itsicherheit_exploit_flaw   187

« earlier    

Page Cache Attacks
We present a new hardware-agnostic side-channel attack that targets one of the most fundamental software caches in modern computer systems: the operating system page cache. The page cache is a pure software cache that contains all disk-backed pages, including program binaries, shared libraries, and other files, and our attacks thus work across cores and CPUs. Our side-channel permits unprivileged monitoring of some memory accesses of other processes, with a spatial resolution of 4KB and a temporal resolution of 2 microseconds on Linux (restricted to 6.7 measurements per second) and 466 nanoseconds on Windows (restricted to 223 measurements per second); this is roughly the same order of magnitude as the current state-of-the-art cache attacks. We systematically analyze our side channel by demonstrating different local attacks, including a sandbox bypassing high-speed covert channel, timed user-interface redressing attacks, and an attack recovering automatically generated temporary passwords. We further show that we can trade off the side channel's hardware agnostic property for remote exploitability. We demonstrate this via a low profile remote covert channel that uses this page-cache side-channel to exfiltrate information from a malicious sender process through innocuous server requests. Finally, we propose mitigations for some of our attacks, which have been acknowledged by operating system vendors and slated for future security patches.
arvix, 04.01.2019
software_os_page_cache  itsicherheit_exploit_flaw  itsicherheit_sandbox_isolierung  itsicherheit_seitenkanal_analyse_angriff  itsicherheit_verdeckterkanal_data_exfil  software_os_linux  software_os_windows  software_os_linux_kernel_syscall  itsicherheit_speicher  uni_at_tu_graz  uni_us_boston 
4 hours ago by kraven
Attacking end-to-end email encryption: Efail, other attacks and lessons learned
In this talk, I’ll present several attacks that leak the plaintext of OpenPGP or S/MIME encrypted emails to an attacker. Some of the attacks are technically interesting, i.e. the two different efail attacks, some are somewhat silly, yet effective. Some abuse HTML emails, some also work with plain ASCII emails. The disclosure of the efail vulnerabilities caused a lot of stir in the press and the community, which also led to confusion about how the vulnerabilities work, about the mitigations and about the consequences for the OpenPGP and S/MIME standards. I’ll discuss our lessons learned and describe the efail-related changes to mail clients and the OpenPGP and S/MIME standards.
35c3, 28.12.2018
krypto_openpgp  software_krypto_gnupg  itsicherheit_exploit_flaw  krypto_smime  itsicherheit_implementierung  itsicherheit_verdeckterkanal_data_exfil  krypto_openpgp_mdc  internet_protokoll_mime  itsicherheit_software_mua 
20 days ago by kraven
All Your Gesundheitsakten Are Belong To Us: "So sicher wie beim Online-Banking" - Die elektronische Patientenakte kommt - für alle.
Die elektronische Gesundheitskarte ist gescheitert. Stattdessen kommt jetzt die elektronische Patientenakte: In spätestens drei Jahren sollen die Befunde, Diagnosen, Röntgenbilder und Rezepte aller gesetzlich Krankenversicherten online und zentral gespeichert verfügbar sein. Schon heute können Millionen Versicherte eine solche Lösung nutzen und, wie Gesundheitsminister Jens Spahn fordert, "auch auf Tablets und Smartphones auf ihre elektronische Patientenakte zugreifen". Zeitgleich zur elektronischen Patientenakte steht die Onlinebehandlung vor der Tür: Das Fernbehandlungsverbot wurde vor wenigen Monaten gekippt, und schon heute können sich Millionen Versicherte ausschließlich online behandeln lassen. Nach Jahren des Wartens geht dabei alles ganz schnell. "Diese Maßnahmen dulden keinen Aufschub", sagt Spahn. Und macht uns alle damit zu Beta-Testern in Sachen Gesundheit. Mit fatalen Folgen: Unsere streng vertraulichen Gesundheitsdaten liegen für alle sichtbar im Netz. In diesem Vortrag zeige ich an fünf konkreten Beispielen, welche fahrlässigen Entscheidungen die Online-Plattformen und Apps der Anbieter aus dem Bereich Gesundheitsakte und Telemedizin so angreifbar machen und demonstriere, wie einfach der massenhafte Zugriff auf unsere vertraulichen Gesundheitsdaten gelang. Zur Debatte steht, was angesichts dieser neuen alten Erkenntnisse zu tun ist - und was wir besser bleiben lassen.
35c3, 27.12.2018
absurdistan  land_deutschland  itsicherheit_datensicherheit  itsicherheit_implementierung  itsicherheit_by_obscurity  itsicherheit_mobil_apps  itsicherheit_mobil_os  datenschutz_patient_gesundheitsdaten  itsicherheit_exploit_flaw  unternehmen_allg_desinformation_propaganda  unternehmen_allg_versicherung_kk  gesetz_de_ehealth  de_ministerium_bmg  itsicherheit_audit  itsicherheit_web_anwendung_framework  software_javascript  internet_cloud_datenspeicher  unternehmen_allg_inkompetenz  itsicherheit_authentisierung  itsicherheit_prüfsigel_zertifizierung  datenschutz_kontrolle_pseudo  staat_allg_inkompetenz  datenschutz_niveau_senkung  unternehmen_modzero  eid_dokument_egk  staat_politik_it_gesundheit_ega_epa  staat_politik_it_gesundheit_telemedizin 
21 days ago by kraven
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
Mobile communications are used by more than two thirds of the world population who expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) responsible for the worldwide standardization of mobile communication has designed and mandated the use of the AKA protocol to protect the subscribers' mobile services. Even though privacy was a requirement, numerous subscriber location attacks have been demonstrated against AKA, some of which have been fixed or mitigated in the enhanced AKA protocol designed for 5G. In this paper, we reveal a new privacy attack against all variants of the AKA protocol, including 5G AKA, that breaches subscriber privacy more severely than known location privacy attacks do. Our attack exploits a new logical vulnerability we uncovered that would require dedicated fixes. We demonstrate the practical feasibility of our attack using low cost and widely available setups. Finally we conduct a security analysis of the vulnerability and discuss countermeasures to remedy our attack.
