<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Paul Moore]]></title><description><![CDATA[Information Security Consultant]]></description><link>https://paul.reviews/</link><image><url>https://paul.reviews/favicon.png</url><title>Paul Moore</title><link>https://paul.reviews/</link></image><generator>Ghost 1.15</generator><lastBuildDate>Tue, 10 Sep 2019 04:38:52 GMT</lastBuildDate><atom:link href="https://paul.reviews/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Passwords: Using 3 Random Words Is A Really Bad Idea!]]></title><description><![CDATA[A brief, somewhat-technical look at why you shouldn't use 3 random words as your password..]]></description><link>https://paul.reviews/passwords-why-using-3-random-words-is-a-really-bad-idea/</link><guid isPermaLink="false">59ec76e5ae59970740ba705a</guid><category><![CDATA[passwords]]></category><category><![CDATA[hashing]]></category><category><![CDATA[security]]></category><category><![CDATA[password]]></category><category><![CDATA[pbkdf2]]></category><category><![CDATA[random]]></category><category><![CDATA[breaking]]></category><category><![CDATA[cracking]]></category><category><![CDATA[3 random words]]></category><category><![CDATA[diceware]]></category><category><![CDATA[md5]]></category><category><![CDATA[sha1]]></category><category><![CDATA[sha256]]></category><category><![CDATA[sha512]]></category><category><![CDATA[bcrypt]]></category><category><![CDATA[scrypt]]></category><category><![CDATA[argon2]]></category><dc:creator><![CDATA[Paul Moore]]></dc:creator><pubDate>Sun, 22 Oct 2017 15:57:38 GMT</pubDate><media:content url="https://paul.reviews/content/images/2017/10/Password-Header.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://paul.reviews/content/images/2017/10/Password-Header.jpg" alt="Passwords: Using 3 Random Words Is A Really Bad Idea!"><p>In 2015, the UK government released an <a href="https://www.cyberaware.gov.uk/blog/passwords-%E2%80%93-why-three-random-words">article</a> advocating the use of 3 random words in passwords, citing &quot;pragmatism and algorithmic strength against common issues like brute force attacks&quot;.</p>
<blockquote class="twitter-tweet" data-lang="en"><p lang="en" dir="ltr"><a href="https://twitter.com/hashtag/Thinkrandom?src=hash&amp;ref_src=twsrc%5Etfw">#Thinkrandom</a> when creating passwords – <a href="https://twitter.com/hashtag/use3randomwords?src=hash&amp;ref_src=twsrc%5Etfw">#use3randomwords</a> to make them  <a href="https://t.co/6BlS8EqK7v">https://t.co/6BlS8EqK7v</a> <a href="https://t.co/qtA43ffLf6">pic.twitter.com/qtA43ffLf6</a></p>&mdash; Cyber Aware (@cyberawaregov) <a href="https://twitter.com/cyberawaregov/status/855366795359858688?ref_src=twsrc%5Etfw">April 21, 2017</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<p>2 years later and a plethora of respected Twitter users continue to push this advice.  If you're one of them (looking at you <a href="https://twitter.com/WMPDigitalPCSO">@WMPDigitalPCSO</a> <a href="https://twitter.com/DurhamCyber">@DurhamCyber</a> <a href="https://twitter.com/SurreyPolice">@SurreyPolice</a> <a href="https://twitter.com/nerccu">@nerccu</a> <a href="https://twitter.com/ncsc">@ncsc</a> <a href="https://twitter.com/HP_Cyber">@HP_Cyber</a> <a href="https://twitter.com/metpoliceuk">@metpoliceuk</a> <a href="https://twitter.com/cyberawaregov">@cyberawaregov</a>), I implore you to read this article thoroughly and reconsider your position.</p>
<h1 id="understandingthebasics">Understanding the basics...</h1>
<p>After you've entered your chosen password, a responsible site should store it using a suitably-strong password hashing algorithm (bCrypt, PBKDF2, Argon2 etc).  Note, I said &quot;password hashing algorithm&quot;... this is a different concept from a cryptographic hashing algorithm.  More on that shortly.</p>
<p>The developer, mindful of the threat landscape, value of the data &amp; server resources... will configure their chosen algorithm such that each hash takes a set time to compute.  For example, it's reasonable to expect a hash to be generated in 400/500 milliseconds (or roughly half a second).  This delay is crucial, as it dramatically increases the time required to brute-force their way into your account.  A 0.5 second delay is insignificant to the real user, but a real burden to an attacker needing to try trillions of various passwords.</p>
<p>In an ideal world, sites would all use a well-configured algorithm &amp; users would opt for strong, truly random passwords.  But, that's rarely the case.</p>
<h1 id="gettingthebasicswrong">Getting the basics wrong...</h1>
<p>Another, entirely inappropriate storage method is a cryptographically strong hashing/digest algorithm.  The underlying principle remains the same; derive a fixed-length output for any given input.  However, these hashes are blisteringly fast to compute... making brute-force far easier.  Examples of such hash algorithms are MD5 (still very common and possible to brute-force at a rate of 200 billion permutations a second), SHA1 (70 billion a second), SHA256 (23 billion a second), SHA512 (8 billion a second) and so on.</p>
<p>As this article &amp; indeed most password advice is aimed at the end-user, it's important to choose a password based on the worst case scenario; assume the site stores our credentials in the weakest possible way and mitigate that risk first.</p>
<h1 id="charactersvswordsthepremisebehindtheadvice">Characters vs words; the premise behind the advice</h1>
<p>Long, strong, unique &amp; complex passwords are inherently difficult to remember... especially if you use several websites.  This inevitably leads to password re-use, recycling &amp; insecure storage.  On that basis, I fully understand the need for an alternative, more-pragmatic approach.</p>
<p>However, are words really a secure alternative?  Let's dive in.</p>
<h1 id="themaths">The Maths</h1>
<p>For an attacker, carrying out a brute-force attack is a last resort; the process of trying every possible permutation in order to break a password hash.  It is however, a guaranteed way (given sufficient time &amp; resources) to gain access to an account.</p>
<p>To understand the challenge our attacker faces, we first need to understand exponents.</p>
<p>If our password consists of 8 possible characters and is 3 characters long, the calculation would look like so:<br>
<img src="https://paul.reviews/content/images/2017/10/exponent.jpg" alt="Passwords: Using 3 Random Words Is A Really Bad Idea!"></p>
<p>In this example, there are 512 possible permutations; meaning our attacker is guaranteed to access our account after 512 attempts.</p>
<p>Let's take it one step further with a real-world example...</p>
<p>If a password consists of a-z, A-Z and 0-9, we have 26 characters + 26 characters + 10 numbers.  Our &quot;base&quot; in this example would be 62.  Now let's assume it's 12 characters long, meaning our exponent is 12.</p>
<p>62^12 = 3226266762397899821056 permutations (three sextillion, two hundred twenty-six quintillion, two hundred sixty-six quadrillion, seven hundred sixty-two trillion, three hundred ninety-seven billion, eight hundred ninety-nine million, eight hundred twenty-one thousand &amp; fifty-six)</p>
<p>Obviously, that's an enormous burden to our attacker and results in a password they're never going to break, assuming the password is chosen at <em>random</em>.</p>
<h2 id="itsnotallaboutthebase">It's not all about the base</h2>
<p>Now you understand how passwords are stored &amp; broken, we can begin to understand why some believe 3 (or more) random words are a better, more secure alternative.</p>
<p>Compare these...</p>
<p>&quot;MTLWcAXfY4Dy&quot; is a 12-character, random password.<br>
&quot;<strong>jump</strong>desk<strong>polish</strong>&quot; is a 3-word, random password.  It just so happens to be 14 characters too.</p>
<p>We can represent &quot;MTLWcAXfY4Dy&quot; as upper-case, lower-case &amp; numbers... giving us a base of 62.  It's 12 characters long, giving us our exponent of 12.</p>
<p>We've already done the maths on 62^12 earlier, so we know it to be unbreakable if chosen at <em>random</em>.</p>
<p>If we represent &quot;jumpdeskpolish&quot; in the same fashion, it's just lower-case... giving us a base of 26.  Despite being easier to remember, it's also longer at 14 characters, giving us our exponent of 14.</p>
<p>26^14 = 64509974703297150976 permutations (sixty-four quintillion, five hundred nine quadrillion, nine hundred seventy-four trillion, seven hundred three billion, two hundred ninety-seven million, one hundred fifty thousand, nine hundred &amp; seventy-six)</p>
<p>Purely on the maths alone, we can see this password has far fewer permutations and is undoubtedly weaker... but that's not the whole story.</p>
<p>64509974703297150976 (permutations) / 200,000,000,000 (speed in seconds to break an MD5 hash, the weakest widely-used algorithm) is just over 10 years!</p>
<p>Success!  We've managed to use far fewer characters, made our password easier to remember and it's still going to take over a decade to break.  By any reasonable measure, this can be considered secure.</p>
<p>Or is it?</p>
<h1 id="thecombinatorattack">The Combinator Attack</h1>
<p>Modern password cracking machines can just as easily rotate characters as words, so &quot;AA/AB/AC&quot; consumes near-identical resources as &quot;appleapple/appleardvark/appleangle&quot; and so on.</p>
<p>But now we're using words, there's a much faster way to break our password.</p>
<p>Instead of representing &quot;jumpdeskpolish&quot; as 26^14, why can't we represent it as 171,000^3?</p>
<p>Confused yet?  Let me explain.</p>
<p>The latest figures suggest there are 171,000 words in the English dictionary, meaning our &quot;base&quot; increases dramatically.  Our password is 3 words long... so let's replay the maths again.</p>
<p>171,000^3 = 5000211000000000 permutations (five quadrillion, two hundred eleven billion)</p>
<p>Remember, our attacker can break MD5 hashes at a rate of <strong>200 billion a second</strong>.</p>
<p>5000211000000000 (permutations) / 200,000,000,000 (speed to break an MD5 hash, the weakest widely-used algorithm) = just shy of <strong>7 hours</strong>!</p>
<p>Just by altering the attack, our password no longer provides 10 years security... but a much less confidence-inspiring 7 hours.</p>
<h1 id="itgetsworse">It gets worse...</h1>
<p>We've assumed 171,000 is the maximum number of words in a modern English dictionary.  By doing so, we know that any password containing 3 English words <em>will fall</em> in 7 hours or less.</p>
<p>However, that's not the whole story either.</p>
<p>Let me introduce Susie Dent...<br>
<img src="https://paul.reviews/content/images/2017/10/SPORT00021.jpg" alt="Passwords: Using 3 Random Words Is A Really Bad Idea!"></p>
<p>If you're in the UK, you'll likely recognise Susie as the lexicographer and dictionary expert from <a href="https://en.wikipedia.org/wiki/Countdown_(game_show)">Countdown</a>.  <a href="https://www.lingholic.com/how-many-words-do-i-need-to-know-the-955-rule-in-language-learning-part-2/">Susie's research</a> demonstrates the average active vocabulary of an English-speaking adult is 20,000 words; with their passive vocabulary being closer to 40,000.</p>
<p>If you're wondering... an active vocabulary consists of words <em><strong>you can recall</strong></em> and use regularly yourself.  A passive vocabulary consists of words you recognise &amp; understand, but aren't able to use yourself.</p>
<p>If we take Susie's expert opinion at face value, our calculations now look like this.</p>
<p>20,000^3 = 8000000000000 permutations (eight trillion).</p>
<p>8000000000000 (permutations) / 200,000,000,000 (speed to break an MD5 hash) is 40 seconds.  FORTY SECONDS!</p>
<p>We've gone from 10 years, to 7 hours, to 40 seconds.  This is simple mathematics folks, no opinions or interpretation here.</p>
<p>Not to cast aspersions on Susie's expertise, but there has also been research which demonstrates a college-educated adult has a vocab of around 80,000 words (or around half of all words in the dictionary).  So, if your linguistic ability is comparable to Jacob Rees-Mogg, are you secure?</p>
<p>80,000^3 = 512000000000000 permutations (five hundred twelve trillion) or, at the same rate as before, your 3 &quot;random&quot; words falls in just <strong>42 minutes</strong>!</p>
<h1 id="addingnumbersspecialcharacters">Adding numbers &amp; special characters</h1>
<p>I have noticed a couple of Twitter'ers adding &quot;use numbers &amp; special chars too&quot; as a caveat to using 3 random words.  This not only undermines the entire premise of memorable words, but has little/no security benefit either.</p>
<p>In the example above, we've gone from a base of 20,000 to 80,000.  If quadrupling the base has no tangible effect on security, such that it's broken in under an hour, adding 100 special chars &amp; 10 numbers really won't make a dent.</p>
<p>The underlying issue here is the low exponent... making it <strong>exponent</strong>ially easier to break.</p>
<h1 id="strongerhashing">Stronger hashing</h1>
<p>Now it's true... I've focussed on the weakest &amp; fastest possible hash which is still widely (and sadly!) in use.  If the hash is slower, the time to break the hash increases significantly.</p>
<p>But, if we choose a password assuming the worst possible scenario (MD5, notwithstanding plain-text), it actually doesn't matter how they're stored; it's already either immensely-strong, or unbreakable.</p>
<h1 id="whatmethodshouldipromote">What method should I promote?</h1>
<p>Password managers.  Nothing else.</p>
<p>The machine-generated passwords they provide (assuming you're using a respectable one!) are quite literally unbreakable at 12 upper/lower/numbers or more, even with the weakest storage algorithms.</p>
<p>Before promoting anything, research &amp; understand the concept and ask yourself... could I/do I do this myself?  If you can remember 30+ (or possibly hundreds of) random, 12-character passwords, great... but the majority can't!  Rather than promoting passwords as security measures, instead sell the added usability &amp; convenience of never having to deal with passwords again.</p>
<p>Forget the semantics &amp; subtle nuances of password security; upper-case, lower-case, special characters, numbers, words, lengths, storage, entropy et al... humans don't <em>do</em> random, at least not well.</p>
<h1 id="faqs">FAQs</h1>
<p><strong>&quot;Is 4 random words enough?&quot;</strong><br>
The <a href="https://www.ncsc.gov.uk/guidance/password-guidance-simplifying-your-approach">NCSC's article</a>, upon which the above advice is based, actually suggests 4 random words, not 3.  It's not clear why someone arbitrarily opted to lower the quantity of words.  But, now we're increasing the exponent, not the base... it'll have a significant impact upon your password's security.  However, it's still not enough.</p>
<p>20,000^4 = 160000000000000000 permutations (one hundred sixty quadrillion). Using the same 200,000,000,000 a second figure, that password would fall in 9 days.</p>
<p><strong>&quot;Which password manager should I use?&quot;</strong><br>
There are several, each serving very different purposes.  For home/SME users, I recommend 1Password.</p>
<p><strong>How does this compare to diceware?</strong><br>
Diceware is a list of 7,776 words, but they are truly random.  A 7-word diceware password could be represented as:</p>
<p>7776^7 = 1719070799748422591028658176 permutations (one octillion, seven hundred nineteen septillion, seventy sextillion, seven hundred ninety-nine quintillion, seven hundred forty-eight quadrillion, four hundred twenty-two trillion, five hundred ninety-one billion, twenty-eight million, six hundred fifty-eight thousand, one hundred seventy-six)</p>
<p>At 200 billion a second, it'd literally take millions of years to break.  Note the &quot;base&quot; is significantly lower than our &quot;3 random word&quot; examples, but a slightly higher exponent takes it from broken in seconds, to <strong>unbroken</strong> in millions of years.</p>
<p>[Edit]<br>
@ramriot just made an important point on Twitter, worthy of an update here...</p>
<blockquote class="twitter-tweet" data-conversation="none" data-lang="en"><p lang="en" dir="ltr">BTW mentions of diceware as strong should also include that many places that need PW also restrict length thus precluding diceware.</p>&mdash; 🤖 (@ramriot) <a href="https://twitter.com/ramriot/status/922448154552864768?ref_src=twsrc%5Etfw">October 23, 2017</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<p>If the site limits password input length, it may be impossible to use diceware.</p>
