Feedback & Followups
- 🇺🇸 ID.me developments:
- More NSO Group/Pegasus related developments:
- 🇺🇸 FBI Purchased Now-Banned NSO Group Spyware — tidbits.com/…
- A Second Pegasus By a Different Company Disclosed — www.macobserver.com/…
- 🚿 A new and exclusive deep-dive into the NSO group: The Battle for the World’s Most Powerful Cyberweapon — www.nytimes.com/…
- AirTag Developments:
- A new twist in the AirTags story: Silent AirTags and Other Accessories Raise Privacy Concerns — www.macobserver.com/…
- Apple have released a new Personal Safety User Guide covering all their technologies, including AirTags — tidbits.com/…
> “Offering quick checklists and in-depth feature tasks, this resource is designed to help customers experiencing technology-enabled abuse, stalking, or harassment understand the options available across the Apple ecosystem that can help you protect your personal safety”
- The App Tracking Transparency fallout continues:
- Twitter to expand downvoting test to global audience — www.imore.com/…
- 🇺🇸 The EARN It Act is Back and Coming for Social Media Companies — www.macobserver.com/…
- Facebook’s Failed ‘Diem’ Stablecoin Now Officially Over — www.macobserver.com/…
Deep Dive 1 — Meet Topics, the new FLoC
Last March Google announced Federated Learning of Cohorts as their proposed replacement for tracking cookies. We dug into the detail in a Security Medium on the 7th of March 2021, but the TL;DR is that it was problematic from a privacy point of view, and unlikely to succeed because it required all the browser vendors to get on board an implement the protocol too. That didn’t happen.
The idea of FLoC was that your browser would watch where you surf, then group you into cohorts of other people who surfed to similar sites and give that group an ID that could be used for ad tracking. Instead of targeting individuals, advertisers would be targeting learned groups of similar people. The fact that the groupings were learned meant they could prove very sensitive indeed — collecting people by race, gender identity, sexuality, illness, addiction, anything.
Topics turns the logic around, instead of trying to learn similar people and giving the people an ID, Google will define a taxonomy of safe topics of interest, and then assign people to those topics on a rolling basis. As your surf, your weekly browsing habits get boiled down into a handful of topics, and the previous three weeks’ worth of topics will be used to present information about you to advertisers. Each website will be presented with a randomly chosen but sticky sub-set of your topics, and to add some noise and plausible deniability, 5% of the time a totally random topic will be added to the list. The algorithm is designed to ensure the topics API can’t be used to fingerprint users.
So, from a privacy POV Topics is much better than FLoC (and astronomically better than tracking cookies!).
But, this is still the browser tracking users to facilitate ads, so, Topics depends on other browsers adopting it. Will they? Personally, I doubt it.
There’s another significant problem IMO — because of how the fingerprint-prevention is implemented, the bigger your ad network, the more data you get from the Topics API, so Topics gives a clear advantage to larger ad networks over smaller ones. As Gruber put it, “this is a solution by Google for Google”.
Links
- Google Topics Will Categorize Your Browsing for Advertising — www.macobserver.com/…
- Robin Berjon on ‘Topics’, Google’s Proposed Replacement for FLoC — daringfireball.net/…
- 🎧 SN 856: The “Topics” API – PwnKit Tech Details, DrawnApart, Zerodium Bug Bounties, Log4Shell Hits Ubiquiti — overcast.fm/…
Deep Dive 2 — Apple Makes SMS-based 2FA a Little Less Bad
Last year Apple released an open-source spec to add computer-readable context to 2FA text messages.
For some time now, Apple have had an excellent feature where numbers in the most recent SMS message are automatically offered as an auto-complete suggestion when entering 2FA codes into apps or websites. This is spectacularly convenient, but, that convenience comes with a nasty security sting in the tail — Apple have no idea whether the user is entering the code into the app or site it was intended for, or if they are being phished! Real-time phishing is a thing these days — the bad guys set up a malicious clone of a real site that uses SMS 2FA, and when the user enters their username and password it forwards those on to the real site, triggering the real site to send an SMS message with the code. The fake site presents the user with a box to type in the code, and if they do, forwards it to the real site, letting the attackers in.
The obvious defence here is to always check the domain name of the page you’re entering your credentials into, but not everyone does that, and the fact that Apple very conveniently offers the code as an auto-complete on the phishing site makes the whole process quicker, so there’s less time for the user to notice they’re not where they think they are.
Apple figured it would be great if the SMS messages with the code could tell the OS what site or app they are from, so they could be offered to the user only when appropriate. For that to work there’d need to be an agreed standard structure for the SMS messages. That’s what Apple published last year, and it’s nice and simple.
Each SMS message would have the following parts (I’ve copied these descriptions from the linked iMore article):
- A standard human-readable message, including the code, followed by a new line.
- The scoped domain as
@domain.tld
. - The code repeated again as
#123456
. - If the site uses an embedded HTML element, called an iframe, the source of the iframe is listed after
%
, such as%ecommerce.example
.