uni_de_tu_berlin  uni_ch_eth  tech_mobilfunk_lte_ngmn  tech_mobilfunk_standard  krypto_key_agreement_exchange  krypto_algo_aka  überwachung_lokalisierung_bewegung  überwachung_mobilfunk  überwachung_mobilfunk_imsi_catcher  privatsphäre  itsicherheit_by_obscurity  itsicherheit_exploit_flaw  itsicherheit_implementierung  npo_3gpp  verband_gsma  überwachung_verhalten  überwachung_itk_verkehrs_metadaten  wissenschaft_forschungsinstitut_sintef  überwachung_person_profil 
6 weeks ago by kraven
GCHQ opens kimono for infosec world to ogle its vuln disclosure process
In a briefing note today the agency revealed it may keep vulns in unsupported software to itself. "Where the software in question is no longer supported by the vendor," it said, "were a vulnerability to be discovered in such software, there would be no route by which it could be patched." When it decides whether or not to give up a vuln, GCHQ said three internal bodies are involved: the Equities Technical Panel, made up of "subject matter expert" spies; the GCHQ Equity Board, which is chaired by a civil servant from GCHQ's public-facing arm, the National Cyber Security Centre (NCSC), and staffed by people from other government departments; and the Equities Oversight Committee, chaired by the chief exec of the NCSC, Ciaran Martin. Broadly speaking, Martin gets the final word on whether or not a vuln is "released" to be patched. Those decisions are "regularly reviewed at a period appropriate to the security risk" and, regardless of the risk, "at least every 12 months". Today a post-Snowden legal tweak comes into force: state employees wanting to hack targets' networks and devices must now get a judge-issued warrant, under section 106 of the Investigatory Powers Act. Using hacking tools to investigate alleged crimes that fall under sections 1 to 3 of the Computer Misuse Act 1990 is now subject to the "equipment interference warrant" procedure, rather than the bog-standard Police Act 1997 "property interference authorisation". "In exceptional cases, the CEO of the NCSC may decide that further escalation via submissions to Director GCHQ and, if required, the Foreign Secretary should be invoked," said the GCHQ press briefing note.
register, 29.11.2018
land_uk  geheimdienst_uk_gchq_ncsc  geheimdienst_uk_gchq_jtrig_cna_cne  geheimdienst_polizei_infiltration_tech  itsicherheit_malware_spyware  itsicherheit_exploit_flaw  gesetz_uk_ipa  recht_richtervorbehalt  geheimdienst_uk_gchq_cne_equipment_interference 
7 weeks ago by kraven
My name is Johann Wolfgang von Goethe – I can prove it
The German government-issued identity card (nPA) allows German citizens to not only prove their identity in person, but also against online services (by using the embedded RFID chip). SEC Consult conducted a short security test on a software component commonly used to implement this authentication mechanism. A critical security vulnerability was found during this security test, allowing an attacker to impersonate arbitrary users against affected web applications. To start an authentication, the web application sends a request to the eID client, which then initiates all further steps needed for the authentication. It requests a PIN from the user, communicates with an authentication server (eID-Server or SAML-Processor), the web application and the RFID chip and finally sends a response to the web application. This response contains the data retrieved from the id card, e.g. the name or date of birth of the citizen. To prohibit an attacker from manipulating this data, the response is digitally signed by the authentication server (which takes on the role of a trusted third party). The SEC Consult Vulnerability Lab identified a vulnerability that allows an attacker to arbitrarily manipulate the response without invalidating the signature. An attacker could therefore abuse this vulnerability e.g. to alter data coming from the id card, fool age verification or authenticate as any other citizen. We have informed the CERT-Bund about this vulnerability in July 2018. The CERT-Bund (BSI) took on further communication and coordination with the vendor. In August 2018, Governikus released a patched version ( of the Autent SDK and informed affected customers.
sec consult, 20.11.2018
eid_dokument_npa  land_deutschland  itsicherheit_authentisierung  eid_dokument_software  itsicherheit_exploit_flaw  unternehmen_governikus  itsicherheit_authentisierung_saml  itsicherheit_authentisierung_sso  itsicherheit_authentisierung_protokoll  itsicherheit_implementierung  internet_protokoll_http  staat_politik_it_egovernance_egovernment 
8 weeks ago by kraven
Spectre, Meltdown researchers unveil 7 more speculative execution attacks
A research team—including many of the original researchers behind Meltdown, Spectre, and the related Foreshadow and BranchScope attacks—has published a new paper disclosing yet more attacks in the Spectre and Meltdown families. The result? Seven new possible attacks. Some are mitigated by known mitigation techniques, but others are not. That means further work is required to safeguard vulnerable systems. In the new research, these Meltdown variants are joined by a new one using Intel's "Protection Keys for Userspace" (PKU). Similarly, another Intel extension is the Memory Protection eXtensions (MPX). Just as all the Meltdown variants follow a similar pattern, so, too, do the Spectre variants. In total, five different misprediction scenarios were identified (four based on branch predictors, one based on stores to memory being overlooked momentarily). Of the four branch predictor attacks, each attack can be used either against the same address space or a different one, and it can be used against the same branch or one that's related. This creates 16 branch predictor-based variants as well as the store-based attack. In particular, one of the variants of the original Spectre attacks has been shown to have greater applicability against AMD's latest processors than previously known; likewise the attack has also been shown to be effective against ARM processors.
ars technica, 14.11.2018
itsicherheit_cpu_meltdown_spectre  itsicherheit_exploit_flaw  itsicherheit_seitenkanal_analyse_angriff  itsicherheit_verdeckterkanal_data_exfil 
9 weeks ago by kraven
Gesundheitsdaten: Krankenkassen-App Vivy hatte womöglich erhebliche Sicherheitslücken
Vor knapp sechs Wochen ist mit der Gesundheits-App Vivy diejenige gelauncht worden, die der bislang größte Kreis an Menschen in Deutschland nutzen könnte: 13,5 Millionen Menschen sind versichert bei den beteiligten gesetzlichen wie privaten Krankenversicherungen, die sie anbieten. Darunter sind die DAK, verschiedene Innungskrankenkassen, die BertelsmannBKK, Gothaer, Barmenia und Allianz. Letztere ist auch als Gesellschafter mit 70 Prozent beteiligt an der Betreiberfirma der App, der in Berlin ansässigen Vivy GmbH. Die hat am 22. September, fünf Tage nach dem Start der App, morgens um 9.45 Uhr eine Mail der schweizerisch-deutschen IT-Sicherheitsfirma modzero erhalten. Der Inhalt des Schreibens musste alarmierend sein: Die Vivy-App, verfügbar für die Smartphone-Betriebssysteme Android und iOS enthalte nach einer Analyse von modzero schwerwiegende Schwachstellen in Sachen Datensicherheit. Martin Tschirsich, ein bei modzero beschäftigter IT-Security-Analyst, hatte kurz nach dem Launch der App im September "schwere Sicherheitsmängel sowohl in der Smartphone-App als auch in der Cloud-Plattform und der Browser-Anwendung für Ärzte" gefunden – mithin also an allen nur erdenklichen Punkten, an denen Hacker ansetzen könnten. Am 25. Oktober verfasste Thorsten Schröder, Geschäftsführer von modzero, die finale Version eines 35-seitigen Berichtes, den seine Firma umgehend an die Vivy GmbH sandte. Die Mängelliste, die modzero zur Vivy-App erstellt hat, ist lang. So seien etwa Informationen darüber, wer wann mit welchem Arzt Gesundheitsdaten geteilt hatte, "ungeschützt für jede Person lesbar im Internet" gewesen. Versicherte seien identifizierbar gewesen "anhand von Namen, Foto, E-Mailadresse, Geburtsdatum und Versichertennummer", auch die Namen der von ihnen kontaktierten Medizinerinnen und Ärzte seien auslesbar gewesen. Schlimmer noch: "Unbefugte konnten über das Internet alle Dokumente, die an einen Arzt gesendet werden sollten, abfangen und entschlüsseln."