<p><strong>I've followed the &quot;3 random word&quot; advice.  Should I change my passwords?</strong><br>
Yes.  Stop reading, do it now.</p>
<h1 id="summary">Summary</h1>
<p>Don't use words in passwords. Ever.<br>
Don't try coming up with secure passwords, apart from the one protecting your password manager.<br>
After adopting a solid password manager, don't give passwords another thought... let it do the hard work for you.<br>
If you insist on tweeting &quot;3 random word&quot; advice, provide evidence to substantiate its security.</p>
<p>That's it folks.  Please RT.</p>
</div>]]></content:encoded></item><item><title><![CDATA[SafeBuy: Can you trust a trustmark?]]></title><description><![CDATA[Before you trust your firm's reputation to SafeBuy, read this...]]></description><link>https://paul.reviews/safebuy-can-you-trust-a-trustmark/</link><guid isPermaLink="false">59d5fe6588cbd23fc7400308</guid><category><![CDATA[xss]]></category><category><![CDATA[security]]></category><category><![CDATA[passwords]]></category><category><![CDATA[breach]]></category><category><![CDATA[data]]></category><category><![CDATA[safebuy]]></category><category><![CDATA[trustmark]]></category><dc:creator><![CDATA[Paul Moore]]></dc:creator><pubDate>Fri, 06 Oct 2017 16:49:35 GMT</pubDate><media:content url="https://paul.reviews/content/images/2017/10/SBY0010a-SafebuyConsumerCarelogo.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://paul.reviews/content/images/2017/10/SBY0010a-SafebuyConsumerCarelogo.jpg" alt="SafeBuy: Can you trust a trustmark?"><p>While watching reruns of <a href="https://en.wikipedia.org/wiki/Dragons%27_Den_(UK_TV_series)">Dragon's Den</a> last week, one particular pitch caught my attention.</p>
<p>After Googling the company, I arrived at a page containing SQL errors.  Having read the error log, it became clear the site had a critical security vulnerability.  After a few tweets, emails &amp; a brief call, the company patched it within 24hrs. Result!</p>
<p>However, something else caught my eye...</p>
<p><img src="https://paul.reviews/content/images/2017/10/safebuy_small.jpg" alt="SafeBuy: Can you trust a trustmark?"></p>
<p>... a <a href="http://safebuy.org.uk">SafeBuy</a> trustmark.</p>
<p>Clicking the trustmark reveals the following popup...</p>
<p><img src="https://paul.reviews/content/images/2017/10/safebuy_popup.jpg" alt="SafeBuy: Can you trust a trustmark?"></p>
<p>Interest piqued, I decided to see just how trustworthy this SafeBuy scheme really is.</p>
<h2 id="registration">Registration</h2>
<p>SafeBuy offer a 60 day free trial, after which, it's £180 a year.</p>
<p><img src="https://paul.reviews/content/images/2017/10/reg1.jpg" alt="SafeBuy: Can you trust a trustmark?"></p>
<p><img src="https://paul.reviews/content/images/2017/10/payment1-1.jpg" alt="SafeBuy: Can you trust a trustmark?"></p>
<p>That's it!  That's the entire registration process.  The observant amongst you will note the lack of a &quot;I agree to abide by our code of conduct&quot; checkbox and, if you're especially observant, you'll also note the price has gone up to £238.80 too.</p>
<p>The majority of sites ask for a password during registration, but surprisingly, SafeBuy do not.</p>
<p>24 hours later, I receive an email:</p>
<p><img src="https://paul.reviews/content/images/2017/10/email1.jpg" alt="SafeBuy: Can you trust a trustmark?"></p>
<p>Hmm, the password is prefixed with &quot;safe&quot; and what looks to be a random number,  1709121.  Remember that for later...</p>
<p>After logging in, you're greeted with your account profile page.</p>
<p><img src="https://paul.reviews/content/images/2017/10/loggedin1.jpg" alt="SafeBuy: Can you trust a trustmark?"></p>
<p>Wait, what?! Toronto, Canada, Freshbooks?!  Where did that come from?</p>
<p>In actual fact, the URL I entered (urity.co.uk) redirects to our billing control panel; run by Freshbooks.  SafeBuy have wrongly assumed I own Freshbooks... but surely they wouldn't issue a trustmark in their name?</p>
<p><img src="https://paul.reviews/content/images/2017/10/1.PNG" alt="SafeBuy: Can you trust a trustmark?"></p>
<p>Sigh.  The independent vetting process can't be particularly thorough if this slipped through!</p>
<p>As if that wasn't bad enough, I've been automatically featured in their members' directory.</p>
<p><a href="https://www.safebuy.org.uk/directory/computers.html">https://www.safebuy.org.uk/directory/computers.html</a><br>
<img src="https://paul.reviews/content/images/2017/10/memberdirectory1.jpg" alt="SafeBuy: Can you trust a trustmark?"></p>
<p>Hang on, that &quot;accreditation number&quot; looks familiar...<br>
<img src="https://paul.reviews/content/images/2017/10/weakPW.jpg" alt="SafeBuy: Can you trust a trustmark?"></p>
<p>Oh for christ sake!  The reputation of &quot;my&quot; business, or rather that of Freshbooks, is now in the hands of anyone blessed with the gift of sight.  Thanks &quot;Safe&quot; Buy!</p>
<p>By this point, I've already written this off as insecure, ill-conceived snake oil.  But, how deep does this rabbit hole go?</p>
<h2 id="crediblereviews">&quot;Credible reviews&quot;</h2>
<p>Having all the hallmarks of a &quot;one man band&quot;, I doubt SafeBuy has the resources to audit each &amp; every review they receive.  What they can do however, is implement the most basic of automated checks to verify a review is genuine.  Unfortunately, that doesn't appear to be the case.</p>
<p>Here's my first review:<br>
<img src="https://paul.reviews/content/images/2017/10/review1.jpg" alt="SafeBuy: Can you trust a trustmark?"></p>
<p>Trouble is, you get slightly less of a warm, fuzzy feeling when you review... yourself.  Yes, I submitted that review... and I was logged in at the time!  What's the point of a &quot;trusted&quot; reviews site which allows companies to review themselves?</p>
<h2 id="securityorlackthereof">Security, or lack thereof</h2>
<p>Before we get into the shocking state of security at SafeBuy, here's my reviews page:<br>
<a href="https://ratings.safebuy.org.uk/freshbooks.com/stats.html">https://ratings.safebuy.org.uk/freshbooks.com/stats.html</a></p>
<p>If you're wondering why the images are going crazy and you're hearing some pretty awful music, that's the harlem shake.</p>
<p>You see, the site is so unspeakably insecure, it's possible to embed &amp; execute arbitrary code as if I'm the developer.  OK, the harlem shake is a bit of harmless fun... but I could just as easily embed malware or indeed alter <em>anything</em> you see; quantity of reviews, star ratings, each review, their responses... literally anything!</p>
<p>Talking of responses:<br>
<img src="https://paul.reviews/content/images/2017/10/reviewedit1.jpg" alt="SafeBuy: Can you trust a trustmark?"></p>
<p>On this screen, we can see all our customer reviews and if necessary, respond to them.  One of the best ways to judge a company is not from the quantity of reviews (especially as they're so easy to fake) but how they respond to reviews/complaints.</p>
<p>Hmm, there's an ID in the URL.  What happens if we change it?</p>
<p><img src="https://paul.reviews/content/images/2017/10/reviewedit2.jpg" alt="SafeBuy: Can you trust a trustmark?"></p>
<p>Sigh!  It's the review screen for <a href="http://oakhillflooringltd.co.uk">oakhillflooringltd.co.uk</a>.</p>
<p>At first glance, you'd be forgiven for thinking this isn't a major security concern.  After all, we can view their reviews publicly anyway.  Trouble is, the &quot;reply&quot; button works!</p>
<p>Yes, we can reply to OakHill's customers as if we're logged in as OakHill.  It's a good job I'm not in competition with them, or it'd be very easy to destroy their reputation.</p>
<h2 id="letsrecap">Let's recap</h2>
<p>In summary, we've visited an insecure website, been assured it's secure &amp; private by a trustmark, registered and been accredited for a brand I neither own nor control, been given an insecure default password (also stored in plain text!), reviewed our own company, hijacked our own review page to deliver fake/inflated reviews and/or malware &amp; had the opportunity to hijack <em>any</em> other SafeBuy member simply by changing a number in the address bar.</p>
<p>It's hard to believe this was designed in collaboration with the Office of Fair Trading!<br>
<img src="https://paul.reviews/content/images/2017/10/oft1.jpg" alt="SafeBuy: Can you trust a trustmark?"></p>
<p>It's worth mentioning at this point, the OFT closed in 2014... but it adds credibility, so why remove it? &lt;/sarcasm&gt;</p>
<h2 id="responsibledisclosureredefined">Responsible disclosure; redefined?</h2>
<p>As regular readers will know, I always follow (what we call) responsible disclosure; typically by reporting these issues to the company in an attempt to have them addressed.  However, there are those who will undoubtedly claim this <em>isn't</em> responsible disclosure, so let me explain my actions...</p>
<p>The industry is plagued by snake oil, meaningless trustmarks which continue to mislead users around the world.  I've no doubt Troy Hunt would agree, given his comments in this <a href="https://www.troyhunt.com/why-i-am-worlds-greatest-lover-and/">excellent article</a> from 2013.  By reporting &amp; effectively donating my time to companies which provide them, I am complicit in their questionable practices.  On this occasion, the only way to &quot;responsibly disclose&quot; this... is to inform you, the general public, of just how pointless they really are.</p>
<h2 id="servingmalware">Serving malware!</h2>
<p>If you visit the site with a VPN and/or antivirus app running, you'll receive an error similar to this:<br>
<img src="https://paul.reviews/content/images/2017/10/freedomeblock.jpg" alt="SafeBuy: Can you trust a trustmark?"></p>
<p>Why?  The site has been infected with malware for months!  Thankfully, the site which the malware redirects to has since been fixed... but quite how &quot;SafeBuy&quot; were hacked is still unknown.  Keep in mind, their trustmark ensures &quot;total security &amp; privacy&quot; yet their own site falls short.</p>
<h2 id="summary">Summary</h2>
<p>I have thinly veiled contempt for companies which claim to be &quot;secure&quot; simply by displaying a misleading image; even more so for those who advocate &amp; facilitate this type of behaviour.</p>
<p>To put it bluntly, SafeBuy is a complete &amp; utter shambles.  If you're considering entrusting your firm's reputation to them, I'd strongly urge you to think again.</p>
</div>]]></content:encoded></item><item><title><![CDATA[Kervball: The Kerv ring data breach...]]></title><description><![CDATA[Kerv Ring data breach - what you need to know...]]></description><link>https://paul.reviews/kervball-the-kerv-ring-data-breach/</link><guid isPermaLink="false">59d4b6cd99cc4737934a1d7b</guid><category><![CDATA[security]]></category><category><![CDATA[privacy]]></category><category><![CDATA[breach]]></category><category><![CDATA[data]]></category><category><![CDATA[ico]]></category><category><![CDATA[kerv]]></category><category><![CDATA[insider threat]]></category><dc:creator><![CDATA[Paul Moore]]></dc:creator><pubDate>Fri, 23 Jun 2017 09:15:38 GMT</pubDate><media:content url="https://paul.reviews/content/images/2017/06/kerv.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><blockquote>
<img src="https://paul.reviews/content/images/2017/06/kerv.jpg" alt="Kervball: The Kerv ring data breach..."><p>Notice: This article is a work-in-progress and serves only to address questions from media outlets &amp; Kerv customers.</p>
</blockquote>
<p>On the morning of June 21st 2017, I received an email from an &quot;anonymous&quot; Kerv user... coincidentally the same day I received my Kerv ring.</p>
<p><img src="https://paul.reviews/content/images/2017/06/20170622_153103.jpg" alt="Kervball: The Kerv ring data breach..."></p>
<p>Nothing unusual there, apart from the fact it contained my name, home address, phone number and memorable information.  Oh dear...</p>
<p>As regular readers will know, I use 1Password to generate both passwords &amp; memorable information; meaning a breach of such information doesn't adversely affect other accounts I hold elsewhere.  As each entry is entirely unique, it's trivially easy to determine the author of this email really does have access to my Kerv account.  It quickly became clear that this wasn't a breach in the typical sense... this &quot;anonymous&quot; person had inside information which wouldn't otherwise be available.  In an act of either lunacy or clarity, he subsequently forwarded admin credentials to me from a Tor address; obviously unaware of my work deanonymizing Tor users.  Not a smart move!</p>
<p>After logging in to my Kerv account, I was greeted with the usual user interface.  This time however, I clearly had access to features which were only intended for Kerv employees.  After a brief investigation, it became obvious I had full admin access to the site, shop &amp; customer database.</p>
<p>Time to contact Kerv!</p>
<p>I initially tried the Kerv &quot;lost &amp; stolen&quot; number from the site, but there was nobody immediately available for comment.  Cue Twitter...</p>
<blockquote class="twitter-tweet" data-lang="en"><p lang="en" dir="ltr">Hi <a href="https://twitter.com/KervLife">@KervLife</a> <br>I need to speak with your security team urgently. Please advise.<br>cc <a href="https://twitter.com/FD_Phil">@FD_Phil</a></p>&mdash; Paul Moore (@Paul_Reviews) <a href="https://twitter.com/Paul_Reviews/status/877467210796716033">June 21, 2017</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<p>After a matter of minutes, Mr Phil Campbell (Director @ Kerv Wearables) emailed to request further information.  After a lengthy telephone conversation, I advised Phil to immediately take the site offline until a review could be performed.  Almost immediately, my access was revoked and at 2:15PM, the site was taken offline completely.</p>
<p><img src="https://paul.reviews/content/images/2017/06/9.PNG" alt="Kervball: The Kerv ring data breach..."></p>
<p>In the hours which followed, Phil and his team worked to identify the root cause and restore service to their customers.</p>
<p>More information to follow...</p>
<h2 id="faq">FAQ</h2>
<p>Q) <strong>What can I do to protect myself?</strong><br>
A) Change your passwords and memorable information, immediately.  Use a <a href="https://paul.reviews/password-managers-facts-fallacies-fud/">password manager</a> to generate them both.  Register with <a href="http://www.noddle.co.uk">Noddle</a> for free credit alerts/reports.</p>
<p>Q)  <strong>How did Kerv handle the disclosure?</strong><br>
A)  Phil/Kerv's response is a perfect example of how companies should handle data/security breaches.</p>
<p>Q)  <strong>Do you have any other concerns, should I still use my Kerv?</strong><br>
A)  I haven't spent much time with Kerv, having only received it yesterday and it being offline ever since.  However, I have a number of concerns which I've raised with Phil.  It wouldn't be appropriate to list them here, however I've every confidence that Kerv will resolve any outstanding issues.  Nonetheless, I see no reason to abandon Kerv.  Insider threats affect everyone; Kerv have taken (what I'd consider to be) reasonable &amp; appropriate steps to mitigate the risks involved and have been open &amp; honest in their responses.</p>
<p>Q)  <strong>What information did you have access to?</strong><br>
A)  I was added to the &quot;customer services admin&quot; group, allowing access to virtually every piece of customer data, <strong>excluding financial info</strong>.</p>
<p>Q)  <strong>Do you have any further comments?</strong><br>
A)  If &amp; when I do, I'll update the article.  If you're a news/media outlet looking for comment, please use the comments form below.</p>
</div>]]></content:encoded></item><item><title><![CDATA[Don't let them paste passwords...]]></title><description><![CDATA[Disabling paste on password fields can increase security... despite claims to the contrary.]]></description><link>https://paul.reviews/dont-let-them-paste-passwords/</link><guid isPermaLink="false">59d4b6cd99cc4737934a1d7a</guid><category><![CDATA[2fa]]></category><category><![CDATA[multi-factor authentication]]></category><category><![CDATA[biometrics]]></category><category><![CDATA[security]]></category><category><![CDATA[passwords]]></category><category><![CDATA[paste]]></category><category><![CDATA[disable paste]]></category><category><![CDATA[password managers]]></category><dc:creator><![CDATA[Paul Moore]]></dc:creator><pubDate>Sat, 18 Feb 2017 12:45:16 GMT</pubDate><media:content url="https://paul.reviews/content/images/2017/02/header-3.png" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://paul.reviews/content/images/2017/02/header-3.png" alt="Don't let them paste passwords..."><p><img src="https://paul.reviews/content/images/2017/02/header-2.png" alt="Don't let them paste passwords..."></p>
