Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:The UK Gov will just mandate a backdoor on phon (Score 1) 46

I worry about that. In my threat model, I assume the attacker wants to keep the backdoor secret, and is unwilling to push a secret mass surveillance backdoor to all phones. Even if no one noticed the backdoor, someone is likely to notice all that encrypted surveillance traffic. So, there may be occasionally used back doors in our phones already, but secret mass surveillance is done server-side. That's the main threat I'm worried about.

Comment Re:Sounds interesting (Score 4, Informative) 46

Data can eventually add up. It isn't like a block chain, but we might have say 1KiB per device, and 8 billion devices globally, so maybe 10 TiB? That's assuming we don't ever shard into different quorums, and 15-ish nodes run the world, which is probably unrealistic. With say 150 nodes by then, it could add up to 1TiB per node.

Queries per second would always be low. Using a public key for incremental backups and only rotating the private key every month or two, 8 billion devices registering once a month is only 3,000 QPS globally, and again dividing by 10, that's only 300, which a Raspberry PI can probably handle.

So... it's dumb, but I will find it entertaining to run my node on a Raspberry PI until I start having security concerns. That would be roughly when enough devices are enrolled to make the system a juicy target, probably at least 2 years out. We'll need improved security at that point, e.g. running nodes in data centers with multi party with for any changes, and maybe Tor routing.

Submission + - Help wanted to build open source Advanced Data Protection for everyone

WaywardGeek writes: Recall that Apple was ordered to back-door Advanced Data Protection in the UK. We need to take action now to protect users.

I helped build Google's Advanced Data Protection (Google Cloud Key VaultService) in 2018, and Google is way ahead of Apple in this area. I know exactly how to build it an can have it done in spare time in a few weeks, at least server side. The whole world would be able to use it for free, protecting backups, passwords, message history, and more, if we can get existing applications to talk to the new data protection service.

However, I need help. I've got the algorithms and server-side covered. This would be a distributed trust based system, so I need folks willing to run the protection service. I'll run mine on a Raspberry PI. Areas where I need help include:

* Running protection servers. This is a T-of-N scheme, where users will need say 9 of 15 nodes to be available to recover their backups.
* Android client app, and preferably tight integration with the platform as an alternate backup service.
* Same with iOS
* Authentication. Users should register, and login before they can use any of their limited guesses to their phone unlock secret.

The scheme splits a secret among N protection servers, and when it is time to recover the secret, which is basically an encryption key, they must be able to get key shares from T of the original N servers. This uses a distributed oblivious pseudo random function algorithm, which is very simple.

In plain English, it provides nation-state resistance to secret back doors, and eliminates secret mass surveillance, at least when it comes to data backed up to the cloud. iOS and Android systems don't currently do that. The UK and similarly confused governments will need to negotiate with operators in multiple countries to get access to any given users's keys. There are cases where rational folks would agree to hand over that data, and I hope we can end the encryption wars and develop sane policies that protect user data while offering a compromise where lives can be saved.

So, nothing too serious :-)

Are you up for this challenge? Are you ready to plunge into this with me?

Comment Re: A warning? (Score 1) 144

And my first philosophy class at Berkeley in 1982 I predicted the singularity would happen in 2025. I just applied more slaw a threshold of million 1982 dollars for a grad student to be able to use a college bot machine to code intelligence. I also predicted that instead of writing code the way we do today there would be a new profession where we guide the machines telling it more about what we wanted than how to build it.

Comment Re: A warning? (Score 1) 144

And my first philosophy class at Berkeley in 1982 I predicted the singularity would happen in 2025. I just applied more slaw a threshold of million 1982 dollars for a grad student to be able to use a college bot machine to code intelligence. I also predicted that instead of writing code the way we do today there would be a new profession where we guide the machines telling it more about what we wanted than how to build it.

Humidity can take this in two ways. We can harse the awesome potential to produce more with less work making everyone much better off. Or we can follow history and it will be a s*** show for everyone.

