RISKS Forum mailing list archives

Risks Digest 30.39


From: RISKS List Owner <risko () csl sri com>
Date: Sat, 22 Jul 2017 15:57:36 PDT

RISKS-LIST: Risks-Forum Digest  Saturday 22 July 2017  Volume 30 : Issue 39

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
  <http://catless.ncl.ac.uk/Risks/30.39>
The current issue can also be found at
  <http://www.csl.sri.com/users/risko/risks.txt>

  Contents:
Authorities shut down two black markets on the Darknet (NYTimes)
On Reddit, Intimate Glimpses of Addicts in Thrall to Opioids (NYTimes)
To tackle online crime, Israel approves web censorship law
  (Times of Israel)
Uber and Airbnb Want To Tap Into India's Massive and Controversial
  Biometric Database (Gizmodo)
FBI To Parents: Watch Out For Kids' Privacy With Internet-Connected Toys
  (Consumerist)
Wifi Webcam TENVIS sends all it knows to dvripc.cn (turgut kalfaglu)
PSA: Update iPhones/iPads to iOS 10.3.3 now to fix serious wifi
  vulnerability allowing attacker complete control
Watch a Homemade Robot Crack a Safe in Just 15 Minutes (WiReD)
Risks of hoarding vulnerabilies (Belfer Center et al.)
9-year standoff between Ireland's DP Commissioner & Statistics Office
  (Bernard Lyons)
Mixed standard output and error streams (Diomidis Spinellis)
Connected cars -- where to attack first? (FPF)
Ransomware attack puts KQED in low-tech mode (San Francisco Chronicle)
Facebook fights fake news spread via modified link previews (TechCrunch)
Re: Charging Phone Kills 14-Year-Old Girl in Bathtub" (Paul Fenimore)
Re: Your pacemaker is spying on you (Rich Wales)
Re: Western tech firms bow to Russian demands to share cybersecrets
  (Anthony Youngman, Martin Ward, Anthony Youngman)
Re: Press kits or other publications on thumb drives?
  (Geoffrey Keating, Ivan Jager, Kelly Bert Manning)
Re: Leaping Kangaroos (Dave Horsfall, Amos Shapir)
Power outages caused by squirrels vs. kangaroos to date (PGN)
Abridged info on RISKS (comp.risks)

----------------------------------------------------------------------

Date: Fri, 21 Jul 2017 05:58:12 -0400
From: Monty Solomon <monty () roscom com>
Subject: Authorities shut down two black markets on the Darknet

Nathaniel Poppower and Rebecca Ruiz, *The New York Times*, 21 Jul 2017
The authorities took control of one large site, Hansa Market, and covertly
operated it to catch refugees fleeing the closing of the largest market,
AlphaBay.
https://www.nytimes.com/2017/07/20/business/dealbook/alphabay-dark-web-opioids.html

------------------------------

Date: Fri, 21 Jul 2017 09:06:01 -0400
From: Monty Solomon <monty () roscom com>
Subject: On Reddit, Intimate Glimpses of Addicts in Thrall to Opioids

https://www.nytimes.com/2017/07/20/us/opioid-reddit.html

Dispatches left on a now-banned forum show the role one of the world's
largest online communities played in facilitating access to drugs tied to a
mounting toll.

------------------------------

Date: Tue, 18 Jul 2017 11:18:46 -0400
From: Gabe Goldberg <gabe () gabegold com>
Subject: To tackle online crime, Israel approves web censorship law

To tackle online crime, Israel approves web censorship law Courts may now
order providers to block terror group websites, online illegal gambling,
prostitution services, hard drug sales.  ...

The court order may be issued only if it is essential to halting the
criminal activity taking place online; or essential to prevent the exposure
of the Israeli user to an activity that, would it be done in Israel, would
be a crime, and the website's activity has some connection to Israel; or if
the website belongs to a terror organization.

In certain cases, if the owner of the website is Israel-based, the court may
order the provider to seek the website's removal, rather than merely
restricting access, it said.