zeit, 30.10.2018
itsicherheit_datensicherheit  itsicherheit_implementierung  itsicherheit_by_obscurity  itsicherheit_mobil_apps  itsicherheit_mobil_os  datenschutz_patient_gesundheitsdaten  itsicherheit_exploit_flaw  unternehmen_vivy  unternehmen_modzero  unternehmen_allg_desinformation_propaganda  unternehmen_allg_versicherung_kk  unternehmen_allianz  itsicherheit_audit  itsicherheit_prüfsigel_zertifizierung  land_deutschland  staat_politik_it_gesundheit_ega_epa 
11 weeks ago by kraven
Überwachungsexporte: Bundesregierung stellt Industrie vor Menschenrechte
Vor zwei Jahren startete die EU-Kommission auf Druck der Bundesregierung eine Initiative, um den Handel der europäischen Überwachungsindustrie mit autokratischen Regimen zu stoppen. Vertrauliche Verhandlungsprotokolle zeigen nun: Die Bundesregierung nutzt die laufenden Brüsseler Verhandlungen, um Wünsche der deutschen Industrie zu erfüllen – und wird bei Regelungen zum menschenrechtlichen Schutz vor Überwachung ausgetrickst. Gemeinsam mit der Menschenrechtsorganisation Reporter ohne Grenzen veröffentlichen wir die Dokumente im Volltext, die belegen, dass von den einstigen Versprechungen heute kaum noch etwas übrig geblieben ist. Tatsächlich hat die Bundesregierung nun in einigen Punkten sogar gegen Verbesserungsvorschläge gestimmt, die EU-Kommission und Europaparlament in jahrelangen Verhandlungsrunden erarbeitet hatten. In anderen Bereichen scheiterte die Strategie der deutschen Beamten in Brüssel durch taktische Fehleinschätzungen, sodass sich mittlerweile ein regelrechter Block gegen Deutschland gebildet hat. Die historische Reform steht damit vor dem Aus.
netzpolitik, 29.10.2018
de_bundesregierung  eu_europäischer_rat_der_eu  land_europa  abkommen_waasenaar  recht_eu_vo_dual_use  land_deutschland  staat_politik_wirtschaft_förderung_schutz  staat_politik_wirtschaft_exportkontrolle  itsicherheit_malware_spyware  itsicherheit_exploit_flaw  unternehmen_allg_exploit_malware_dealer  unternehmen_allg_lobbyismus  verband_bdi  staat_form_autoritarismus  staat_form_polizeistaat  staat_repression_medien_presse  staat_repression_opposition_dissidenz  staat_repression_politische_verfolgung  überwachung_ngo_npo  überwachung_medien_presse  überwachung_int_sigint_comint  geheimdienst_polizei_infiltration_tech  staat_politik_aktionismus_symbolisch  staat_politik_geheimhaltung  staat_politik_diplomatie  überwachung_itk_inhaltsdaten  überwachung_onlinedurchsuchung  überwachung_quellen_tkü  land_schweden  land_finnland  staat_repression_ngo_npo 
11 weeks ago by kraven
In March 2017, the ShadowBrokers published a chunk of stolen data that included two frameworks: DanderSpritz and FuzzBunch. DanderSpritz consists entirely of plugins to gather intelligence, use exploits and examine already controlled machines. Fuzzbunch on the other hand provides a framework for different utilities to interact and work together. It contains various types of plugins designed to analyze victims, exploit vulnerabilities, schedule tasks, etc. One of the most interesting Fuzzbunch’s categories is called ImplantConfig and includes plugins designed to control the infected machines via an implant at the post-exploitation stage. DarkPulsar is a very interesting administrative module for controlling a passive backdoor named ‘sipauth32.tsp’ that provides remote control, belonging to this category. We found around 50 victims located in Russia, Iran and Egypt, typically infecting Windows 2003/2008 Server. Targets were related to nuclear energy, telecommunications, IT, aerospace and R&D.
kaspersky labs, 19.10.2018
geheimdienst_us_nsa_tao_cna_cne  itsicherheit_botnetz_c&c  itsicherheit_exploit_flaw  itsicherheit_malware_spyware  geheimdienst_polizei_infiltration_tech  itsicherheit_verdeckterkanal_data_exfil  software_os_windows  überwachung_backdoor_software  software_server  itsicherheit_authentisierung 
october 2018 by kraven
If Supermicro boards were so bug-ridden, why would hackers ever need implants?
Whether spy chips reported by Bloomberg existed, attackers had much easier options. By now, everyone knows the premise behind two unconfirmed Bloomberg articles that have dominated security headlines over the past week. The complexity, sophistication, and surgical precision needed to pull off such attacks as reported are breathtaking, particularly at the reported scale. The other monumental effort required by the reported supply-chain attacks is the vast amount of engineering and reverse engineering. Based on Bloomberg’s descriptions, the attacks involved designing at least two custom implants (one that was no bigger than a grain of rice), modifying the motherboards to work with the custom implants, and ensuring the modified boards would work even when administrators installed new firmware on the boards. While the requirements are within the means of a determined nation, three hardware security experts interviewed for this story said the factory-seeded hardware implants are unnecessarily complex and cumbersome, particularly at the reported scale, which involved almost 30 targets. “Attackers tend to prefer the lowest-hanging fruit that gets them the best access for the longest period of time,” Steve Lord, a researcher specializing in hardware hacking and co-founder of UK conference 44CON, told me. “Hardware attacks could provide very long lifetimes but are very high up the tree in terms of cost to implement.” “I spoke with Jordan a few months ago,” Moore said, referring to Jordan Robertson, one of two reporters whose names appear in the Bloomberg articles. “We chatted about a bunch of things, but I pushed back on the idea that it would be practical to backdoor Supermicro BMCs with hardware, as it is still trivial to do so in software. It would be really silly for someone to add a chip when even a non-subtle change to the flashed firmware would be sufficient.”
