kraven + software_os_mac   4

Reading privileged memory with a side-channel
We have discovered that CPU data cache timing can be abused to efficiently leak information out of mis-speculated execution, leading to (at worst) arbitrary virtual memory read vulnerabilities across local security boundaries in various contexts. Variants of this issue are known to affect many modern processors, including certain processors by Intel, AMD and ARM. For a few Intel and AMD CPU models, we have exploits that work against real software. So far, there are three known variants of the issue: Variant 1: bounds check bypass (CVE-2017-5753), Variant 2: branch target injection (CVE-2017-5715), Variant 3: rogue data cache load (CVE-2017-5754). Before the issues described here were publicly disclosed, Daniel Gruss, Moritz Lipp, Yuval Yarom, Paul Kocher, Daniel Genkin, Michael Schwarz, Mike Hamburg, Stefan Mangard, Thomas Prescher and Werner Haas also reported them; their [writeups/blogposts/paper drafts] are at: Spectre (variants 1 and 2), Meltdown (variant 3) [NB: Fuck you Intel, mein nxter Rechner wird non-intel].
google project zero, 03.01.2018
itsicherheit_exploit_flaw  itsicherheit_malware_spyware  itsicherheit_speicher_aslr  itsicherheit_hardware  itsicherheit_implementierung  itsicherheit_os  unternehmen_intel  sicherheitsforschung_itsicherheit  software_os_linux  software_os_windows  software_os_mac  software_os_kernel  unternehmen_amd  unternehmen_arm  tech_hw_chip_cpu  tech_hw_chip_cpu_cache  itsicherheit_cpu_meltdown_spectre  itsicherheit_seitenkanal_analyse_angriff 
january 2018 by kraven
Vault 7 - Imperial
WikiLeaks publishes documents from the Imperial project of the CIA. Achilles is a capability that provides an operator the ability to trojan an OS X disk image (.dmg) installer with one or more desired operator specified executables for a one-time execution. Aeris is an automated implant written in C that supports a number of POSIX-based systems (Debian, RHEL, Solaris, FreeBSD, CentOS). It supports automated file exfiltration, configurable beacon interval and jitter, standalone and Collide-based HTTPS LP support and SMTP protocol support - all with TLS encrypted communications with mutual authentication. It is compatible with the NOD Cryptographic Specification and provides structured command and control that is similar to that used by several Windows implants. SeaPea is an OS X Rootkit that provides stealth and tool launching capabilities. It hides files/directories, socket connections and/or processes. It runs on Mac OSX 10.6 and 10.7.
wikileaks, 27.07.2017
geheimdienst_us_cia_ioc  itsicherheit_os  itsicherheit_malware_spyware  land_usa  software_os_linux  software_os_mac  überwachung_int_sigint_comint  ngo_wikileaks_cia_vault 
august 2017 by kraven
iSpy: The CIA Campaign to Steal Apple's Secrets
Researchers working with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released. Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.” Other presentations at the CIA conference have focused on the products of Apple’s competitors, including Microsoft’s BitLocker encryption system, which is used widely on laptop and desktop computers running premium editions of Windows.
intercept, 10.03.2015
geheimdienst_allg_spionage  geheimdienst_uk_gchq_mti_mobile_projekt  geheimdienst_uk_gchq_ptd_arthur  geheimdienst_us_cia_ioc  geheimdienst_uk_gchq_nsa_mhet  itsicherheit_exploit_flaw  itsicherheit_hardware  itsicherheit_mobil_apps  itsicherheit_mobil_os  land_usa  land_uk  tech_computing_trusted  software_os_mac  software_os_windows  krypto_entschlüsselung  krypto_analyse_seitenkanal  unternehmen_lockheed_martin  us_ministerium_energie_natlab_sandia  überwachung_backdoor_software  überwachung_int_sigint_comint  überwachung_lokalisierung_bewegung  geheimdienst_us_nsa_ces  geheimdienst_us_nsa_tao_cna_cne  überwachung_mobilfunk  überwachung_quellen_tkü  überwachung_onlinedurchsuchung  überwachung_akustisch  überwachung_keylogger  tech_hw_chip_krypto_tpm  tech_hw_mobilfunk_gerät  krypto_key_recovery  software_krypto_bitlocker  staat_propaganda_sicherheit_going_dark  geheimdienst_polizei_infiltration_tech  itsicherheit_seitenkanal_analyse_angriff 
march 2015 by kraven
E-mail's Big Privacy Problem: Q&A With Silent Circle Co-Founder Phil Zimmermann
Phil Zimmermann, the inventor of popular email encryption service Pretty Good Privacy (PGP) and co-founder of Silent Circle, told us even he was using e-mail less and less, and relying more heavily on mobile messaging services in the quest for privacy. He also explained the gnawing problem of Silent Circle’s e-mail service and why the company was now planning to put servers in Switzerland.

