S0E14: "A Failed Experiment"

Posted
Comments 0

Navigation
Previous EpisodeNext Episode
Log
Recorded (UTC) Aired (UTC) Editor
2015-08-15 16:39:15 2015-09-14 04:18:48 brent s.
Verification
Format SHA256 GPG Audio File
MP3 8b77a6d366a67e1cb0dc57b20e2b579c8dc1238fa696d21c8a95c8c889922c5b click click
OGG d0cb0d860e3ec4317765939f0128eac9ca4b88922e44a6bf67b5a6b354513b39 click click

In this episode, we talk about Certifigate (an Android vulnerability), another Lenovo oopsies, more Windows 10 privacy issues, the UNIX Rosetta Stone (by request of MOQ in our IRC channel, key management (by request of ‘‘chthnous’‘ in our IRC channel), making everyday crypto easier, and data recovery.

Notes

  • I mention that we’ve talked about Stagefright before (in S0E13).
    • We also suggest flashing a non-carrier-provided firmware for your Android device. We’ve talked about this in more detail in S0E3.
    • You can read more about Certifigate here and the TechRepublic article here.
  • We didn’t actually cover Superfish before, though I thought we had.
    • Uninstall instructions for Superfish are here.
    • The Ars Technica forum post is here.
    • Apparently there is a (risky) removal process for Lenovo-replaced autochk here.
  • Windows 10’s privacy policy is horrible. PLEASE SEE THE ERRATA, this affects Windows 7 and 8/8.1 as well. Sorry, Jthan.
  • We mention the UNIX Rosetta Stone
  • I mention Tripwire (which has since gone commercial), AIDE, and the bootloader-integrity-checker I mention that I couldn’t remember the name of is afick. Alternatively, if you’re using a Secure Boot-compatible UEFI machine, you can use that. Yes, even on GNU/Linux.
    • A common “Evil Maid Attack” tool is the USB Rubber Ducky. More information is here. Mostly used by skids and amateur pentesters, but it is at least rather extensible.
    • And yes, there are ways to protect yourself from NSA’s SSH attacks, see here.
  • Crypto Might Not Suck
    • I should do an entire segment on Tor, but suffice to say: do not trust it. At all. And if your OpSec sucks, Tor isn’t going to help. And yes, tor does in fact have commits from Navy staff, and the NSA has actively performed MitM attacks on Tor exit nodes. Plus who knows how many exit nodes are under NSA control/access?
    • Tails is also bullshit. It’s primary selling point is Tor, which as shown above is pointless- thus negating all their claims. It’s not even useful, it’s missing an actually usable environment.
    • They make absolutely laughable claims, like Tor is better than a private VPN.
    • You might want to use GRML instead, if you’re a Debian advocate.
    • Or you can build your own (better) alternative to Tails by using BDisk.
  • When doing data recovery, be sure you’re using GNU ddrescue, not dd_rescue. There are some corner cases in which dd_rescue may be better for your use, but ddrescue is a lot easier to use (and sees more stability).
  • I talk about FOSSCON. You should check it out!

Errata

  • I totally was able to edit out the weird sound on Jthan’s track. Boo-yah!
  • Windows 10’s privacy-infringing stuff is now backported into Windows 7 and 8. We weren’t aware of this at the time of recording.
  • ssh-keyscan is awesome. Usage is simple: ssh-keyscan <Host/IP address of server> >> ~/.ssh/known_hosts
    • I don’t mention it, but also handy is ssh-copy-id. It allows you to set up pubkey authentication for a user on a remote server in one step. Usage: ssh-copy-id <Host/IP address of server>. You’ll be prompted for your password, and subsequent connections will not use password auth.
  • I said “sfldd”. I meant “dcfldd”.
  • We forgot to talk about terminal servers and password cracking in S0E15 (should be released 09.27.2015), sorry! I’ve pushed them back into the topic list.
  • Jthan, Macs definitely supports their own variant of PXE/BOOTP called Netboot. You can also use iPXE and can also bootstrap via DHCP.
  • I couldn’t remember the name of the protocol when talking about Tor. It’s I2P. Something like Hyperboria should work (a lot better than Tor) as well.

Music

Music Credits
Track Title Artist Link Copyright/License
Intro Blip Stream Kevin MacLeod click CC-BY 3.0
Outro Kawai Kitsune Kevin MacLeod click CC-BY 3.0
(All music is royalty-free, properly licensed for use, used under fair use, or public domain.)

Author
Categories (Pilot Season)

Comments

There are currently no comments on this article.

Comment...

Enter your comment below. Fields marked * are required. You must preview your comment before submitting it.