Comment Re:Reminds me of that old joke (Score 2) 73

So, I work for Google. I am on the only team that defends your data from all of Google. It is a weird threat model: The CEO shows up at your desk with security guards and demands that you hand over a particular user's data by the end of the day or you and your whole team are fired. If you succeed in providing the data, you've failed. To be more specific, we ensure that Google can't see your Android backup/restore data, unless you can prove you know your Android screen unlock secret. If you do, then secure hardware I helped deploy to data centers will let you recover your backup data to a new Android device. If you fail 10 times, your data is lost forever, because the secure hardware only allows 10 guesses. This is all in our white paper.

I am of two minds about this sort of press. First, I'm proud to work for the only company I have ever known to spend a crap-ton (an official unit of measure) to hide user data from itself. On the other hand, Google's management needs reminders that users actually give a shit about privacy.

Comment Cooler than I expected, but not the same at all... (Score 4, Interesting) 352

I'm an Air Force brat. In 1969.I watched with my family as Neil Armstrong took the first steps on the moon. That was an OMG moment, which set unfulfilled expectations for years to come. Instead of OMG moments, we've had a steady advance in tech, better every year, but never with an OMG moment like that.

So, I'm disappointed that I cannot vacation on Mars. At the same time, the steady tech revolution has changed the world far more than most of us would have thought possible.

In 1982, I took a philosophy class at UC Berkeley. For my final project, I predicted when the AI singularity would occur. My hypothesis was that we sim[y lacked the compute power, and when we had enough such that for $1M in 1982 dollars, any mainstream university could afford a neural network with the same capacity as a human brain, then some a-hole would come along and program it to actually be intelligent.

I predicted, based on Moore's Law, 2025....

Government

Were Russian Hackers Deterred From Interfering In America's Election? (omaha.com) 240

"Despite probing and trolling, a Russian cyberattack is the dog that did not bark in Tuesday's midterm elections," writes national security columnist Eli Lake. This is the assessment of the Department of Homeland Security, which says there were no signs of a coordinated campaign to disrupt U.S. voting. This welcome news raises a relevant and important question: Were cyber adversaries actually deterred from infiltrating voter databases and changing election results...?

In September the White House unveiled a new policy aimed at deterring Russia, China, Iran and North Korea from hacking U.S. computer networks in general and the midterms in particular. National security adviser John Bolton acknowledged as much last week when he said the U.S. government was undertaking "offensive cyber operations" aimed at "defending the integrity of our electoral process." There aren't many details. Reportedly this entailed sending texts, pop-ups, emails and direct messages warning Russian trolls and military hackers not to disrupt the midterms. U.S. officials tell me much more is going on that remains classified. It is part of a new approach from the Trump administration that purports to unleash U.S. Cyber Command to hack the hackers back, to fight them in their networks as opposed to America's.

Bolton has said the policy reverses previous restrictions on military hackers to disrupt the networks from which rival powers attack the U.S. Sometimes this is called "persistent engagement" or "defend forward." And it represents a shift in the broader U.S. approach to engaging adversaries in cyberspace.... The difference now is that America's cyber warriors will routinely try to disrupt cyberattacks before they begin... The object of cyberdeterrence is not to get an adversary to never use cyberweapons. It's to prevent attacks of certain critical systems such as voter registration databases, electrical grids and missile command-and-control systems. The theory, at least, is to force adversaries to devote resources they would otherwise use to attack the U.S. to better secure their own networks.

Jason Healey, a historian of cyber conflicts at Columbia University's School for International and Public Affairs, asks "How much of cyberspace will survive the war?" warning that "persistent engagement" could lead to a dangerous miscalculation by an adversarial nation-state -- or even worse, a spiral of escalation, with other state's following America's lead, changing the open Internet into more of a battleground.

Slashdot Top Deals

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...