"We didn’t have a PGP client that could run on a smartphone, and our market is primarily smartphone users. So how [could] we get it? Get a server side implementation of PGP, a Symantec product called PGP Universal, meant for enterprise customers who want to manage keys on the servers. So that’s what we were using. But if someone comes to us and forces us to hand over the keys, [we're in trouble.] There is no way to do encrypted e-mail where the content is protected ... I don’t use e-mail that much anymore. One reason why I don’t is PGP doesn’t run very well on a Mac these days. Symantec hasn’t kept that up. So I hardly ever run PGP. When people send me PGP encrypted mail I have to go through a lot of trouble to decrypt it. If it’s coming from a stranger, I’ll say please re-send this in plain text, which probably raises their eyebrows."
forbes, 09.08.2013
itsicherheit_by_obscurity  itsicherheit_strategie  krypto_entschlüsselung_zwang  unternehmen_silent_circle  software_os_mac  geheimdienst_us_fbi_nsletter  land_usa  krypto_verschlüsselung_kommunikation  überwachung_internet_email  tech_computing_mobil  unternehmen_symantec  unternehmen_allg_inkompetenz  unternehmen_hushmail  krypto_openpgp_emailgateway  krypto_pgp_universal  unternehmen_allg_desinformation_propaganda  krypto_key_escrow  tech_anwender_autonomie  itsicherheit_angriff_modell 
august 2013 by kraven

related tags

geheimdienst_allg_spionage  geheimdienst_polizei_infiltration_tech  geheimdienst_uk_gchq_mti_mobile_projekt  geheimdienst_uk_gchq_nsa_mhet  geheimdienst_uk_gchq_ptd_arthur  geheimdienst_us_cia_ioc  geheimdienst_us_fbi_nsletter  geheimdienst_us_nsa_ces  geheimdienst_us_nsa_tao_cna_cne  itsicherheit_angriff_modell  itsicherheit_by_obscurity  itsicherheit_cpu_meltdown_spectre  itsicherheit_exploit_flaw  itsicherheit_hardware  itsicherheit_implementierung  itsicherheit_malware_spyware  itsicherheit_mobil_apps  itsicherheit_mobil_os  itsicherheit_os  itsicherheit_seitenkanal_analyse_angriff  itsicherheit_speicher_aslr  itsicherheit_strategie  krypto_analyse_seitenkanal  krypto_entschlüsselung  krypto_entschlüsselung_zwang  krypto_key_escrow  krypto_key_recovery  krypto_openpgp_emailgateway  krypto_pgp_universal  krypto_verschlüsselung_kommunikation  land_uk  land_usa  ngo_wikileaks_cia_vault  sicherheitsforschung_itsicherheit  software_krypto_bitlocker  software_os_kernel  software_os_linux  software_os_mac  software_os_windows  staat_propaganda_sicherheit_going_dark  tech_anwender_autonomie  tech_computing_mobil  tech_computing_trusted  tech_hw_chip_cpu  tech_hw_chip_cpu_cache  tech_hw_chip_krypto_tpm  tech_hw_mobilfunk_gerät  unternehmen_allg_desinformation_propaganda  unternehmen_allg_inkompetenz  unternehmen_amd  unternehmen_arm  unternehmen_hushmail  unternehmen_intel  unternehmen_lockheed_martin  unternehmen_silent_circle  unternehmen_symantec  us_ministerium_energie_natlab_sandia  überwachung_akustisch  überwachung_backdoor_software  überwachung_internet_email  überwachung_int_sigint_comint  überwachung_keylogger  überwachung_lokalisierung_bewegung  überwachung_mobilfunk  überwachung_onlinedurchsuchung  überwachung_quellen_tkü 

Copy this bookmark:



description:


tags: