Listener Feedback #170

Listener Feedback #170

Security Now! Transcript of Episode #409 Page 1 of 40 Transcript of Episode #409 Listener Feedback #170 Description: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-409.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-409-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. What a great show ahead. Questions, answers. We'll talk more about PRISM, more insight there. You've got to stay tuned. This is the show to keep your privacy and security up. Security Now! is next. Leo Laporte: This is Security Now! with Steve Gibson, Episode 409, recorded June 19th, 2013: Your questions, Steve's answers, #170. It's time for Security Now!, the post-NSA edition. Steve Gibson is here, our Explainer in Chief, the guy who does all the security and privacy and is really our guru in that realm. Hello, Steve. Good to see you. Steve Gibson: Hey, Leo. Great to be with you again. And we have largely, as expected, a follow-up to last week's blockbuster theory of how PRISM works, as I expected. Actually I probably had double the number of email that I normally pull from the mailbag, which would have only been in half of the period of time. So, strong response. I've never had a response, as evidenced on Twitter, like we had to last week's episode. So a lot of people who - our typical listener, who understands the technology that we talked about, and we talk about every week, understood this. And actually another document surfaced. I have a link to it in the notes today [bit.ly/sn408n]. But it's from this Narus company, which was originally an Israeli company that produced the high-performance networking filter hardware that I referred to last week. I tracked them down after the show, and one of the - like the second page of their brochure shows a prism as - it's like, okay, yeah. That's a little too coincidental. Security Now! Transcript of Episode #409 Page 2 of 40 Leo: Well, and I've seen a number of articles that kind of seem to somewhat confirm, from the Washington Post and Declan McCullagh writing at CNET, that kind of confirm your hypothesis. And I've seen nothing to negate it. Steve: Right. Leo: So, but it was interesting because Apple put out a statement, I don't know if you were going to - I'll save, let's save this. Steve: We do, we do discuss Apple's statement, and actually, unfortunately, how weak it actually is, given the evidence that they're able to provide iMessages in the backlog after the fact. So anyway, we'll talk about that. So inevitably we were going to see some jokes arise from the NSA... Leo: You know, that's how you know something's serious. Steve: Yes, exactly. Leo: Seriously, when something - there's a guy named Jan Brunner [sp] who's an expert on urban, you know, those joke cycles, like remember the elephant in your refrigerator, the dead baby, all of these joke cycles? And I interviewed him once, and he said it's always the most taboo subjects. So the dead baby jokes were right about when the abortion debate was raging in this country. And so it's a way of handling very taboo subjects in a way that is not incendiary, but lets some of the steam off. And so of course... Steve: Exactly, sort of allows sort of the pressure off of the... Leo: Yeah, it's a coping mechanism. Steve: So my absolute favorite actually was a photo that my tech support guy, Greg, sent me. And so there was - it was a photo of a distraught-looking woman. And across the top it said, "My computer's hard drive crashed...." And then at the bottom, and this explains why she's unhappy, "And the NSA won't send me their backup copy." Leo: [Laughing] What backup - what are you - what? Steve: I liked that. Then we have another one. An NSA agent walks into his favorite bar. The bartender says, "Hey, I've got a joke for you." The NSA guy replies, "I already heard it." Security Now! Transcript of Episode #409 Page 3 of 40 Leo: [Laughing] Excellent. I love that. I already heard it. Steve: Okay. And then we have crypto humor, NSA crypto humor: Why didn't Edward Snowden ever go back to his Hong Kong hotel room to avoid the NSA? Leo: Why? Steve: It was a one-time pad. Leo: As it should be if you're Edward Snowden. Never sleep in the same bed twice. Steve: Exactly. Leo: Wow. Excellent, excellent. Steve: So that's our humor, our opening podcast humor, consequence of last week's certainly less than humorous disclosures and our theory about the way things may be working. In security news it was a very quiet week. I think everybody's still in shock. No one's doing anything, good or bad, except that Oracle had no choice but to release a critical patch update for Java. This fixes 40 new security problems. 37 of these are remotely exploitable without authentication. And Oracle recommends, reading from their release news, that this critical patch update be applied as soon as possible because it includes fixes for a number of severe vulnerabilities. Note that the vulnerabilities fixed in this critical patch update affect various components and, as a result, may not affect the security posture of all Java users in the same way. So... Leo: Posture as in bend over? Steve: As in why, you know - oh, and there was a link, like check your current version. So I thought, okay, I wonder what I have. And of course Firefox said, oh, you have no evidence of Java. It's like, yes. Leo: Oh, good news. Steve: That's what we want. We have no current version. Leo: No version. Steve: Now. Security Now! Transcript of Episode #409 Page 4 of 40 Leo: Yeah, yeah. I was disappointed to see that, you know, I got a new Mac, and I was disappointed to see that Safari by default - happy to see Safari by default blocks third-party cookies - by default does not give you the, what is that setting that we like, Do Not Track setting. It's off by default. Steve: Right. Leo: And unfortunately Java's on by default. But Apple has a very good policy, which is, if you don't use it, it turns it off; and, before you can run it, it says are you sure you want to run it. So I guess it's probably all right to leave it on, but I turn it off. I turn it off. Steve: Yeah. The problem, of course, is that people who don't know will just say, oh, yeah. They just click "Yes" in order to move on to what they want. And that's how they get owned in this day and age. There was a piece in a Foreign Policy website. I think our friend Simon Zerafa pointed me to it. At first I was just going to give it a synopsis. But as I began to read it, in order to figure out how I would pull out from it, I thought, wow, this is just all good stuff. So I'm going to share it with our listeners. The title is "The Suddenly Booming Business of Secretive Communications." And of course the reason this is relevant is what has been the upshot of the revelations a week and a half ago. So the article reads: "For anyone in the habit of wearing a tinfoil hat, the last couple of weeks have been ones of redemption. With a steady stream of revelations about the National Security Agency's astonishingly broad intelligence-gathering activities, conspiracy theories about its reach have been seemingly validated. Those same raise a related question: Are there ways to avoid the NSA's prying eyes? "It turns out there are, for the most part, anyway. And for the companies selling communication tools to circumvent surveillance programs, business is going like gangbusters. Silent Circle, a company that provides encrypted email, phone, and messaging services, has seen sales increase 400% so far this month. You can now take advantage of a 50% discount on its full suite of services. "Moxie Marlinspike, the hacker and developer behind Whisper Systems, another purveyor of encrypted communications tools, says his service has seen a 3,000% increase in its new active user rate since June 6, when the story about the NSA's PRISM program first broke, though he did not offer specifics about the number of users the company has signed up. Cryptocat, a free encrypted chat service" - which was of course the topic of this podcast a couple weeks ago - "welcomed almost 5,000 new users last week, and server traffic is currently running 80% above average for its 65,000 regular users, according to Nadim Kobeissi, the site's lead developer. And Tor, a web browser" - as this site describes it, and we know what Tor is, actually, a network, anonymizing network - "that protects its users from so-called 'traffic analysis,' has seen a 17% increase in its mean daily users in the United States.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    40 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us