The courts may also order search engines to remove the websites from their
search results and may rely on classified government testimony to make their
decision. All affected parties must be present in court, the law said,
unless they were summoned and failed to appear. ...

http://www.timesofisrael.com/to-tackle-online-crime-israel-approves-web-censorship-law/

------------------------------

Date: Wed, 19 Jul 2017 13:56:47 -0700
From: Lauren Weinstein <lauren () vortex com>
Subject: Uber and Airbnb Want To Tap Into India's Massive and Controversial
  Biometric Database

NNSquad
http://gizmodo.com/uber-and-airbnb-want-to-tap-into-india-s-massive-and-co-1797066488

  The national ID database, Aadhar, contains information on about 90 percent
  of India's population of 1.3 billion people, as well as people working and
  living in the country.  Aadhar was launched in 2009 as a way to inhibit
  fraud and improve access to welfare and healthcare. But the
  biometric-based system has been criticized as Orwellian and dangerous
  because it can be used to monitor residents and because the nation has no
  privacy regulations. According to a report from India's Centre for
  Internet and Society, about 130 million citizens were put at risk of fraud
  after Aadhar data was recently leaked online.  Earlier this month,
  Microsoft also integrated Aadhar into Skype Lite, but the company said it
  will keep user information encrypted. As more companies use Aadhar data,
  the risk of personal data being leaked will likely increase.  Anonymous
  sources at Airbnb, Uber, and Ola told BuzzFeed News how the companies
  planned to use the controversial system.  Airbnb is interested in using
  the database to authenticate India-based hosts and is already testing it
  with a sample of users, according to an Airbnb spokesperson. Hosts
  selected for the test are given the option to use Aadhar to verify their
  identity.

------------------------------

Date: Fri, 21 Jul 2017 16:07:44 -0400
From: Gabe Goldberg <gabe () gabegold com>
Subject: FBI To Parents: Watch Out For Kids' Privacy
  With Internet-Connected Toys

A basketball, a Lego set, or a box of crayons is largely what it seems, but
modern smart toys and entertainment devices for kids have a lot of things in
them that can collect sensitive data. And as more and more of a kid's
nursery fills up with gadgets that connect to Bluetooth, the web, or parent
apps, the feds are advising parents to be wary.

The FBI's public service announcement doesn't outright say not to buy
connected toys, but it does say that parents and caretakers need to be aware
of the vulnerabilities smart toys present.

https://consumerist.com/2017/07/19/fbi-to-parents-watch-out-for-kids-privacy-with-internet-connected-toys/

------------------------------

Date: Tue, 18 Jul 2017 07:47:32 +0300
From: turgut kalfaglu <turgut () kalfaoglu com>
Subject: Wifi Webcam TENVIS sends all it knows to dvripc.cn

I have purchased several wifi webcams, but the TENVIS webcam is unique;
every few minutes, I see a GET request going out from my LAN, to China.

Here is its log from squid cache - using which I blocked the webcam's
outbound requests:

1497330724.676    278 192.168.1.99 TCP_DENIED/403 5976 GET
http://post.dvripc.cn/post/post.aspx?xmldata=%3c%3fxml+version%3d%221.0%22+encoding%3d%22gb2312%22%3f%3e%0d%0a+%3cdvs+dvsid%3d%220018A977AF83%22+domainname%3d%2277AF83%22+corpid%3d%22%22++dvsname%3d%22IPCAM%22+dvsip%3d%22192.168.1.99%22+webport%3d%2280%22+ctrlport%3d%228200%22+protocol%3d%22tcp%22++userid%3d%22root%22+password%3d%22mypassword%22+model%3d%22C006-A1080003%22+postfrequency%3d%2260%22+version%3d%22H150602%22+status%3d%220%22+serverip%3d%220.0.0.0%22+serverport%3d%2280%22+transfer%3d%222%22+mobileport%3d%2215961%22+channelcount%3d%221%22%3e%0d%0a%3cdv+channel%3d%220%22+dvname%3d%22Channel01%22+status%3d%221%22+%2f%3e%0d%0a%3c%2fdvs%3e%0d%0a
- HIER_NONE/- text/html

(Modified IP addresses and password)

Risks are obvious: Trust a webcam to keep you private, but it sends
everything to "post.dvripc.cn" instead.  Nowhere in the configuration does
it mention that it sends information to some "cloud".

------------------------------

Date: Thu, 20 Jul 2017 18:41:49 -1000
From: geoff goodfellow <geoff () iconia com>
Subject: PSA: Update iPhones/iPads to iOS 10.3.3 now to fix serious wifi
  vulnerability allowing attacker complete control

It's always a good idea to accept iOS dot updates as soon as they are
available as they generally have significant security fixes. But iOS 10.3.3
<https://9to5mac.com/2017/07/19/ios-10-3-3/>, released yesterday, fixes one
particularly nasty vulnerability, making a swift update a particularly good
idea.

