Confidentiality in the Face of Pervasive Surveillance
RFC 7624 addresses confidentiality threats post-2013 surveillance revelations. It defines attacker models, vulnerabilities, and encryption's role in protecting against eavesdropping, emphasizing Internet security enhancements against pervasive surveillance.
Read original articleThe RFC 7624 discusses the threat model and problem statement regarding confidentiality in the face of pervasive surveillance, following the revelations of widespread surveillance in 2013. The document outlines an idealized passive pervasive attacker interested in undetected eavesdropping, based on known attacks. It emphasizes the need for addressing vulnerabilities exploited in these attacks to ensure user trust in the Internet. The attacker's capabilities, costs, and security considerations are detailed, focusing on classes of attacks not previously addressed in Internet engineering. Terminology specific to the attacks is defined, including passive and active pervasive attacks. The attacker's ability to observe and infer information from communications is highlighted, with encryption providing partial protection against inference. The document aims to describe the threats posed by pervasive attacks and the necessary solutions to secure the Internet against them. It sets the stage for further discussions on safeguarding Internet communications from surveillance threats.
Related
EU Council has withdrawn the vote on Chat Control
The EU Council withdrew the vote on Belgium's Chat Control plan due to lack of support. Critics raised privacy concerns over monitoring chat messages and client-side scanning. Uncertainty looms as discussions resume post-summer.
Simple ways to find exposed sensitive information
Various methods to find exposed sensitive information are discussed, including search engine dorking, Github searches, and PublicWWW for hardcoded API keys. Risks of misconfigured AWS S3 buckets are highlighted, stressing data confidentiality.
BeyondCorp (2014)
Google's BeyondCorp approach rethinks enterprise security by moving away from traditional perimeter security to enhance protection in the changing tech environment. Visit the link for more details on this innovative strategy.
Google: Stop Burning Counterterrorism Operations
Google's Project Zero and TAG exposed a U.S.-allied government's counterterrorism operation, sparking debate on the impact of revealing such information. Cyber operations play a crucial role in counterterrorism efforts, balancing intelligence gathering with minimizing risks.
Why I Attack
Nicholas Carlini, a computer science professor, focuses on attacking systems due to a passion for solving puzzles. He categorizes vulnerabilities as patchable or unpatchable, stresses responsible disclosure, and highlights the importance of going public to prevent future exploitation.
The kind of capital-F Freedom that is supposed to exist in the Free World is in practice just the gap between what's practical to control hierarchically and the level of desired power to control (effectively limitless). Technology continues to narrow the gap.
Some of the themes of societal change in my lifetime are: reduced trust, reduced privacy, centralization of power, increased economic efficiency at the expense of robustness, and increased profit extraction at the expense of nearly everything else.
I have all of this scripted to launch trivially within a few seconds, and it reduces the effectiveness of most of the attacks this RFC describes.
Was hoping for some new tips on what to do about government agencies demanding information from constituents and then storing it in MS Windows.
2) Therefore: "Protocols that do not encrypt their payload make the entire content of the communication available to the idealized attacker along their path."
3) Furthermore: "When store-and-forward protocols are used, intermediaries leave this data subject to observation by an attacker that has compromised these intermediaries..."
I will now prove a negative: If the idealized attacker has 1 then they've already achieved 3. Therefore this is a bullshit line of argument.
What next? Read your eyeballs with your web cam? Do I need to encrypt traffic on loopback? Where is "reasonable" here? There is no such thing as absolute zero trust or absolute air gap. Is the "idealized defender" an idiot who thinks that encrypting loopback mitigates pwnage at the os or hardware level? What role does deception, salting, misdirection play in a healthy security posture?
This should be interpreted as a followon to RFC 7258 (cited in the Introduction): "While PM is an attack, other forms of monitoring that might fit the definition of PM can be beneficial and not part of any attack, e.g., network management functions monitor packets or flows..."
I am reminded of this from RFC 1034: "Clients of the domain system should be able to identify trusted name servers they prefer to use before accepting referrals to name servers outside of this 'trusted' set." and rhetorically now I ask how has that worked out?
Not discounting that the technical issues and scenarios are valid, but to point out the blatantly political nature of this rhetoric.
What this gets us at the level of technical implementation is e.g. qname minimization, which in turn begets moaning about lame delegations (I don't deny they are a problem) and the horrible horrible excess traffic they cause... entirely omitting the fact that qname minimization can double the number of unprimed queries required to resolve a name. Just one example.
Related
EU Council has withdrawn the vote on Chat Control
The EU Council withdrew the vote on Belgium's Chat Control plan due to lack of support. Critics raised privacy concerns over monitoring chat messages and client-side scanning. Uncertainty looms as discussions resume post-summer.
Simple ways to find exposed sensitive information
Various methods to find exposed sensitive information are discussed, including search engine dorking, Github searches, and PublicWWW for hardcoded API keys. Risks of misconfigured AWS S3 buckets are highlighted, stressing data confidentiality.
BeyondCorp (2014)
Google's BeyondCorp approach rethinks enterprise security by moving away from traditional perimeter security to enhance protection in the changing tech environment. Visit the link for more details on this innovative strategy.
Google: Stop Burning Counterterrorism Operations
Google's Project Zero and TAG exposed a U.S.-allied government's counterterrorism operation, sparking debate on the impact of revealing such information. Cyber operations play a crucial role in counterterrorism efforts, balancing intelligence gathering with minimizing risks.
Why I Attack
Nicholas Carlini, a computer science professor, focuses on attacking systems due to a passion for solving puzzles. He categorizes vulnerabilities as patchable or unpatchable, stresses responsible disclosure, and highlights the importance of going public to prevent future exploitation.