Feedback & Followups
- Following on from Apple’s introduction of support for FIDO2 in iOS 13, Google now allow you to use an iPhone as a hardware security token — nakedsecurity.sophos.com/…
- 🇺🇸 Following on from YouTube’s recent $170 million fine for breaching COPPA, a bi-partisan bill has been introduced in the US House of Representatives named the PROTECT Kids Act which basically extends COPPA from 13 to 16 years of age, and add a right to be forgotten (Editorial by Bart: the introduction of a bill is a very early step on the long road to an idea becoming law, but it’s interesting to see elected representatives seriously consider such a law) — nakedsecurity.sophos.com/…
- 🎧 Related Listening Suggestion: Reset: The YouTubers are freaked — overcast.fm/…
- 🎧 Related Listening Suggestion: Reset: The YouTubers are freaked — overcast.fm/…
- Microsoft now reviewing Skype audio in ‘secure’ places (not China) — nakedsecurity.sophos.com/…
- Adobe’s Creative Cloud now supports ‘Sign In with Apple’ — www.imore.com/…
- Apple’s new privacy features have further rattled the location-based ad market — digiday.com/…:
“Right now opt-in rates to share data with apps when they’re not in use are often below 50%, said Benoit Grouchko, who runs the ad tech business Teemo that creates software for apps to collect location data. Three years ago those opt-in rates were closer to 100%, he said. Higher opt-in rates prevailed when people weren’t aware that they even had a choice.”
…
“Seven in 10 of the iPhone users tracked by location-verification business Location Sciences downloaded iOS 13 in the six weeks after it first became available, and 80% of those users stopped all background tracking across their devices.” - Social media companies continue their battle against abuses of their platforms:
Deep Dives
❗ The CurveBall Windows Crypto Bug
Microsoft have patched a bug in the core cryptography library used by Windows 10 (and Windows Server 2016). The bug allows attackers to create forged certificates that Windows will consider valid in many circumstances.
This core crypto library is used throughout the OS, so this bug can affect everything from digitally signed apps, drivers and app updates to secured websites. Thankfully the certificates used to sign Windows updates are pinned, so they can’t be forged.
The potential dangers are still very real though. Attackers could execute Man-in-the-middle attacks against HTTPS websites without triggering warnings, intercept automatic software update processes in 3rd party apps and inject malware into the updates, or publish apps or drives that appear to be digitally signed by legitimate companies, but are actually booby-trapped with malware.
Protecting yourself is very easy — apply this month’s Windows updates!
Links
- Serious Microsoft crypto vulnerability – patch right now — nakedsecurity.sophos.com/…
- NSA and Github ‘rickrolled’ using Windows CryptoAPI bug — nakedsecurity.sophos.com/…
- Looking for silver linings in the CVE-2020-0601 crypto vulnerability — nakedsecurity.sophos.com/…
🇺🇸 Round 2 in US -v- Apple Encryption Fight
The US government continues to put pressure on Apple to decrypt the two iPhones belonging to the so-called Pensacola shooter.
The US President and DOJ continue to lead the attack against Apple, claiming Apple are refusing to help them. Apple take great issue with this, and point out that they have answered every request for information promptly and with as much information as they have. This includes multiple gigabytes of data from iCloud backups.
The phones in question are older models, so we know the US government has access to tools that have been shown to be able to crack these older models. This makes it clear that this is not really about this specific attack, but an attempt to secure some kind of more general back-door.
The President and Attorney General either don’t understand how encryption works or, are choosing to pretend they don’t.
It’s not the case that Apple have the ability to crack phones but are choosing not to. The secure enclave and other recent technological advances mean the phones are truly encrypted, and Apple do not have the keys.
The only thing Apple could conceivably do is develop a special version of iOS that prevents devices auto-wiping when the password is entered incorrectly multiple times, or, to reduce the timeout after multiple failed guesses. This would not actually crack the phones, but it would speed up brute-force attacks against the phones. With the modern secure enclaves, it’s not clear just how big a speedup is possible though — at least some of the delay is caused by the secure enclave hardware, so that can never be removed.
Another possibility would be the passage of a law that requires Apple to remove the truly secure encryption they implement now and replace it with less secure encryption that could be more easily cracked. That, of course, would benefit every malefactor around the world — criminals as well as hostile governments, and put everyone, including US government officials, at more risk.
