Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:just run the 2nd OS in a VM and call it a day (Score 1) 378

You guys need thicker tin-foil. Having a VM does not prevent the host from becoming vulnerable connecting to an un-trusted network. Since the host controls all the resources of the guest, neither the guest or host operating system is safe from being tracked/hacked etc. on an un-trusted network. if you don't trust the underlying software (or backing hardware), don't connect it to an un-trusted network!

Would a separate OS hooked up to the same keyboard/display and having a separate controller manage the keyboard and display connections make things more secure?? Or would this just another piece of hardware to hide a key logger? I think it's more hardware redundant useless hardware to keep secure. A piece of limited purpose hardware that would go obsolete before the rest of the more expensive hardware attached to it.

I don't think you can do better on the same device than using dual secure boot w/ firmware verification and encrypted drives for each OS. Unfortunately, I don't think x86 computing has ever properly cared about security so you're SOL for truly secure computing on un-trusted networks... too many independent micro-controllers in an x86 system where you can't verify the firmware. Too many legacy holes.

Comment Re:You can view the strings.. (Score 2) 321

Old news... From the actual block chain itself:

"http://cointelegraph.com/news/113806/warning-kaspersky-alerts-users-of-malware-and-blockchain-abuse

Warning! Kaspersky Alerts Users of Malware and 'Blockchain Abuse'

Kaspersky Labs warns users of a possible exploit in cryptocurrency blockchains
that would allow malicious actors to distribute malware or even images
depicting child abuse.

The warning is the result of research of INTERPOL Cyber threat experts, a group
that includes a Kaspersky employee.

They warn that the extra space provided in each transaction, intended for
notes, messages and as a space to allow additional functions to be built on top
of the blockchain, could in fact be used to spread malicious code or worse.

Kaspersky's report states:

        "The design of the blockchain means there is the possibility of malware
        being injected and permanently hosted with no methods currently available
        to wipe this data. This could affect 'cyber hygiene' as well as the sharing
        of child sexual abuse images where the blockchain could become a safe haven
        for hosting such data."

The blockchain, as CoinTelegraph readers are assuredly aware, is the virtually
unmodifiable public ledger that acts as the backbone for the Bitcoin network.
Once someone commits data to the blockchain, it is there forever unless more
than 51 % of bitcoin miners decide to mine on a modified blockchain that
doesn't include that data. That would be what is called a "hardfork" and would
be extremely difficult if not impossible to pull off, with the current number
of bitcoin users.

Despite Kaspersky's recent warnings, storing illegal data in a compressed
manner has been a concern for the Bitcoin community for a while. In fact, links
to sites containing child abuse images have already been found in early
blockchain blocks and storing an image in a hashed form has also been
accomplished.

Blockchain transactions don't provide enough room to store illegal images in an
uncompressed form effectively. What INTERPOL and Kaspersky seem to be concerned
about is either compressed, hashed, images on the Bitcoin blockchain or
uncompressed images on alternative coin blockchains that allow for more space.

Encrypted and compressed data needs to be uncompressed and decrypted with an
algorithm. Theoretically, since an algorithm is just a set of rules to
interpret data, any code can be turned into any other kind of code. Even the
words of this text could, in theory, be "decrypted" into an image of the
algorithm creator's choosing. It seems extremely unlikely that Bitcoin users
would be subject to prosecution for possession or distribution of child
pornography, when those images don't "exist" without proper decrypting
software.

A more realistic concern would be a small script embedded into the blockchain
that either forces the download and install of more powerful code or somehow
manages to run a damaging script in the few kilobytes of space provided. It
seems it would be difficult to get those scripts to run without user
interaction. Nevertheless, Kaspersky implies that even our private keys could
be at risk.

        "[Blockchain malware] could also enable crime scenarios in the future such
        as the deployment of modular malware, a reshaping of the distribution of
        zero-day attacks, as well as the creation of illegal underground
        marketplaces dealing in private keys which would allow access to this
        data."

Kaspersky stressed that they are believers in decentralized technology like the
blockchain, but pointed out that their role is to identify threats before they
become reality. At press time, there is no known instance of users storing and
executing malware through the Bitcoin blockchain; it is just a possibility that
concerns Kaspersky. They do not, at this time, offer any advice on how users
can keep themselves safe. However, leaving updated anti-virus software running
while blockchains are downloading is probably a good move, even though some
software often finds false positives.

Comments
========

Norton identifies every single cryptocurrency wallet as malware and
automatically deletes it. I'm pretty sure about that as I've tried to run
dozens - and not from small alt coins that might be dodgy, from coins with big
market caps, lots of users, and open source code. You have to restore it after
the fact and tell Norton to let it through.

Personally I suspect that this is the part of the industry making excuses
because they know their products can't deal with cryptocurrency software very
well and they would prefer you to think they are protecting you from these
imaginary threats than to think that they just can't be bothered to update the
way they recognise malware so that it doesn't automatically presume all
blockchain technology is bad.

-Dean Scott Walsh

Kaspersky usually makes a lot of sense, and maybe he's been misquoted, but this
articles makes zero sense to me. How does a few bytes per transactions of
irreversible distributed ledger create a virus risk? Huh? You might want to
focus on say web sites, that have active readers (browsers) that run code. Or
phishing mail with attachments, or operating sytems and virus scanning systems
that blacklist and hence fail open; rather than capability based things like
Qubes that whitelist and fail closed. There is no javascript analog in
op_return data, and no user client software interpreting it as code, so the
articles claim doesnt make sense.

-Adam Back
"

Comment Re:I used to work at vmware. Criminal engineering. (Score 1) 33

I think much of this was fueled by the $1 Billion VMware Nicira buy. It alienated their partnership with Cisco and VCE and was poor strategy. It's like nobody realized that their user base couldn't figure understand what an MTU mismatch was, let alone handle a network issues caused by layers of poorly written software on broken hardware.

That stated you don't need to use vCenter to change DVS ports to get vCenter up - you /can/ do it in the CLI and you should be using ephemeral port allocation for the vCenter port-group. Often the difference between getting a senior tech with free time or one from the low cost geographies was evident by whether or not they made you re-install the product.

Comment Re:Okay, so how SHOULD this be done? (Score 2) 53

Same as the typical Cisco/Nortel/Dell product "This product is unsupported in the current browser" right in the browser when you manually accept the certificate warning. At the end of the day this is a stupid problem. There should not be a valid signed certificate and private key required for a local service. Other than DRM there is no point in the encryption with localhost communication for a video player app. There should be no DNS request required to make this work.

Slashdot Top Deals

Passwords are implemented as a result of insecurity.

Working...