Apple's security document <https://support.apple.com/en-us/HT207923>
describes it in rather mundane-sounding terms.

Impact: An attacker within range may be able to execute arbitrary code on
the Wi-Fi chip

Description: A memory corruption issue was addressed with improved memory
<handling.

*But what Nitay Artenstein of Exodus Intelligence discovered -- and reported
to Apple -- was that it was able to exploit the issue to run code in the
main application processor.  In other words, gain complete control of your
device.*

*The underlying issue is a weakness in the Broadcom BCM43xx family of wifi
chips. These are used in every iPhone from the iPhone 5 to iPhone 7, as well
as 4th-gen iPad and later, and iPod Touch 6th gen. But Artenstein found a
way to leverage control of the wifi chip to then take control of the main
processor.*

Now that the vulnerability is fixed, Artenstein will be sharing full
details at the Black Hat conference
<https://www.blackhat.com/us-17/briefings/schedule/#broadpwn-remotely-compromising-android-and-ios-via-a-bug-in-broadcoms-wi-fi-chipsets-7603>next
week.

It's not the first time that a bug has allowed an attacker to take control
of an iPhone via wifi. Back in 2015, attackers were able to completely
disable <https://9to5mac.com/2015/04/22/security-flaw-ios-carriers/> any
device running iOS 8 within range of a given wifi network.

https://9to5mac.com/2017/07/20/broadpwn-wifi-vulnerability-iphone-ipad/

  N.B. in the articles comments: "most Android users won't get this
  fix at all," vis-a-vis "... fix serious wifi vulnerability allowing
  attacker complete control"

------------------------------

Date: Fri, 21 Jul 2017 18:12:36 -0400
From: Gabe Goldberg <gabe () gabegold com>
Subject: Watch a Homemade Robot Crack a Safe in Just 15 Minutes

Last Christmas, Nathan Seidle's wife gave him a second-hand safe she'd found
on Craigslist. It was, at first glance, a strange gift. The couple already
owned the same model, a $120 SentrySafe combination fire safe they'd bought
from Home Depot. But this one, his wife explained, had a particular feature:
The original owner had locked it and forgotten the combination. Her
challenge to Seidle: Open it.

Seidle isn't much of a safecracker. But as the founder of the Niwot,
Colorado-based company SparkFun, a DIY and open-source hardware supplier,
he's a pretty experienced builder of homemade gadgets, tools, and robots. So
over the next four months, he and his SparkFun colleagues set about building
a bot that could crack the safe for them. The result: A fully automated
device, built from off-the-shelf and 3-D printed components, that can open
his model of SentrySafe in a maximum of 73 minutes, or half that time on
average, with no human interaction. In fact, in the demonstration Seidle
gave WIRED in the video above, the process took just 15 minutes.

https://www.wired.com/story/watch-robot-crack-safe/

------------------------------

Date: Fri, 21 Jul 2017 13:15:18 -0400
From: Gabe Goldberg <gabe () gabegold com>
Subject: TV computer weather animation proves global warming

https://www.youtube.com/watch?v=iXuc7SAyk2s

------------------------------

Date: Fri, 21 Jul 2017 8:23:41 PDT
From: "Peter G. Neumann" <neumann () csl sri com>
Subject: Risks of hoarding vulnerabilies

http://www.belfercenter.org/sites/default/files/files/publication/Vulnerability%20Rediscovery.pdf

https://jia.sipa.columbia.edu/sites/default/files/attachments/Healey%20VEP.pdf

https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1751/RAND_RR1751.pdf

------------------------------

Date: Thu, 20 Jul 2017 21:11:41 +0100
From: Bernard Lyons <bernard.lyons () mac com>
Subject: 9-year standoff between Ireland's DP Commissioner & Statistics Office

A project by [Ireland's] Central Statistics Office proposing to track
tourists and Irish residents traveling abroad using mobile phone roaming
data has been described as *surveillance at its worst* by a world-renowned
privacy expert.

The statistics office wants to compel mobile operators to transfer to it
monthly the details of phones or users roaming on the networks, as well as
the dates and times of their calls.

It has been in a stand-off with the Data Protection Commissioner for almost
nine years on the legality of the proposal, but said last week it had found
an *innovative technical solution* to anonymise the phone records.

The commissioner's office has described the project as *disproportionate*
and *extraordinary*.

Dr Ann Cavoukian, executive director of the Privacy and Big Data Institute
at Ryerson University in Toronto, and former information and privacy
commissioner for Ontario, said she was *appalled* by the proposal,
particularly given the *negative messaging* from the commissioner.  [...]

Full article
<https://www.irishtimes.com/business/technology/cso-mobile-phone-plan-surveillance-at-its-worst-privacy-expert-1.3159979>

------------------------------

Date: Tue, 18 Jul 2017 12:22:54 +0300
From: Diomidis Spinellis <dds () aueb gr>
Subject: Mixed standard output and error streams

A student sent me a shell script attached in an email.  My mail program
wouldn't display it, so I tried to view it through the email's source code.
This also didn't work, because the script was base64-encoded.  Rather than
saving the attachment and opening it with an editor, I lazily copied the
text into the clipboard and run "base64 -d /dev/clipboard".  This is what I
got.

#!/bin/bash

input_file=$1
echo "Input file:" $input_filebase64: invalid input

I first thought that the student had sent me a wrong incomplete script.  I
then realized that the actual output, intermixed with the base64 error
message was a plausible shell script.  The risks are obvious; here is a
possible solution.

Now that we all have color screens and work with smart terminal emulators,
it would make sense for terminal emulators to subtly color a program's
standard error stream, so as to make it distinguishable from its standard
output.  This would also educate novice users on the difference between the
two types of outputs, and encourage tool authors to properly use the two
types of streams.  While at it, coloring folded lines would also help us
read streams with long lines (e.g. log files) and, again, educate novice
users on the folly of writing such text.

Diomidis Spinellis - https://www.spinellis.gr

------------------------------

Date: Tue, 18 Jul 2017 17:21:02 -0400
From: Gabe Goldberg <gabe () gabegold com>
Subject: Connected cars -- where to attack first?

https://fpf.org/2017/06/29/infographic-data-connected-car-version-1-0/

https://www.ftc.gov/news-events/events-calendar/2017/06/connected-cars-privacy-security-issues-related-connected

Videos:
https://www.ftc.gov/news-events/audio-video/video/connected-cars-privacy-security-issues-related-connected-automated-0

------------------------------

Date: Wed, 19 Jul 2017 10:47:28 -0400
From: Gabe Goldberg <gabe () gabegold com>
Subject: Ransomware attack puts KQED in low-tech mode

The journalists at San Francisco's public TV and radio station, KQED, have
been stuck in a time warp.  All Internet-connected devices, tools and
machinery have been cut off in an attempt to isolate and contain a
ransomware attack that infected the station's computers on 15 Jun.  More
than a month later, many remain offline.

Though the stations' broadcasts have been largely uninterrupted -- minus a
half-day loss of the online stream on the first day of the attack -- KQED
journalists said every day has brought new challenges and revealed the
immeasurable ways the station, like many businesses today, has become
dependent on Internet-connected devices.

``It's like we've been bombed back to 20 years ago, technology-wise,'' said
Queena Kim, a senior editor at KQED.  ``You rely on technology for so many
things, so when it doesn't work, everything takes three to five times longer
just to do the same job.''

http://www.sfchronicle.com/business/article/Ransomware-attack-puts-KQED-in-low-tech-mode-11295175.php

------------------------------

Date: Tue, 18 Jul 2017 15:33:14 -0700
From: Lauren Weinstein <lauren () vortex com>
Subject: Facebook fights fake news spread via modified link previews
  (TechCrunch)

via NNSquad
https://techcrunch.com/2017/07/18/facebook-link-preview-modification/?ncid=rss

  Until now, any Facebook Page that posted a link could change the headline,
  body text and image that appeared in the News Feed preview.  That allowed
  fake news distributors to bait-and-switch readers into visiting articles
  they didn't expect, or make it look like legitimate news publishers were
  posting inflammatory or false headlines. But it also let real news outlets
  A/B test link previews, tailor content to different audiences and update
  previews as news stories evolved.  To combat false news without stifling
  responsible publications, Facebook is now starting to disable the ability
  of all Pages to edit the previews of the links they post in the Page
  composer or API, with an exemption for some original publishers.

------------------------------

Date: Wed, 19 Jul 2017 03:27:32 -0600
From: Paul Fenimore <fenimore () swcp com>
Subject: Re: Charging Phone Kills 14-Year-Old Girl in Bathtub"
  (Harriet Sinclair re: RISKS-30.38)

I claim the biggest risk here is not principally poor user education --
which is on-going for a Century or more. Instead, regardless of particulars
in this case (the essential technical detail about the presence or absence
of ground-fault protection is missing from the news articles), the
fundamental risk associated with allowing grand-fathered electrical circuits
to continue operating without a clear sunset provision for older, unsafe
circuits. I am not claiming this fundamental problem is easy solve. I am
claiming the problem of old installations is the real problem.

The persistent risk of shock in wet *and damp* environments observed
over the decades has not been radically reduced by the population
becoming more familiar with electricity and widgets. Education cannot
and will not solve this problem because 120V 15A 60Hz electrical power
in wet *and damp* environments is fundamentally unsafe without
engineering controls. The technical basis for the risk is a ground-fault
current, and addressing that risk *as an engineering challenge* is the
only effective means of mitigating a fundamental risk associated with
wet environments. The National Electric Code (US) specifies that
electric power sockets in these *high risk* areas be "protected" by a
ground-fault interrupter. There are also special rules for the presence
of power cabling in wet and damp environments even without a socket.

There is an analogy of old power circuit designs to old software that is
not maintained but continues to operate in the high-risk environments
found on networks.

[There is something to be said for understanding the basics of
technology. GW]

Harriet Sinclair, *Newsweek*, 11 Jul 2017
http://www.newsweek.com/teenager-madison-coe-killed-after-using-cell-phone-bath-635208

opening text:

A teenager has been killed after using her cell phone in the bath and
suffering an electric shock.

------------------------------

Date: Wed, 19 Jul 2017 22:28:02 -0700
From: Rich Wales <richw () richw org>
Subject: Re: Your pacemaker is spying on you (Thorson, RISKS-30.38)

Any discussion of the forensic value of pacemaker data should certainly
mention the 2000 death of David Crawford in Australia, whose time of death
was precisely established through analysis of his pacemaker -- thus
disproving the alibi offered by his killer.  There is, to be sure, a
difference between the (presumably) steadily beating heart of an accused
arsonist one the one hand, and the non-beating heart of a murder victim on
the other.

------------------------------

Date: Tue, 18 Jul 2017 11:19:27 +0100
From: Wols Lists <antlists () youngman org uk>
Subject: Re: Western tech firms bow to Russian demands to share cybersecrets
  (Thomas, RISKS-30.38)

There were two points. First, reasoning is HARD. It takes time, and
(like cryptography) many problems have no solution that can be computed
in the time we have available.

All reasoning depends on axioms. Does Youngman eschew reasoning?

And second, that reason is itself unreasonable ... ?

The thing with axioms is they have this sneaky little habit of turning out
to be unreliable -- we get them wrong, we pick the wrong ones, etc.  And
Godel proved that this is not our fault, this is actually the fundamental
nature of an axiom.

So no, I'm actually all in favour of reasoning, and logical thought.  What I
am against is glib calls for it treating it as if it is a "magic bullet",
with no regard to its failings.

I'm a scientist. I've seen too many examples of "the wrong maths in the
wrong place", leading to mathematically perfect but practically erroneous
results. (My favourite example, Euclid's "parallel lines never meet" leads
to Newtons laws of motions, which are mathematically perfect but clearly
erroneous.) Formal mathematical proofs are only as good as the assumptions,
or axioms, on which they are based. And both experience and formal
mathematical proofs -- Godel's theorem -- lead me to the inevitable
conclusion that these axioms will have holes in them.

------------------------------

Date: Thu, 20 Jul 2017 14:41:00 +0100
From: Martin Ward <martin () gkc org uk>
Subject: Re: Western tech firms bow to Russian demands to share cybersecrets
  (Youngman, RISKS-30.38)

The last occasion when a flaw was discovered in the axioms used to prove the
correctness of programs (logic and basic set theory) was Russell's Paradox:
discovered in 1901, partially fixed by Russell's theory of types in 1903,
and resolved in 1908.  Putting to one side questions concerning the Axiom of
Choice and various large cardinal axioms (which are not relevant to proofs
in computer science) there have been no subsequent flaws uncovered in the
axioms in over a century.  We cannot prove that the axioms are consistent
(cf Godel), but the axioms have survived the entire history of electronic
computing so far and so can probably be relied on in the future!

As Martyn Thomas points out, *all* engineering depends on mathematics.
Engineering also depends on the "laws" of physics: which have been revised
several times over the last century.  But engineers use physics and
mathematics extensively because they know that these methods are far more
likely to lead to dependable systems.

Then of course, there is the little problem that any program of any size
will likely exhibit knapsack complexity, i.e., an automated proof would
take longer than the universe has existed.

Most formal-methods researchers do not advocate writing a program in an
informal way, and then attempting to prove it correct.  Instead, we develop
methods for deriving code from specifications such that the code guaranteed
to be correct by construction.  For example, in my paper "Provably Correct
Derivation of Algorithms Using FermaT" (Formal Aspects of Computing, Volume
26, Issue 5, pp 993--1031, 2013) I derived a program for polynomial addition
using Knuth's four-way linked list data structure.  The first time I ran the
program it crashed :-( But I soon noticed a typo: I had mistyped a variable
name when typing up the code from my written notes.  After fixing this typo
the program ran correctly, and was tested by running it continuously for
several days.  The derived algorithm also turned out to be over twice as
fast as Knuth's algorithm in "Fundamental Algorithms" Vol 1.  I then derived
a program to solve the more complex problem of polynomial
multiplication. This time I took more care with my typing, and the program
ran correctly first time.

Martyn Thomas <martyn () thomas-associates co uk> writes:
All reasoning depends on axioms. Does Youngman eschew reasoning?

There is (alas) a new and growing area of research under the heading
"empirical software engineering" which does appear to eschew reasoning.  A
program is deemed "correct" if and only if it passes its test suite.
Various automated and semi-automated ways of modifying the program are being
investigated: any modification which passes the test suite is deemed to be
"correct". For example, "empirical slicing" may be defined as "delete random
sections of code and call the result a valid slice if it passes the
regression test". Program semantics and program analysis are considered to
be "too difficult" by these researchers, and therefore are not attempted.

Regular RISKS readers will no doubt already be wondering how such methods
avoid introducing security holes: given that a security hole will not
necessarily prevent the program from passing its test suite (unless the
tests happen to include the carefully crafted data which triggers the
security hole!) As far as I can tell, the answer is: they don't!

Dr Martin Ward | Email: martin () gkc org uk | http://www.gkc.org.uk

------------------------------

Date: Thu, 20 Jul 2017 18:24:45 +0100  cybersecrets (Ward, RISKS-30.38)
From: Wols Lists <antlists () youngman org uk>
Subject: Re: Western tech firms bow to Russian demands to share cybersecrets
  (Thomas, RISKS-30.39)

The last occasion when a flaw was discovered in the axioms used
to prove the correctness of programs (logic and basic set theory)
was Russell's Paradox:

And? The maths was flawed, it was incorrect.

My problem is people using the wrong maths -- it's correct but
inappropriate.  Like I said, Newton's laws of motion are mathematically
correct, but useless for calculating the path of a spacecraft ...

But engineers use physics and mathematics extensively because they know
that these methods are far more likely to lead to dependable systems.

And as I learnt on Groklaw, philosophers seem to divide into two camps.  The
majority view appears to be that Mathematics tells the Universe what to do.
I seem to be in the minority believing that Mathematics describes what the
Universe does.

That doesn't mean that mathematics is any less important to those of us in
the second camp. It just makes us rather more skeptical about the assumption
that a proof means the program will run correctly.  (Regardless of that, my
personal attitude is that the time spent doing it formally is time very well
spent.)

...

I got my first programming job based on top 'A'-level grades so have no
formal computer qualifications. That said, it always seems to have been me
pushing for formal methods, good programming practice, etc etc. I tend to
program top down by defining the problem and refining it into a program -
quite like the mechanism you describe :-) (And I've seen what happens when
such a program is "improved" by someone ignoring the proof logic :-)

My position is quite simple - formal methods and proofs are time well
spent, but given that the foundations of mathematics are themselves
provably unprovable, a complete formal proof is impossible. That's not
saying they're not worth having.

------------------------------

Date: 17 Jul 2017 23:28:03 -0700
From: Geoffrey Keating <geoffk () geoffk org>
Subject: Re: Press kits or other publications on thumb drives? (Manning,
  RISKS-30.38)

High-value targets probably shouldn't rely on that.  A random object
inserted into a USB port might not actually be a thumb drive; it might be a
chip that impersonates a keyboard and/or mouse and takes over your system.
Or it might be a perfectly functional blank thumb drive that's been
additionally programmed to impersonate a keyboard at some time in the
future.

