Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Thank you - THIS (Score 2) 141

> reliable UDP protocol You want a reliable *unreliable* datagram protocol protocol? Sounds like something guaranteed to fail. Everyone tries to reinvent TCP. Almost always they make something significantly worse. This is no exception.

I once worked at a company that made Parking Meters - and accepted credit cards at them. They sent their data over https, and had random issues with timeouts.
It turns out they would format their data in (very descriptive) XML, and discovered an excessively large file combined with an SSL handshake over crappy 2g connection took too long to transfer the data (it didn't help the programmers 'forgot' they hardcoded a timeout, so if the comms was just slow, it would throw a generic error and they blamed Apache for it).

In any case, the offshore dev team's solution was to create a UDP client/server protocol of their own.

It was working nicely when I left, and was PCI Compliant, but at that point we had no way to reliably monitor communications from the perspective of the meter because we (SysAdmins in charge of the backend systems) would have had to write proprietary code from non-existing documentation just to replicate what used to be a simple HTTP POST.

Some things look great, but aren't thought out all the way ...

Comment I reported a similar issue to BofA in 2008 (Score 2) 157

Completely against PCI Compliance, they were using your 'account number' (full card number) as your identifier when downloading your statement in PDF form. So their web server logs would have been chock full of credit card numbers in clear text. Doh!

The biggest problem was finding someone to report it to. Customer Service doesn't know dick about Compliance - I had to to cross my fingers that it would get escalated properly. It took about 6 months for that to change.

When I did this 'search test', Most of my hits were PDFs of credit card statements.

Comment Re:How about SourceForge? (Score 1) 104

What does "a community" have to do with whether the tools work or not?

To Quote - " I'd rather use some tools with more of a community than just the 4 of us."
He also never said that there were shortcomings in the toolset they created. It sounds like he may not like the database, maybe he wants a nicer front-end for managing the tables? But it's not described as 'the problem'.

Therefore, if they create a community around their own toolset, then the only problem actually described in the OP is resolved.

Comment Re:I read the documents. (Score 0) 195

In p 31 he is asked to hand over the SSL and TLS keys for his service, which in practical terms it would allow the FBI to eavesdrop in the communications of *everybody* at will, this with all certainty would have meant a breach of contract with his users, lawsuits would have ensued. Would the FBI have paid for the damages?

Most importantly Lavabit was willing to comply with the original request, which was limited to a single email account.

You'll have to try harder if you want to dispel the positive aura around Ladar..

Of course he was asked to hand over the SSL keys, he refused to hand over the requested information in the first place.

Duplicating incoming and outgoing email, on a server you own and apparently WROTE THE CODE FOR, is trivial. Even Exchange can do it. Page 7 is the request for mailbox contents, but a separate device is NOT REQUIRED . It should be obvious that using SMTP means the data is in clear text until it's encrypted - at rest.

At best, he's an incompetent admin, and you want him to secure your email?

Comment LOL (Score -1, Flamebait) 195

It's going to be called 'LavaCircle'. And the whitepaper that's produced to explain it will include a lot of busy work and confusion, and the result will be locally encrypted/decrypted files.

Then, when someone asks how that can actually be secure, Ladar will throw a tizzy and claim all our constitutional rights are being trampled on.

Comment Re:lavabit should have helped the first time (Score 1) 230

Well - public/private key encryption comes to mind. Your users would just need a local client, either plugged into a fat client, run as Java (like the CA provider), or using opengpg's javascript or Chrome plugins. The solutions exist, Lavabit just created an overly complex 'paper shuffling' process to hide the fact it's not really secure.

I believe the content of the email was encrypted at all times. But a mail server has to have information on sending and receiving the mail. so not all data can be encrypted by the user's key.

It can't be encrypted at all times if a normal client is able to view it. It was merely encrypted at rest, with a single encryption/decryption key stored on the same server.

So what's the problem with providing account information and log data for a single account, requested by court order? If Snowden's a whistleblower, then there's nothing to be afraid of. If he's sending highly classified data to the Russians... uhm, my age is showing... Chinese, and using 'whistleblower' as a cover for his actions, then we have a problem. That's not Ladar's call to make. That's why there are professional investigators involved, a 'Federal Bureau', as it were.

