hhmx.de

Dieses Fediverse-Konto und seine Inhalte werden nicht von hhmx.de verwaltet. Die kontoführende Instanz ist infosec.exchange - die originale Adresse ist https://infosec.exchange/@rene_mobile.

rene_mobile@infosec.exchange
rene_mobile@infosec.exchange

Renรฉ Mayrhofer :verified: ๐Ÿ‡บ๐Ÿ‡ฆ ๐Ÿ‡น๐Ÿ‡ผ

(@rene_mobile@infosec.exchange)

Sa 05.11.2022

Beiträge: 2.391Folgt: 366Folgende: 1.198

Prof. for networks and security at + dabbling in Android platform security at . This account will mostly carry IT security stuff, occasionally politics and other comedy.

Screeching voice of the minority. I will not cooperate with fascists or nazis - traditional or neo; Austrian, German, US, Russian, or otherwise. I will not help build surveillance and oppression states. Never again.

"I need privacy, not because my actions are questionable, but because your judgement and intentions are."

Statements are only my own opinion, not my employers'.

This is currently my primary infosec account in the . It should be through tootfinder.ch. Previous Twitter posts are available in archival form at twitterarchive.mayrhofer.eu.or.

infosec.exchange · mastodon · 2025-05-14 11:51:15

Föderation EN Mi 14.05.2025 08:05:37

Last Friday, we (again) added a statement on the next iteration of the ministry of internal affairs trying to legalize for secret services: parlament.gv.at/gegenstand/XXV

TL;DR: It is a slight improvement over the last draft, but still doesn't align with technical reality.

Föderation EN Do 27.02.2025 16:52:11

Because <reasons> in right now, we seem to again have the debate about "chat surveillance" () on the (newly forming) government level...

The arguments and facts have not changed, so I am just posting my last public presentation slides [mayrhofer.eu.org/talk/secure-m] and recording [media.ccc.de/v/26cd6d27-247f-5] again. Oh, and ins.jku.at/chatcontrol/ is still unchanged as well.

To our new (and old) policymakers: Maybe read/listen and then we can happily talk efficiently about any new ideas that might come up?

CC @epicenter_works @suka_hiroaki @harkank @isec_tugraz @openrightsgroup

Föderation EN Sa 30.03.2024 22:58:50

My current take on the situation, not having read the actual source backdoor commits yet (thanks a lot for hiding the evidence at this point...) besides reading what others have written about it (cf. boehs.org/node/everything-i-kn for a good timeline):

1. This is going to be an excellent teaching example for advanced supply chain attacks that I will definitely be using in the future - after much more in-depth analysis.

2. It seems to have been a long game, executed with an impressive sequence of steps and preparation, including e.g. disabling OSSFuzz checks for the particular code path and pressuring the original maintainer into accepting the (malicious) contributions.

3. The potential impact could have been massive, and we got incredibly lucky that it was caught and reported (openwall.com/lists/oss-securit) early. Don't count on such luck in the future.

4. Given the luck involved in this case, we need to assume a number of other, currently unknown supply chain backdoors that were successfully deployed with comparable sophistication and are probably active in the field.

5. Safe(r) languages like for such central library dependencies would maybe (really big maybe) have made it a bit harder to push a backdoor like this because - if and only if the safety features are used idiomatically in an open source project - reasonably looking code is (a bit?) more limited in the sneaky behavior it could include. We should still very much use those languages over C/C++ for infrastructure code because the much larger class of unintentional bugs is significantly mitigated, but I believe (without data to back it up) that even such "bugdoor" type changes will be harder to execute. However, given the sophistication in this case, it may not have helped at all. The attacker(s) have shown to be clever enough.

6. Sandboxing library code may have helped - as the attacker(s) explicitly disabled e.g. landlock, that might already have had some impact. We should create better tooling to make it much easier to link to infrastructure libraries in a sandboxed way (although that will have performance implications in many cases).

7. Automatic reproducible builds verification would have mitigated this particular vector of backdoor distribution, and the Debian team seems to be using the reproducibility advances of the last decade to verify/rebuild the build servers. We should build library and infrastructure code in a fully reproducible manner *and* automatically verify it, e.g. with added transparency logs for both source and binary artefacts. In general, it does however not prevent this kind of supply chain attack that directly targets source code at the "leaf" projects in Git commits.

8. Verifying the real-life identity of contributors to open source projects is hard and a difficult trade-off. Something similar to the -of-trust would potentially have mitigated this style of attack somewhat, but with a different trade-off. We might have to think much harder about trust in individual accounts, and for some projects requiring a link to a real-world country-issued ID document may be the right balance (for others it wouldn't work). That is neither an easy nor a quick path, though. Also note that sophisticated nation state attackers will probably not have a problem procuring "good" fake IDs. It might still raise the bar, though.

9. What happened here seems clearly criminal - at least under my IANAL naive understanding of EU criminal law. There was clear intent to cause harm, and that makes the specific method less important. The legal system should also be able to help in mitigating supply chain attacks; not in preventing them, but in making them more costly if attackers can be tracked down (this is difficult in itself, see point 8) and face risk of punishment after the fact.

H/T @GossiTheDog @AndresFreundTec @danderson @briankrebs @eloy

Föderation · Di 04.07.2023 11:48:13

Today, two open letters from academics on the scientific arguments against the current (client side scanning) initiatives have been released:

* The first (in English, internationally coordinated) one is online at tinyurl.com/CSAScientistsLette and still open for additional signatures.

* The second (in German, by academics) one is online at ins.jku.at/chatcontrol/ and explicitly includes law experts in addition to the arguments from a security, privacy, and AI perspective.

This debate is expected to gain new steam with taking over the EU council presidency, given recently leaked statements like "Ideally, in our view, it would be desirable to legislatively prevent EU-based service providers from implementing end-to-end encryption" (wired.co.uk/article/europe-bre).

Please boost on any channels you deem adequate. The discussion is still open, and we have little time to bring it to a more rational level.