ars technica, 11.10.2018
medien_presse_bloomberg  land_usa  land_china  überwachung_abhörschnittstelle  überwachung_backdoor_hardware  tech_computer_server  itsicherheit_verdeckterkanal_data_exfil  geheimdienst_polizei_infiltration_tech  itsicherheit_malware_spyware  itsicherheit_firmware  unternehmen_supermicro  überwachung_backdoor_software  itsicherheit_exploit_flaw  itsicherheit_code_signing 
october 2018 by kraven
Voting Machine Used in Half of U.S. Is Vulnerable to Attack, Report Finds
Election machines used in more than half of U.S. states carry a flaw disclosed more than a decade ago that makes them vulnerable to a cyberattack, according to a report to be delivered Thursday on Capitol Hill. The issue was found in the widely used Model 650 high-speed ballot-counting machine made by Election Systems & Software LLC, the nation’s leading manufacturer of election equipment. It is one of about seven security problems in several models of voting equipment described in the report, which is based on research conducted last month at the Def Con hacker conference. The flaw in the ES&S machine stood out because it was detailed in a security report commissioned by Ohio’s secretary of state in 2007, said Harri Hursti, an election-security researcher who co-wrote both the Ohio and Def Con reports. “There has been more than plenty of time to fix it,” he said.
wsj, 27.09.2018
tech_hw_wahlcomputer  itsicherheit_exploit_flaw  land_usa 
september 2018 by kraven
DARPA Wants to Find Botnets Before They Attack
The Defense Advanced Research Projects Agency on Aug. 30 awarded a $1.2 million contract to cybersecurity firm Packet Forensics to develop novel ways to locate and identify these hidden online armies. The award comes as part of the agency’s Harnessing Autonomy for Countering Cyber-adversary Systems program, a DARPA spokesperson told Nextgov. Through the HACCS program, DARPA aims to build a system that can automatically pinpoint botnet-infected devices and disable their malware without their owners ever knowing. Launched in 2017, the program is investing in three main technologies: systems that uncover and fingerprint botnets across the internet, tools that upload software to infected devices through known security gaps, and software that disables botnet malware once it’s uploaded. Packet Forensics’ technology falls under that first category, the DARPA spokesperson said.The effort is scheduled to last to four years, with the first phase running 16 months. Later phases include additional funding.
defense one, 12.09.2018
militär_us_darpa_projekt_haccs  militär_allg_infiltration_tech  itsicherheit_botnetz_c&c  itsicherheit_malware_spyware  itsicherheit_exploit_flaw  geheimdienst_us_nsa_treasure_map  geheimdienst_us_nsa_turbulence_genie_turbine  geheimdienst_us_nsa_tao_quantum  tech_dual_use  militär_allg_kriegsführung_elektro_it_ki  unternehmen_packet_forensics  land_usa  itsicherheit_botnetz_c&c_gchq_nsa 
september 2018 by kraven
UIDAI’s Aadhaar Software Hacked, ID Database Compromised, Experts Confirm
The authenticity of the data stored in India's controversial Aadhaar identity database, which contains the biometrics and personal information of over 1 billion Indians, has been compromised by a software patch that disables critical security features of the software used to enrol new Aadhaar users, a three month-long investigation by HuffPost India reveals. The patch—freely available for as little as Rs 2,500 (around $35)— allows unauthorised persons, based anywhere in the world, to generate Aadhaar numbers at will, and is still in widespread use. This has significant implications for national security at a time when the Indian government has sought to make Aadhaar numbers the gold standard for citizen identification, and mandatory for everything from using a mobile phone to accessing a bank account. HuffPost India is in possession of the patch, and had it analysed by three internationally reputed experts, and two Indian analysts (one of whom sought anonymity as he works at a state-funded university), to find that: The patch lets a user bypass critical security features such as biometric authentication of enrolment operators to generate unauthorised Aadhaar numbers. The patch disables the enrolment software's in-built GPS security feature (used to identify the physical location of every enrolment centre), which means anyone anywhere in the world — say, Beijing, Karachi or Kabul — can use the software to enrol users. The patch reduces the sensitivity of the enrolment software's iris-recognition system, making it easier to spoof the software with a photograph of a registered operator, rather than requiring the operator to be present in person. The experts consulted by HuffPost India said that the vulnerability is intrinsic to a technology choice made at the inception of the Aadhaar programme, which means that fixing it and other future threats would require altering Aadhaar's fundamental structure. HuffPost India could not establish just how many enrolment centres used the patch, but even the UIDAI has admitted that the enrolment process has been marred by corruption. In 2017, the UIDAI said it had blacklisted 49,000 enrolment centres for various violations, and in February 2018, the UIDAI terminated all contracts with common service centres as well. Henceforth, only banks and government institutions like the postal service can enrol Aadhaar users. As a consequence, tens of thousands of young men, with rudimentary education but great familiarity with the Aadhaar system, were put out of work.
huffington post, 11.09.2018
datenbank_biometrie_in_aadhaar  land_indien  itsicherheit_by_obscurity  datenbank_population  itsicherheit_authentisierung_biometrie  biometrie_täuschung  itsicherheit_implementierung  itsicherheit_exploit_flaw  datenschutz_id_management  itsicherheit_datensicherheit  staat_outsourcing  in_uidai  in_nciipc  biometrie_erfassung  video_youtube  gesellschaft_armut  staat_politik_desinformation  staat_allg_inkompetenz 
september 2018 by kraven
Worries arise about security of new WebAuthn protocol
At the end of last month, the team of security researchers at Paragon Initiative, known for their strong background in cryptography, have taken a close look at this new protocol making its way into browsers like Chrome, Edge, and Firefox. In a security audit, researchers say they identified various issues with the algorithms used to generate the attestation keys (signatures). They point out that the W3C WebAuthn specification recommends the use of outdated algorithms such as the FIDO Alliance's Elliptic Curve (EC) Direct Anonymous Attestation (DAA), or RSASSA-PKCS1-v1_5. The Paragon team detailed a long list of issues with both algorithms in a technical report, here, but in short, they are vulnerable to quite a few known cryptographic attacks. In particular, they took an issue with the use of RSASSA-PKCS1-v1_5. But the FIDO Alliance's custom ECDAA crypto algorithm is not that safe either. "If converted into a practical exploit, the ECDAA attacks discussed in the article would allow attackers to steal the key from a [server's] TPM, which would allow attackers to effectively clone the user's hardware security token remotely," Arciszewski said. "The scenarios that follow depend on how much trust was placed into the hardware security token," he added. "At minimum, I imagine it would enable 2FA bypasses and re-enable phishing attacks. However, if companies elected to use hardware security tokens to obviate passwords, it would allow direct user impersonation by attackers." In subsequent email exchanges with the Paragon team, ZDNet understands that at the heart of the issue may be the confusing WebAuthn documentation released by the FIDO Alliance team, which, for legacy purposes, categorizes both algorithms as "required" (for RSASSA-PKCS1-v1_5) and "recommended" (two ECDAA-based algorithms). This may lead to situations where implementers may believe the two algorithms may be minimal thresholds for implementation and support only these. "There are plenty of COSE algorithms to choose from," Arciszewski said.