It's a problem when all of the reporters on that list end up going missing a short time afterwards. You are fra too trusting of the government here. Think of this situation like it were reversed, and a Russian or Chinese operative was exposing their dirty laundry to the world in the US. Think of the things that these regimes would do. Now, realize that the US would do all of the same things if they could manage to keep it quiet.

Assuming every corner of the government was in on it. Most of those people are just doing their jobs. Trails of bodies tend to attract attention

Also, the theory that he was very publicly a whistleblower as a cover to give foreign governments intel is ridiculous. That's about the worst way to try and accomplish that.

We are talking about the genius who, upon deciding to commit treason, used an account with his name on it - not even an alias.
So either he's incredibly stupid, or incredibly intelligent. It would be incredibly intelligent to save your ass from the fire by making yourself appear to be a folk hero.

Comment Re:lavabit should have helped the first time (Score 1) 230

'Clearly'. I disagree. He was being an ass, and the operation didn't have the security he touted in the first place - it's like buying a lockbox at a bank, but giving your stuff to the teller to put in the box. That's not secure.

The system was about as secure as an email service you don't personally host can be, at least as far as the general model goes.

Well - public/private key encryption comes to mind. Your users would just need a local client, either plugged into a fat client, run as Java (like the CA provider), or using opengpg's javascript or Chrome plugins. The solutions exist, Lavabit just created an overly complex 'paper shuffling' process to hide the fact it's not really secure.

As an email service provider, I can attest these orders are not executed by the NSA, they're part of investigations performed by the FBI. They DO NOT want any more info than is listed on the court order. Are you kidding me? Using evidence gained illegally as part of a prosecution? A defense lawyer would have a field day with that.

They were searching for information on Snowden. They weren't looking for information for a trial. They were trying to find out who he was in contact and exactly what he had so they could control the situation.

So what's the problem with providing account information and log data for a single account, requested by court order? If Snowden's a whistleblower, then there's nothing to be afraid of. If he's sending highly classified data to the Russians... uhm, my age is showing... Chinese, and using 'whistleblower' as a cover for his actions, then we have a problem. That's not Ladar's call to make. That's why there are professional investigators involved, a 'Federal Bureau', as it were.

Comment Re:lavabit should have helped the first time (Score 1) 230

Reading a little bit further into the docs, it would appear that they initially wanted a bit more access than he was comfortable giving. They wouldn't let him just give the info after 60 days and wanted a trace device that would let them intercept information unencrypted in real time. The court order only gave them permission to intercept certain information, but they would have had access to much more, and it would have compromised the security of their entire operation. Given the information we have available right now about US spy agencies' utter disrespect for the rule of law, he clearly made the right choice.

'Clearly'. I disagree. He was being an ass, and the operation didn't have the security he touted in the first place - it's like buying a lockbox at a bank, but giving your stuff to the teller to put in the box. That's not secure.

As an email service provider, I can attest these orders are not executed by the NSA, they're part of investigations performed by the FBI. They DO NOT want any more info than is listed on the court order. Are you kidding me? Using evidence gained illegally as part of a prosecution? A defense lawyer would have a field day with that.

If you mean that he made the right choice in talking with the media about the abuse of the government taking his SSL keys, instead of talking about his lack of cooperation, then yeah, I agree he made the choice that was in his best interests. No publicity is bad publicity they say.

Comment Re:Wait a second... (Score 1) 230

As I recall, each paying Lavabit customers' email storage was encrypted using a key of the respective customers' choosing. Lavabit did not have these keys and could not, themselves, read customers' email, even if they wanted to. So, I'm to believe that you can be charged with contempt for not providing something that you don't have?

The encryption key was encrypted by the user's password. Merely intercepting the user's password would decrypt the mailbox. Since they wrote the software, it would be trivial to log the password for any or all user's accounts. It was not much more than 'security by obscurity'.