Links:
- Justice Department announces the findings of the Florida base shooting — www.imore.com/…
- Apple blasts FBI claim it was unhelpful in Pensacola shooter investigation — www.imore.com/…
- President Donald Trump says that Apple should ‘step up to the plate’ and unlock criminal’s phones — www.imore.com/…
- President Trump at Davos: Apple has keys to the criminal mind! — www.imore.com/…
- Apple says no to unlocking shooter’s phone; AG and Trump lash back — nakedsecurity.sophos.com/…
- The FBI doesn’t need Apple to unlock Pensacola gunman’s phones — www.imore.com/…
- Privacy advocates lend their weight to Apple’s case against the FBI over encryption — www.imore.com/…
- 💵 Barr’s Encryption Push Is Decades in the Making, but Troubles Some at FBI — www.wsj.com/…
- An avenue by which it might be technically possible to give an iPhone ‘the software equivalent of cancer’ — www.loopinsight.com/…
- Related news:
- The FBI Used a GrayKey to Obtain Data From a Locked iPhone 11 Pro Max — daringfireball.net/…
- Apple publishes transparency report on Government requests for data — www.imore.com/… & China and US top user data requests in Apple transparency report — nakedsecurity.sophos.com/…
- 🇬🇧 Police video shows Cellebrite device in action, says it ‘minimizes intrusion’ — 9to5mac.com/…
- Related: This is what a $10 million iPhone-cracking lab looks like — www.imore.com/…
- Related Explainer: How Modern iPhone Encryption Works — daringfireball.net/…
- Recommended (by Bart) Opinion Pieces
- By former NSA Director Michael Hayden: Encryption Backdoors Won’t Stop Crime But Will Hurt U.S. Tech — www.bloomberg.com/…
- Wall Street Journal Editorial Board op-ed backs Apple in encryption battle — www.loopinsight.com/…
- 🎧 I found this segment of Ken’s daily Apple new show extremely insightful: Mac OS Ken: 01.14.2020 — overcast.fm/…
- A very insightful history & analysis from Rene Richie — FBI vs. Apple: The politics of privacy and the assault on encryption — www.imore.com/…
🇺🇸 Did Apple Abandon End-to-End Encryption of iCloud Backups Because the FBI Asked them to?
Reuters have published a report quoting sources within Apple and the intelligence agencies stating that Apple abandoned plans for full end-to-end encryption of iCloud backups and that they may have done so at the request of the FBI. The original report was not categorical about the casualty, but much subsequent reporting on that original reporting has been. The original report points out that the other rationale for not providing true end-to-end encryption on backups — if you do, the backups become useless if the user forgets their password!
Apple briefly implemented optional truly end-to-end encryption of cloud backups for users of their original Two-Step authentication, but rolled back from that approach when they moved to their current Two-Factor authentication system. At the time the reasoning was simple — Apple was finding itself having to tell customers they could not help them recover their treasured data too often.
It’s very important to note that iCloud backups are encrypted! It’s just that right now, two people hold those encryption keys — the user, and Apple. Since Apple have the key, they can decrypt the backups, so when presented with a valid subpoena they have no choice but to use them.
Also note that some data within iCloud backups are truly end-to-end encrypted (Apple do not have the keys), including all health data and the contents of the iCloud keychain.
It’s also very important to not Apple do not have the keys for manually created encrypted local backups (via iTunes).
Finally, I (Bart) want to stress that while the Reuters sources probably do genuinely believe Apple made the decision they made because the FBI asked them to, that doesn’t mean they’re correct in that belief! We often assume the motivations behind other people’s actions even when we have no idea what was actually going on in other people’s heads! There’s no need to assume this story could only be false if the sources lied.
Backups are fundamentally different to the devices we use every day, and especially to the portable devices we carry around with us. Our devices live in a hostile world where we need them to fail-secure to protect us. It’s OK for our devices to fail secure precisely because we have backups! For regular folks, backups should not also fail-secure, they need to fail-safe, otherwise when things go badly wrong the backups fail to fulfill their fundamental task! Rene Richie has been eloquently making this argument for years, and I (Bart) agree with him. For most people, Apple’s choice to end-to-end encrypt only the most sensitive data while regularly encrypting the rest is the right choice for the vast majority of Apple users. The only real problem is that Apple are not providing an alternative for the minority of users whose data is so sensitive that it really would be better for it to be destroyed than revealed when things go badly wrong.