<p>After months of tweets, emails &amp; articles from eminent figures like <a href="https://www.troyhunt.com/the-cobra-effect-that-is-disabling/">Troy Hunt</a> &amp; the <a href="https://www.ncsc.gov.uk/blog-post/let-them-paste-passwords">NCSC</a>, it's about time I weighed in on the debate surrounding sites which disable a user's ability to paste passwords.</p>
<p>The general consensus amongst many experts, including those mentioned above, is that disabling paste on password fields reduces security; the NCSC went one step further, calling it <a href="http://www.telegraph.co.uk/news/2017/02/14/gchq-boss-admits-even-struggles-remember-internet-passwords/">&quot;completely pointless&quot; and &quot;damaging&quot;</a>.</p>
<p>So without further ado, allow me to explain why I believe disabling paste can actually increase security.</p>
<h2 id="premise">Premise</h2>
<p>Disabling paste facilitates barrier-less 2FA.</p>
<p>Confused?  OK, let me explain...</p>
<p>Traditional e-authentication systems monitor <em>what</em> you type (your password, for example).  This, by definition, provides 1FA or single-factor authentication; you've demonstrated to the site (or verifier, for those of a <a href="https://pages.nist.gov/800-63-3/sp800-63-3.html">NIST</a>y disposition) that you &quot;know&quot; the password.</p>
<p>As we know, passwords can be and are frequently stolen, guessed, intercepted, cracked or bypassed... thus requiring a drive towards 2FA or multi-factor authentication.</p>
<p>For many years, companies have focused on introducing a &quot;possession&quot; factor, allowing you to present something you have (along with something you know) to further prove you are who you're purporting to be.  That's great, in theory... but the adoption rate of this type of 2FA is pretty abysmal; with some firms (Google et al) seeing figures of &lt; 5%.</p>
<p>Other firms have opted to use a little-known technique called behavioural biometrics/keystroke dynamics.  These systems monitor <em>how</em> you type; the periodicity of your keystrokes, how long you dwell between each key, how often you make mistakes, how long each key is pressed and so on.  These metrics can be used, with astonishing &amp; near 100% accuracy, to determine who's typing.  This is known as an inherence factor.  <a href="https://paul.reviews/behavioral-profiling-the-password-you-cant-change/">Here's a more detailed explanation of behavioural profiling</a>.</p>
<p>You could, in theory, give someone your password and they'll be unable to login... simply because their typing pattern differs enormously from your own.  Think of it as a signature; something unique to you.</p>
<h2 id="justhowreliableisit">Just how reliable is it?</h2>
<iframe width="560" height="315" src="https://www.youtube.com/embed/v5tjBF5zlkg" frameborder="0" allowfullscreen></iframe>
<p>Back in 2015, myself &amp; Per Thorsheim (@thorsheim) <a href="https://www.youtube.com/watch?v=v5tjBF5zlkg">presented our research</a> into behavioural biometrics (and how to defeat it) at Cambridge University.</p>
<p>During this research, we demonstrated the ability to <a href="https://arstechnica.co.uk/security/2015/07/how-the-way-you-type-can-shatter-anonymity-even-on-tor/">shatter a user's anonymity, even when using proxy servers &amp; Tor</a>.</p>
<p>Just let that sink in for a moment...</p>
<p>Even when a user is actively trying to hide their identity using sophisticated &amp; layered defences, the site is able to identify who they are by <em>how</em> they type.  <strong>No passwords</strong>, no perma-cookies... just typing into a webpage.</p>
<p>Many financial institutions, including 2 UK banks actively use this technology in the fight against fraud.  Also, HSBC recently announced the introduction of behavioural biometrics via telephone banking; using just your voice to identify you.</p>
<h2 id="howdoesdisablingpastebreakbehaviouralbiometrics">How does disabling paste break behavioural biometrics?</h2>
<p>When you paste data into a form, the value reaches the DOM almost immediately (a caveat being the use of scripts which monitor for bubble events and delay/block them).</p>
<p>As you haven't typed anything, the script is unable to verify it's really you... leaving you with just single-factor authentication again.  Depending on how the site is designed, it may prevent you from logging in, or increase a fraud indicator which prevents access to certain functions (transferring funds etc)</p>
<h2 id="myths">Myths</h2>
<p>It's true, there are dozens of increasingly-comical reasons why some developers believe disabling paste increases security.</p>
<blockquote>
<p>We'll lose our security certificate if we allow paste</p>
</blockquote>
<p>Nonsense.</p>
<blockquote>
<p>We'll be vulnerable to brute-force attacks</p>
</blockquote>
<p>True, but attacks are rarely (if ever) carried out this way.</p>
<p>Bizarre eh! But equally bizarre, are the myths which circulate as to why you <em>should</em> be allowed to paste passwords.</p>
<blockquote>
<p>It breaks password managers!</p>
</blockquote>
<p>Not one for going with the status quo, I decided to test this widely agreed-upon theory.</p>
<h2 id="disablingpastedoesntbreakpasswordmanagers">Disabling paste doesn't break password managers...</h2>
<iframe width="560" height="315" src="https://www.youtube.com/embed/eTZ2SuhpThk" frameborder="0" allowfullscreen></iframe>
<p>1Password, LastPass, Roboform &amp; Dashlane all work <strong>perfectly</strong> with paste disabled.</p>
<h3 id="howsthatpossibleifpasteisdisabled">How's that possible if paste is disabled?</h3>
<p>They don't use paste, at all.</p>
<p>If you're using a password manager which generates &amp; populates password fields automatically, it won't be using the &quot;paste&quot; event to achieve the desired result, thus disabling it has no effect whatsoever.  I admit, testing 4 password managers is hardly comprehensive... but they all face the same constraints (set by the browser) in terms of how they interact with DOM elements and nearly all adopt a similar, tried &amp; tested method of populating the field.</p>
<p>Now it's true, some password managers don't auto-populate fields and have little/no integration with your browser; KeePass is a prime example.  In that scenario, you would be unable to copy/paste from KeePass to the password field.  You still haven't &quot;broken&quot; the password manager or measurably decreased security... only the user-experience (UX) is affected.</p>
<h3 id="thatsagoodenoughreasontoallowpastethensurely">&quot;That's a good enough reason to allow paste then, surely?&quot;</h3>
<p>Not really, no.</p>
<p>If we make conscious design decisions affecting <em>only</em> people who use password managers, we're already talking a tiny fraction of your potential user-base.  To further limit those decisions to people who only use comparably-antiquated and potentially more risky solutions like KeePass, you're probably in the realms of &lt; 0.1%.</p>
<h2 id="summary">Summary</h2>
<p>Barrier-less 2FA is exactly that... a zero-barrier, frictionless method of increasing security for all your customers, including those who use password managers.</p>
<p>There are many &quot;<a href="http://www.telegraph.co.uk/news/2017/02/14/gchq-boss-admits-even-struggles-remember-internet-passwords/">completely pointless</a>&quot; reasons to disable paste, but that doesn't mean disabling paste is completely pointless, nor damaging.</p>
<p>That's it folks.</p>
</div>]]></content:encoded></item><item><title><![CDATA[How to choose & remember a long, strong & unique password...]]></title><description><![CDATA[Possibly the clearest, most concise password advice you'll read today.]]></description><link>https://paul.reviews/how-to-choose-remember-a-long-strong-unique-password/</link><guid isPermaLink="false">59d4b6cd99cc4737934a1d79</guid><category><![CDATA[password]]></category><category><![CDATA[1password]]></category><category><![CDATA[crypto]]></category><category><![CDATA[strong]]></category><category><![CDATA[unique]]></category><dc:creator><![CDATA[Paul Moore]]></dc:creator><pubDate>Sat, 26 Nov 2016 18:22:59 GMT</pubDate><media:content url="https://paul.reviews/content/images/2016/11/1P4-Mac-icon.png" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://paul.reviews/content/images/2016/11/1P4-Mac-icon.png" alt="How to choose & remember a long, strong & unique password..."><p>Use a password manager.</p>
<p><a href="https://agilebits.com/store?d=PaulReviews"><img src="https://paul.reviews/content/images/2016/11/1Password-6-Hero1.png" alt="How to choose & remember a long, strong & unique password..."></a></p>
</div>]]></content:encoded></item><item><title><![CDATA[Bank & Mobile Network Security: For want of a nail...]]></title><description><![CDATA[How two simple exploits allowed access to a million mobile accounts (calls & SMS) and online banking.]]></description><link>https://paul.reviews/bank-mobile-network-security-for-want-of-a-nail/</link><guid isPermaLink="false">59d4b6cd99cc4737934a1d78</guid><category><![CDATA[banking]]></category><category><![CDATA[security]]></category><category><![CDATA[breach]]></category><category><![CDATA[xss]]></category><category><![CDATA[csrf]]></category><category><![CDATA[security headers]]></category><category><![CDATA[mobile network]]></category><category><![CDATA[2fa]]></category><category><![CDATA[2sv]]></category><category><![CDATA[two factor authentication]]></category><category><![CDATA[two step verification]]></category><category><![CDATA[theft]]></category><category><![CDATA[sms]]></category><category><![CDATA[halifax]]></category><category><![CDATA[freedompop]]></category><category><![CDATA[lloyds banking group]]></category><dc:creator><![CDATA[Paul Moore]]></dc:creator><pubDate>Mon, 02 May 2016 11:40:12 GMT</pubDate><media:content url="https://paul.reviews/content/images/2016/05/Bank-Credit-Unions-Security-Services-NYC.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://paul.reviews/content/images/2016/05/Bank-Credit-Unions-Security-Services-NYC.jpg" alt="Bank & Mobile Network Security: For want of a nail..."><p><img src="https://paul.reviews/content/images/2016/05/privacy-policy-banner-3-1.png" alt="Bank & Mobile Network Security: For want of a nail..."></p>
<p>Ever since publishing a &quot;<a href="https://paul.reviews/the-difference-between-two-factor-and-two-step-authentication/">two factor authentication vs two step verification</a>&quot; article in 2014, I've been waiting for an opportunity to irrefutably demonstrate the difference.</p>
<p><strong>Note:</strong><br>
This article is very much a &quot;work in progress&quot; as until both exploits are patched, I can't provide any technical information.</p>
<h2 id="aquickrecap">A quick recap...</h2>
<p>If you haven't yet read the above article, let's quickly recap on the differences between two-factor authentication &amp; two-step verification.</p>
<p>A &quot;factor&quot; falls into one of the following categories.</p>
<ol>
<li>Knowledge</li>
<li>Possession</li>
<li>Inherence</li>
</ol>
<p>The lines between them however, become blurry when companies refer to SMS one-time passwords (OTPs) or calls as &quot;two-factor&quot; authentication.</p>
<p>Although you technically &quot;possess&quot; the phone, the OTP isn't generated by, nor dependent on the phone itself... but rather the code sent to it via the mobile network.  I've long argued that despite <a href="http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-2.pdf">NIST's statement to the contrary</a>, SMS OTPs do not constitute 2FA.</p>
<p>So, let's dive right in.</p>
<h2 id="whoarefreedompop">Who are FreedomPop?</h2>
<p><a href="http://www.freedompop.com">FreedomPop</a> are the UK's first completely free mobile network provider; launching in September 2015.</p>
<p>Unsurprisingly, FreedomPop has grown rapidly to in excess of a million users, many of whom opt for the free 200 minutes, 200 texts &amp; 200MB data plan.</p>
<h2 id="freedompopssecurityorlackthereof">FreedomPop's security... or lack thereof</h2>
<p>At this point, I'd usually explain the exploit in detail but, mindful of not wanting to exacerbate the problem, stop short of providing a step-by-step guide.  On this occasion however, the risk is such that any further information is likely to immediately place 1+ million users at considerable risk.</p>
<p><strong>It is currently possible to remotely hijack any FreedomPop account, allowing both calls &amp; messages to be made/intercepted by an attacker.  No usernames, no passwords and no SIM swapping... just unfettered access to a user's communications.</strong></p>
<h2 id="monetizingtheexploit">Monetizing the exploit...</h2>
<p>OK.  We now have access to every call &amp; SMS message to a user's device... how can we convert that into actual money?</p>
<p>Well, the user's contact list is probably a good place to start; a few quick texts to friends &amp; family is likely to yield a few quid.  Keep in mind, the messages are coming from the victim's own number.</p>
<p>That's all well &amp; good, but what if we're not interested in a few hundred quid?</p>
<h2 id="hittingthebank">Hitting the bank</h2>
<p>At first glance, this seems like a particularly crazy idea.</p>
<p>To successfully gain access to a Halifax account, an attacker would need the username, password &amp; security pass phrase.  Even armed with all this, they're unable to add a new payee without triggering further anti-fraud checks... in the form of an automated call to your registered mobile number.</p>
<p>The UK banking sector isn't particularly hot on security either, but that's still a tall order without tripping sophisticated anti-fraud systems.</p>
<h3 id="canwebypasstheusernamepasswordsecuritypassphraseentirely">Can we bypass the username, password &amp; security pass phrase entirely?</h3>
<p>As of the date of this article, it's possible to do just that.</p>
<p><img src="https://paul.reviews/content/images/2016/05/bankscreen.PNG" alt="Bank & Mobile Network Security: For want of a nail..."></p>
<p>Halifax don't offer a &quot;<strong>Premier +</strong>&quot; account, but would you have spotted the fake/malicious section of the page?</p>
<p>No security warnings, no outward signs at all that we're looking at a page controlled entirely by an attacker.</p>
<p>A serious (yet remarkably simple) vulnerability in the Halifax site allows an attacker to execute arbitrary &amp; external scripts.  This gives the attacker complete control over the victim's environment; changing links, buttons, text and crucially... perform actions as if they're the genuine user.</p>
<p>Thankfully, Halifax/Lloyds Banking Group have since verified this exploit, even bringing in external consultants to re-test &amp; confirm their results.</p>
<p>Whilst we agree there's an issue, Halifax/Lloyds have (unsurprisingly) played down the risk, suggesting that other safeguards prevent unauthorised access to a user's bank account.  One of those safeguards, of course, is the requirement to verify a new payee by contacting the victim's mobile number.</p>
<p>I've demonstrated one method of payload delivery and although it works, it's by no means quick or easily scaled.  There's at least one other route too, but proving this theory means breaching the Computer Misuse Act and, given their propensity for threatening legal action, it's a step too far for an exploit I've proven by other means.</p>
<p>Let's not forget though, even a single, well-executed attack can yield a sizeable return.  Remember <a href="https://paul.reviews/phishing-attacks-are-evolving-the-vivian-gabb-story/">Vivian Gabb</a>?</p>
<h2 id="killingtwobirdswithonestone">Killing two birds with one stone.</h2>
<p>Let's recap...</p>
<p>We control the user's mobile number.<br>
We control the user's banking environment.</p>
<p>But, we still need to deliver &amp; execute the payload in a manner which doesn't alert the user.</p>
<h3 id="how">How?!</h3>
<p>The fix for this exploit is due in 3/4 weeks, so until then, I obviously can't give any further details.</p>
<p>However, their failure to adopt even the most basic of safeguards means it's possible to fire both exploits simultaneously and directly on Halifax's own site.  To make matters worse, the exploit takes place on the user's device; effectively shielding the attacker from the vast majority of anti-fraud checks.</p>
<h2 id="widerissues">Wider issues...</h2>
<p>Let's be clear.  An attacker is unlikely to hit your bank account first... the risk is just too high.</p>
<p>There are other low/no risk targets which could yield an equally high return.  Your email address, as an example, provides access to virtually every account you own.</p>
