to access other data on the SIM which requires PIN, e.g. the address book. This could provide more bits to the key. I just had no success yet to query the SIM phone book programmatically Has anybody tried this successfully? It could help a lot.
On the other hand, some may find that 50 bits are enough for their data on the phone. The usual thief or finder would not try to crack it brute force. Those having real sensitive data should of course not protect data using a 15 digit number...
The Following 2 Users Say Thank You to zimon For This Useful Post: | ||
And (deleting received SMS-commands) makes also sense in terms of security somehow..
Michael