The contempt part should relate to his all out lack of cooperation, as the original request wasn't even for mailbox data - it was for metadata. He escalated it to requiring SSL keys, because the government didn't trust him. Unless you want the government to charge people with crimes without a proper investigation, there's no reason to ignore a signed metadata request (from a non-FISA court for that matter).

Comment Re:lavabit should have helped the first time (Score 1) 230

Do you have a source on that? IIRC, they have agreed to install 'pen register' devices in the past. Those provide no useful information for users of their paid accounts because it is all encrypted. They even eventually provided the SSL key, albeit in a very spiteful manner. You are correct that the details of the whole situation are not all out yet, but when everything comes to light, it's usually the authoritarian governments acting in the shadows that come out as the bad guys. With the given evidence out so far, the level needed to justify everything they've done would have to be that they know of a serious threat to all life on Earth, and said threat could come from anywhere, likely involving leaders of other world governments. Anything short of that would mean that the NSA should be taken down.

Read the first document Only metadata was requested, Ladar refused, and the government escalated.

It's not reported that way because 'company ignores warrant for user account information' isn't anywhere near as flashy as 'ZOMG GUBERMENT SPYING ON US!'

The NSA isn't even involved in this. This is a company owner refusing to provide BASIC information, and the government taking logical steps in order to attain the information a non-FISA court agreed was needed in their investigation. One particular person is benefiting immensely from media manipulation, and it's the same person who claimed he could encrypt and decrypt data, and not have access to it.

Comment Re:Blatantly wrong (Score 1) 230

In the case of Lavabit, the government demanded, and was given, a warrant for the HTTPS private key to monitor the online actions of a couple of defendants. This would allow the FBI to monitor not only the specific defendants, but all Lavabit customers.

And I want to be totally clear about this: The government asked to install a pen trap device *and* have the private keys which would have allowed it to monitor all Lavabit customers.

(Unlike phone companies, E-mail providers are under no legal obligation to make surveillance easy, or even possible, by the government.)

Third parties have a duty to assist law enforcement, but that duty does not extend "regardless of the burden involved". The ACLU argument is that giving over the private keys would have completely destroyed the Lavabit business, which was an unreasonable burden to take in assisting law enforcement.

Ladar destroyed his 'business' (Secure storage where the storing party holds the keys? Not possible) by not handing over the requested METADATA in the first place. By not handing over data that a judge deemed was necessary in an ongoing investigation, the government escalated to the point of pentrap / SSL keys.

You do when they have a warrant.

Just saying "You do when they have a warrant" is no longer sufficient. There's ample evidence that judicial oversight has been compromised by the FISA court et al., and this is a particularly strong case of government overreach.

You can't take warrants at face value any more.

There was no FISA court involved in this issue. It was a standard warrant.

Read the first document - there's nothing in that request that should be objected to - unless you want people to be charged with a crime without a proper investigation. Feel free to compare that court with the list of FISA courts at Wikipedia.

Ladar is playing you all - and you're all falling for it. The NSA spying is most definitely an issue, but this has nothing to do with NSA spying.

Comment Re:Civil disobedience has a cost ... (Score 1) 230

You don't when that warrant is ethically and Constitutionally wrong ...

You are mistaken, there is nothing in the Constitution that says you can pick and choose which warrants issued by a valid court you will obey.

What you are thinking of is called "civil disobedience", and civil disobedience often has a cost. Precisely the sort of thing we are seeing with respect to the contempt charge in this case. Civil disobedience is not an end run around the law nor a get out of trouble free card. What it is is a way to preserve your personal sense of ethics and a way to draw attention to and raise public awareness of an unjust law with the goal of amending or repealing the unjust law.

Right. There was nothing wrong with the initial request Lavabit received. It requested metadata for a single account, and was signed off by a judge. By ignoring that request, Ladar escalated the issue into one of epic proportions. From one perspective, an investigator is requesting the steps that need to be taken in order to fulfill the initial request. From another perspective, the government is taking the 'keys to the kingdom'.

There was no reason for Lavabit to not turn over metadata other than Ladar didn't want to. He should be in jail.

Slashdot Top Deals

NOWPRINT. NOWPRINT. Clemclone, back to the shadows again. - The Firesign Theater

Working...