Links
- Report claims that Apple may have abandoned plans to fully encrypt iCloud backups after FBI complaint — www.imore.com/…
- Reuters: Apple cut backup end-to-end encryption plans after FBI complained — arstechnica.com
- Apple Allegedly Dropped Full iCloud Backup Encryption under FBI Pressure — tidbits.com/…
- Apple allegedly made nice with FBI by dropping iCloud encryption plan — nakedsecurity.sophos.com/…
- A year ago, in Germany, Tim Cook aid he expected iCloud backups to eventually be end-to-end — daringfireball.net/…
- Mossberg in 2016 told us about “The iCloud loophole” — www.loopinsight.com/…
- Related: Android 9 and Later Offers Encrypted Backups to Google — daringfireball.net/…
- Related Explainer: Here’s the Data Apple Can Give to Law Enforcement — www.macobserver.com/…
- Recommended (by Bart) Opinion Pieces
- Regarding Reuters’s Report That Apple Dropped Plan for Encrypting iCloud Backups — daringfireball.net/…
- Another important insight from John Gruber: 2016 WSJ Story on Apple’s Plans for E2E Encryption for iCloud Data — daringfireball.net/…
- Another thoughtful and insightful break-down of a complex topic by Rene Richie: Did Apple Kill iCloud Backup Encryption for the FBI? — www.imore.com/… or 🎧 Vector: Did Apple Kill iCloud Backup Encryption for the FBI? — overcast.fm/…
The Cable Haunt Cable Modem Vulnerability
A serious flaw has been found in the reference implementation of the drivers for a chipset used in many models of cable modem all over the world. Hardware vendors and ISPs all around the world have used this reference implementation as the starting point for their firmwares, so variations of the vulnerability are extremely wide-spread.
In their worst form, these vulnerabilities allow remote attackers to take full control of users’ cable modems, giving them a very valuable man-in-the-middle position that they can leverage to attack everyone accessing the internet through the modem.
Most unfortunately, most ISPs do not allow end-users to alter the firmware on their modems, so with just a few exceptions, we are all powerless to protect ourselves, we have no choice but to trust our ISPs to do the right thing 🙁
Links
- The bug’s official home page: cablehaunt.com
- ‘Cable Haunt’ vulnerability exposes 200 million cable modem users — nakedsecurity.sophos.com/…
Google’s Criticisms of Apple’s Safari ITP
ITP is Apple’s Intelligent Tracking Protection feature in Safari on iOS and macOS.
Back in December Apple released updates to Safari to tweak ITP to work around some issues with ITP disclosed to it by Google’s Project Zero security researchers.
What Google’s engineers discovered was that, rather ironically, websites could detect if a given domain was being blocked by ITP, and they could probe many domains to get a fingerprint of which domains a specific instance of Safari was blocking, and which it was not. This had two negative side-effects, it allowed sites to detect the other sites a user visits, a direct privacy violation, and, ironically, it allowed for a new form of browser fingerprinting, enabling tracking.
Apple fixed the specific problems Google highlights, but this week Google released a report making the argument that Apple’s design is flawed and that other attacks against it are likely to be discovered.
For now there is no immediate danger, but if Google are correct and Apple’s current design is fundamentally weak, Apple engineers will have a lot of work to do over the coming months!
Links
- Google finds privacy holes in Safari’s ITP anti-tracking system — nakedsecurity.sophos.com/…
> “… some of the attack scenarios suggested by Google would have required websites to invest a fair amount of effort into defeating [ITP]. There is also no evidence that any did. If you’ve been using Safari recently, it’s unlikely your privacy was compromised by the techniques Google discusses.”
❗ Action Alerts
- While the CurveBall patch is by far the most important update released by Microsoft on Patch Tuesday, it’s by no means the only one, be sure to apply the other patches too: Patch Tuesday, January 2020 Edition — krebsonsecurity.com/… & Microsoft fixes critical bugs in CryptoAPI, RD Gateway and .NET — nakedsecurity.sophos.com/…
- The latest Mozilla Firefox update is so important, even the Department of Homeland Security says you should upgrade — www.imore.com/…
- Update now! Popular WordPress plugins [InfiniteWP Client & WP Time Capsule] have password bypass flaws — nakedsecurity.sophos.com/…
Worthy Warnings
- Microsoft issued an advisory warning about an as-yet unpatched zero-day bug in IE that is seeing ‘limited’ exploitation in the wild. There is no official Microsoft patch ATM (though 0patch, a for-profit security vendor has made an unofficial patch available to their customers). Microsoft have published a possible work-around, but it has negative side-effects and needs to be undone or it will prevent future software updates from being applied. Since the risk seems low ATM, it’s probably best for regular users not to apply this workaround, and to consider avoiding IE until the patch is released next patch Tuesday — threatpost.com/…
- 🇺🇸 FBI issues warning about lucrative fake job scams — nakedsecurity.sophos.com/…
- Peekaboo Moments baby-recording app has a bad database booboo — nakedsecurity.sophos.com/…
- A cautionary tale from the real world as Brian Krebs relays a story from an African iPhone user targeted by a clever phishing attack against his iCloud account built around an iPhone X he’d recently lost — krebsonsecurity.com/…
Notable News
- Windows 7 is now officially out of support. Unless you are a large organisation paying (substantially) for extended support, you will no longer get security updates. (Opinion by Bart: The OS is now unsafe to use, and will continue to get ever unsafer as time goes on. It really is time to upgrade!) — nakedsecurity.sophos.com/… & www.cnet.com/…
- 🧯 Microsoft accidentally exposed a customer support database containing 250 million anonymised records for most of December 2019. The data in the DB went back to 2005. Despite there being so many records, very little personal information seems to have been exposed. Only records where the anonymisation failed due to data quality issues seem to pose a risk. Microsoft responded quickly, and have emailed all affected users. Microsoft’s logs also imply that the database was not accessed by any third parties while it was exposed, so there seems to be no reason for anyone who hasn’t heard from Microsoft to worry — nakedsecurity.sophos.com/…
- Microsoft have released their new Chromium-based Edge browser for the Mac (Opinion by Bart: this is a nice addition to the ecosystem, and from my own experiments with the browser I like its privacy settings page a lot, and the browser feels clean and snappy. Plugin availability is not great though, have to use 1PasswordX rather than true integration with the desktop app) — www.macobserver.com/…
- The official download page — www.microsoft.com/…
- How to use Microsoft Edge browser on Mac: The Ultimate Guide — www.imore.com/…
- How to customize privacy settings for Microsoft Edge on Mac — www.imore.com/…
- How to set up parental controls for Microsoft Edge on Mac — www.imore.com/…
- Related Opinion: Top 5 reasons to switch to Microsoft Edge for Mac (and one reason not to) — www.imore.com/…
- Another nail in the venerable SHA-1 Hashing Algorithm’s coffin: Powerful GPG collision attack spells the end for SHA-1 — nakedsecurity.sophos.com/…
- Google announced plans for the future of privacy on its Chrome browser:
- Google plans to phase out the browser’s use of the so-called User Agent String, an HTTP header that tells a website about your browser and computer and replace it with a more privacy-protecting alternative. The change is planned to be rolled out in phases throughout 2020 — www.imore.com/…
- Google plans to kill third-party cookies over the next two years, replacing them with alternatives they say will protect privacy more, while still allowing some tracking — nakedsecurity.sophos.com/… & www.imore.com/…
- 🇬🇧 The Information Commissioners Office (ICO) has released the final version of the *Age Appropriate Design Code *, their proposed regulations for protecting children online. The code needs to be approved by parliament before it comes into effect — nakedsecurity.sophos.com/…
- 🇺🇸 NIST has published the first version of their new Privacy Framework. This framework dovetails with their existing Security Framework. It is intended to guide American companies as they work to bring their privacy processes in line with best practice and modern privacy laws like the EU’s GDPR and California’s CCPA — nakedsecurity.sophos.com/…
Top Tips
- The Complete Guide to Avoiding Online Scams — lifehacker.com/…
- 5 tips to avoid spear-phishing attacks — nakedsecurity.sophos.com/…
Interesting Insights
- The Norwegian Consumer Council (NCC) released a report detailing the data shared by 10 popular apps. They describe the current state of play as ‘completely out of control, harming consumers, societies, and businesses’ — nakedsecurity.sophos.com/…
Palate Cleansers
- 🎧 An interesting look at the pros-and-cons of using massive satellite constellations for providing internet access around the world: Reset: The internet, from SpaceX — overcast.fm/…
Legend
Note: When the textual description of a link is part of the link it is the title of the page being linked to, when the text describing a link is not part of the link it is a description written by Bart.
Emoji | Meaning |
---|---|
🎧 | A link to audio content, probably a podcast |
flag | The story is particularly relevant to people living in a specific country, or, the organisation the story is about is affiliated with the government of a specific country. |
🧯 | A story that has been over-hyped in the media, or, “no need to light your hair on fire” 🙂 |
💵 | A link to an article behind a pay-wall. |
❗ | Very important! |