The macosxhints Forums

The macosxhints Forums (http://hintsforums.macworld.com/index.php)
-   The Coat Room (http://hintsforums.macworld.com/forumdisplay.php?f=8)
-   -   Can mac users be spied on using PROMIS software? (http://hintsforums.macworld.com/showthread.php?t=84623)

macuserhere 01-20-2008 10:07 AM

Can mac users be spied on using PROMIS software?
 
I've read this article about PROMIS software and this made me concerned:

http://users.cyberone.com.au/myers/bugs.html

Quote:

Newer computer operating systems have "background housekeeping". This means that, at times, the computer will do things you didn't tell it to, such as building indexes. But it could also be performing surveillance on you.

Windows, from 95 up, is bugged. This means that it contains a trapdoor, and the NSA has a key: http://www.heise.de/tp/english/inhalt/te/5263/1.html.

To probe this further, search for "windows NSA key" in a search engine.

Not only Windows, but all newer OS may be bugged.

A Mac expert informed me that the Mac OS is bugged from version 9 up. A Unix expert informed me that Unix is probably bugged too - even Open Source Unix. It would be possible to bug it because it's so complex, and written in the cryptic language "C".

Don't trust encryption; and back up your OS & data regularly.

How Big Brother can keep info on your computer: http://www.phaster.com/unpretentious/browsing.html.

But for better protection, switch to Mac or Unix - Department of Homeland Security Standardizes on Mac OS 10 (X): http://db.tidbits.com/getbits.acgi?tbart=07616.
I'm not really into conspiracies and never thought much of people who said that Windows was designed to become popular so that the government could spy on you. I thought they were exaggerating and being paranoid.

But after reading this and having things spelled out how this PROMIS software works, I realize they are right.

Where does that leave mac users? The article says that mac users can be spied on too: those using Mac OS 9.0 up ..... and then it says for better protection switch to mac (or unix)???

Does anyone have the dirt or insider's information or expert opinion on this?

cwtnospam 01-20-2008 10:22 AM

It could be true, but I doubt it. The thing about secrets is that they tend to be exposed over time. This secret, if it were to be effective, would have to be known to a significant number of government employees over a significant period of time. Eventually, one or more would attempt to use the information to their benefit, and any back door would be exposed.

I think it's more likely that governments pay close attention to known vulnerabilities and they may develop ways to exploit them for their purposes.

macuserhere 01-20-2008 10:31 AM

They openly admit it. Microsoft AND MACINTOSH. Read this article:

http://www.washingtonpost.com/wp-dyn...010801352.html

Quote:

Other software makers have turned to government agencies for security advice, including Apple, which makes the Mac OS X operating system. "We work with a number of U.S. government agencies on Mac OS X security and collaborated with the NSA on the Mac OS X security configuration guide," said Apple spokesman Anuj Nayar in an e-mail.
And it's LEGAL too or it's about to be made legal.

Illegal spying about to be made legal

NSA spying argued in court hearing

Look at all the links about "NSA and Windows":
Search "Microsoft" "Spying" "NSA"

Another article:
Why NSA computer spying puts Americans in danger

NSA and Microsoft worked together on Windows Vista security

There are tons of articles on this.

Now we know Microsoft Windows and Vista are compromised (99% certain).

What about the status of Macintosh?

I don't care about Windows; I don't use it much, but I use Macintosh all the time.

This is scary.

This book by Ben-Menashe came out in 1992. So the secret about PROMIS software has been known since then. I bet you though the government has done nothing about it.

For all we know, all of our computers can be linked to this PROMIS software (through the operating systems) and we have been spied on for years and years - not just by the US government but by Israel.

I believe this PROMIS software still is in place.

cwtnospam 01-20-2008 11:12 AM

Collaborating with the NSA on the Mac OS X security configuration guide is a long way from installing a back door for the NSA.

Assume Apple did install a back door for the NSA. What would happen? First, there would need to be a number of NSA and Apple employees who know about the back door. This number would need to grow well beyond the initial few who devised it, if the back door were to be used.

Ever hear of Area 51? It's a super secret facility that the government denied existed. It's in the desert. In the middle of nowhere. Everybody knows it's there. The same thing would happen with a back door, only worse. At Area 51, armed guards authorized to kill are able to keep everyone literally miles away from the base. With an OS, everyone has access to it. No one can stop you from examining every byte if you've got the expertise, the time, and the inclination. There are lots of people who are looking for ways into lots of operating systems, and if they thought there might be a back door, they'd look for one. If there was one, they'd find it.

macuserhere 01-20-2008 11:34 AM

They found it with Windows and it was even named appropriately NSAkey or something like that. It's in one of the links. Microsoft denies that that has anything to do with it and say the "NSA" part refers to it being "NSA-approved". Do you believe that?

