App Devs as Cyber Targets

First Look has broken news about a CIA program to target Apple’s XCode toolchain, that is required to develop native MacOS and iOS apps:
https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/

The result of the attack, if successful, is that the compiled binary you send to your end-users contains a backdoor, without the original source code or encryption you might use ever needing to be compromised.

This news fits well with Hans recent post on a very well social engineered phishing attack we received on our Google Play developers account. I see a lot of attacks, and this one nearly fooled me:
https://guardianproject.info/2015/02/24/phishing-for-developers/

I think this is a fairly broad set of adversaries, both state and non, who are beginning to use this tactic. The idea that toolchains and distribution systems of app developers are as much a target of surveillance and compromise as end-users or the networks they use is a fairly new realization to many, that many people out there are still waking up to.

What’s the solution? Well, overall hardening of systems and workflow for people building apps is a great start, but there are also some very exciting new approaches to this problem. Chiefly, right now is the idea of reproducible builds (aka multi-party loosely affiliated notaries to make sure source code = binary app), which you can read about here:

https://guardianproject.info/2015/02/11/complete-reproducible-app-distribution-achieved/
http://events.ccc.de/congress/2014/Fahrplan/events/6240.html
https://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global-compromise

Published
Categorized as General

My Prediction for 2015: “Delete This”

From today’s Boston Globe, my lighthearted prediction for 2015:

DELETE THIS

Thanks to an unshakable fear that their own gossip-laden e-mails (not to mention business strategies and classified documents) will be leaked to the world, the people of 2015 will finally decide that it may not be a good idea to have a copy of every message sent stored forever online. A new e-mail tagline will be popularized, stating: “In order to conserve our collective personal and professional reputations, we recommend you permanently delete this e-mail upon reading. Seriously.” The upside of all this ephemerality is that many more people will end up getting to “Inbox Zero,” causing a marked increase in the gross national happiness of the planet. Whether it is embracing iMessage and WhatsApp’s end-to-end encryption features, or following the Electronic Frontier Foundation’s recommendation to use super-secret apps like SilentText, TextSecure, and ChatSecure, 2015 turns out to be the year that message encryption (and deletion!) goes mainstream. If you are under 21, this new year will validate your obsessive use of SnapChat as visionary and path-paving to your future career in national security or Hollywood.

Read more from other brilliant minds here.

Published
Categorized as General

More Analysis of Firechat’s Opportunistic Mesh Marketing

Re/code recently published an article on Firechat’s use in Hong Kong, mostly just repeating one of the app’s founders speech from a recent Silicon Valley area tech event. I am really tired of beating this horse, but I really couldn’t help myself, as the attempts to use the ongoing very real-life protests in Hong Kong as a some sort of springboard for VC funding or product awareness is a tactic I have never been happy with. I also think tech publications like Re/code must do a much better job about being informed and critical on topics related to privacy, security, anonymity and freedom-enhancing tools developed by privately funded, closed source companies, that somehow claim to do things they may not really do. As an example, a Wired story from March on Wickr, another closed-source secure mobile messaging startup, is actually quite good, and includes a variety of actual experts providing actual analysis.

Somehow while WhatsApp and Facebook weren’t working,Open Garden’s Micha Benoliel claims people were able to still download the multi-megabyte Firechat app from Google Play or iTunes, and register on Firechat’s cloud-based servers before using the app. Benoliel wants to paint a picture of an app that can work without Internet, but it requires the Internet, and pretty decent reliable connection to app stores, to get the app in the first place. Additionally, the majority of screenshots of the apps use show people on the “Everyone” tab, which should be renamed the “Internet” tab, meaning you are using a wifi, 3g or 4g connection, and NOT meshing. If you are using the “Nearby” tab then you are meshing. Screenshot after screenshot after screenshot I have seen showing examples of use in Hong Kong, Taiwan and elsewhere all use Firechat in the basic IRC-style chat room mode, which is great, but has nothing to do with what they are saying the app is being used for.

 

A great analysis from PC Magazine actually provided detailed testing of the promise of Firechat’s nearby mesh mode versus its reality:

“But in my testing, FireChat’s mesh networking proved unreliable. With four phones spread over 241 feet apart, I was unable to receive messages from the furthest device while offline in nearby mode. I experienced this same unreliability in offline nearby mode when all the phones were within a few inches of each other.”

If a highly skilled tech reporter finds it unreliable in his lab, then how is it magically working for 100,000s of people in the streets of Hong Kong? Perhaps Firechat does work better when there is more people, but again, I would love to see any tiny piece of evidence of that, and not just anecdotes.

Somehow even though this is a decentralized mesh app not using the Internet (remember it was too congested!), the Firechat team knows specific numbers about the amount and duration of unique chat sessions. The truth is their app constantly communicates back to their centralized servers, which is apparently how they are getting these metrics for their marketing efforts. This is important because words like anonymous chat app are constantly batted around in reference to Firechat, when it isn’t at all, and in fact, there is a great deal of analytics going on to fuel possible future funding and business models. Reminds me of a whisper I once heard…

The numbers they promote in the presentation are a bit blurry even though they sound big when initially quoted… 500,000 new users held 2 million unique chat sessions that averaged 3 minutes each. This is promoted as being more powerful than 1.4 million tweets sent during the same time, even though those likely reached a much larger audience of people that a half million. Now first, let’s address the cognitive dissonance that people *were* tweeting, meaning they were using the Internet, posting photos, videos, and other rich media content, constantly from their phones in the streets of Hong Kong. Even Kenny G appeared on Twitter from the front lines of Occupy Central, though he now famously backpedaled, unlike the truly awesome Chow-Yun Fat. Again, the congestion of the mobile Internet and Firechat’s ability to counteract that are being overplayed, and by promoting Twitters use in Hong Kong during their own presentation, Firechat is not even being consistent with their own version of reality.

Now back to the “unique chat sessions”… Are these mostly just one on one chats? Are they huge group chats all in the “Nearby” mode, or are they topic based chat rooms? How far does one message or one session actually spread? The current impressions is not very far, though they claim 70 meters, so people are having 3 minute chat sessions with people within a few blocks from them. However, in the Nearby mode there is no filtering or targeting – it is just a massive stream of everyone within 70 meters of you (apparently). Again, if that was really happening in the middle of these massive crowds, I would love to see some evidence of it – a screen shot of “Nearby” with 100000s talking in it, or even 100. Does it exist? Please share!

Finally, the idea they were surprised by this type of usage is not genuine, considering they had promoted press coverage months earlier of use of the app in protests in Taiwan and by ISIL supporters in Iraq. In both of those places, just to continue to make this point, all of the screenshots were in “Everyone” mode, and not in “Nearby”. However, the point is that Firechat is keenly aware of the press attention they can get by promoting adoption of their apps in high visibility gatherings, be it their marketing around Burning Man or Occupy Central. In this way, I do really appreciate the stance that Snapchat’s CEO Evan Spiegel took on not promoting use of their app in situations like this:

“One of my pet peeves over time is how the technology industry has tried to sell counterculture. It’s tried to sell the revolution. We’ve been really resistant to doing this. We didn’t feel like pushing these photos and videos out would turn that attention into action that would be helpful in Hong Kong.”

When Snapchat is making your marketing tactics look bad, then you really do need to take a look at yourself. Look, I understand Open Garden is a startup, with investors, and they need to have that break through in order to make it. I just want them to be honest with themselves and the world about what their app can or cannot do today, and really, deeply consider what might happen if their app doesn’t work as well as they say it does, when the Internet ACTUALLY gets turned off, blocked, intercepted or surveilled. Don’t let your marketing and popularity get ahead of what it is your product is meant to do.

 

How Dungeons & Dragons Can Help Twitter Fight Trolls

One of the core problems of Twitter with regards to trolling and bullying, is that all users are created equally. While the various follow, filter and block features allow you to craft the version of the Twitter feed that you want to see, it doesn’t stop someone from spreading misinformation about you, spreading actual information (doxing), impersonating you or otherwise causing trouble. When users are banned or blocked, it is easy enough for someone to create a new account, under a new pseudonym, and continue their harassment. Blocking IP addresses or requiring “real name registration” are not the solutions, and we are left with the targets of the attacks often choosing to leave Twitter instead.

Ironically, given recent events, I believe traditional table-top role-playing games (RPGs) offer some insight to a solution to the problem that Twitter and other users face. Game dynamics have often been used to predict outcomes of real-world events, and inversely they can be used to provide constructive frameworks for people to interact in complex ways. At this point, Twitter, and Facebook, as well, have very rudimentary systems to deal with harassment and trolling, and instead, need a great deal more complexity within their own systems for monitoring and managing, as well as in the tools and capabilities users have to shape their feeds.

 

7368362_f520

Here are some possibly unoriginal thoughts (would love to hear about other online community systems who might have D&D inspired reputation systems) about how to address that, and no, you won’t need a twenty-sided die to implement them…

Leveling Up

RPGs: When you roll a new character in role-playing games, you start at Level 0 with no weapons or armor. This means you better not piss anyone off, or your characters life-span will be quite short. Mostly you stay in town, do basic jobs, and try to get some gold. The goal is to level up, add some points to various skills, and get some leather skins and a workable weapon.

Twitter: If your account falls under a certain threshold of followers or tweets, you should be considered a provisional user, and any @ tweet message you send mentioning another user should be shown publicly or at least in the timeline of the targeted user. If your message is flagged a small amount of times, your account is instantly shutdown for review. You should be able to build some reputation by tweeting useful, interesting, unique content that others will want to follow. One you have shown you have something useful to add to Twitter, you can graduate past the provisional phase.

Building Alliances

RPGs: One quick way to improve the power and longevity of your character is to team up with other characters, join groups, guilds or armies. This way you can begin joining quests that you otherwise may not be equipped to survive. If your group contains a mage, you can even benefit from healing spells.

Twitter: Getting put onto Twitter lists that have a strong percentage of users with many follows and high-quality tweets should reflect well on your account, and build resistance to being flagged or blocked. Anyone who places you on a list, can endorse you, as someone worth following.

Exposing Your Alignment

RPGs: There is no right or wrong in RPGs, and in fact there is a whole range of acceptable alignments, from good to evil, lawful to chaotic, with a variety of interesting combinations. This is all part of how the game works, and everyone plays their roles. That said, if you are a chaotic evil thief, don’t expect the a holy citadel full of lawful clerics to give you shelter.

Twitter: Who you follow, what you retweet, what you say, and the topics you discuss, all should have an impact on the perception of what kind of user of Twitter you are. There is not necessarily right or wrong on Twitter, and there shouldn’t be blanket censorship or bans, but your behavior on Twitter should allows others to avoid or block you en masse, and not just at the account level.

Character Classes

RPGs: Warrior, mage, thief, cleric, ranger, paladin… when you choose the type of character you wish to be, you say something about who you are, what you bring to the game, and what type of activities you want to participate in. Each class has certain skills and capabilities, not everyone can do everything, and this builds useful dependencies between people that require trust building and negotiation. If you are a warrior entering a dungeon, you better have a cleric with you who can heal, a mage that can open spell-bound chests, and a thief that can detect traps. Any quest requires this type of cooperation.

Twitter: Twitter provides a very limited, free form manner in which to indicate who you are, and why you are, on Twitter, and what you have to bring to the table. Your short bio, ollowers, “Follow Friday” tweets and hashtags, all provide a limited mechanism for indicating your expertise, and otherwise, it is general based on what you tweet that people decide whether to listen or ignore. Twitter would be greatly enhanced if you could more strongly indicate your alliances and affiliations, your background and your skill, that qualifies you to discuss a topic or provide insight. Tweets might show a special power-up symbol if you are tweeting about a topic you have been indicated as an expert in, or shown to have a google or linked history related to.

Strength, Constitution, Intelligence, Wisdom, Dexterity, Charisma….

RPGs: The strength or weakness of any attribute in your character plays a huge role in your value to a quest, guild or party. You don’t need to have huge numbers for all of them, but if you are a thief with great dexterity and speed, then you will be in great demand. Similarly, a warrior with excellent strength but low intelligence and wisdom, should be treated like the hulk they are, and a mage, a chaotic-nuetral one at that, with high intelligence and charisma perhaps should not be trusted at self-serving junctures. All of these factors contribute to interaction with everyone else in the game, and the success of your character in the realm.

Twitter: Twitter has metrics like follows, following, tweets, re-tweets, time since you joined, and perhaps a few other hidden ones as well. There is data behind your account that could be used to better indicate to others whether they should follow, interact or spend any time at all with you. If you follow relatively few people in ratio to who you follows you, then it is likely that your tweets are one-sided and you aren’t that interest in listening. If you have join a long time ago, and have highly re-tweeted tweets posted now and then, then you have good things to say, but tend to keep to yourself. All of this data could be summed up in a manner that helps people and/or Twitter decide how visible your tweets are, and how much benefit of the doubt you are given when others start to flag or block your account.

Back to the Future

I first played Dungeons and Dragons when I was about six years old. These gaming concepts are not new, and the larger notion of game mechanics and dynamics is a huge field of study way beyond my own comprehension. However, it seems the design teams behind Twitter, Facebook and other sites have implemented the minimal viable systems for managing users, and then left all the rest of it up to chance or binary choices. Facebook has a bad history of allowing groups of people to team up to flag users unfairly and unjustly, as well as leaving decisions about users and acceptable content up to an army of editors who decided on issues like nudity without any concept of the users or community they are a part of. More to the point of this post, Twitter is facing a huge reputation problem itself, as it is becoming literally overrun with trolls, not to mention orcs, goblings and kobolds. Users and botnets are already gaming these system for their own advantages and ends, be it financial, political, cultural or purely for amusement. Why not make the rules of the game then more complex, and more tuned for a better experience for all? Otherwise, no amount of spells of fire or healing will be able to fight off evil or heal these services in the long run.