zdnet, 09.09.2018
internet_spezifikation_w3c_webauthn  itsicherheit_by_obscurity  itsicherheit_exploit_flaw  itsicherheit_implementierung  itsicherheit_authentisierung_2fa_u2f_fido  itsicherheit_authentisierung_id_token  internet_spezifikation_cose  internet_spezifikation_jose  krypto_algo_fido_ecdaa  krypto_algo_rsassa_pkcs1v15  unternehmen_paragonie 
september 2018 by kraven
Chaos Computer Club fordert strikt defensive Cyber-Sicherheitsstrategie
Die Bundesregierung hat heute die Gründung einer „Agentur für disruptive Innovationen in der Cybersicherheit“ verkündet. Die Ausrichtung unter der Ägide von Innen- und Verteidigungsministerium lässt große Zweifel aufkommen, ob es hier wirklich um Cybersicherheit und nicht vielmehr um die Ausweitung der Cyber-Bewaffnung geht. Der Chaos Computer Club fordert, die deutsche Cybersicherheits-Strategie strikt defensiv auszurichten. Eine sinnvolle Strategie für eine sichere digitale Welt für Bürger und Wirtschaft erfordert, unabhängige zivile Organisationen und auch das Bundesamt für Sicherheit in der Informationstechnik (BSI) zu stärken, und gerade keine weitere Militarisierung und Vergeheimdienstlichung des Themas. „Wenn die Bundeswehr und die Geheimdienste den Ton bei der Agentur angeben, wird der Schwerpunkt auf Cyber-Offensiv-Waffen liegen“, sagte CCC-Sprecher Frank Rieger. „Dies ist das falsche Signal und wird die desolate Situation in der IT-Sicherheit verschlechtern und nicht verbessern.“ Ob ein „Zurückhacken“ und offensive digitale Angriffe, zumal durch das deutsche Militär, überhaupt mit geltendem deutschen Recht und dem Völkerrecht vereinbar ist, steht ohnehin in Zweifel. Darüber kann auch die euphemistische Verbrämung des Vorhabens durch die irreführende Namensgebung der Agentur nicht hinwegtäuschen. Dass offenbar militärische, geheimdienstliche und polizeiliche Interessen weiter vermengt werden, wenn die Agentur diese aus gutem Grund rechtlich getrennten Bereiche bedient, ist nicht akzeptabel.
ccc, 29.08.2018
land_deutschland  de_ministerium_bmi  itsicherheit_malware_spyware  itsicherheit_exploit_flaw  geheimdienst_polizei_infiltration_tech  militär_allg_infiltration_tech  sicherheitsforschung_de  staat_propaganda_itsicherheit  staat_politik_desinformation  militär_allg_kriegsführung_elektro_it_ki  de_ministerium_bmvg_adic_cyberagentur 
august 2018 by kraven
Neue Behörde: Agentur für Hackbacks und Quantenkryptographie
Die Bundesregierung will mit der Gründung einer neuen Agentur für Innovationen in der Cybersicherheit "völlig neue Wege" in der Forschungsförderung gehen. Das sagte Bundesverteidigungsministerin Ursula von der Leyen (CDU) bei der Vorstellung der neuen Behörde am Mittwoch in Berlin. Nach Darstellung von Bundesinnenminister Horst Seehofer (CSU) soll die Agentur "Schlüsseltechnologien mit hohem Innovationspotenzial fördern". Da die Förderung in einem sehr frühen Stadium erfolgen solle, sei ebenso wie bei privaten Risikokapitalgebern das Scheitern von Projekten einkalkuliert. Laut von der Leyen sollen der Agentur in den kommenden fünf Jahren 200 Millionen Euro zur Verfügung stehen. Davon sollen 80 Prozent in Förderprojekte fließen. Weitere Details sind noch offen.
golem, 29.08.2018
land_deutschland  de_ministerium_bmi  itsicherheit_malware_spyware  itsicherheit_exploit_flaw  geheimdienst_polizei_infiltration_tech  militär_allg_infiltration_tech  sicherheitsforschung_de  staat_propaganda_itsicherheit  staat_politik_desinformation  staat_politik_wirtschaft_förderung_schutz  unternehmen_allg_start_up  militär_allg_kriegsführung_elektro_it_ki  de_ministerium_bmvg_adic_cyberagentur 
august 2018 by kraven
The Problems and Promise of WebAssembly
This blog post gives an overview of the features and attack surface of WebAssembly, as well as the vulnerabilities we found. WebAssembly binaries consist of a series of sections (binary blobs) with different lengths and types. If a section has a code that is not specified in the above table, it is called a custom section. Some browsers use custom sections to implement upcoming or experimental features. Unrecognized custom sections are skipped when loading a Module, and can be accessed as TypedArrays in JavaScript. Module loading starts off by parsing the module. This involves going through each section, verifying its format and then loading the needed information into a native structure inside the WebAssembly engine. Most of the bugs that Project Zero found in WebAssembly occured in this phase. There are two emerging features of WebAssembly that are likely to have a security impact. One is threading. Currently, WebAssembly only supports concurrency via JavaScript workers, but this is likely to change. Since JavaScript is designed assuming that this is the only concurrency model, WebAssembly threading has the potential to require a lot of code to be thread safe that did not previously need to be, and this could lead to security problems. WebAssembly GC is another potential feature of WebAssembly that could lead to security problems. Currently, some uses of WebAssembly have performance problems due to the lack of higher-level memory management in WebAssembly. If WebAssembly GC is implemented, it will increase the number of applications that WebAssembly can be used for, but it will also make it more likely that vulnerabilities related to memory management will occur in both WebAssembly engines and applications written in WebAssembly.