I'm wondering if someone who is computer-savvy has found something similar with Macintosh or is it a case of not wanting to tell even if they know?

The writer of the article in the OP has asserted that they have also put this backdoor into macintoshes, not just Windows-based PCs.

The article talks quite in detail about Area 51 actually.

Please read the article in the OP before commenting because the article lays it all out how this PROMIS software has 'infected' everything. I don't know much about computers at all but this article certainly has me worried.

I just quickly checked "Promis" in Search and found that the company is still going strong. This means the PROMIS software is still in use.

It seems 'they' have even killed people over this; in the article it says an investigative reporter who was investigating the Inslaw case and the government connections mysteriously died. Also Maxwell mysteriously died. It seems the lawyer who was representing Hamilton got off very lightly when he was retired by his law firm and paid off to not work on this case.

Those 'tin-foil hat-wearers' were right all along! We are being spied on through our computers.

cwtnospam 01-20-2008 11:50 AM

I'm not saying that the NSA isn't comprised of a bunch of jack booted brown shirts. I'm just saying that putting a back door in an operating system isn't the best way to go about spying on people. It's more likely to backfire than accomplish any of their goals.

macuserhere 01-20-2008 11:54 AM

How would it backfire? It seems like they have been doing it for decades and now they have made it legal and this applies retrospectively too.

What is a better way of spying on people except to read their electronic communications: emails, history of browsing, everything else that you do on a computer?

The article shows how beneficial the PROMIS was in tracking people's movements just by looking at their payments of electricity bills, phone usage etc ... you would get a whole lot of useful information as well by looking directly at the target's computer.

This information came out in 1992 when Ben-Menashe's book came out. There were no repercussions as far as I know. Things continued on as usual. Some people caught it and mentioned it on messageboards. I read these postings but dismissed them as they weren't fleshed out - they were just posted as rumors. Now that I have read the article and read some relevant links, I can see the evidence for myself that there is a lot of substance to the rumors.

And a computer EXPERT has found the backdoor and confronted Microsoft with it. It's in one of the links. Microsoft continues to deny it however.

cwtnospam 01-20-2008 12:01 PM

It would backfire for many reasons and in many ways. The NSA isn't immune to political realities, nor are its computers 100% free of vulnerabilities. A backdoor found in commercial operating systems would mean that government computers could be compromised easily and stealthily if the information got into the wrong hands.

You don't need a backdoor to read emails, bills, credit card information, etc. All you need is a court order, and that is risk free.

macuserhere 01-20-2008 12:05 PM

Government computers ARE compromised. There was the news recently that a hacker hacked into the computers controlling an electric grid somewhere. This is only the tip of the iceberg. Did you read the whole article? It's not just the USA, it's the whole WORLD that's being spied on, these PROMIS-infected computers are everywhere; the writer claims it's one of the things that brought down the Soviet Union or something like that.

And no you don't need a court order anymore. Did you read the link where it says they have legalized the computer spying? And made it legal retroactively?

The "Enemy of the State" movie was not 'fictional'; it's been 'fact' for a long time now.

Here is another article about NSA and the trapdoor built into Windows:

http://www.heise.de/tp/r4/artikel/5/5263/1.html

Quote:

Duncan Campbell 04.09.1999


How NSA access was built into Windows


Careless mistake reveals subversion of Windows by NSA


A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA "help information" [local] trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.

The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.

[..]
A second key

Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4, [extern] Service Pack 5. He found that Microsoft's developers had failed to remove or "strip" the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called "KEY". The other was called "NSAKEY".

[.....]

A third key?!


But according to two witnesses attending the conference, even Microsoft's top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was "stunned" to learn of these discoveries, by outsiders.
[...]

"How is an IT manager to feel when they learn that in every copy of Windows sold, Microsoft has a 'back door' for NSA - making it orders of magnitude easier for the US government to access your computer?" he asked.

....MORE
WHO IS BEHIND THE THIRD KEY?

At the end of the article they say they were lucky to find the key in time because the next batch of computers put out by Microsoft makes it impossible to find these backdoors.

Here is the article in the OP again:

http://users.cyberone.com.au/myers/bugs.html

Quote:

Bugged Computer Software - Ari Ben-Menashe - Peter Myers; date October 26, 2000; update June 28, 2004.

You are at http://users.cyberone.com.au/myers/bugs.html.

(1) Ari Ben-Menashe, Profits of War: The Senational Story of the World-Wide Arms Conspiracy (2) Bin Laden given PROMIS software? (3) PROMIS incident number: 887890

(1) Ari Ben-Menashe, Profits of War: The Senational Story of the World-Wide Arms Conspiracy, Allen & Unwin, Sydney 1992.

The author, Ari Ben-Menashe, was an Israeli intelligence officer; Rafael Eitan was a counterterrorism adviser to Menachem Begin. This book broke the Iran Contra scandal, but was ignored by the media. It also describes the capture of Mordecai Vanunu, beginning with his approaching the Sydney Morning Herald about his secret photos; that newspaper, instead of scooping the story, contacted ASIO (Australia's equivalent of the CIA). Ari Ben-Menashe is lucky to be alive. The extracts below describe the development of bugged computer software, and how Israel helped to bring down the USSR with it.

{p. 129} One of Eitan's pet projects was an anti-terrorist scheme involving a sinister, Big Brother-like computer program named Promls. It was through Eitan that I became involved in it. This was not Joint Committee work, per se, but many of the same people who worked on our arms-to-Iran operation worked on Promls also. The most prominent of these was British medla baron Robert Maxwell, who made a fortune out of it. Through some of his companies, the Israelis and the Americans were eventually able to tap into the secrets of numerous intelligence networks around the world - including Britain, Canada, Australia, and many

{p. 130} others - and set into motion the arrest, torture, and murder of thousands of lnnocent people in the name of "antiterrorism."

The frightening story of the Promis program begins in the United States in the late 1960s when communications expert William Hamilton .... MORE ..............
Look these people aren't fooling around or trying to play nice; if you read the whole article, you will see that people who have come too close to uncovering this or have been involved in some other way have mysteriously died. This is a high-stakes game. The PROMIS software is an invaluable tool for certain parties.

NovaScotian 01-20-2008 01:31 PM

Just another wedge inserted as big brother pries open the door to your privacy the better to watch over you. There was a lot of discussion about the requirement for a "back door" when modern methods of encryption became impossible to break in reasonable time spans. For a while anyway, PGP could not be exported, not even into Canada. I suspect the ban on exporting it was lifted when the backdoor was installed to NSA's satisfaction. It's been there for quite a while, in other words. Why the sudden shock and awe?

macuserhere 01-20-2008 07:55 PM

The sudden shock and awe for me at least is because I haven't come across concrete evidence for this before now. Just rumor and conjecture. As I've said I'm pretty ignorant about computers so don't keep up with the latest news. Also I thought macintosh was safer or above doing this sort of thing. Everyone knows how popular Windows has been relative to mac. If I had come across proof that Windows had been working hand in hand with the NSA it wouldn't be as shocking, but I also find that mac (and linux) are in the same boat i.e. operating systems are vulnerable to being spied on; and that mac (anyway, don't know about linux) has been actively working with the NSA in developing this backdoor. I thought mac was more independent, more lone wolf guy, anti-government canoodlling ...

... It makes a lot of sense to me now what's been happening; things like Microsoft making big inroads to China; remember the meeting between Gates and the President of China? They want to spy on the Chinese as well and it looks like they can.

And I had a quick search in the forums here for PROMIS and found no posts or threads about it. Mine is the first. So if this is so well-known and there is no need for shock and awe, where are the messages about it? I would have thought if this was to be discussed on the net, it would be on a messageboard like this one.

Anyway this thread is a kind of a warning as well as an attempt to dig out more information from 'insiders' or those not connected but knowledgeable about this - I'm looking for a "Yes, this is true; this is how the NSA spies on you; Windows has the NSAKEY and mac has ......." or "We've been aware of Ben-Menashe's claims since they came out and this is where mac stands on the issue ..."

Now I'm beginning to think mac is somehow deep up to its elbows in collaborating with the NSA in enabling it to access people's computers through the backdoor/trapdoor or whatever you want to call it. The reason? I don't know why. Maybe they were 'persuaded' to do so or they wanted to 'help' them out.

It's good to air this and let everyone know what's going on especially as there is information straight from the horse's mouth on this available on the net: see the link in the OP.

What is surprising to me is the LACK of shock and awe over this. I've only come across mutterings about this before; one-line statements that Windows allows the government to spy on you, that's all ... this is the first time I've seen the story about this all laid out.

Also I wanted someone to explain the ambiguous message quoted in the OP about macs where it says macs can be spied on and then it says macs are safer ... this part is confusing to me; the writer seems to contradict himself there a little.

cwtnospam 01-20-2008 08:10 PM

Quote:

Originally Posted by macuserhere (Post 444058)
I'm looking for a "Yes, this is true; this is how the NSA spies on you; Windows has the NSAKEY and mac has ......."

You're not likely to get it. Just a guess, but NSAKEY sounds like a Registry entry. Anyone could make one, and it doesn't necessarily mean that the PC is compromised. As for the Mac, if there is a back door and somebody finds it, my guess is you'll hear about it as the first true Mac virus. Soon after that, Apple will close the hole.

fazstp 01-20-2008 08:13 PM

As far as the OP Ari Ben-Menashe doesn't exactly look like a reputable source.

cwtnospam 01-20-2008 08:29 PM

Quote:

Originally Posted by macuserhere (Post 444058)
Also I wanted someone to explain the ambiguous message quoted in the OP about macs where it says macs can be spied on and then it says macs are safer ... this part is confusing to me; the writer seems to contradict himself there a little.

As far as that's concerned, you can never prove that any system is 100% secure, partly because they aren't, and partly because you can't prove a negative. You can't prove that something can't be broken into.

In a sense, he's correct if there is no back door. Macs are safer than PCs, but that certainly doesn't make them 100% safe, so it's possible that somebody could be spying on Mac users through their computers. Likely? I don't think so. Remember that for this back door to be useful, they'd also need back doors for every router performing NAT, as well as a way to disable applications like Little Snitch. The degree of difficulty seems likely to exceed any potential benefits. Not that logic would get in the way of such an effort. ;)

EatsWithFingers 01-20-2008 08:39 PM

Hmm...
 
I am not one for conspiracy theories, so I want to add my cynical 2¢:

Quote:

It would be possible to bug it because it's so complex, and written in the cryptic language "C".
The code base may be large, but it is likely to be relatively easy to determine the bits which would be relevant to the 'trap-door'. Especially for people involved in security companies who search for flaws in their day-to-day work.

Quote:

The US government is currently making it as difficult as possible for "strong" crypto to be used outside of the US.
I realise that there are indeed restrictions on the strength of cryptographic algorithms which can be exported. It typically enforces a maximum key-length (e.g. 256 bits).

However, to encrypt something with 1024 bit strength, you simply have to chain four encryptions together (with four different keys). That is, encrypt data with key 1, encrypt result with key 2, encrypt that result with key 3, and encrypt that result with key 4. Result has effectively been encrypted with a 1024 bit key*.

* this assumes the intermediate results have no discernable structure. If they did, then the resulting strength would only be equivalent to four times the original key length (e.g. using a 258 bit key instead of a 256 bit key).

This chaining is exactly how TripleDES works - an encryption, followed by a decryption, and then a final encryption. And DES has no backdoor (although people did suggest this was possible when it was invented, it has been analysed in great detail by a lot of people and shown to contain a number of steps which make cracking it very difficult, and moreover does not contain a backdoor).


Quote:

By dialing into the central computer of any foreign intelligence agency using Promis, an Israeli agent with a modem need only type in certain secret code words to gain access.
So we are to assume that the foreign intelligence agency allows arbitrary access to its systems from any computer...? And even if it were that case, the fact that the 'back-door' seems to rely on a single hidden key (i.e. the password) and that key is known (it's the one in the DLL*), everyone should be able to access everyone else's computers.

Correct me if I'm wrong, but this hasn't happened yet!

And changing the DLL (or rather the second key in the DLL) would close the 'trap-door'.

*another caveat: if the key in the DLL is the encrypted password, for example, then the computer being accessed has to either encrypt the password typed in, or decrypt the stored one. Both require use of the same key, and that key has to be stored on the computer. But the real killer is that the encryption/decryption has to be by the computer being accessed. Since the majority of computers don't have "hardware security modules" (although some now do courtesy of the Trusted Platform Group), their memory contents can be read at all times and thus it would be possible to discover the secret key.

Then there's the issue of network traffic. For the backdoor to work (if it even exists) the computer has to be connected to the Internet. And internet traffic can be analysed (at the very least to detect 'suspicious' traffic).

I cannot believe that every piece of software or hardware that can analyse network traffic has been developed to ignore traffic sent using this 'backdoor'.

Basically, I am saying that if such a back-door existed, enough is known to actually use it, and using it could be trivially detected.


Quote:

For example, if a person suddenly started using more water and more electricity and making more phone calls than usual, it might be suspected he had guests staying with him. Promis would then start searching for the records of his friends and associates, and if it was found that one had stopped using electricity and water, it might be assumed, based on other records stored in Promis, that the missing person was staying with the subject of the investigation.
Current developments in automatic utility metering are specifically intended to prevent the utility company from being able to learn 'private' information such as normal usage patterns, and therefore prevent them from determining when current usage is not normal (e.g. when a guest is staying).

DeltaMac 01-20-2008 08:45 PM

The most likely backdoor is the PROMIS software itself, (and not the operating system). That would use the internet for its database access, and backdoors could easily be part of the design of _that_ software. Isn't that what those articles are all about? (especially the paranoia part, eh?)

macuserhere 01-20-2008 09:03 PM

You're right. Two backdoors: the first backdoor is the one built into the operating system. This backdoor allows the NSA to spy on you. Then there is the second backdoor built right into the PROMIS system itself. This enables anyone with a key to the backdoor to spy on the spooks (NSA) themselves.

That's the bigger implication: the NSA and by default ALL US government agencies including the Defense department etc can be spied on by a third party who has access to the keys. These are the people who developed the software from the start.

But a third key was found in the Windows OS; whoever has access to this third key can spy on Windows users. You can bypass the NSA altogether if you have access to the keys and directly spy on computer-users.

Why hasn't the government done a thorough clean-out and removed the PROMIS software now that they know it's not secure? What they're doing instead is spreading the breach of security to individual users of computers and the internet.

Paranoia? Do you believe the NSA when it says that it is only helping Apple and MS systems be more secure against spying by lending them a hand?

Why would a spy agency have an interest in making individual users' computers more secure against spying?

It's like expecting a robber to help you make your house more secure against robbery by telling the robber the location of your safe and the lock combination and asking them to set a new combination for it.

EatsWithFingers:

Quote:

Basically, I am saying that if such a back-door existed, enough is known to actually use it, and using it could be trivially detected.
I hope you're right. This does make sense to me.

DeltaMac 01-20-2008 09:26 PM

Quote:

Originally Posted by macuserhere (Post 444084)
Paranoia? Do you believe the NSA when it says that it is only helping Apple and MS systems be more secure against spying by lending them a hand?

Why would a spy agency have an interest in making individual users' computers more secure against spying?

It's like expecting a robber to help you make your house more secure against robbery by telling the robber the location of your safe and the lock combination.

Well, yes, that's one of the good techniques for making your system(or your house) more secure - you hire someone who knows where the insecure areas are... right?
So, yes, I would believe the NSA (on that point). Leaving trapdoors that can't be detected by any means? That's a huge stretch with today's network security tools. (even a huge leap for paranoia to put any belief in every freak who wants to post a blog on the internet). I mean, if you can't trust your own government agencies, who can you trust? ( :D ) Anyway, if you must have an attitude, try something other than paranoia - (they'll come after you if you do that, you know!)

ThreeDee 01-20-2008 09:30 PM

Wow. All I have to say is: Woah. Calm down.

This reminds me of the conspiracy saying that men really didn't land on the moon and only made doctored photos and videos to show everyone.

Do some more research.

Quote:

Other software makers have turned to government agencies for security advice, including Apple, which makes the Mac OS X operating system. "We work with a number of U.S. government agencies on Mac OS X security and collaborated with the NSA on the Mac OS X security configuration guide," said Apple spokesman Anuj Nayar in an e-mail.
The NSA did not program OS X. They merely wrote, as the article says, a security configuration guide to configure your firewall/user accounts/etc. You can read it here:
http://www.nsa.gov/snac/downloads_ma...ID=scg10.3.1.1

The PROMIS software is NOT any form of malware. It's a encrypted database system developed by Inslaw software that the government uses to protect top-secret documents.

NSAKEY is indeed just a simple registry entry, like the hundreds of other entries listed there.

Also, Ari Ben-Menashe is a complete liar:
http://en.wikipedia.org/wiki/Ari_Ben-Menashe

Yes, it is from Wikipedia, but all of the sources are cited on the bottom. You can verify the article yourself, if you want.

DeltaMac 01-20-2008 10:01 PM

"spinner of tangled yarns" - yeah, that seems right!

macuserhere 01-20-2008 10:29 PM

Ben-Menashe is not a complete liar. I don't see it as black and white. Many of his claims have checked out: see Vanunu, Maxwell, Iran-Contra etc.

Anyway this is turning into a political argument which it wasn't intended to be ... I just wanted to know how secure the computer system is for macs. It looks like it's a case of backing the data up and being aware that anyone can spy on your computer if you use the internet.

And I believe man landed on the moon :)

fazstp 01-20-2008 10:52 PM

oops, what happened? Sorry wrong thread for some reason.

ArcticStones 01-21-2008 05:39 AM

.
As I recall, the NSA has publicly posted a number of excellent guidelines to system security. (You’re welcome to search and download those.)

I do not have an inbred trust of government agencies, particularly those dealing in the intelligence field. However, in this instance I am actually inclined to believe that the NSA’s involvement is benevolent.

Why? A vast number of American companies are, in one way or another, involved as providers to the military sector. The NSA has a vested interest in keeping those systems secure.

Which means closing, rather than opening, back doors.

What ThreeDee writes seems to confirm that.

-- ArcticStones
.

Mikey-San 01-21-2008 06:41 AM

Quote:

written in the cryptic language "C"
This is the stupidest thing I have read in weeks, period.

I won't get into the NSA debate, since that's all over the Internet, but C is not some kind of impenetrable cryptic construct. Typical conspiracy theorist stuff, taking one or two pieces of disturbing truth and then freaking out like a defective toy robot.

I'd love to see the inside of this guy's apartment. I wonder how many deadbolts are on his door.

http://content.imagesocket.com/image...oil_hat2a8.jpg

ArcticStones 01-21-2008 06:49 AM

.
Macuserhere, one little matter of protocol: Unless these articles are public domain, they should not be quoted at such length. Rather, copyright material should be linked to, summarised, and/or quoted briefly.

:) ArcticStones

macuserhere 01-21-2008 08:42 AM

Quote:

Originally Posted by ArcticStones (Post 444164)
.
As I recall, the NSA has publicly posted a number of excellent guidelines to system security. (You’re welcome to search and download those.)

I do not have an inbred trust of government agencies, particularly those dealing in the intelligence field. However, in this instance I am actually inclined to believe that the NSA’s involvement is benevolent.

Why? A vast number of American companies are, in one way or another, involved as providers to the military sector. The NSA has a vested interest in keeping those systems secure.

Which means closing, rather than opening, back doors.

What ThreeDee writes seems to confirm that.

-- ArcticStones
.

I don't agree. I think the NSA is spying on us and the NSA in turn are being spied on. I also think NSA is aware of this and for political reasons doesn't do anything about it. As I've said it's mostly a matter of politics what you believe. Suffice it to say, I've read all these articles by this guy, Myers, pertaining to this, plus articles by others about PROMIS (Bollyn is one author), and because they all agree with each other on the basics, I tend to agree with them. I think that inaccuracies such as C+ being a complex language or not* really doesn't change the substance of the theories in the main article, and dwelling on them and pointing them out as the basis of one's skepticism is like looking at the speck of sand in a bucket of pebbles and saying the presence of sand disproves the bucket is full of pebbles.

And I guess that people with the ability to know whether macs can be spied on, mainly experts who work for Apple, would not divulge this for obvious reasons. They want to protect the company and not reveal things that would make its customers lose confidence in their product (although we don't have much choice anyway, and also Apple may not have had a choice either). Anyway, I just threw that out there as I thought it might spark some interesting discussion by Apple 'insiders' who could give details about the security of macs or how to make them more secure and clear up that ambiguity about macs in the last part of the article in the OP. But it seems to have sparked off more of a political debate than a technological debate so perhaps I was better off posting this in a technologically-minded conspiracy forum in the first place.

* And Linux being open source (more eyes can pick up anomalies than fewer ones can) does make it less likely for the software to have been compromised. That makes me have faith in that system although I wouldn't have a clue as to how to operate that software.
Quote:

We don't know where the constants came from in the first place. We only know that whoever came up with them could have the key to this backdoor. And we know there's no way for NIST -- or anyone else -- to prove otherwise.

This is scary stuff indeed ...more....
.

Craig R. Arko 01-21-2008 09:25 AM

There is always paper and pencil. ;)

macuserhere 01-21-2008 10:13 AM

Or use Linux and keep clear of the random-number generator Dual_EC-DRBG.

Backdoor to Vista

Quote:

Schneier on Security

A blog covering security and security technology.

« Friday Squid Blogging:
December 17, 2007
Dual_EC_DRBG Added to Windows Vista

Microsoft has added the random-number generator Dual_EC-DRBG to Windows Vista, as part of SP1. Yes, this is the same RNG that could have an NSA backdoor.

It's not enabled by default, and my advice is to never enable it. Ever.

EDITED TO ADD (12/18): I should make this clear that the algorithm is available as a program call. It is not something that the user can enable or disable.
I've narrowed the backdoor to this random number generator:
random number generator.