<p>If you're sensible, you've enabled 2FA or 2SV on your email account; effectively preventing unauthorized access to anyone armed with just your password.  It's also sensible to add a fallback number, if you ever lose access to your second factor... <em>or is it</em>?</p>
<p>Every fallback/revocation option provides a wider threat surface, each attracting their own set of security concerns.  An immensely strong password is rendered useless by anyone with access to my email account.  A Yubikey/Google Authenticator is rendered useless by the ability to bypass it via SMS.  Instead, the crypto seeds which form the basis of my OTPs are backed up locally; encrypted and isolated from the outside world.</p>
<p>Thankfully, I've never lost my keys... but it'll happen one day.  If you must use backups/fallback options, just bear in mind they're another door into your digital life.</p>
<p>If the attacker now has <strong>knowledge</strong> of your OTP, he has access to your supposedly &quot;2FA&quot; protected accounts.  Keep in mind, 2 knowledge factors does not constitute 2FA either... but 2SV or two-step verification.</p>
<p>The attacker hasn't stolen something you &quot;possess&quot;, thus it couldn't possibly be 2FA.  It's undoubtedly stronger than just a password, but it's by no means comparable to true 2FA.</p>
<h2 id="summary">Summary</h2>
<p>These exploits really are the lowest of the low-hanging fruit; detected by even the most rudimentary of security scans... but overlooking even the simplest of exploits can lead to much bigger problems.</p>
<p>In isolation, the issues at the Halifax do not appear to be particularly serious...  though I'd question how such a basic flaw went unnoticed.  When combined with other, equally simple exploits elsewhere, an attacker has a much wider window of opportunity to gain access to your communications &amp; bank account.</p>
<hr>
<h4 id="timeline">Timeline</h4>
<p>Halifax/Lloyds Banking Group responded immediately, escalating the issue to the appropriate team for review.  They later called to confirm the exploit, the steps they're taking to resolve it and their assessment of the risk.  As our assessments differ, a partial publication seems appropriate.</p>
<p>FreedomPop however, are yet to reply.</p>
<p>24/03/16 - Tweeted FreedomPop.  They replied asking for details to be emailed to <a href="mailto:feedback@freedompop.com">feedback@freedompop.com</a> - Email sent.<br>
24/<strong>04</strong>/16 - Identical email to <a href="mailto:feedback@freedompop.com">feedback@freedompop.com</a> requesting a response.<br>
25/04/16 - Email to CTO.  No response.<br>
27/04/16 - DM to FreedomPop asking for an update.<br>
28/04/16 - Response to DM. &quot;We've relayed your message, have a wonderful day&quot;<br>
01/05/16 - Publication.  Further information to follow if they fail to respond.</p>
</div>]]></content:encoded></item><item><title><![CDATA[PwnPhone: Default passwords allow covert surveillance.]]></title><description><![CDATA[A brief demonstration of how a default configuration can destroy your privacy & security.  Hijacking a VoIP phone with just a browser.]]></description><link>https://paul.reviews/pwnphone-default-passwords-allow-covert-surveillance/</link><guid isPermaLink="false">59d4b6cd99cc4737934a1d76</guid><category><![CDATA[snom]]></category><category><![CDATA[cisco]]></category><category><![CDATA[security]]></category><category><![CDATA[privacy]]></category><category><![CDATA[csrf]]></category><category><![CDATA[covert surveillance]]></category><category><![CDATA[voip]]></category><category><![CDATA[remote control]]></category><category><![CDATA[default passwords]]></category><category><![CDATA[passwords]]></category><category><![CDATA[authentication]]></category><category><![CDATA[breach]]></category><dc:creator><![CDATA[Paul Moore]]></dc:creator><pubDate>Sat, 13 Feb 2016 22:05:07 GMT</pubDate><media:content url="https://paul.reviews/content/images/2016/02/header1-2.gif" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://paul.reviews/content/images/2016/02/header1-2.gif" alt="PwnPhone: Default passwords allow covert surveillance."><p><img src="https://paul.reviews/content/images/2016/02/header1-1.gif" alt="PwnPhone: Default passwords allow covert surveillance."></p>
<p>A few weeks ago, I was asked to observe an installation of several wireless access points &amp; VoIP phones, with a view to making recommendations on how best to improve security while maintaining ease of deployment.</p>
<p>It didn't take long for several trends to appear; chief amongst which was the use of</p>
<blockquote>
<p>We'll just use defaults, <strong>for now</strong>.  That password will do, <strong>for now</strong>.</p>
</blockquote>
<p>Of course, as soon as the device burst into life, it's on to the next one.  At which point, &quot;<strong>now</strong>&quot; becomes a distant memory, along with any thoughts of hardening the device for use in a commercial setting.</p>
<p>This was not a fly-by-night company either, nor do they install cheap &amp; cheerful hardware; we're fitting enterprise-grade Cisco, Snom &amp; Ubiquiti UniFi equipment.  With a tight schedule &amp; reputable brand names, I completely understand why many installers trust the default configurations so vehemently.</p>
<h2 id="adefaultconfigisrarelyasecureconfig">A default config is rarely a secure config.</h2>
<p>A default configuration is <strong>only</strong> intended to restore a device to a &quot;default&quot; state, such that a competent installer can configure it to meet the client's needs.</p>
<blockquote>
<p>Note:  This is neither aimed at nor unique to Snom devices.  I'm aware of similar exploits against current Cisco devices too.</p>
</blockquote>
<p>In the following example, I've reset a Snom 320 VoIP phone (running 8.7.5.13 firmware) back to factory &quot;default&quot; settings.</p>
<p>Even before we begin, there's a serious problem... there's <strong>no authentication whatsoever</strong>!</p>
<p><img src="https://paul.reviews/content/images/2016/02/snom1-2.png" alt="PwnPhone: Default passwords allow covert surveillance."></p>
<p>To their credit, some manufacturers provide a default set of credentials... even if they're usually &quot;admin/admin&quot;, thus equally insecure.</p>
<p>Snom however, opted to place a tiny &quot;HTTP password not set&quot; warning at the top of the configuration screen.  That'd be fine if it forced you to set a password during the setup process, but it doesn't.</p>
<p>To make matters worse, it's only too happy to accept a <strong>single</strong> character/number password too.</p>
<blockquote>
<p>They're sat behind a strong firewall, so what's the big deal?</p>
</blockquote>
<p>A reasonable argument, you might think.  So, let's put it to the test.</p>
<h2 id="hijackingthesnom320">Hijacking the Snom 320</h2>
<p><strong>Step 1:</strong>  Visit a site which contains the exploit payload.</p>
<p>That's it.</p>
<p>Simply by opening a malicious site (or a genuine site containing the malicious payload), the attacker has <strong>complete</strong> control over our VoIP phone.</p>
<p>To demonstrate this vulnerability, I enlisted the help of two colleagues... Per Thorsheim &amp; Scott Helme.  Per will play the part of our attacker, embedding the exploit on a site which he controls.  Meanwhile, I'm reading Per's site while having a <em>private</em> conversation with Scott, via Skype.</p>
<p>Unbeknownst to me, Per has forced my VoIP phone to call his premium rate number and disabled the speaker, so unless I'm looking at the phone, I wouldn't know it's dialling.</p>
<blockquote>
<p>Note: We've left the activity LED on during this demo, as it's difficult to read the screen.  When the light illuminates, the phone is dialling out.</p>
</blockquote>
<iframe width="853" height="480" src="https://www.youtube.com/embed/mavwngM52Tc" frameborder="0" allowfullscreen></iframe>
<h2 id="whatcantheattackerdo">What can the attacker do?</h2>
<p>Virtually anything.</p>
<p>Make calls, receive calls, transfer calls (even before it rings), play recordings, <strong>upload new firmware</strong> and crucially... use the device for covert surveillance.</p>
<h2 id="ourselfdefeatingapproach">Our self-defeating approach...</h2>
<p>If we look beyond the IP telephony sector to the industry as a whole, many companies ship devices which have no &quot;default&quot; security... or permit the use of weak credentials which provide nothing more than a false sense of security.</p>
<p>It has to stop.</p>
<p><strong>Vendors -  If you must supply devices with &quot;default&quot; credentials, disable all other functionality until a suitably-secure password is set to replace it.</strong></p>
<h2 id="summary">Summary</h2>
<p>The term &quot;covert surveillance&quot; is usually only associated with nation states, certain 3-letter agencies and those closed-minded individuals pushing the Investigatory Powers Bill (IPBill / Snoopers Charter).</p>
<p>In this demonstration, the attacker has not only compromised your phone &amp; privacy with <strong>just</strong> a browser, but you've paid him for the privilege!</p>
<p>If you install, use or just find yourself sat next to one of these devices, just remember... it's basically a PC, with all the security vulnerabilities associated with them.  Don't assume it's safe because it's running as the manufacturer intended; seek professional advice.</p>
<ol>
<li>Use strong passwords, derived from a <a href="https://paul.reviews/privacy-password-managers-a-reality-check/">password manager</a>.</li>
<li>VLAN  / network segregate your phones, if possible.</li>
<li>Restrict access to APIs, even if they're only visible internally.</li>
<li>Check &amp; upgrade your firmware regularly, ensuring it doesn't revert to &quot;defaults&quot; afterwards.</li>
</ol>
<p>Just today, Professor Alan Woodward of Surrey University published an article entitled &quot;<a href="http://www.profwoodward.org/2016/02/are-you-only-one-using-your-voip-phone.html">Are you the only one using your VOIP phone?</a>&quot; which discusses the various attack vectors &amp; implications associated with VoIP devices.  If you haven't yet subscribed to Alan's RSS feed, I'd strongly suggest doing so.</p>
<p>Thanks to <a href="https://godpraksis.no">Per Thorsheim</a> &amp; <a href="https://scotthelme.co.uk">Scott Helme</a> for their help with this demonstration.</p>
<p>That's it folks... <strong>for now</strong>.</p>
</div>]]></content:encoded></item><item><title><![CDATA[Identity theft & payment fraud?  That's ASDA price.]]></title><description><![CDATA[Over the last 2 years, ASDA have processed over 19+ million transactions on a demonstrably insecure site.]]></description><link>https://paul.reviews/identity-theft-payment-fraud-thats-asda-price/</link><guid isPermaLink="false">59d4b6cd99cc4737934a1d75</guid><category><![CDATA[csrf]]></category><category><![CDATA[xss]]></category><category><![CDATA[xsrf]]></category><category><![CDATA[cross site request forgery]]></category><category><![CDATA[cross site scripting]]></category><category><![CDATA[security]]></category><category><![CDATA[asda]]></category><category><![CDATA[identity theft]]></category><category><![CDATA[payment data]]></category><dc:creator><![CDATA[Paul Moore]]></dc:creator><pubDate>Mon, 18 Jan 2016 12:36:00 GMT</pubDate><media:content url="https://paul.reviews/content/images/2016/01/Asda_slogan.png" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://paul.reviews/content/images/2016/01/Asda_slogan.png" alt="Identity theft & payment fraud?  That's ASDA price."><p>Back in March 2014, I contacted ASDA to report several security vulnerabilities and despite a fix promised &quot;in the next few weeks&quot;, little appears to have changed.</p>
<blockquote class="twitter-tweet" data-conversation="none" lang="en"><p lang="en" dir="ltr"><a href="https://twitter.com/Stuho1mez">@Stuho1mez</a> All of our sites are secure, I would advise using Chrome. Thanks, Beth</p>&mdash; Asda Service Team (@AsdaServiceTeam) <a href="https://twitter.com/AsdaServiceTeam/status/687552939792052224">January 14, 2016</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<p>After 677 days and several tweets along a similar vein, my patience has finally run out.</p>
<h2 id="whatstheproblem">What's the problem?</h2>
<p>Two of the simplest and most prevalent exploits allow an attacker to quickly &amp; effectively collect personal information &amp; full payment details.</p>
<p>Rather than outline the finer points of <a href="https://www.owasp.org/index.php/Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF)">CSRF (Cross Site Request Forgery)</a> &amp; <a href="https://www.owasp.org/index.php/Top_10_2013-A3-Cross-Site_Scripting_(XSS)">XSS (Cross Site Scripting)</a> for the umpteenth time, it's probably easier to show you.</p>
<iframe width="1280" height="720" src="https://www.youtube.com/embed/iaMOhbzYWAw?VQ=HD720" frameborder="0" allowfullscreen></iframe>
<h2 id="haveibeenaffected">Have I been affected?</h2>
<p>As of <a href="http://your.asda.com/press-centre/asda-announces-q2-2014-financial-results-continued-sales-growth-ahead-of-the-market">Q2 2014</a>, ASDA processed upwards of 200,000 online orders each week.  Given the length of time this has been exploitable, that equates to over 19 million transactions.</p>
<p>I'm not aware of any evidence suggesting <strong>these</strong> exploits are being used in the wild, but just a few months after my initial report, this tweet appeared.</p>
<blockquote class="twitter-tweet" lang="en"><p lang="en" dir="ltr"><a href="https://twitter.com/asda">@asda</a> some one hacked my acc tomake fraud on line purchases the bank caught it tank god but warn ur customers and i need a number to ring</p>&mdash; cathy creighton (@Ruby6918) <a href="https://twitter.com/Ruby6918/status/476335927355514880">June 10, 2014</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<p>Unfortunately, it's difficult to know if your details have been stolen unless the attacker uses the information very shortly after the breach occurs, such that it's reasonable to assume a link between the two.  However, ASDA may be able to shed further light on anyone affected by this, or any other exploit.</p>
<h2 id="howcaniprotectmyself">How can I protect myself?</h2>
<p>The safest way is simply to shop elsewhere.</p>
<p>ASDA/Walmart have had ample opportunity to fix these issues and have failed to do so.  If you must continue shopping with ASDA, open a &quot;private&quot; / &quot;incognito&quot; window and do not open <strong>any</strong> other tabs/windows until you've logged out.</p>
<h2 id="otherissues">Other issues...</h2>
<p>Well, they don't enforce SSL/TLS during login and the entire session is maintained over an insecure protocol.</p>
<p>Another user spotted this too... and tweeted ASDA.</p>
<blockquote class="twitter-tweet" lang="en"><p lang="en" dir="ltr">Hey <a href="https://twitter.com/asda">@ASDA</a> why do you serve your login form over plain (unencrypted) HTTP? <a href="http://t.co/1LsuP8YuLF">pic.twitter.com/1LsuP8YuLF</a></p>&mdash; Chris (@cmrowles) <a href="https://twitter.com/cmrowles/status/564776548193288192">February 9, 2015</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<p>Did they acknowledge the issue &amp; deploy a fix?  Not quite.</p>
<blockquote class="twitter-tweet" data-conversation="none" lang="en"><p lang="en" dir="ltr"><a href="https://twitter.com/cmrowles">@cmrowles</a> Morning! We&#39;ve had it confirmed that the page is secure 😊 Thanks, Beth</p>&mdash; Asda Service Team (@AsdaServiceTeam) <a href="https://twitter.com/AsdaServiceTeam/status/565060421267120128">February 10, 2015</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<p>--</p>
<p>When Sarah tried to apply for a job, she was greeted with this error.</p>
<blockquote class="twitter-tweet" lang="en"><p lang="en" dir="ltr"><a href="https://twitter.com/asda">@asda</a> get a new security certificate for your jobs site, risk of having personal data stolen. <a href="https://twitter.com/hashtag/asda?src=hash">#asda</a> <a href="https://twitter.com/hashtag/websecurity?src=hash">#websecurity</a> <a href="http://t.co/mVpueZs5Qy">pic.twitter.com/mVpueZs5Qy</a></p>&mdash; Sarah Rose (@NyowcatS) <a href="https://twitter.com/NyowcatS/status/603098482174459904">May 26, 2015</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<p>Did they spot their mistake, generate and deploy a new certificate?</p>