project zero, 16.08.2018
software_browser_allg_wasm  software_javascript  itsicherheit_exploit_flaw  itsicherheit_speicher  itsicherheit_software_browser 
august 2018 by kraven
Three more data-leaking security holes found in Intel chips as designers swap security for speed
Intel will today disclose three more vulnerabilities in its processors that can be exploited by malware and malicious virtual machines to potentially steal secret information from computer memory. These secrets can include passwords, personal and financial records, and encryption keys. They can be potentially lifted from other applications and other customers' virtual machines, as well as SGX enclaves, and System Management Mode (SMM) memory. SGX is Intel's technology that is supposed to protect these secrets from snooping code. SMM is your computer's hidden janitor that has total control over the hardware, and total access to its data. Across the board, Intel's desktop, workstation, and server CPUs are vulnerable. Crucially, they do not work as documented: where their technical manuals say memory can be marked off limits, it simply is not. This means malicious software on a vulnerable machine, and guest virtual machines on a cloud platform, can potentially lift sensitive data from other software and other customers' virtual machines. Here are the three cockups, which Intel has dubbed its L1 Terminal Fault (L1TF) bugs because they involve extracting secret information from the CPU level-one data cache: CVE-2018-3615: This affects Software Guard Extensions (SGX). This vulnerability was named Foreshadow by the team who uncovered it. CVE-2018-3620: This affects operating systems and SMM. CVE-2018-3646: This affects hypervisors and virtual machines. The upshot is malware or a malicious guest operating system can exploit this to ascertain data it shouldn't be able to read, by forcing pages to be marked as not present and observing what's fetched speculatively from the L1 cache before the page fault circuitry in the processor can step in and halt proceedings. This requires the exploit code to run on the same physical CPU core as the victim code, because it needs to observe the L1 data cache.
register, 14.08.2018
unternehmen_intel  itsicherheit_cpu_meltdown_spectre  itsicherheit_seitenkanal_analyse_angriff  tech_hw_chip_cpu_smm_smi  tech_hw_chip_intel_sgx  tech_virtualisierung  tech_hw_chip_cpu_cache  itsicherheit_by_obscurity  itsicherheit_malware_spyware  itsicherheit_exploit_flaw 
august 2018 by kraven
Police Bodycams Can Be Hacked to Doctor Footage
At the DefCon security conference in Las Vegas on Saturday, one researcher will present findings that many body cameras on the market today are vulnerable to remote digital attacks, including some that could result in the manipulation of footage. Josh Mitchell, a consultant at the security firm Nuix, analyzed five body camera models from five different companies: Vievu, Patrol Eyes, Fire Cam, Digital Ally, and CeeSc. The companies all market their devices to law enforcement groups around the US. Mitchell's presentation does not include market leader Axon—although the company did acquire Vievu in May. In all but the Digital Ally device, the vulnerabilities would allow an attacker to download footage off a camera, edit things out or potentially make more intricate modifications, and then re-upload it, leaving no indication of the change. Or an attacker could simply delete footage they don't want law enforcement to have.
wired, 11.08.2018
überwachung_video_mobil  itsicherheit_by_obscurity  itsicherheit_exploit_flaw  itsicherheit_datensicherheit  itsicherheit_authentisierung  itsicherheit_firmware_peripherie  itsicherheit_hardware  polizei_allg_streife_patrouille 
august 2018 by kraven

« earlier    

related tags

abkommen_waasenaar  absurdistan  anonymisierung  anonymisierung_anti  biometrie_erfassung  biometrie_stimme_sprache  biometrie_täuschung  ca_ministerium_verteidigung  datenanalyse_bigdata  datenanalyse_echtzeit  datenanalyse_graph_sna  datenanalyse_prognose_vorhersage  datenanalyse_raster_muster  datenanalyse_text  datenbank_biometrie_in_aadhaar  datenbank_population  datenschutz_id_management  datenschutz_kontrolle_pseudo  datenschutz_niveau_senkung  datenschutz_patient_gesundheitsdaten  de_bundesamt_bsi  de_bundesanwaltschaft  de_bundesregierung  de_bundesregierung_bkamt  de_bundestag  de_bundestag_ausschuss_digitaleagenda  de_bundestag_ausschuss_expertenanhörung  de_bundestag_ausschuss_nsa  de_bundestag_ausschuss_recht  de_bundestag_dip  de_bundestag_vertrauensgremium  de_ministerium_bmg  de_ministerium_bmi  de_ministerium_bmi_zitis  de_ministerium_bmvg  de_ministerium_bmvg_adic_cyberagentur  de_ministerium_bmvg_cih  de_ministerkonferenz_imk  eid_dokument  eid_dokument_egk  eid_dokument_npa  eid_dokument_software  eu_europäischer_rat_der_eu  eu_kommission  eu_minister_rat_der_eu  fr_inria  geheimdienst_abkommen_ukusa_14eyes_sseur  geheimdienst_allg_sabotage  geheimdienst_allg_spionage  geheimdienst_allg_verdeckte_operation  geheimdienst_ca_csec_cna_cne  geheimdienst_de_bka  geheimdienst_de_bnd_ta  geheimdienst_de_bnd_ta_cia_glotaic  geheimdienst_de_bnd_ta_nsa_jsa_eikonal  geheimdienst_de_bnd_ta_panos_aniski  geheimdienst_de_bnd_ta_panos_uranos  geheimdienst_de_bnd_ta_sit  geheimdienst_de_bnd_ta_zerberus  geheimdienst_de_bundespolizei  geheimdienst_de_verfassungsschutz  geheimdienst_de_verfassungsschutz_xks_poseidon  geheimdienst_eu_europol  geheimdienst_eu_europol_ec3  geheimdienst_il_idf_aman_unit8200_isnu  geheimdienst_militär_zusammenarbeit  geheimdienst_polizei_infiltration_tech  geheimdienst_polizei_kontrolle  geheimdienst_polizei_tarnung_undercover  geheimdienst_polizei_zusammenarbeit  geheimdienst_uk_gchq  geheimdienst_uk_gchq_cne_equipment_interference  geheimdienst_uk_gchq_jtrig_cna_cne  geheimdienst_uk_gchq_mti_tempora  geheimdienst_uk_gchq_ncsc  geheimdienst_uk_gchq_op_socialist  geheimdienst_uk_mi5_ss  geheimdienst_us_analyse_datenzentrum  geheimdienst_us_cia  geheimdienst_us_cia_cao  geheimdienst_us_cia_ddi_cci  geheimdienst_us_cia_ddi_cci_edg  geheimdienst_us_cia_ddi_ccie  geheimdienst_us_cia_ioc  geheimdienst_us_fbi  geheimdienst_us_fbi_cipav_nit  geheimdienst_us_nsa  geheimdienst_us_nsa_cao_tao  geheimdienst_us_nsa_cao_tao_eao  geheimdienst_us_nsa_cao_tarex  geheimdienst_us_nsa_ces_bullrun  geheimdienst_us_nsa_ctma_geoloc_cell  geheimdienst_us_nsa_etc  geheimdienst_us_nsa_gilgamesh  geheimdienst_us_nsa_shenanigans  geheimdienst_us_nsa_sigad_roc_station  geheimdienst_us_nsa_sso_rampart_a  geheimdienst_us_nsa_tao_ato  geheimdienst_us_nsa_tao_baddecision_seconddate  geheimdienst_us_nsa_tao_blinddate  geheimdienst_us_nsa_tao_cna_cne  geheimdienst_us_nsa_tao_foxacid  geheimdienst_us_nsa_tao_quantum  geheimdienst_us_nsa_treasure_map  geheimdienst_us_nsa_turbulence_apex  geheimdienst_us_nsa_turbulence_genie_turbine  geheimdienst_us_nsa_upstream  geheimdienst_us_odni  gericht_de_bverfg  gericht_uk_ripa_ipt  gericht_us_bundesbezirk_amtsrichter  gesellschaft_armut  gesellschaft_stadt_smart_city  gesetz_ca_c_59  gesetz_ca_cse_act  gesetz_de_bkag  gesetz_de_ehealth  gesetz_de_polizei  gesetz_de_stpo_tech_observation  gesetz_de_tkg_tküv  gesetz_de_tmg  gesetz_entwurf_änderung  gesetz_uk_ipa  gesetz_uk_isa  gesetz_us_rea_frcrmp_rule41  hacktivism_ethik  hacktivism_hacker_whitehat  in_nciipc  in_uidai  internet_cloud_datenspeicher  internet_dienst_chat_im  internet_dienst_voip  internet_iot_m2m  internet_protokoll_http  internet_protokoll_mime  internet_regulierung  internet_spezifikation_cose  internet_spezifikation_jose  internet_spezifikation_w3c_webauthn  internet_wlan  internet_zugang_anbieter  itsicherheit_angriff_zuschreibung  itsicherheit_audit  itsicherheit_authentisierung  itsicherheit_authentisierung_2fa_u2f_fido  itsicherheit_authentisierung_biometrie  itsicherheit_authentisierung_id_token  itsicherheit_authentisierung_passwort  itsicherheit_authentisierung_protokoll  itsicherheit_authentisierung_saml  itsicherheit_authentisierung_sso  itsicherheit_autonom_automatisch  itsicherheit_backup_datensicherung  itsicherheit_botnetz_c&c  itsicherheit_botnetz_c&c_gchq_nsa  itsicherheit_by_obscurity  itsicherheit_code_signing  itsicherheit_cpu_branchscope  itsicherheit_cpu_meltdown_spectre  itsicherheit_datensicherheit  itsicherheit_dos  itsicherheit_firewall_paketfilter  itsicherheit_firmware  itsicherheit_firmware_bios  itsicherheit_firmware_mobilfunkgerät  itsicherheit_firmware_peripherie  itsicherheit_firmware_router  itsicherheit_hardware  itsicherheit_implementierung  itsicherheit_iot_m2m  itsicherheit_malware_spyware  itsicherheit_mobil_apps  itsicherheit_mobil_os  itsicherheit_netzwerk  itsicherheit_os  itsicherheit_pentesting  itsicherheit_prüfsigel_zertifizierung  itsicherheit_sandbox_isolierung  itsicherheit_seitenkanal_analyse_angriff  itsicherheit_software_browser  itsicherheit_software_mua  itsicherheit_software_server  itsicherheit_speicher  itsicherheit_speicher_aslr  itsicherheit_strategie  itsicherheit_trafficmanipulation_paketinjektion  itsicherheit_verdeckterkanal_data_exfil  itsicherheit_virtualisierung  itsicherheit_web_anwendung_framework  kriminalität_cracker_blackhat  krypto_algo_aka  krypto_algo_fido_ecdaa  krypto_algo_md5  krypto_algo_modus_aead  krypto_algo_modus_aead_eax  krypto_algo_modus_aead_ocb  krypto_algo_rsa  krypto_algo_rsassa_pkcs1v15  krypto_algo_sha1  krypto_algo_wpa2  krypto_analyse  krypto_analyse_bruteforce  krypto_analyse_seitenkanal  krypto_backdoor  krypto_bibliothek_libgcrypt  krypto_bibliothek_rsa_infineon  krypto_crypto_war  krypto_downgrading  krypto_entschlüsselung  krypto_faktorisierung  krypto_ipsec  krypto_key_agreement_exchange  krypto_key_kdf  krypto_key_recovery  krypto_openpgp  krypto_openpgp_mdc  krypto_passwort_hash  krypto_rng  krypto_signierung  krypto_signierung_qes  krypto_smime  krypto_ssh  krypto_tls  krypto_tls_cert  krypto_tls_cert_client  krypto_tls_cert_pinning  krypto_tls_hsts  krypto_verschlüsselung  krypto_verschlüsselung_datenträger  krypto_verschlüsselung_kommunikation  krypto_verschlüsselung_transport  land_china  land_deutschland  land_europa  land_finnland  land_indien  land_kanada  land_mexiko  land_schweden  land_uk  land_usa  medien_presse_bloomberg  militär_allg_infiltration_tech  militär_allg_kriegsführung_elektro_it_ki  militär_allg_sabotage  militär_ca_armed_forces  militär_de_bundeswehr_kdocir  militär_de_bundeswehr_kdocir_itbw_zcsbw  militär_nato_coc  militär_us_darpa_office_information_innovation  militär_us_darpa_projekt_haccs  mx_regierung  ngo_allg_hacktivism  ngo_allg_politik_aktiverwiderstand  ngo_allg_politik_netz_aktivismus  ngo_anarchismus  ngo_eff  ngo_wikileaks_cia_vault  npo_3gpp  npo_ietf  npo_ostif  partei_de_cducsu  