Quote:

Did NSA Put a Secret Backdoor in New Encryption Standard?
11.15.07 | 12:00 AM

Random numbers are critical for cryptography: for encryption keys, random authentication challenges, initialization vectors, nonces, key-agreement schemes, generating prime numbers and so on. Break the random-number generator, and most of the time you break the entire security system. Which is why you should worry about a new random-number standard that includes an algorithm that is slow, badly designed and just might contain a backdoor for the National Security Agency [more]
Look at the date of that blog entry and the date of the Wired article; it seems this issue is very current.

Do macs use this random number generator? And what are the implications of the new macs that have the option of switching to a Windows OS?

Another article about NIST and the random number generator:

NIST encryption standard may have NSA backdoor
Quote:


Security experts: NIST encryption standard may have NSA backdoor


By Ryan Paul | Published: November 17, 2007 - 05:45PM CT

According to security experts, an algorithm for generating random numbers that is included in an official standard documented by the National Institute of Standards and Technology (NIST) could potentially include a backdoor planted by the NSA.

[..]

The NSA's support for the algorithm does seem somewhat suspicious, particularly in light of its relative weaknesses compared to the others in the standard. Schneier recommends that developers avoid using Dual_EC-DRBG and notes that "both NIST and the NSA have some explaining to do."
Why is NIST/NSA pushing an inferior logarithm onto computer makers?

Craig R. Arko 01-21-2008 10:18 AM

I'd prefer OpenBSD for a maximum security platform.

http://www.openbsd.org/index.html

cwtnospam 01-21-2008 10:35 AM

Quote:

Originally Posted by macuserhere (Post 444202)
I've narrowed the backdoor to this random number generator:
random number generator.

From that link:
Quote:

Back in 1996, an early version of SSL was broken because of flaws in its random-number generator.
Essentially, this is what I said in post # 12. In this case, Netscape had to close the hole, whether or not it was due to an NSA backdoor.

There will always be the possibility that some one could be spying on you, and they may or may not be using computers to do it. If you're worried that somebody might be, get a router and use Little Snitch. That will add a couple of difficult layers of defense for them to penetrate.

fazstp 01-21-2008 01:55 PM

Quote:

Originally Posted by macuserhere (Post 444185)
I don't agree. I think the NSA is spying on us and the NSA in turn are being spied on. I also think NSA is aware of this and for political reasons doesn't do anything about it.

Open source intelligence. Interesting concept. Do you really think they would knowingly share/leak information to a third party which they probably wouldn't even share with another government department? Disinformation maybe.

ThreeDee 01-21-2008 03:54 PM

Let me say this:

Any computer can be spied upon, no matter what. Even with some super-complex firewall, anti-intrusion programs, etc, even if there is no actual NSA backdoor, someone is always going to find a way in. Security programs just make it harder for someone to hack into your system. There are possibly many other flaws and holes to exploit. It might be pretty difficult to find them, but it is possible.

Oh, and:
What exactly is the NSA trying to find by spying on us? They can easily go through government files and find our SSN, credit card numbers, etc. without having to hack into our computers.

fazstp 01-21-2008 05:58 PM

1 Attachment(s)
It seems this goes much deeper than I gave credit. We're through the looking glass here, people...

ArcticStones 01-21-2008 06:25 PM

Re: The technological debate
 
Quote:

Originally Posted by macuserhere (Post 444185)
I don't agree. I think the NSA is spying on us and the NSA in turn are being spied on...

...I thought it might spark some interesting discussion by Apple 'insiders' who could give details about the security of macs or how to make them more secure... But it seems to have sparked off more of a political debate than a technological debate...

Agreed, the technological side of this debate is the interesting one. The rest is as much smoke & mirrors, opinions & conjecture as anything else. Also: I take what you said about the NSA above for granted. We live in an Age of Transparency -- and that is particularly true of digital aspects of our world.

Then again, I assume that all my digital communication passes through NSA filters (without attracting interest), be they word or phrase trigger filters or whatever.

I really do wish that I had the prerequisite knowledge to go into the technological side of this. But I don’t, so I readily admit that what I have ventured so far is mere conjecture. I’ll be reading with fascination the thoughts of those of you who are qualified do so.

Thanks for well-organised posts and links to a wealth of material on the subject! :)

-- ArcticStones

J Christopher 01-21-2008 07:16 PM

Considering that AES 128 is approved by the NSA for classified documents up to Secret, and AES 256 is approved for Top Secret, I consider it highly unlikely that these security measures have a backdoor for NSA or any other US government agency. Even if they did, the secrecy of the ability to do so would be so valuable that it could be utilized only extremely rarely such that only a handful of people in the world would be at risk of being compromised by such measures.

fat elvis 01-21-2008 07:46 PM

Is this really something that needs to be debated?

AT&T domestic spying

Uncle Sam trying to protect it's stool pidgeons

COINTELPRO

Yellow Dots on my resume?

Does NSA have a back door? Who cares! They can spy on us whenever they want.

ArcticStones 01-21-2008 07:58 PM

Quote:

Originally Posted by fat elvis (Post 444351)
Does NSA have a back door? Who cares! They can spy on us whenever they want.

Well, I certainly would like to know more about the relevant technologies, any inherent security weaknesses in my OS of choice, and what I can (or cannot) do to make my system more secure.

iampete 01-21-2008 08:05 PM

Quote:

Originally Posted by J Christopher (Post 444347)
Considering that AES 128 is approved by the NSA for classified documents up to Secret, and AES 256 is approved for Top Secret, I consider it highly unlikely that these security measures have a backdoor . . .

Maybe a back door isn't really needed, after all. From Wikipedia:
Quote:

In October 2005, Dag Arne Osvik, Adi Shamir and Eran Tromer presented a paper demonstrating several cache timing attacks against AES. . . . One attack was able to obtain an entire AES key after only 800 operations triggering encryptions, in a total of 65 milliseconds. This attack requires the attacker to be able to run programs on the same system that is performing AES.
Doesn't this imply that no matter how secure AES itself may be, it can be defeated in a de facto sense if the security incorporated into the computer has any unauthorized access "holes" at all? As previous posters have stated in different words, there is no absolutely certain firewall.

fat elvis 01-21-2008 08:11 PM

"The only secure computer is one that's unplugged, locked in a safe,
and buried 20 feet under the ground in a secret location... and i'm
not even too sure about that one"
-Dennis Huges, FBI.

I've heard this quote in many different forms...but Mr. Hughes (if he really exists ;)) will get credit this time.

I guess my "who cares" statement wasn't meant to disregard your quest for knowledge Arctic...but more to say that if they want to spy, "they" will find a way...and they have been finding ways.

I've read that it's possible to monitor one's activity by monitoring emitted radiation from CRT monitors. I'm not sure if anything similar exists for LCDs.

fazstp 01-21-2008 08:24 PM

Quote:

Originally Posted by fat elvis (Post 444355)
I've read that it's possible to monitor one's activity by monitoring emitted radiation from CRT monitors.

Monitor's flicker reveals data on screen

Seeing through walls

J Christopher 01-21-2008 10:21 PM

Quote:

Originally Posted by iampete (Post 444354)
Maybe a back door isn't really needed, after all. From Wikipedia:

Doesn't this imply that no matter how secure AES itself may be, it can be defeated in a de facto sense if the security incorporated into the computer has any unauthorized access "holes" at all? As previous posters have stated in different words, there is no absolutely certain firewall.

I wonder how many bit encryption was cracked. As far as I know, AES 128 and 256 have never been cracked, although the systems they protect have been, on rare occasions, by methods other than defeating the encryption.

Personally, if it were that important to me to breach someone's encrypted computer, I would probably use a small camera to monitor the keyboard for the password, or some other way that would be far, far easier than trying to break the encryption directly.

iampete 01-21-2008 11:25 PM

Quote:

Originally Posted by J Christopher (Post 444370)
I wonder how many bit encryption was cracked. As far as I know, AES 128 and 256 have never been cracked, although the systems they protect have been, on rare occasions, by methods other than defeating the encryption. . .

Apparently, it is AES 128, and in a matter of just seconds!

From their paper <http://people.csail.mit.edu/tromer/papers/cache.pdf>:
Quote:

. . . (my comment: referring to a "clean" testing environment) . . . we recover the full 128-bit AES key after only 300 encryptions on Athlon 64, and after 16,000 encryptions on Pentium 4E. . .
We then set out to test the attacks on a real-life encrypted filesystem. . . .we succeed in extracting the full key after just 800 write operations done in 65ms (including the analysis of the cache state after each write), followed by 3 seconds of off-line analysis.
It's also probably worthwhile to note that this is freely disseminated, common knowledge stuff that the powers that be don't really care about. I understand that historically, "they" have actively suppressed encryption/decryption info they really don't want the public to know about.


All times are GMT -5. The time now is 11:16 PM.

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.
Site design © IDG Consumer & SMB; individuals retain copyright of their postings
but consent to the possible use of their material in other areas of IDG Consumer & SMB.