<blockquote class="twitter-tweet" data-conversation="none" lang="en"><p lang="en" dir="ltr"><a href="https://twitter.com/NyowcatS">@NyowcatS</a> Hi Sarah, I can confirm that all our Asda web pages are secure, Thanks Steph</p>&mdash; Asda Service Team (@AsdaServiceTeam) <a href="https://twitter.com/AsdaServiceTeam/status/603126471620632577">May 26, 2015</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<p>No.  They go on to recommend Sarah delete her cookies!</p>
<p>Scott tried to apply for a job too.</p>
<blockquote class="twitter-tweet" lang="en"><p lang="en" dir="ltr"><a href="https://twitter.com/asda">@asda</a> I&#39;m trying to apply for a job on your site. But anytime I try to access the application part. It tells me the websites in danger</p>&mdash; scott paterson (@whosinthebox94) <a href="https://twitter.com/whosinthebox94/status/610385229530988545">June 15, 2015</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<p>Surely now they'll fix it, right?</p>
<blockquote class="twitter-tweet" lang="en"><p lang="en" dir="ltr"><a href="https://twitter.com/whosinthebox94">@whosinthebox94</a> Hi Scott, I can confirm to you that the <a href="http://t.co/I7R0i6VbzC">http://t.co/I7R0i6VbzC</a> website is a fully secure site, Thanks Steph</p>&mdash; Asda Service Team (@AsdaServiceTeam) <a href="https://twitter.com/AsdaServiceTeam/status/610426675340247040">June 15, 2015</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<p>Nope.  Now, it's <em>fully</em> secure.</p>
<h2 id="summary">Summary</h2>
<p>Despite a speedy response to my first email and a privacy policy which suggests otherwise, ASDA do not appear to be overly concerned about the security of their customers.</p>
<p><img src="https://paul.reviews/content/images/2016/01/2016-01-18_1434.png" alt="Identity theft & payment fraud?  That's ASDA price."></p>
<p>I invited ASDA to comment on the situation; requesting more detailed information on who customers should contact if they believe they're affected by any security flaws.  I received an &quot;out of office&quot; from their &quot;data protection&quot; email address and haven't heard anything since.</p>
</div>]]></content:encoded></item><item><title><![CDATA[Privacy & Password Managers: A Reality Check]]></title><description><![CDATA[A calm, sensible discussion about the benefits & pitfalls of Password Managers... and the implications on privacy.]]></description><link>https://paul.reviews/privacy-password-managers-a-reality-check/</link><guid isPermaLink="false">59d4b6cd99cc4737934a1d74</guid><category><![CDATA[password manager]]></category><category><![CDATA[security]]></category><category><![CDATA[privacy]]></category><category><![CDATA[leak]]></category><category><![CDATA[1password]]></category><category><![CDATA[lastpass]]></category><category><![CDATA[pbkdf2]]></category><category><![CDATA[steve gibson]]></category><category><![CDATA[securitynow]]></category><category><![CDATA[TWiT]]></category><dc:creator><![CDATA[Paul Moore]]></dc:creator><pubDate>Fri, 23 Oct 2015 17:00:35 GMT</pubDate><media:content url="https://paul.reviews/content/images/2015/10/privacy-1.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://paul.reviews/content/images/2015/10/privacy-1.jpg" alt="Privacy & Password Managers: A Reality Check"><p><img src="https://paul.reviews/content/images/2015/10/privacy-policy-banner-3.png" alt="Privacy & Password Managers: A Reality Check"></p>
<p>Before we begin, let me preface this by saying... I actually quite like Steve Gibson.  For all his faults, he often raises very salient points on a variety of topics, typically surrounding security products &amp; services.</p>
<p>During the latest &quot;Security Now / TWiT&quot; episode on 20/10/2015, Steve &amp; Leo Laporte featured a piece of 1Password <em>news</em> regarding Dale Myer's &quot;<a href="http://myers.io/2015/10/22/1password-leaks-your-data/">1Password leaks your data</a>&quot; article.</p>
<p>It's a little over 10 minutes long...</p>
<iframe width="560" height="315" src="https://www.youtube.com/embed/PfCuL8I7onU?start=3480&end=4145" frameborder="0" allowfullscreen></iframe>
<p>It's no secret that Steve's a huge fan of LastPass and for that, I can't fault him.  LastPass is a remarkable product; one which I've recommended to many people in the past.  I on the other hand, prefer 1Password.</p>
<p>However, my personal preferences do not preclude me from criticising 1Password when it's necessary.  Avid followers may have already spotted that Dale's news isn't new at all... it's something I mentioned during an article 2.5 years ago (and I wasn't the first!) (<a href="https://paul.reviews/1password-forgot-your-password-youre-doing-it-wrong/">https://paul.reviews/1password-forgot-your-password-youre-doing-it-wrong/</a>) and despite this, I've remained a supporter of 1Password and until recently, still relied heavily upon the agilekeychain format.</p>
<p>Before we dive in to the specifics, first... a minor correction.  Dale Myers is not (nor does he claim to be) a <strong>security</strong> engineer, but a <strong>software</strong> engineer.  I say this not to diminish the validity of his article at all, but to clarify that his viewpoint is that of a developer, not someone who understands the logistics of solid cryptography.</p>
<h2 id="whatstheproblemwithagilekeychain">What's the problem with Agilekeychain?</h2>
<p>The &quot;location&quot; (the actual URL) and &quot;title&quot; (the name of the site) fields (so-called metadata) are stored in plain text, such that anyone in possession of the keychain can identify any sites you use.</p>
<p>Although it's entertaining to listen to Steve wax lyrical about how this &quot;represents a fundamental, crucial failure of judgement&quot; while Leo sneers in the background, there is sound reasoning behind the decision.</p>
<p>The main focus of an application of this nature is not security, nor privacy... but usability.  A naive &amp; amateurish approach would be to encrypt everything, regardless of the consequences; an unfortunate result of which is a poor user experience which ultimately leads to the user reverting back to old ways.</p>
<h3 id="whyisntthemetadataencryptedwithyourmasterpassword">Why isn't the metadata encrypted with your master password?</h3>
<p>In reality, none of the data (including your username/passwords) is encrypted with your master password.</p>
<p>Your master password is used to derive a cryptographic key, which in turn is used to encrypt something else.</p>
<h3 id="okwhyisntthemetadataencryptedwithyourmasterkey">OK, why isn't the metadata encrypted with your master &quot;key&quot;?</h3>
<p>It may come as a surprise, but this key isn't used to directly encrypt your data either.  Instead, a unique, entry-specific key is generated by 1Password.</p>
<p>This unique key is encrypted with your master key, which itself is derived from your master password.</p>
<h2 id="considertheenvironment">Consider the environment...</h2>
<p>Now we understand a little about how 1Password is put together, we can begin to understand why &quot;performance reasons&quot; is not an argument in response to a bug, but a valid &amp; reasonable design decision taken by experts who fundamentally understand the problem.</p>
<p>When Agilekeychain launched in 2008, Android was still in its infancy and Apple users were rocking the iPhone 3G.  In terms of technology at that time, an HTC G1 had just a 528Mhz CPU and a measly 192MB RAM.</p>
<p>If 1Password was to be truly cross-platform compatible, it needed to provide a reasonable defense against attacks from modern PCs but accommodate the performance constraints of a mobile phone.  As any developer will tell you, it's incredibly difficult to strike that balance and unfortunately, sacrifices have to be made.</p>
<p>Think for a moment about what 1Password needs to do in order to display a list of entries.</p>
<p>First, it must stretch your master password through the use of PBKDF2 (itself a considerable demand for a mobile device).  With the master key, it must iterate through every single site (of which there could be hundreds), decrypt the entry-specific key and <em>then</em> decrypt the data.</p>
<p>In reality, it just wouldn't work on a mobile device at that time.  It'd either hang completely, or slow the experience to the point where the user reverts back to &quot;password1234&quot; and writes 1Password off.</p>
<p>Remember, it's usable security we're after...</p>
<h3 id="coulditbemadetowork">Could it be made to work?</h3>
<p>Sure... dropping multiple derived keys would help with performance, but to the detriment of security.  It's safer to assess the risks involved in storing metadata in plain text, than undermine the entire foundation in an effort to increase performance.</p>
<h3 id="takeitslow">Take it slow...</h3>
<p>When it comes to deriving keys from passwords, speed (or performance) is our enemy.  If your environment can generated keys rapidly, such that plain-text storage wouldn't need to be considered, so can an attacker.</p>
<h3 id="butnottooslow">But not too slow...</h3>
<p>It needs to be slow enough to trouble a would-be attacker, but not so slow as to interfere with the user experience.  Again, this is a balancing act which every developer struggles with at some point.</p>
<p>The problem?  The lack of consistency across platforms!  A PBKDF2 library on iOS will respond differently to an Android equivalent; something which must also be taken into consideration at the design stage.  If you expect a record to decrypt in 100 milliseconds, but it actually takes 200 milliseconds... you've doubled the time on one particular platform.</p>
<p>Of course, they could write their own library... but they're sensible enough not to go down that route too.</p>
<h3 id="whats100millisecondsbigdeal">What's 100 milliseconds? Big deal!</h3>
<p>If you have a couple of entries, sure... it seems like a nominal difference.  If, like me, you have 200+ entries, instead of opening in 2 seconds, it takes a yawn-inducing 4 seconds.  Would you be happy with a 4 second delay each time you searched/listed all entries?</p>
<p>What happens if the device is busy, or near its resource limit?  Will it crash, fail gracefully, dump decrypted data to storage or take 8 seconds instead?</p>
<p>These are all considerations which require plenty of forethought.</p>
<h2 id="whowastheinformationexposedto">Who was the information exposed to?</h2>
<p>Anyone in possession of the keychain, or perhaps more accurately... nobody in the overwhelming majority of cases.</p>
<p>Agilebits have never recommended uploading your agilekeychain to a publicly-accessible location.  In truth, they actively dissuade users from doing so... but I completely understand why someone would.</p>
<p>If your keychain is stored on your PC/mobile device, it's incredibly unlikely that anyone has seen it.  Likewise with Dropbox; unless you've specifically shared the keychain with others or made it public, it's highly unlikely that your privacy or data has been leaked.</p>
<p>What's crucial here, is that it was <strong>not</strong> exposed to Agilebits.  They don't want it, need it nor have the infrastructure necessary to store it.</p>
<h2 id="couldntagilebitsmovetoopvaultsooner">Couldn't Agilebits move to OPVault sooner?</h2>
<p>If this article has been pro-1Password thus far, it's about to take a turn for the worse.</p>
<p>The drawbacks of agilekeychain and added benefits of OPVault have not been communicated well at all; even a minimal risk is worth mentioning to allow users to make an informed decision.  Although I discovered these issues during my investigation in 2013, I still opted for agilekeychain as the associated risks didn't affect <em>me</em>.</p>
<p>Each use case is different, so please don't consider that a recommendation either!</p>
<h2 id="theinevitablecomparisonwithlastpass">The inevitable comparison with LastPass</h2>
<p>It was only a matter of time before Steve made a comparison with LastPass, so here it is.</p>
<iframe width="560" height="315" src="https://www.youtube.com/embed/PfCuL8I7onU?start=3940&end=3958" frameborder="0" allowfullscreen></iframe>
<p>Unfortunately, it's comments like these which place Steve in my &quot;entertainment&quot; bookmarks folder, not security.</p>
<p>You see, LastPass doesn't encrypt metadata either!  It's stored, <strong>by LastPass</strong>, in plain text.</p>
<p><img src="https://paul.reviews/content/images/2015/10/5.PNG" alt="Privacy & Password Managers: A Reality Check"></p>
<p>At first glance, the URL looks like an encrypted string.  In fact, it's <strong>encoded</strong> in Hex!</p>
<p>Again, this isn't new information... it was first mentioned by a fellow researcher in <strong>2012</strong>, coincidentally around the same time Agilebits moved away from such techniques.</p>
<h3 id="whydolastpassstoremetadatainplaintext">Why do LastPass store metadata in plain text?</h3>
<blockquote>
<p>&quot;to provide favicon support&quot;, LastPass Support.</p>
</blockquote>
<p>You know, these things...<br>
<img src="https://paul.reviews/content/images/2015/10/2.png" alt="Privacy & Password Managers: A Reality Check"></p>
<p>Of course, they couldn't possibly leak anything of importance could they?!</p>
<p>Frankly, I don't buy that.  You can't build an application as good as LastPass without knowing there are other, more efficient ways to grab a favicon without <strong>leaking</strong> metadata and storing it on your own servers.</p>
<iframe width="560" height="315" src="https://www.youtube.com/embed/PfCuL8I7onU?start=4092&end=4096" frameborder="0" allowfullscreen></iframe>
<p>Oh dear, where do I start with that?</p>
<p>Firstly, his risk assessment is way, way off.  If the suggestion is &quot;I'll never give them my data, neither should you&quot;, I'm afraid Steve/TWiT no longer belongs in the entertainment/comedy folder either.</p>
<p>I suppose it'd be prudent to reiterate that it's <strong>impossible</strong> to give Agilebits your data.  It's not cloud-based and has no requirement to be so.</p>
<p>I'll also take a moment to chuckle, Leo-style, at the fact he's unwittingly leaking his own metadata to LastPass during each and every login.  The file &quot;loglogin.php&quot; should be all the indication necessary to question why (or more importantly, how) a company with no personal, private data can possibly create meaningful logs/reports unless their applications share such information.</p>
<h2 id="shouldsteveclosehislastpassaccount">Should Steve close his LastPass account?</h2>
<p>Well, yes and no.</p>
<iframe width="560" height="315" src="https://www.youtube.com/embed/PfCuL8I7onU?start=4115&end=4145" frameborder="0" allowfullscreen></iframe>
<p>There are two options...</p>
<ol>
<li>Admit that with hindsight, it's was a ridiculous overreaction to write off an application because of a measured, reasoned set of decisions based on technology constraints from 7 years ago<br>
or</li>
<li>Stand by his comments, admit LastPass leaks substantially more metadata, shares his activities in plain text with the server and close his account immediately.</li>
</ol>
<p>I asked Steve to comment, but I'm yet to receive a reply.</p>
<blockquote class="twitter-tweet" lang="en"><p lang="en" dir="ltr">Thoughts <a href="https://twitter.com/SGgrc">@SGgrc</a>, given your stance on <a href="https://twitter.com/hashtag/1Password?src=hash">#1Password</a>&#39;s &quot;leak&quot; ?&#10;<a href="https://t.co/qVr41oBikn">https://t.co/qVr41oBikn</a>&#10;&#10;URLs are sent to <a href="https://twitter.com/hashtag/LastPass?src=hash">#LastPass</a> in plain hex btw.&#10;<a href="https://twitter.com/hashtag/privacy?src=hash">#privacy</a></p>&mdash; Paul Moore (@Paul_Reviews) <a href="https://twitter.com/Paul_Reviews/status/657232347255951360">October 22, 2015</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<h2 id="summary">Summary</h2>
<p>As I've said countless times before, 1Password is designed &amp; written by experts who understand the subtle nuances of deploying a scalable, secure application; to whom the term &quot;security&quot; means more than wrapping AES around everything in sight.</p>
<p>Trust is everything.</p>
</div>]]></content:encoded></item><item><title><![CDATA[Behavioral Profiling: The password you can't change.]]></title><description><![CDATA[You can be identified by how you type, even behind proxies and Tor.  Protect yourself with KeyboardPrivacy.]]></description><link>https://paul.reviews/behavioral-profiling-the-password-you-cant-change/</link><guid isPermaLink="false">59d4b6cd99cc4737934a1d73</guid><category><![CDATA[privacy]]></category><category><![CDATA[security]]></category><category><![CDATA[authentication]]></category><category><![CDATA[password]]></category><category><![CDATA[biometrics]]></category><category><![CDATA[plugin]]></category><category><![CDATA[keyboardprivacy]]></category><dc:creator><![CDATA[Paul Moore]]></dc:creator><pubDate>Tue, 28 Jul 2015 08:42:35 GMT</pubDate><media:content url="https://paul.reviews/content/images/2015/07/3.PNG" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://paul.reviews/content/images/2015/07/3.PNG" alt="Behavioral Profiling: The password you can't change."><p>We're all familiar with the 3 basic categories of authentication.</p>
<ol>
<li>Knowledge factors (passwords, PINs)</li>
<li>Possession factors (a software/hardware token - Yubikey/Google Authenticator/SecureID)</li>
<li>Inherence factors (fingerprint, heartbeat, iris/retina scanning)</li>
</ol>
<p>While the vast majority of sites use knowledge factors, a growing number are turning to multi-factor solutions in an effort to bolster security; to the detriment of the user experience.</p>
<p>Cue continuous authentication / behavioral biometrics... the process of identifying a user based on the subtle nuances in their voice, typing patterns, facial features and location.</p>
<h2 id="howdoesitwork">How does it work?</h2>
<p>As opposed to traditional authentication which is only interested in <em>what</em> you type, behavioral biometric systems collect &amp; profile <em>how</em> you type too.  By actively monitoring how you type, the system is able to build a profile on you.</p>
<p>In order to achieve this, the system monitors how long each key is depressed (dwell time), how long between each key press (gap time), how long to type a known string and hundreds of other metrics.</p>
<p><img src="https://paul.reviews/content/images/2015/07/modalities.png" alt="Behavioral Profiling: The password you can't change."><br>
Source: <a href="http://behaviosec.com">behaviosec.com</a></p>
<p>With enough supporting data, it's entirely possible to identify you based purely on how you type.</p>
<p>Think about that for a moment.</p>
<h2 id="howaccurateisit">How accurate is it?</h2>
<p>Back in 2011, <a href="http://www.ecole.ensicaen.fr/~rosenber/index_UK.html">professor Christophe Rosenberger at ENSICAEN</a> announced it was possible to determine the user's gender after just a few keystrokes.</p>
<p>Over the last 4 years, many companies have researched &amp; invested heavily in leveraging this technology.</p>
<p><a href="http://behaviosec.com"><img src="https://paul.reviews/content/images/2015/07/BehavioSec.jpg" alt="Behavioral Profiling: The password you can't change."></a></p>
<p>Meet <a href="http://behaviosec.com">BehavioSec</a>, a swedish company which shot to fame after recent publications on BBC News, the Wall Street Journal, CNBC, Wired, Forbes to name a few.</p>
<p>After a brief training period, their technology is able to identify a user with astonishing accuracy.</p>
<p>Here's the demo login page.</p>
<p><img src="https://paul.reviews/content/images/2015/07/1.PNG" alt="Behavioral Profiling: The password you can't change."></p>
<p>Looks remarkably similar to every other login page, doesn't it?</p>
<p>After entering your username &amp; password, you're asked to simulate a bank transfer.  After just <strong>44 characters</strong>, look at the result.</p>
<p><img src="https://paul.reviews/content/images/2015/07/4_green.PNG" alt="Behavioral Profiling: The password you can't change."></p>
<p>A session score of 99% with a confidence rating of 80%!  Remember, we've typed <strong>44</strong> characters so far.</p>
<h2 id="balancingsecuritywithprivacy">Balancing security with privacy</h2>
<p>In terms of security, this is a huge leap forwards... but does it tip the security/privacy scale too far?</p>
<p>You can forget Tor, a VPN and your favorite proxy site... if you have javascript enabled and you've been profiled, there's a very good chance they'll identify you.</p>
<p>The problem is... <strong>do you know <em>when</em> you're being profiled?</strong></p>
<p>It's been rumored that UK banks are actively trialing this technology in an effort to detect &amp; minimize the risk of fraud.  How many other sites use it?  Would they tell you if they were?</p>
<h2 id="sharedsecrets">Shared secrets</h2>
<p>Although we all love to hate passwords, they're shared secrets which can be changed with just a few clicks.</p>
<p>If your biometric behavioral profile is shared/stolen, the consequences are far-reaching and considerably more difficult to mitigate.  You can't change the way you type and even if you did, they'll simply profile you again until the confidence level reaches acceptable limits.</p>
<h2 id="howdoiprotectmyprivacy">How do I protect my privacy?</h2>
<p>On Wednesday, 22nd July 2015, Per Thorsheim (Founder of PasswordsCon, CISA, CISM, CISSP ISSAP) Skype'd me with an interesting challenge.</p>
<blockquote>
<p>Defeat the underlying technology and protect the user's privacy.</p>
</blockquote>
<p>Challenge accepted.</p>
<p>Over the next few days, I researched the underlying technology and explored ways to nullify such profiling.  You can read Per's analysis of this technology <a href="https://godpraksis.no/2015/07/the-privacy-risk-of-behavioral-profiling/">here</a>.</p>
<p>Although many implementations claim to use hundreds of metrics, it became clear that only a few were weighted heavily enough to really matter.</p>
<ol>
<li>Dwell time - How long each key is depressed.</li>
<li>Gap time - How long between each key press.</li>
</ol>
<p>If we can skew these statistics enough, it'd be almost impossible to profile and/or identify a user.</p>
<p><a href="https://chrome.google.com/webstore/detail/keyboard-privacy/aoeboeflhhnobfjkafamelopfeojdohk"><img src="https://paul.reviews/content/images/2015/07/keyboardprivacy_logo.png" alt="Behavioral Profiling: The password you can't change."></a></p>
<p>Meet KeyboardPrivacy, a proof-of-concept Google Chrome extension which interferes with the periodicity of everything you enter into a website.</p>
<p>Once installed, you can continue to use the web exactly as you do now.  When you enter anything on your keyboard, KeyboardPrivacy will artificially alter the rate at which your entry reaches the document object model (DOM).</p>
<p><img src="https://paul.reviews/content/images/2015/07/2.PNG" alt="Behavioral Profiling: The password you can't change."></p>
<p>As you can see, we have a 50 millisecond dwell &amp; gap time (the default configuration) here.  It's enabled everywhere by default, but you can disable it on a per-site basis if you wish.</p>
<p>Let's see what happens when we try to login now.</p>
<p><img src="https://paul.reviews/content/images/2015/07/5_red.PNG" alt="Behavioral Profiling: The password you can't change."></p>
<p>That's better!</p>
<p>Our session score has plummeted to just 0.07%!  Crucially, they're 78% confident in the assumption that the person in front of the keyboard is not me, despite having my username &amp; password.</p>
<h2 id="whataboutmouseprivacy">What about MousePrivacy?</h2>
<p>Most (if not all) behavioral profiling systems check your mouse movements too.  However in my experience, mouse movements do not provide sufficient metadata to accurately identify a user.</p>
<p>As such, the plugin makes no attempt to mask/obfuscate your mouse movements.</p>
<h2 id="doesntthatreducesecurity">Doesn't that reduce security?</h2>
<p>Absolutely, but that's not necessarily a bad thing.</p>
<p>As I mentioned earlier, it's more important to strike a good balance between security &amp; privacy; it's rarely possible to increase one without measurably degrading the other (password managers being an exception).  If you're happy to leak this information to every site, or if you're forced to do so by a financial institution, you can disable the plugin on a per-site basis.</p>
<p>Even if your behavioral profile is leaked to a 3rd-party, it's of no use unless you happen to disable it on their site too.</p>
<p>The single biggest problem with passwords is not length or strength, but re-use.  Your behavioral biometrics (knowingly or not) are essentially secrets which you unwittingly share with every site.</p>
<h2 id="granularityiskey">Granularity is key</h2>
<p>Although the technology is often described as &quot;continuous authentication&quot;, it rarely is.  With 400+ unique metrics for every field, the amount of metadata would be astronomical.</p>
<p>However, that's not to say it's not possible.</p>
<p>If you're a large corporation or a certain 3-letter government agency, behavioral biometric data is priceless.  If the site happens to profile every single word (ignoring the fact they'll be swamped with data), imagine this scenario...</p>
<p>The user types and the site profiles the word &quot;<strong>behavioral</strong>&quot;.  OK, no big deal... but look deeper.</p>
<p>What happens when the user types &quot;<strong>behav</strong>e&quot; or &quot;<strong>oral</strong>&quot;?  We already have partial data for those terms, even though they haven't type the word exactly.  Although the system works on loose tolerances, it's granular and smart enough to make an educated guess.</p>
<h2 id="deliveringtheproofofconcept">Delivering the proof of concept...</h2>
<p>Since laying down the gauntlet, I've been in daily contact with Per Thorsheim to test each version of KeyboardPrivacy.</p>
<p>The current version appears to be working quite nicely; even protecting a profile created through Tor.</p>
<iframe width="1280" height="720" src="https://www.youtube.com/embed/rAYz7uWPN_8?rel=0" frameborder="0" allowfullscreen></iframe>
<h2 id="defeatingthetechnologynottheimplementation">Defeating the technology, not the implementation</h2>
<p>As you've seen, Per and I have conducted our tests against BehavioSec... but defeating individual implementations is not the goal here.</p>
<p>Let's try <a href="https://www.keytrac.net">KeyTrac</a>; a similar product intended to add biometric profiling to current knowledge-based authentication.</p>
<p>First, we'll try with the plugin disabled (note the red dot on the plugin icon)</p>
<p><img src="https://paul.reviews/content/images/2015/07/8.PNG" alt="Behavioral Profiling: The password you can't change."></p>
<p>82% is a reasonable score to allow a session to continue.  Let's enable the plugin and try again...</p>
<p><img src="https://paul.reviews/content/images/2015/07/9.PNG" alt="Behavioral Profiling: The password you can't change."></p>
<p>Ah, the sweet smell of success.</p>
<h2 id="summary">Summary</h2>
<p>This was an interesting challenge and ultimately, it wasn't as difficult as I expected.  If you strip away the fundamentals required to make a chrome extension, the code is just 13 lines long and has proven to be quite robust so far.</p>
<p>The Chrome extension is now available <a href="https://chrome.google.com/webstore/detail/keyboard-privacy/aoeboeflhhnobfjkafamelopfeojdohk">here</a>.  Sit tight for a Firefox version too.</p>
</div>]]></content:encoded></item><item><title><![CDATA[Phishing attacks are evolving. The Vivian Gabb story...]]></title><description><![CDATA[Spare a thought for Vivian Gabb, a tennis coach from London who lost £50,000 to fraudsters in a sophisticated phishing scam.]]></description><link>https://paul.reviews/phishing-attacks-are-evolving-the-vivian-gabb-story/</link><guid isPermaLink="false">59d4b6cd99cc4737934a1d71</guid><category><![CDATA[security]]></category><category><![CDATA[tls]]></category><category><![CDATA[bank]]></category><category><![CDATA[phishing]]></category><category><![CDATA[scam]]></category><category><![CDATA[vivian gabb]]></category><dc:creator><![CDATA[Paul Moore]]></dc:creator><pubDate>Mon, 29 Jun 2015 22:05:13 GMT</pubDate><media:content url="https://paul.reviews/content/images/2015/09/medium_Gmg0VzDXSOXzoweyDTkQPQJP913Y4E6ax_Kptnqes8k.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><blockquote>
<img src="https://paul.reviews/content/images/2015/09/medium_Gmg0VzDXSOXzoweyDTkQPQJP913Y4E6ax_Kptnqes8k.jpg" alt="Phishing attacks are evolving. The Vivian Gabb story..."><p>&quot;We have detect some unauthorized active on your account.  Please update your detail as soon as possible&quot;</p>
</blockquote>
<p>We've all had them; the notorious and grammatically inept phishing emails designed to strip us of our hard-earned money.</p>
<p>The vast majority are destined for immediate deletion, but a growing number of sophisticated attacks are starting to emerge.  Nobody understands this better than <a href="http://www.bbc.co.uk/news/uk-33257129">Vivian Gabb</a>, a tennis coach from London who recently lost nearly <strong>£50,000</strong> to fraudsters.</p>
<p>Before you cast aspersions, this was <strong>not</strong> your average phishing attack.  Far from it.</p>
<p>Vivian's email account was breached by the fraudster.  Rather than spam her contact list with a desperate plea for financial help, the fraudster opted to sit and wait.  Unfortunately for Vivian, her conversations with her solicitor were being monitored.  When the time came to transfer a deposit to purchase a house, the fraudster took a high-risk approach and assumed the identity of the solicitor.</p>
<p>Apart from the &quot;sit &amp; wait&quot; strategy, this phishing attack stands out for the sheer level of sophistication demonstrated by the fraudster.  Rather than sending an email which Vivian would likely spot, the fraudster first registered a new domain name which closely resembled her solicitor's and even opened a new business bank account!</p>
<p>So when the carefully-crafted email arrived, Vivian didn't give it a second thought.  They addressed her by name, referred to their correspondence on the previous day and even mirrored the tone used by her solicitor.  A quick bank transfer later... and Vivian lost her life savings.</p>
<p>To make matters worse, neither her bank (Halifax) nor the receiving bank (TSB) were able to recover any money until it was too late.</p>
<h2 id="shouldthebankcoverherlosses">Should the bank cover her losses?</h2>
<p>Morally, I believe they should.  Technically, perhaps not.</p>
<p>You see, the bank has to prove that Vivian acted negligently.  Can you, hand on heart, say you'd never fall for this well-executed scam?  In reality, £50,000 is peanuts and discretion really should apply.</p>
<h2 id="bbccoverage">BBC Coverage</h2>
<p>I first became aware of Vivian's plight via a <a href="http://www.bbc.co.uk/programmes/p02vh3ys">BBC article</a>.  Unfortunately, the advice from Tony Neate @ GetSafeOnline will only exacerbate the problem... so I'll say this as succinctly as I can.</p>
<p><strong>Do NOT change passwords regularly.</strong></p>
<p>A password, regardless of length &amp; strength, has a finite value; it’s only useful until the user changes it.  Of infinite value however, is knowing how a user chooses a password.  Each time you choose a password (which is subsequently leaked/cracked etc), you're inadvertently leaking information about how you choose a password.  Does it start with an uppercase letter and end in a 4 digit date?  Does it contain special characters but only at the end of the password?  Does it resemble another password associated with you and if so, are there any common denominators (numbers, dates, words, layout etc)?</p>
<p>With this information, an attacker doesn’t need to know your current password… they can predict (with great accuracy) what your next password will be.  I’m yet to meet anyone who enjoys choosing another password, so choices are made purely from a usability point of view, not security.</p>
<p>Using Tony’s flawed logic, a site which forces a password change every 3 months is much safer.  Likewise, forcing a password change every day would be even stronger.  Sadly, that’s just not true.  Instead of choosing an entirely new, unique, long &amp; strong password… the user is far more likely to add a “1” to the end of the password (MyPasswordForThisSite20151).  We’ve all done it, but it’s a problem made significantly worse when you’re forced to make frequent and unnecessary changes.</p>
<p>Ultimately, <strong>passwords should only be changed when there’s suspicion or proof that it’s no longer a secret (assuming it’s reasonably strong in the first place)</strong>.</p>
<p>The only caveat to that being the use of a password manager.  Many password managers choose &amp; subsequently store random passwords for the user, removing the burden of choosing &amp; remembering something comparably weaker.  In this instance, repeated password changes (necessary or not) would not leak any significant information to an attacker.</p>
<h2 id="whosresponsible">Who's responsible?</h2>
<p>The more I think about it, the more it doesn't quite add up.</p>
<p>It's almost certainly a targeted attack; someone who knew Vivian was in the process of buying a property.  Why?  Attackers <em>rarely</em> sit on breached accounts for a significant length of time... as each passing day increases the likelihood of being discovered.  I'm struggling to believe a sophisticated attacker just happened upon her account at such a convenient time.</p>
<p>Personally, I'd start by looking closer to home.  Friends, family... even the solicitors aren't exempt from suspicion.  Although it's highly unlikely Vivian will ever see a penny of her money, it's only right to put those responsible before a court.  As far as I can gather, she's approached an &quot;IT expert&quot; with a view to investigating exactly what happened; with quotes of roughly £1000 being mentioned.</p>
<p>In truth, £1000 wouldn't even scrape the surface and would likely be more money down the drain.</p>
<p>You could argue that consistently bad &amp; misleading advice from &quot;experts&quot; is also to blame, to a certain extent.</p>
<p>I've invited GetSafeOnline and the BBC to comment and issue a retraction, but I'm yet to hear from either party.  I will update the article if necessary.</p>
</div>]]></content:encoded></item><item><title><![CDATA[Boosting Your Galaxy Gear Battery Life]]></title><description><![CDATA[How I increased my battery life from 22hrs to 3 days, step by step.]]></description><link>https://paul.reviews/boosting-your-galaxy-gear-battery-life/</link><guid isPermaLink="false">59d4b6cd99cc4737934a1d6f</guid><category><![CDATA[galaxy]]></category><category><![CDATA[gear]]></category><category><![CDATA[galaxy gear]]></category><category><![CDATA[gear 2]]></category><category><![CDATA[smartwatch]]></category><category><![CDATA[battery life]]></category><category><![CDATA[increase battery life]]></category><category><![CDATA[extended battery]]></category><category><![CDATA[samsung]]></category><category><![CDATA[tips]]></category><dc:creator><![CDATA[Paul Moore]]></dc:creator><pubDate>Sun, 15 Mar 2015 17:15:09 GMT</pubDate><media:content url="https://paul.reviews/content/images/2015/03/uk_SM-V7000ZKABTU_004_Front_black_thumb-1.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://paul.reviews/content/images/2015/03/uk_SM-V7000ZKABTU_004_Front_black_thumb-1.jpg" alt="Boosting Your Galaxy Gear Battery Life"><p><img src="https://paul.reviews/content/images/2015/03/uk_SM-V7000ZKABTU_004_Front_black_thumb.jpg" alt="Boosting Your Galaxy Gear Battery Life"></p>
<p>Just 22hrs after charging my Galaxy Gear, it's already minutes away from switching off and needing a recharge.</p>
<p>I've read dozens of guides on how to extract as much life as possible from the tiny 312mAh battery, but few go into sufficient detail to help make informed decisions.</p>
<p>So, here's a list (in order of effectiveness, highest to lowest) of steps you can take to increase your battery life.</p>
<h4 id="1upgradetotizen">1) Upgrade to Tizen</h4>
<p>Google's Android is great, but it was never designed for use on a smart watch.</p>
<p>If you haven't already done so, install Samsung Kies and connect your Gear.  If there's an update available in your region, it'll prompt you to upgrade.  Make sure your battery is 50% or greater before starting the upgrade.</p>
<h4 id="2performafactoryreset">2)  Perform a factory reset</h4>
<p>Even if you've just upgraded to Tizen, go through the recovery/reset process.  This will completely wipe your device.</p>
<p>With the Gear switched on, press and hold the power button until it says &quot;rebooting&quot;.  Press the power button 5 times.  You'll arrive at a menu with 3 options which you can scroll through by pressing the power button.  Go to &quot;recovery&quot; and press &amp; hold the power button for 3 seconds to select it.  Follow the instructions and wait for it to reset.</p>
<h4 id="3disablemotionwake">3) Disable &quot;Motion Wake&quot;</h4>
<p>With &quot;Motion Wake&quot; enabled, the Gear uses the gyroscope and accelerometer to detect and calculate your movements.  Although only specific movements will cause the Gear to wake up, you may not realise that it's constantly &quot;listening&quot; to your movements which ultimately affects your battery life.  I leave it enabled because I'm happy to lose some battery life for the benefit of not pressing the power button each time, but if you really want to optimize your battery life, disable this too.</p>
<h4 id="4updategearmanagerandalldependencies">4) Update Gear Manager and all dependencies</h4>
<p>As a companion device, the Gear needs to be paired with a smartphone to work effectively.  Each time it sends notifications or indeed any data at all, it devours the battery of both devices.  The latest versions are much more efficient.</p>
<h4 id="5disableautounlock">5) Disable &quot;Auto Unlock&quot;</h4>
<p>Auto-unlock works by continually transmitting a signal to paired devices, letting them know that it's within range.  Although useful, it's very power-hungry.</p>
<h4 id="6useablackwallpaper">6) Use a black wallpaper</h4>
<p>The Galaxy Gear uses an AMOLED screen.  As opposed to LCD screens, each AMOLED pixel is illuminated individually.  When your device needs to show a black pixel, it simply disables that pixel.  With a black wallpaper, the vast majority of your screen is switched off.  Tests have shown this can increase your battery life by as much as 20%.</p>
<h4 id="7reduceyourscreentimeouttime">7) Reduce your screen timeout time</h4>
<p>It goes without saying, but the longer your screen is on, the less time your battery will last.  The minimum time in Tizen is 10 seconds, with Android allowing just 7 seconds.  If you have &quot;Motion Wake&quot; enabled, keep in mind that each time it wakes (intentionally or otherwise), this timeout value starts again.</p>
<h4 id="8reduceyourscreenbrightnesssoundvolume">8) Reduce your screen brightness &amp; sound volume</h4>
<p>If you must use &quot;outdoor mode&quot;, use it sparingly.  At full brightness, the Gear gobbles battery life.  Use the absolute minimum you need to use it without straining your eyes.  Also, keep the volume as low as possible.</p>
<h3 id="theresults">The Results</h3>
<p>With Tizen, a factory reset, motion wake <strong>enabled</strong>, the latest Gear Manager, auto unlock disabled, a black wallpaper, a 10 second screen timeout, a screen brightness of &quot;3&quot; and roughly 40 notifications per day, I managed just over 3 days of usable life.  If you're a particularly heavy user, you should achieve 2 days quite easily.</p>
</div>]]></content:encoded></item><item><title><![CDATA[SagePay: Breaching PCI Compliance... intentionally.]]></title><description><![CDATA[SagePay have knowingly processed payments whilst in breach of PCI regulations... and continue to do so.]]></description><link>https://paul.reviews/sagepay-breaching-pci-compliance-intentionally/</link><guid isPermaLink="false">59d4b6cd99cc4737934a1d6d</guid><category><![CDATA[ciphers]]></category><category><![CDATA[encryption]]></category><category><![CDATA[insecure]]></category><category><![CDATA[PCI]]></category><category><![CDATA[security]]></category><category><![CDATA[breach]]></category><category><![CDATA[payment]]></category><category><![CDATA[sagepay]]></category><category><![CDATA[pci compliance]]></category><category><![CDATA[56bit]]></category><category><![CDATA[export]]></category><category><![CDATA[regulations]]></category><dc:creator><![CDATA[Paul Moore]]></dc:creator><pubDate>Tue, 03 Feb 2015 12:17:00 GMT</pubDate><media:content url="https://paul.reviews/content/images/2015/02/sagepay_logo-1.png" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://paul.reviews/content/images/2015/02/sagepay_logo-1.png" alt="SagePay: Breaching PCI Compliance... intentionally."><p><img src="https://paul.reviews/content/images/2015/02/sagepay_logo.png" alt="SagePay: Breaching PCI Compliance... intentionally."></p>
<p>Update: <strong>2:50PM 03/02/2015</strong></p>
<p>Just minutes after this article went live, SagePay have once again removed the 56bit cipher.  It is being actively monitored, so if it creeps back in, I'll update the article again.</p>
<hr>
<p>As one of the largest payment service providers in the world, SagePay has over 50,000 customers and processes over 4 billion payments each year.</p>
<p>The website is festooned with security claims:</p>
<blockquote>
<p>Payment security and fraud prevention are two of our top priorities</p>
</blockquote>
<blockquote>
<p>Thousands of businesses already entrust us with their security because we keep our customer's data secure</p>
</blockquote>
<blockquote>
<p>Our services are completely secure<br>
<cite>SagePay - <a href="http://www.sagepay.co.uk/support/online-shoppers/about-sage-pay">http://www.sagepay.co.uk/support/online-shoppers/about-sage-pay</a></cite></p>
</blockquote>
<p>There's even a certificate to prove it:</p>
<p><img src="https://paul.reviews/content/images/2015/02/3-1.PNG" alt="SagePay: Breaching PCI Compliance... intentionally."></p>
<p>While investigating another serious security breach at &quot;Office&quot;, a shoe retailer in London, I decided to run their PSP through the simplest of tests.</p>
<p><img src="https://paul.reviews/content/images/2015/02/1.PNG" alt="SagePay: Breaching PCI Compliance... intentionally."></p>
<p>At first glance, it appears the POODLE/SSLv3 exploit is the most dangerous flaw... but that's not necessarily the case here.</p>
<p><img src="https://paul.reviews/content/images/2015/02/2.PNG" alt="SagePay: Breaching PCI Compliance... intentionally."></p>
<p>A 56bit export cipher?!  That's not PCI compliant... it's not even close!</p>
<p><img src="https://paul.reviews/content/images/2015/02/tumblr_ndg4hjVaBn1s2tjzio1_400.gif" alt="SagePay: Breaching PCI Compliance... intentionally."></p>
<p>I tweeted SagePay on January 19th 2015 and within hours, I had the (interim) Head of Security on the phone to discuss it.</p>
<p>By the 22nd of January, the 56bit cipher had been removed and SagePay were (notwithstanding POODLE) PCI compliant.</p>
<h2 id="iftheyvefixeditwhatstheproblem">If they've fixed it, what's the problem?</h2>
<p>Well, just a few days later... the 56bit cipher returned!</p>
<p>On the 25th, I sent another message to the Head of Security asking why it had returned.  Although I can't share the exact reason why, I can say that it was <strong>entirely intentional</strong>.</p>
<p>I must be honest, I was disgusted to discover their lack of compliance, but the speedy response did help alleviate my concerns.  However, the fact they've knowingly reverted back demonstrates that quite apart from being a &quot;top priority&quot;, security doesn't appear to be particularly important to them.</p>
<p>It's now February 3rd and it's still not compliant...<br>
<a href="https://www.ssllabs.com/ssltest/analyze.html?d=live.sagepay.com">https://www.ssllabs.com/ssltest/analyze.html?d=live.sagepay.com</a></p>
<h2 id="whataboutpoodle">What about POODLE?</h2>
<p>Responsible firms patched out POODLE months ago.  SagePay are still lagging behind, so I raised the issue again on Twitter DM.</p>
<p><img src="https://paul.reviews/content/images/2015/02/6.PNG" alt="SagePay: Breaching PCI Compliance... intentionally."></p>
<p>Drum roll...</p>
<p><img src="https://paul.reviews/content/images/2015/02/sagepay_updated-1.PNG" alt="SagePay: Breaching PCI Compliance... intentionally."></p>
<h2 id="summary">Summary</h2>
<p>As a result of these issues, I'm working to move several companies &amp; local government accounts away from SagePay.  If you value the security of your customer payment data, I'd advise you do the same.</p>
<p>Don't forget to +1, retweet and share folks.</p>
</div>]]></content:encoded></item><item><title><![CDATA[Roboform Security Revisited: Lies, Deception & Misnomers.]]></title><description><![CDATA[6 months ago, I blogged about Roboform's shocking security.  Not much has changed since then.]]></description><link>https://paul.reviews/roboform-security-revisited-lies-deception-misnomers/</link><guid isPermaLink="false">59d4b6cd99cc4737934a1d6c</guid><category><![CDATA[aes]]></category><category><![CDATA[data]]></category><category><![CDATA[encryption]]></category><category><![CDATA[infosec]]></category><category><![CDATA[password manager]]></category><category><![CDATA[passwords]]></category><category><![CDATA[privacy]]></category><category><![CDATA[roboform]]></category><category><![CDATA[security]]></category><category><![CDATA[2fa]]></category><category><![CDATA[authentication]]></category><dc:creator><![CDATA[Paul Moore]]></dc:creator><pubDate>Thu, 22 Jan 2015 21:10:49 GMT</pubDate><media:content url="https://paul.reviews/content/images/2015/01/robo_ill_small-1.png" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://paul.reviews/content/images/2015/01/robo_ill_small-1.png" alt="Roboform Security Revisited: Lies, Deception & Misnomers."><p><img src="https://paul.reviews/content/images/2015/01/robo_ill_small.png" alt="Roboform Security Revisited: Lies, Deception & Misnomers."></p>
<p>You may recall, I recently published an article entitled &quot;<a href="https://ramblingrant.co.uk/how-secure-is-roboform-the-5-minute-challenge/">How secure is Roboform: The 5 Minute Challenge</a>&quot;.</p>
<p>Well, 6 months have passed and although there's been no official public response from Siber Systems, they have made a number of comments to journalists and customers by email/Facebook and support tickets; during which I've been labelled as &quot;misinformed&quot;, &quot;unpleasant&quot; and &quot;sarcastic&quot;.</p>
<p><img src="https://paul.reviews/content/images/2015/01/5.PNG" alt="Roboform Security Revisited: Lies, Deception & Misnomers."></p>
<blockquote>
<p>There were no bugs in the first place.<br>
<cite>Roboform on Facebook</cite></p>
</blockquote>
<p>Hmm.  They edited the post.</p>
<p><img src="https://paul.reviews/content/images/2015/01/6.PNG" alt="Roboform Security Revisited: Lies, Deception & Misnomers."></p>
<blockquote>
<p>Stick to factual articles.<br>
<cite>Roboform on Facebook</cite></p>
</blockquote>
<p>In both replies, you'll note a link to the HackerNews article which tried to debunk my claims.  Fortunately, The HackerNews pulled the article and replaced it with <a href="http://thehackernews.com/2014/07/critical-vulnerability-and-privacy.html">this</a>; something which <a href="https://twitter.com/scott_helme">Scott Helme</a> pointed out.</p>
<p><img src="https://paul.reviews/content/images/2015/01/7.PNG" alt="Roboform Security Revisited: Lies, Deception & Misnomers."></p>
<blockquote>
<p>Security is our number one priority and we are working to ensure that no vulnerability exists, as it has still yet to be confirmed<br>
<cite>Roboform on Facebook</cite></p>
</blockquote>
<p>So they couldn't replicate it, assumed it was inaccurate and publicly berated the researcher that reported it!  Charmin'!</p>
<p>A week later, Chris Gomez raised the issue again.</p>
<p><img src="https://paul.reviews/content/images/2015/01/4.PNG" alt="Roboform Security Revisited: Lies, Deception & Misnomers."></p>
<p>Although they <strong>still</strong> couldn't replicate it, they did at least release a patch.</p>
<p><img src="https://paul.reviews/content/images/2015/01/8.PNG" alt="Roboform Security Revisited: Lies, Deception & Misnomers."></p>
<p>Since then, it's been radio silence.  The &quot;Roboform Everywhere&quot; portal was still insecure, but that clearly wasn't going to change any time soon.</p>
<hr>
<h2 id="pokingthebear">Poking the bear</h2>
<p>A couple of days ago, a concerned Roboform user sent this:</p>
<p><img src="https://paul.reviews/content/images/2015/01/1.PNG" alt="Roboform Security Revisited: Lies, Deception & Misnomers."></p>
<p>Sigh.  Let's start over.</p>
<blockquote>
<p>RoboForm does not pass Master Password over any network<br><br>
RoboForm does not transmit any decrypted contents of the user data files (passcards/identities/safenotes) over any network.<br>
<cite>Olivia @ Roboform Support</cite></p>
</blockquote>
<p>I agree.  If you use the Roboform desktop application, the master password &amp; passcard data do not travel across the network.  That said, I never claimed they were.  The <a href="https://ramblingrant.co.uk/how-secure-is-roboform-the-5-minute-challenge">article</a> clearly states &quot;Roboform Everywhere Portal&quot; as opposed to the Roboform desktop application.</p>
<blockquote>
<p>These services are using SSL connection (https) for communication between the client (browser) and the server.<br><br>
When the user submits the Master Password to decrypt a file, the Master Password is submitted to RoboForm Everywhere server, the server performs the decryption, and the decryped data is transmitted back to the client.<br>
Even if the user selects to cache the Master Password, the Master Password still is not stored on server.<br>
<cite>Olivia @ Roboform Support</cite></p>
</blockquote>
<p>That's somewhat true.</p>
<h3 id="ssl">SSL</h3>
<p>Yes, they use SSL.  Unfortunately, it's SSLv3 and susceptable to the POODLE exploit, which is insecure.  They also use RC4, which is considered weak.  There's no forward secrecy, HSTS, pinning, elliptic curve crypto or indeed anything considered &quot;military grade&quot;, to use their phrase.</p>
<p><img src="https://paul.reviews/content/images/2015/01/2.PNG" alt="Roboform Security Revisited: Lies, Deception & Misnomers."></p>
<p>You'd have to be insane to <em>willingly</em> send your master password over a &quot;secure&quot; channel such as this... but what if it's not encrypted at all?</p>
<blockquote class="twitter-tweet" lang="en"><p><a href="https://twitter.com/Rambling_Rant">@Rambling_Rant</a> Paul, we believe we addressed this with you a while ago. Can you DM me with some details and we&#39;ll look into it again pls?</p>&mdash; RoboForm (@roboform) <a href="https://twitter.com/roboform/status/500344160751484928">August 15, 2014</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<p>For at least a week in August 2014, Roboform's Everywhere Portal sent data to/from their servers over HTTP!</p>
<p>No encryption, no hashing... nothing!  Just a few minutes before their reply though, the server miraculously started enforcing SSL (albeit insecure/weak).</p>
<p>Did they own up, admit their mistake and allow users to change their passwords?  Nope... they quietly patched it and presumably hoped nobody had noticed.</p>
<h3 id="sendingvsstoringthemasterpassword">Sending vs Storing the Master Password</h3>
<p>Assuming you've read the first article, you'll note I said</p>
<blockquote>
<p>Your master password is <strong>sent</strong> to Siber Systems<br>
<cite>Me - <a href="https://ramblingrant.co.uk/how-secure-is-roboform-the-5-minute-challenge/">here</a></cite></p>
</blockquote>
<p>I specifically used the word &quot;sent&quot; because it was completely at odds with Vadim's (CEO) statement.</p>
<p><img src="https://paul.reviews/content/images/2015/01/3.png" alt="Roboform Security Revisited: Lies, Deception & Misnomers."></p>
<p>As I've previously shown, it's not only sent to Siber Systems (which they now admit), but there's no hashing involved whatsoever.  On both counts, that's a lie.</p>
<p>Their paraphrased rebuttal of &quot;ok, but we don't store it&quot; is pretty weak, not to mention inaccurate.</p>
<hr>
<h2 id="whatsthedifference">What's the difference?</h2>
<p>Trust.</p>
<p>If you're sending the master password over any network, you have to trust it's being handled with care, every step of the way.  We already know the transport layer is horrendous... and that's what we can see; who knows what's going on behind the scenes.</p>
<p>Even with the best of intentions though, it's <strong>never</strong> as safe as simply not sending it in the first place.</p>
<blockquote>
<p>Even if the user selects to cache the Master Password, the Master Password still is not stored on server.<br>
Instead, two strings are derived from it; the first string is stored on the server, the other in a browser cookie.<br>
<cite>Olivia @ Roboform Support</cite></p>
</blockquote>
<p>To derive two keys from the master password, the server <strong>must</strong> have the master password to begin with.  At the very least, this is <strong>stored</strong> in server memory until the key derivation process is complete.</p>
<p>Let's assume they discard the key <strong>immediately</strong> after key derivation.  The only way to recover it is to combine the 1st derived key (already on the server) with the 2nd key (stored in the user's browser as a cookie).</p>
<p>As each requests comes in, those keys are once again combined to encrypt/decrypt your passwords.</p>
<hr>
<h2 id="whydotheyclaimtheydontstoreitiftheydo">Why do they claim they don't store it, if they do?</h2>
<p>I can only assume they mean it's not stored after your session ends.</p>
<p>That doesn't alter the fact that at some point, your master password and/or the keys derived from it reside on the server.</p>
<p>Discarding them at the end of the session doesn't negate the fact they're accessible to the server, during the session.</p>
<blockquote>
<p>You see, Paul Moore &quot;discovered&quot; the #2 (which has never been a secret), and somehow wants to apply it to #1<br>
<cite>Olivia @ Roboform Support</cite></p>
</blockquote>
<p>That's disingenuous too.</p>
<p>I have never confused the two variants... but when they say &quot;Roboform never sends your master password&quot;, users are likely to see &quot;Roboform&quot; as an umbrella term describing any product which bears the name.  Even if they spot the difference and research it further (as I did), they're likely to find Vadim's quote and assume &quot;the master password is <strong>NEVER</strong> sent to the server&quot;.</p>
<p>It may not be a secret, but it's far from clear either.</p>
<blockquote>
<p>Another message in the article is that #2 is not secure enough because of decryption on the server.<br>
I would say it is still secure because of SSL connection<br>
<cite>Olivia @ Roboform Support</cite></p>
</blockquote>
<p>HTTP, SSLv3 and RC4.  Need I go on?</p>
<hr>
<h2 id="multifactorauthentication">&quot;Multi-Factor Authentication&quot;</h2>
<p>In September 2014, Siber Systems announced what they call &quot;<a href="http://www.roboform.com/blog/multifactor-authentication">Multi-Factor Authentication</a>&quot;.</p>
<p>As we know, <a href="https://ramblingrant.co.uk/password-managers-facts-fallacies-fud/">2FA in a PW manager is not possible</a>, but they've given it a shot...</p>
<p><img src="https://paul.reviews/content/images/2015/01/2014_08_mf_3.png" alt="Roboform Security Revisited: Lies, Deception & Misnomers."> <img src="https://paul.reviews/content/images/2015/01/excuse-me-what-is-this-fuckery.gif" alt="Roboform Security Revisited: Lies, Deception & Misnomers."></p>
<p>An OTP by email?! <strong>THAT'S NOT 2FA!</strong></p>
<p>There are 3 factors.</p>
<ol>
<li>Knowledge (something you know - passwords, PINs etc)</li>
<li>Possession (something you have - a smart card, yubikey etc)</li>
<li>Inherence (something you inherently are - fingerprint, iris/retina etc)</li>
</ol>
<p>Your password combined with a PIN number sent by email are multiple steps of a <strong>single</strong> factor, or 2SV.  Don't take my word for it... even <a href="http://csrc.nist.gov/publications/nistpubs/800-63-1/SP-800-63-1.pdf">NIST agrees (section 6.1.4)</a>.</p>
<p>I emailed Natalie Pinto @ Siber Systems to ask for their comment.</p>
<blockquote>
<p>Anyway, let me provide a few more details that may help.<br><br>
The OTP is only used once to register the device.  We don't require that the user enter the OTP each time they access their Everywhere account.  We drop a software token on the device based on the successful recognition of the OTP.  So, the software token is &quot;something you have.<br>
We plan to add SMS as a delivery method for user's OTPs.<br>
I looked at Wikipedia and saw that Soft tokens can be used as a multifactor option.<br>
<cite>Natalie Pinto @ Roboform Support</cite></p>
</blockquote>
<p>An OTP via SMS isn't 2FA either.</p>
<h2 id="summary">Summary</h2>
<p>Don't get me wrong, I wasn't expecting to be on Siber's Christmas card list, but I think the way they've handled these issues is disgraceful.</p>
<p>When it comes to choosing a password manager, trust is everything.  Although Roboform (the desktop/mobile app) is undoubtedly more secure now, I wouldn't trust it with any personal information, let alone the keys to my digital life.</p>
<p>That's it folks.</p>
</div>]]></content:encoded></item><item><title><![CDATA[Immobilise: Police Security Initiative Exposes 28 Million Records.]]></title><description><![CDATA[If you're one of the 4.2 million users with property listed on Immobilise, you may be at higher risk of burglary.]]></description><link>https://paul.reviews/immobilise-police-security-initiative-exposes-28-million-records/</link><guid isPermaLink="false">59d4b6cd99cc4737934a1d6b</guid><category><![CDATA[security]]></category><category><![CDATA[theft]]></category><category><![CDATA[immobilise]]></category><category><![CDATA[burglary]]></category><category><![CDATA[stolen]]></category><category><![CDATA[DOR]]></category><category><![CDATA[direct object reference]]></category><category><![CDATA[police]]></category><category><![CDATA[nmpr]]></category><category><![CDATA[checkmend]]></category><category><![CDATA[sslv3]]></category><category><![CDATA[poodle]]></category><dc:creator><![CDATA[Paul Moore]]></dc:creator><pubDate>Tue, 06 Jan 2015 00:00:00 GMT</pubDate><media:content url="https://paul.reviews/content/images/2015/01/immobilise_small-1.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://paul.reviews/content/images/2015/01/immobilise_small-1.jpg" alt="Immobilise: Police Security Initiative Exposes 28 Million Records."><p><img src="https://paul.reviews/content/images/2015/01/canstock14717279-1.jpg" alt="Immobilise: Police Security Initiative Exposes 28 Million Records."></p>
<p><strong>05/01/2015:</strong><br>
Recipero, the company behind Immobilise, NMPR and CheckMEND have now mitigated this risk by limiting access to the &quot;/verify&quot; &amp; pdf generation pages to only authorized users.  You're no longer able to view records which you do not own, so although it's undoubtedly more secure, the inability to verify the authenticity of a certificate appears to render this process pointless.</p>
<p>This exploit is known as a direct object reference, though I colloquially refer to it as the &quot;open DOR&quot; attack to signify the ease at which it can be detected &amp; exploited.  Immobilise isn't the first site to be vulnerable to such an attack, but it's first I've seen which appears to be built around this flawed principle.  If this technique meets &quot;secured by design&quot; criteria, you have to question <a href="http://arstechnica.com/security/2014/12/sites-certified-as-secure-often-morevulnerable-to-hacking-scientists-find/">how reliable this (or indeed any) trustmark really is</a>.</p>
<p>The POODLE/SSLv3 exploit at both NMPR and CheckMEND has also been resolved, with both scoring a healthy &quot;A&quot; at Qualys.  Perhaps ironically, some forces are now unable to access the site because Internet Explorer (as shipped with Windows XP) is only able to use insecure protocols (SSLv3).  It's now the responsibility of the affected forces to ensure their software meets current standards.</p>
<hr>
<p><img src="https://paul.reviews/content/images/2015/01/both1.jpg" alt="Immobilise: Police Security Initiative Exposes 28 Million Records."></p>
<blockquote>
<p>&quot;Immobilise can be used by members of the public and businesses to register their valued possessions or company assets, and exclusive to Immobilise all account holders registered items and ownership details are viewable on the Police national property database the NMPR. <a href="https://www.immobilise.com">https://www.immobilise.com</a>&quot;</p>
</blockquote>
<p>With an estimated 4.2 million users and 28 million records, the UK's National Property Register is the largest site of its kind; supported by central government, the mobile phone industry and every police force in the UK.</p>
<p>Unfortunately, it's also a veritable goldmine for burglars.</p>
<p>Quite apart from being &quot;secured by design&quot;, Immobilise is quite happy to hand over its information to anyone, if you ask nicely.</p>
<h2 id="howdoesitwork">How does it work?</h2>
<p>Christmas is over and you're stuffed to the gills with turkey.  What better way to relax than sit in front of your new 50&quot; 3D TV and watch Moonraker, <em>again</em>.</p>
<p>But, you're back to work next week and your precious TV will be left unattended at home.  If it's stolen, reporting the theft to Immobilise can increase the likelihood of its safe return.  Once you've registered your device, you're given a certificate of ownership.</p>
<p>To download your certificate, you're given a link which looks something like this.<br>
<a href="https://www.immobilise.com/pdf.php?stage=account&amp;certificate=7161519&amp;user=3714932">https://www.immobilise.com/pdf.php?stage=account&amp;certificate=7161519&amp;user=3714932</a></p>
<p><img src="https://paul.reviews/content/images/2015/01/proof1.PNG" alt="Immobilise: Police Security Initiative Exposes 28 Million Records."></p>
<h2 id="howisitvulnerable">How is it vulnerable?</h2>
<p>To understand what's going on, let's take a closer look at the certificate.</p>
<p><img src="https://paul.reviews/content/images/2015/01/cert_meta.jpg" alt="Immobilise: Police Security Initiative Exposes 28 Million Records."></p>
<p>An attacker wouldn't know the &quot;User ID&quot; or &quot;Certificate ID&quot;, so it's safe, right?</p>
<p>Far from it!  The numbers aren't random, they're sequential, thus deterministic.  If the last certificate number is 7161519, the next is 7161520 and so on.  However, if someone happens to add another item to their account before you, your next number is 7161521.</p>
<p>By simply looping through every combination, it's possible to collect all 28+ million entries.</p>
<p>That's quite a nice shopping list for a would-be burglar!  They'll know your name, home address, telephone number(s), email address, the make/model of your item, any identifying factors (serial numbers, IMEIs, unique marks etc) and even how much it's worth!  Sure, it'll take some time and you're bound to hit a rate limiter along the way, but even if it takes a day/week/month, it's worth the wait.</p>
<p>Like you, I presumed this was a vulnerability and followed the usual responsible disclosure procedures.  I sent this issue, along with several others to Les Gray (COO @ Recipero) in 2013.  The most critical issues were patched very quickly; Les couldn't have been more helpful.</p>
<p>However, this particular issue still remains.  In the last 48hrs, I realised this was actually intentional!</p>
<p><img src="https://paul.reviews/content/images/2015/01/proof2.PNG" alt="Immobilise: Police Security Initiative Exposes 28 Million Records."></p>
<p>If you hand over a certificate to the police or your insurance company, they can use this page to confirm its authenticity.</p>
<h2 id="whatshouldido">What should I do?</h2>
<p>Report it to the <a href="https://ico.org.uk/">Information Commissioner's Office</a> and delete your account immediately.</p>
<p>Had this been a simple vulnerability, that'd probably be overkill (though justified).  As it's &quot;by design&quot; and mindful of the other issues which I can't disclose... the benefits just don't outweigh the risks.</p>
<h2 id="irecentlyjoinedimmobiliseandivebeenburgledisthistoblame">I recently joined Immobilise and I've been burgled, is this to blame?</h2>
<p>It's possible, but <strong>very</strong> doubtful.</p>
<h2 id="isthedatasecureonceitreachesthepolice">Is the data secure once it reaches the Police?</h2>
<p>Immobilise is the public-facing area of the system, so it's quite easy to carry out some basic checks.</p>
<p>The NMPR (National Mobile Property Register) is the Police National database for stolen property, directly fed by Immobilise data.<br>
<img src="https://paul.reviews/content/images/2015/01/nmpr.PNG" alt="Immobilise: Police Security Initiative Exposes 28 Million Records."></p>
<p>Unfortunately, they haven't bothered patching out POODLE/SSLv3...<br>
<img src="https://paul.reviews/content/images/2015/01/nmpr_qualys.PNG" alt="Immobilise: Police Security Initiative Exposes 28 Million Records."></p>
<p>Mindful of the government's propensity for using Windows XP and other archaic technology, it's entirely possible their credentials are travelling over the transport layer using insecure encryption.  This system (and the sister site, CheckMEND) contain over 150 billion records. No, that's not a typo.</p>
<p>In case you're wondering, CheckMEND is also vulnerable to POODLE/SSLv3.<br>
<img src="https://paul.reviews/content/images/2015/01/checkmend_qualys.PNG" alt="Immobilise: Police Security Initiative Exposes 28 Million Records."></p>
<h2 id="summary">Summary</h2>
<p>This is sadly one of those occasions when there's very little you can do to protect yourself.  It uses HTTPS, it's backed by every UK police force and sports a plethora of padlocks &amp; security trustmarks; there's no outward sign whatsoever that you're about to put your home at risk.</p>
<p>The moral of this story is two-fold.</p>
<ol>
<li>Always be careful of what information you share on the web.<br>
and</li>
<li>Take trustmarks, padlocks and privacy policies with a pinch of salt.  Even something which looks secure can be wide open to abuse.</li>
</ol>
<p><img src="https://i.imgur.com/h8nVQfj.gif" alt="Immobilise: Police Security Initiative Exposes 28 Million Records."></p>
</div>]]></content:encoded></item></channel></rss>