partei_de_spd  polizei_allg_streife_patrouille  privatsphäre  recht_eu_vo_dual_use  recht_grundrecht_it_systeme  recht_grundrecht_kernbereich_privat  recht_legalisierung  recht_richtervorbehalt  sicherheitsforschung_de  sicherheitsforschung_it  software_anon_tor  software_anon_tor_onion_service  software_anti_malware_virus  software_browser_allg_wasm  software_chat_messenger_voip  software_javascript  software_krypto_gnupg  software_krypto_hashcat  software_krypto_neopg  software_krypto_openssl  software_krypto_truecrypt_veracrypt  software_mobile_app  software_mua_html_mail  software_mua_tb_enigmail  software_os_kernel  software_os_linux  software_os_linux_android  software_os_linux_kernel_kernelsec_kspp  software_os_linux_kernel_syscall  software_os_mac  software_os_page_cache  software_os_windows  software_passwort_manager  software_server  software_sprachsynthese  staat_allg_haushalt  staat_allg_inkompetenz  staat_allg_interessenkonflikt_korruption  staat_form_autoritarismus  staat_form_polizeistaat  staat_gezielte_tötung_exekution  staat_outsourcing  staat_politik_aktionismus_symbolisch  staat_politik_desinformation  staat_politik_diplomatie  staat_politik_geheimhaltung  staat_politik_intransparenz  staat_politik_it_egovernance_egovernment  staat_politik_it_gesundheit_ega_epa  staat_politik_it_gesundheit_telemedizin  staat_politik_sicherheit_rüstung_kontrolle_wettlauf  staat_politik_wirtschaft_exportkontrolle  staat_politik_wirtschaft_förderung_schutz  staat_ppp_privatisierung  staat_propaganda_itsicherheit  staat_propaganda_rechtspositivismus  staat_propaganda_sicherheit  staat_propaganda_sicherheit_going_dark  staat_repression_einschüchterung  staat_repression_medien_presse  staat_repression_ngo_npo  staat_repression_opposition_dissidenz  staat_repression_politische_verfolgung  staat_wahl_manipulation  statistik_überwachung  tech_computer_fernwartung_steuerung  tech_computer_server  tech_dual_use  tech_hw_chip_cpu  tech_hw_chip_cpu_cache  tech_hw_chip_cpu_smm_smi  tech_hw_chip_intel  tech_hw_chip_intel_me_amt  tech_hw_chip_intel_me_amt_mebx  tech_hw_chip_intel_sgx  tech_hw_chip_intel_smram_smrr  tech_hw_chip_intel_sps  tech_hw_chip_intel_txe  tech_hw_chip_krypto_tpm  tech_hw_krypto_token  tech_hw_laptop_notebook  tech_hw_maus_funk  tech_hw_mobilfunk_gerät  tech_hw_tastatur_funk  tech_hw_wahlcomputer  tech_ki_maschinelles_lernen  tech_ki_maschinelles_lernen_deep_learning  tech_ki_sprache  tech_medien_kompetenz_dau  tech_mobilfunk_lte_ngmn  tech_mobilfunk_standard  tech_netzwerk_protokoll_smb  tech_router_home_cwmp_tr069  tech_router_home_tr064  tech_virtualisierung  tech_wifi_wlan  uas_ugv_überwachung  uni_allg_diverse  uni_at_tu_graz  uni_ch_eth  uni_de_bochum  uni_de_fh_münster  uni_de_saarland  uni_de_tu_berlin  uni_de_tu_münchen  uni_de_unibwm  uni_nl_ku_leuven  uni_us_boston  uni_us_bu  uni_us_cmu  uni_us_princeton  uni_us_uc_riverside  unternehmen_allg_bank_swift  unternehmen_allg_desinformation_propaganda  unternehmen_allg_exploit_malware_dealer  unternehmen_allg_inkompetenz  unternehmen_allg_lobbyismus  unternehmen_allg_sicherheit_rüstung  unternehmen_allg_start_up  unternehmen_allg_versicherung_kk  unternehmen_allianz  unternehmen_amd  unternehmen_arm  unternehmen_bastille_networks  unternehmen_bwi  unternehmen_cisco  unternehmen_crowdfense  unternehmen_facebook  unternehmen_governikus  unternehmen_infineon  unternehmen_intel  unternehmen_kaspersky  unternehmen_mci  unternehmen_microsoft  unternehmen_modzero  unternehmen_nso_group  unternehmen_packet_forensics  unternehmen_paragonie  unternehmen_qualcomm  unternehmen_quarkslab  unternehmen_rhode_schwarz  unternehmen_siemens  unternehmen_supermicro  unternehmen_symantec  unternehmen_telekom_tsystems  unternehmen_verizon  unternehmen_vivy  unternehmen_zerodium  us_darpa_cgc  us_ministerium_justiz  us_ministerium_verteidigung  us_ministerium_verteidigung_diu  us_regierung_hspd23  us_regierung_nspd54  us_regierung_vep  verband_bdi  verband_gsma  verband_ieee  video_youtube  wissenschaft_forschungsinstitut_sintef  überwachung_abhörschnittstelle  überwachung_akustisch  überwachung_backdoor_hardware  überwachung_backdoor_software  überwachung_beschlagnahme_hardware  überwachung_chat_telefonie_voip  überwachung_fingerprint_software  überwachung_funk_jamming  überwachung_identifizierung_itk_nutzer  überwachung_int_finint  überwachung_int_osint_socmint  überwachung_int_sigint_comint  überwachung_internet_email  überwachung_internet_mitm  überwachung_internet_mitm_sslproxy  überwachung_internet_tracking  überwachung_internet_trafficanalyse  überwachung_internet_wlan_catcher  überwachung_itforensik  überwachung_itk_bestandsdaten  überwachung_itk_inhaltsdaten  überwachung_itk_netzknoten  überwachung_itk_netzwerkleitung  überwachung_itk_satellitenlink  überwachung_itk_verkehrs_metadaten  überwachung_keylogger  überwachung_lokalisierung_bewegung  überwachung_massenkontrolle  überwachung_medien_presse  überwachung_mobilfunk  überwachung_mobilfunk_imsi_catcher  überwachung_netzwerk_topologie  überwachung_ngo_npo  überwachung_onlinedurchsuchung  überwachung_person_profil  überwachung_präventiv  überwachung_quellen_tkü  überwachung_raum  überwachung_rechtsanwalt  überwachung_satellitentelefonie  überwachung_sensor_netzwerk  überwachung_stadt_smart_city  überwachung_verhalten  überwachung_video_mobil 

Copy this bookmark: