Search

Items tagged with: backdoor



Politicians around the world want to #backdoor #encryption. But #Signalgate 2.0 shows the danger would be HUGE.

We're saying #NoToBackdoors 💪

Read Hanna's opinion: Signalgate 2.0 proves it - there’s no such thing as a “Backdoor for the Good Guys Only”
👉 tuta.com/blog/opinion-signalga…




🚨BREAKING🚨 The French National Assembly removed the backdoor section from the amendment to the #Narcotrafic law.

Read here how Politicians tried to undermine everybody's #security: tuta.com/blog/france-surveilla…

🙏 And thank you for fighting against this with us. This is a great win for privacy, yet, the battle is not over. Together we are strong! 💪

#backdoor #encryption #privacy #security


Staat mal wieder scharf auf Backdoor! Die französische Regierung plant eine Änderung des Narcotrafic-Gesetzes: Verschlüsselte Messengerdienste wie z. B. Signal + WhatsApp sollen verpflichtet werden eine Backdoor einzubauen. Das würde die Sicherheit + Privatsphäre ALLER Nutzenden gefährden!

@Tutanota tuta.com/blog/france-surveilla…

#privac #DataProtection #datenschutz #backdoor



BREAKING: It's been only ten days since we warned about this...

#Apple has removed its end-to-end #encryption (Advanced Data Protection) in the #UK after the government demanded a #backdoor.

📢 Fight for privacy! #PrivacyMatters #NoBackdoors

🔗 bloomberg.com/news/articles/20…

mastodon.social/@Tutanota/1139…


🚨🚨🚨 Apple to backdoor encryption? Round 2 - and this time the UK is trying to get your data.

Let's fight back against any attempt to #backdoor #encryption! 💪 🔒

More info ➡️ tuta.com/blog/uk-demands-apple…





If Apple complies with this, the UK government will gain access to all iCloud data globally. The only way Apple comes out of this with any integrity is to leave the UK market. If they give in to this, every regime in the world will demand the same thing. And that’s before we even get to the fact that there’s no such thing as a “backdoor” for just so-and-so. Either there is a door or there isn’t and if there is, anyone who obtains the key can use it.

theguardian.com/technology/202…

#apple #backdoor #UK #encryption #privacy #security #personhood #data #democracy #humanRights #iCloud


I implemented Ken Thompson’s Reflections on Trusting Trust (1984 Turing Award Lecture) compiler #backdoor for the GNU Compiler Collection (GCC). The backdoor maintains persistence by re-injecting itself to any new versions of the compiler built. The secondary payload modifies a test application by adding a backdoor password to allow authentication bypass:

$ cat testapp.c
#include <string.h>
#include <stdio.h>
#include <stdlib.h>

int main(int argc, char **argv)
{
if (argc == 2 && !strcmp(argv[1], "secret"))
{
printf("access granted!\n");
return EXIT_SUCCESS;
}
else
{
printf("access denied!\n");
return EXIT_FAILURE;
}
}
$ gcc -Wall -O2 -o testapp.c -o testapp
$ ./testapp kensentme
access granted!
$

I spent most time (around two hours) writing the generalized tooling that produces the final quine version of the malicious payload. Now that this is done, the actual code can be adjusted trivially to exploit more target code without any need to adjust the self-reproducing section of the code. This method of exploitation could be extended to target various binaries: SSH Server, Linux Kernel, Setuid binaries and similar. While itself written in C, the secondary payloads can target any programming languages supported by GCC.

It should be noted that GCC build checks for malicious compiler changes such as this. This check can – of course – also be bypassed. However, most serious projects have measures in place to avoid hacks of this nature.

Some links:
- Ken Thompson's "Reflections on Trusting Trust" paper: cs.cmu.edu/~rdriley/487/papers…
- David A. Wheeler: "Fully Countering Trusting Trust through Diverse Double-Compiling (DDC) - Countering Trojan Horse attacks on Compilers" dwheeler.com/trusting-trust/

#hacking #exploitdevelopment #kenthompson #infosec #cybersecurity @vegard




Three years ago, #FDroid had a similar kind of attempt as the #xz #backdoor. A new contributor submitted a merge request to improve the search, which was oft requested but the maintainers hadn't found time to work on. There was also pressure from other random accounts to merge it. In the end, it became clear that it added a #SQLinjection #vuln. In this case, we managed to catch it before it was merged. Since similar tactics were used, I think its relevant now

gitlab.com/fdroid/fdroidclient…



Unfolding now: news.ycombinator.com/item?id=3…

- openwall.com/lists/oss-securit…
- github.com/tukaani-project/xz/…

An incredibly technically complex #backdoor in xz (potentially also in libarchive and elsewhere) was just discovered. This backdoor has been quietly implemented over years, with the assistance of a wide array of subtly interconnected accounts:

- github.com/tukaani-project/xz/…
- bugs.debian.org/cgi-bin/bugrep…
- github.com/jamespfennell/xz/pu…

The timeline on this is going to take so long to unravel

#security #linux