Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

DA says Apple, Google software helps terrorists
http://nypost.com/2015/04/19/da-says-apple-google-software-helps-terrorists/ ^ | Sunday, April 19, 2015 | Michael Gartland

Posted on 04/20/2015 8:33:09 PM PDT by Star Traveler

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-48 last
To: Swordmaker
i missed nothing. I dismissed it as not worth attention. That statement is twaddle

https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html

meanwhile:

http://www.extremetech.com/extreme/173108-researchers-crack-the-worlds-toughest-encryption-by-listening-to-the-tiny-sounds-made-by-your-computers-cpu

just citing the stuff that's been in the public for years.

41 posted on 04/21/2015 3:41:25 PM PDT by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 40 | View Replies]

To: sten; Star Traveler; dayglored
ROTFLMAO!

https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html

November 2007

A seven and a half year old article? Really?!? Come into modern times, sten.

Do you have any evidence that Apple is using Dual_EC_DRBG as a random number generator routine in iDevices? Of course you don't because they aren't. You are obviously doing Google searches for anything to bolster your claims. It isn't working.

Researchers crack the world’s toughest encryption by listening to the tiny sounds made by your computer’s CPU

I've heard about this. . . but it only worked on systems using their own encryption routines (RSA), which they invented.

In this case, the security researchers listen to the high-pitched (10 to 150 KHz) sounds produced by your computer as it decrypts data.

Without going into too much detail, the researchers focused on a very specific encryption implementation: The GnuPG (an open/free version of PGP) 1.x implementation of the RSA cryptosystem. With some very clever cryptanalysis, the researchers were able to listen for telltale signs that the CPU was decrypting some data, and then listening to the following stream of sounds to divine the decryption key. The same attack would not work on different cryptosystems or different encryption software — they’d have to start back at the beginning and work out all of the tell-tale sounds from scratch.

The researchers successfully extracted decryption keys (from a computer —Swordmaker) over a distance of four meters (13 feet) with a high-quality parabolic microphone. Perhaps more intriguingly, though, they also managed to pull of this attack with a smartphone placed 30 centimeters (12 inches) away from the target laptop.

You claimed that Apple iGadgets had already been cracked. Where does any of this show that?

This article does not claim that any smartphone was ever cracked, but rather that they USED a smartphone to crack into a target laptop. Frankly, I don't believe that any smartphone is wasteful of energy enough to make sounds while it processes or so slow that any sounds it makes would be discernible from any distance away from the phone at all. The decipher routine occurs in a split second at GigaHertz speeds, while these guys are talking about sounds being generated at 10 to 150 KiloHertz. . . and measuring the process over 3.7 seconds. Not a reasonable time frame for modern processors. In fact, it is several orders of magnitude too slow.

Even applied to a computer, it would have had to have been an old and VERY SLOW processor on the targeted computer for sounds to have been discrete enough to discern the deciphering process. I think anyone under attack would notice someone pointing a 12" parabolic microphone at their laptop computer from twelve inches away, don't you?

These are merely more straws you are grasping at. . . and show you don't know what you are talking about.

This isn't even a good try.

42 posted on 04/21/2015 4:45:38 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 41 | View Replies]

To: Swordmaker

just posting the stuff that’s in the public.

as for the idevices... :)


43 posted on 04/21/2015 5:03:10 PM PDT by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 42 | View Replies]

To: null and void

“Manhattan DA Cyrus Vance Jr. sounded a battle cry Sunday, calling on law-enforcement agencies to battle Apple and Google over software that makes it impossible for authorities to “decrypt” cellphones seized in criminal investigations. “

As soon as I saw Cyrus Vance Jr., I knew that the left would be outraged that the ordinary citizen would be protected from the government.....and of course that makes us all terrorists


44 posted on 04/21/2015 6:45:30 PM PDT by Nifster
[ Post Reply | Private Reply | To 11 | View Replies]

To: Swordmaker
First let me state that I have the highest regard for the guys at the NSA and other such fellows who figure out snooping techniques. It's really cool stuff, and they're very good at it. They have my admiration, even though I don't like the NSA collecting lots of data on me without my say-so.

That said, I have some real serious problems believing stories about "listening" to CPU data streams from outside the computer chassis.

CPU chips and other silicon components DO NOT make noise, of any sort. Period. They just don't.

What does make noise, related to CPUs, is a switching power supply whose frequency varies with load. My guess is that they were listening to the whine of the switching power supply.

But as you pointed out, the switching frequencies (up to perhaps 150kHz), and even their harmonics, are many orders of magnitude slower (lower frequency) than the bit rates in the CPU chips. So there simply is no way that one could obtain normal-speed CPU bit data from such things as power supply switching noise.

The other noises of the computer -- hard drive motor, spinning disks, fans (including the CPU fan), vibration of cables -- would tend to mask any subtleties like power supply switching, so I dunno if I believe this story in the first place.

Maybe if they slowed the CPU down to a crawl... but then it would take so long to do the encryption and decryption it's pointless.

Wankers, IMO.

And then there's the problem you mention that a big parabolic mike is kinda hard to hide, but that's a detail. :)

45 posted on 04/21/2015 7:56:17 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 42 | View Replies]

To: dayglored; sten
Maybe if they slowed the CPU down to a crawl... but then it would take so long to do the encryption and decryption it's pointless. Wankers, IMO. And then there's the problem you mention that a big parabolic mike is kinda hard to hide, but that's a detail. :)

Did you see the one where researchers claimed they could use the rise of the heat signature of one computer being sensed by a nearby computer's heat sensors could be surreptitiously used to steal data? Why it could transmit eight bits per hour! What a serious risk to air gap computers which is what they were claiming! Hilariously, for the exploit to work, the target computer had to have a program placed on it to take the data parse it into bits and then raise the computer's heat output for a one, then drop it back to normal, then lower it for a zero, etc. Question is, if one can get the malware program on the target to steal the data, why not just steal the data? Oh, the sensing computer had to be placed not more than six inches from the motherboard of the target computer. LOL!

46 posted on 04/21/2015 8:18:07 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 45 | View Replies]

To: sten; dayglored
just posting the stuff that’s in the public.

as for the idevices... :)

As I said, Googling, and you don't know what you're talking about. Good luck with that.

47 posted on 04/21/2015 8:21:43 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 43 | View Replies]

To: Swordmaker
Oh, and did I mention, if the CPU has more than one core active (as virtually all CPUs these days do), never mind a GPU, there's just no way to sort out which internal pathways are active at a given instant.

The more I think about it, the more I'm inclined to call BS on the entire enterprise. It's not even a drawing-room proof of concept demo. It's just silly.

48 posted on 04/21/2015 8:41:20 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 46 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-48 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson