POPULARITY
우리는 2013년에 미국 국가 안보국 NSA와 영국의 GCHQ가 독일 정부를 대상으로 자주 첩보활동을 했다는 것을 알게 되었습니다. 격분 가운데서, 예술가인 마티아스 주드와 크리스토프 와터는 생각했습니다. 만약 그들이 도청하고 있다면... 그들에게 말을 걸어보자. 그래서 베를린 정부 지구에 있는 스위스 대사관 옥상에 설치한 안테나로, 세계가 가까운 곳에서 듣고 있을 미국과 영국 첩보원들에게 메시지를 보낼 수 있게 해주는 개방된 네트워크를 설치했습니다. 이 작업은 강연에서 자세히 다루는 대담하고, 가끔은 웃기고, 그리고 사실 체제 전복적인 구석도 있는 세 가지 예술 작업 중 하나입니다. 이 강연은 감시와 폐쇄적인 네트워크로 인해 커져가는 이 세계의 불만에 관해 의문을 던집니다.
F*ck the attribution, show us your .idb! Morgan Marquis-Boire Senior Researcher, Citizen Lab Marion Marschalek Malware reverse engineer, Cyphort Inc Claudio Guarnieri Creator and lead developer, Cuckoo Sandbox Over the past few years state-sponsored hacking has received attention that would make a rockstar jealous. Discussion of malware has shifted in focus from ‘cyber crime’ to ‘cyber weapons’, there have been intense public debates on attribution of various high profile attacks, and heated policy discussion surrounding regulation of offensive tools. We’ve also seen the sale of ‘lawful intercept’ malware become a global trade. While a substantial focus has revolved around the activities of China, Russia, and Iran, recent discoveries have revealed the capabilities of Western nations such as WARRIORPRIDE aka. Regin (FVEY) and SNOWGLOBE aka. Babar (France). Many have argued that digital operations are a logical, even desirable part of modern statecraft. The step from digital espionage to political persecution is, however, a small one. Commercially written, offensive software from companies like FinFisher and Hacking Team has been sold to repressive regimes under the guise of ‘governmental intrusion’ software. Nation state hacking operations are frequently well-funded, difficult to attribute, and rarely prosecuted even if substantive evidence can be discovered. While efforts have been made to counter this problem, proof is hard to find and even more difficult to correctly interpret. This creates a perfect storm of conditions for lies, vendor lies, and flimsy attribution. In this talk we will unveil the mess happening backstage when uncovering nation state malware, lead the audience on the track of actor attribution, and cover what happens when you find other players on the hunt. We will present a novel approach to binary stylometry, which helps matching binaries of equal authorship and allows credible linking of binaries into the bigger picture of an attack. After this session the audience will have a better understanding of what happened behind the scenes when the next big APT report surfaces. Morgan Marquis-Boire is a Senior Researcher at the Citizen Lab, University of Toronto. He is the Director of Security for First Look Media and a contributing writer for The Intercept. Prior to this, he worked on the security team at Google. He is a Special Advisor to the Electronic Frontier Foundation in San Francisco and an Advisor to the United Nations Inter-regional Crime and Justice Research Institute. In addition to this, he serves as a member of the Freedom of the Press Foundation advisory board and as an advisor to Amnesty International. Marion is a malware reverse engineer on duty for Cyphort Inc., focussing on the analysis of emerging threats and exploring novel methods of threat detection. She teaches malware analysis at University of Applied Sciences St. Pölten and frequently appears as speaker at international conferences. Two years ago Marion won Halvar Flake's reverse engineering challenge for females, since then she set out to threaten cyber criminals. She practices martial arts and has a vivid passion for taking things apart. Preferably, other people's things. Claudio is a security researcher mostly specialized in the analysis of malware, botnets and computer attacks in general. He's a core member of The Honeynet Project and created the open source malware analysis software Cuckoo Sandbox and Viper and runs the Malwr free service. Claudio published abundant research on botnets and targeted attacks and presented at conferences such as Hack In The Box, BlackHat, Chaos Communication Congress and many more. In recent years he devoted his attention especially on issues of privacy and surveillance and published numerous articles on surveillance vendors such as FinFisher and HackingTeam with the Citizen Lab as well as on NSA/GCHQ and Five Eyes surveillance capabilities with The Intercept and Der Spiegel. Claudio also contributes to Global Voices Advocacy. He continuously researches and writes on government surveillance and threats to journalists and dissidents worldwide and supports human rights organisations with operational security and emergency response.
Topics for this episode: iOS flaw The Chinese hacking campaign against the US Breach at Recorded future Hacking cars through key fobs NSA/GCHQ hacking of people through security software Snowden’s documents in the hands of the Chinese and Russians Sams...
I denne episoden tar vi for oss to veldig viktige former for beskyttelse. Nyhetssaker Dagens lokkal-nytt: Healing-suksess med varme hender og kvist I vår pågående serie "Saltklypa melder så mye triste antivaks-nytt som mulig" får vi nå beskjed om deprimerende mesling-nytt i Europa og særlig Tyskland. Les også om den 18 mnd gamle gutten som døde i Berlin, uvaksinert av meslinger, og Ingeborg Sennesets innlegg om obligatorisk vaksinering i Aftenposten. I ettertid kan vi ta med en liten gladnyhet om at i kjølvannet av disse nyhetene, vil stadig flere la seg vaksinere. Tema: Datasikkerhet Bendik tar oss med inn i datasikkerhetens kryptiske (heh) verden, og innleder med å legge ut om et SIM-kort-firma som ble hacket, og om Superfish-skandalen hos Lenovo. En korreksjon: Gemalto mistet ikke krypteringsnøklene til SIM-kortene sine i hackingen, så de er trygge (for nå). De hadde et sikkerhetsbrudd på et av sine kontor, men de kom ikke inn til SIM-kortene. Gemalto har selv sagt at de mistenker at NSA/GCHQ står bak. Andre nyttige lenker: Sjekk om ditt system er påvirket av Superfish eller tilsvarende: https://filippo.io/Badfish/EFF (https://www.eff.org/) er en lobbyorganisasjon for å holde internett sikkert. Hvorfor vi burde være mistenkelige når myndigheter prøver å få inn bakdører eller tvinge igjennom usikre standarder, slik at de selv kan snoke Grei oppsummering fra Bruce Schneier
This week - UE Mega Boom, fabric printing for fashion designers, Lenovo and Superfish Adware, Tomizone update, Catalyst NZ cloud, Zomato, Blackberry Classic, Android malware that operates when your phone is off, is NSA/GCHQ listening to your calls? Running time : 0:48:06
Two intelligence agencies conspired to steal the keys to your phone's encryption. Julian Sanchez discusses the risks to privacy and security. See acast.com/privacy for privacy and opt-out information.
Microsoft rebrands SkyDrive after legal defeat Strong Surface sales help Microsoft beat forecasts Apple misses Wall Street's iPhone sales forecast, shares hammered Angry Birds website hacked after NSA-GCHQ leaks Apple's iPod: is the end nigh? Prince fans' shock at $22m piracy action Wikipedia's Adding Voice Recordings To Famous People's Biographies