Sites are now starting to adopt this standard, and, Apple have added support for it to the most recent releases of iOS, iPadOS & macOS, so, if you’re using a fully up-to-date Apple OS, and you use SMS-based 2FA on a site that supports the new format, you’ll only be presented with the auto-complete suggestion if you really are on the right page, or in the right app.
This makes entering SMS-based 2FA codes a little safer, but it does nothing to address the underlying problem that SMS itself is not a secure or reliable protocol!.
So, it still remains true that SMS 2FA is better than no 2FA, but just about any other 2FA is better than SMS-based 2FA!
Links
- Apple changed how two-factor authentication SMS codes look for better security — www.imore.com/…
- 🎧 Ken Ray gives a nice summary if you prefer to listen rather than read: Checklist 264: Updates and Sharing What You Know — overcast.fm/…
Deep Dive 3 — US Federal Government Issues “Zero-Trust” Memo (by Allison)
The US Office and Management and Budget has released a memo advising the Federal Government on how to improve cybersecurity. The memo is very forward-leading which is honestly surprising for a government agency.
Key points outlined by BastionZero include:
- Elimination of rotating passwords and passwords with special characters
- Dropping use of SMS and phone verification for 2FA, but also getting rid of authenticator app-based 2FA. Instead, it recommends authenticator devices like Yubikey.
- This would require the agencies or companies to push device certs to authenticate, which evidently would require inventory of users’ devices. This is problematic in the BYOD world
- VPNs aren’t recommended either, rather authenticating people to specific services instead of the entire network
- The memo mandates encrypted HTTP, and also encrypted DNS.
- In perhaps the most surprising section, the memo recommends welcoming external partners and independent parties to test their vulnerabilities. This is in stark contrast with the Computer Fraud and Abuse Act which can criminalize those who exceed authorized access.
Links
- Excellent article breaking down the document www.bastionzero.com/…
- Original US Federal Government Memo www.whitehouse.gov/…
❗ Action Alerts
- “PwnKit” security bug gets you root on most Linux distros – what to do — nakedsecurity.sophos.com/…
- Apple fixes major bugs in iOS, iPadOS, macOS, and watchOS software updates — arstechnica.com, macOS Big Sur 11.6.3 and Security Update 2022-001 Catalina — tidbits.com/… & Safari 15.3 — tidbits.com/…
- ‘AccessPress’ Themes and Plugins for WordPress Contains Backdoor — www.macobserver.com/…
- Elementor WordPress plugin has a gaping security hole – update now — nakedsecurity.sophos.com/…
Worthy Warnings
- This NFT on OpenSea Will Steal Your IP Address — www.vice.com/…
- Civicom Data Leak Affects Over 100,000 Files — www.macobserver.com/…
Notable News
- DazzleSpy Mac Malware Used in Targeted Attacks – The Mac Security Blog — www.intego.com/…
- Facebook Rolls Out End-to-End Encrypted Chats for Everyone — www.macobserver.com/…
- Mozilla VPN for Mobile, Desktop Adds Multi-Account Containers — www.macobserver.com/…
- Google One VPN for iPhone Now Available to Use — www.macobserver.com/…
- 📌 🇪🇺 WhatsApp issued EU ultimatum over data use — www.imore.com/…
Top Tips
- Some nice simple human-friendly tips you can share with friends and family: Happy Data Privacy Day – and we really do mean “happy” 🙂 — nakedsecurity.sophos.com/…
- Here’s How to Blur Your House on Apple Maps and Google Maps — www.macobserver.com/…
- A timely reminder of why it’s important to always check the final resting URL you land on, not just the link you click/enter — bad guys love finding ways to make trustworthy websites redirect to their evil sites to hijack trust and reputation: How Phishers Are Slinking Their Links Into LinkedIn — krebsonsecurity.com/…
Excellent Explainers
Interesting Insights
- 🎧 Apple privacy chief Erik Neuenschwander gives Data Privacy Day interview — www.imore.com/…
- 🎧 The story of how the EFF helped podcasters save podcasting from patent trolls: How to Fix the Internet: Saving Podcasts From A Patent Troll — overcast.fm/…
- My first impressions of web3 — moxie.org/…
Palate Cleansers
- 🎧 An excellent interview with William Shatner: StarTalk Radio: Going to Space with William Shatner — overcast.fm/…
Legend
When the textual description of a link is part of the link it is the title of the page being linked to, when the text describing a link is not part of the link it is a description written by Bart.
Emoji | Meaning |
---|---|
🎧 | A link to audio content, probably a podcast. |
❗ | A call to action. |
flag | The story is particularly relevant to people living in a specific country, or, the organisation the story is about is affiliated with the government of a specific country. |
📊 | A link to graphical content, probably a chart, graph, or diagram. |
🧯 | A story that has been over-hyped in the media, or, “no need to light your hair on fire” 🙂 |
💵 | A link to an article behind a paywall. |
📌 | A pinned story, i.e. one to keep an eye on that’s likely to develop into something significant in the future. |
🎩 | A tip of the hat to thank a member of the community for bringing the story to our attention. |