------------------------------

Date: Tue, 18 Jul 2017 17:21:08 +0000
From: Ivan Jager <aij+ () mrph org>
Subject: Re: Press kits or other publications on thumb drives? (Manning,
  RISKS-30.38)

I believe the RISK being referred to is that of assuming that an untrusted
USB gadget will present itself as a mass storage device when you plug it
into a *general-purpose* bus on your computer. (As opposed to a keyboard,
mouse, network adapter, USB hub, etc.)

Most computers these days will accept input from a new USB keyboard without
requiring any configuration.

Your antivirus may be able to scan media for known malicious content, but it
cannot scan circuits.

------------------------------

Date: Tue, 18 Jul 2017 14:36:20 -0400 (EDT)
From: Kelly Bert Manning <Kelly.Manning () ncf ca>
Subject: Re: Press kits or other publications on thumb drives?
 (Jager, RISKS-30.39)

For me this risk comes up most often when I get Conference Proceedings on a
USB drive, rather than downloading individual presentations one by one from
a web server.

At the annual local Privacy and Security conference someone always does a
demo of a WiFi Pineapple type interception of wireless traffic, so I started
doing an optical disk boot of Tails OS at conferences, and mentioned that to
the session presenter last time it happened. Those events might be places
where folks with the skills might see a challenge or an opportunity.

I check that the mass storage device scan is starting. Windows 8 seems to
prompt me that a new USB device has been installed if it detects a new USB
device that is not a mass storage drive.

The risk of malware in circuitry is a good point. Weren't news organisations
that had received copies of documents from the Snowden Document Dump ordered
to turn chips from devices and peripherals such as keyboards over to
NSA-GCHA, not just hard drives and removable storage media?

The implication is that long-term data recording may involve writable chip
memory within workstations and peripheral devices. A USB connected "device"
could be in that category.

------------------------------

Date: Thu, 20 Jul 2017 11:00:02 +1000 (EST)
From: Dave Horsfall <dave () horsfall org>
Subject: Re: Leaping Kangaroos (Thorn, RISKS-30.38)

In RISKS-30.38, Anthony Thorn wrote:

I am reluctant to question an Australian's statement about kangaroos,
but surely a taller object would appear to be nearer than it really is?

Although Australian (well, British/Australian, to be precise), I don't claim
to be an expert on our hopping fauna, but I believe the system measures from
the bottom of the object to the perceived road surface, thus a mid-air
marsupial appears to be further away than it really is.  How it handles kids
on pogo-sticks is anyone's guess...  Does anyone know for sure how it works?

Dave Horsfall, North Gosford, NSW, Australia

------------------------------

Date: Thu, 20 Jul 2017 18:52:19 +0300
From: Amos Shapir <amos083 () gmail com>
Subject: Re: Leaping Kangaroos (Thorn, RISKS-30.38)

For the same reason the leaping man in this photograph
<http://www.trendingly.com/weird-perspectives/3>  seems to be farther away
-- a near object above ground and a far object on the ground occupy the
same place on the 2D plane of the camera.

------------------------------

Date: Tue, 18 Jul 2017 11:48:15 PDT
From: "Peter G. Neumann" <neumann () csl sri com>
Subject: Power outages caused by squirrels vs. kangaroos to date

  [From CyberSquirrel1 data as of 18 Jul 2017; cumulative?]

Squirrel        1018
Bird             528
Unknown          130
Snake             95
Raccoon           85
Rat               45
Marten            23
aCat              22
Beaver            16
Jellyfish         13
Monkey            11
Possum            11
Eagle              8
Bat                7
Rodent             5
Gopher             4
Elephant           3
Mouse              3
Deer               2
Fox                2
Lizard             2
Bear               2
Marmot             2
Frog               2
Slug               1
Shark              1
Duck               1
Chicken            1
Caterpillar        1
Mongoose           1
Leopard            1
Bobcat             1
Baboon             1
Kangaroo           1  <=====!

  [Incidentally, SRI recently had what I think was our eighth total outage
  in Menlo Park (although our co-generation plant continued to function this
  time).  However, that is irrelevant when applied to self-driving cars in
  Australia.  A few years from now, the kangaroos on Australian roadways may
  seriously outrank the squirrels in causing highway accidents, whereas the
  squirrels are very unlikely to have any significant impact {!!!} on the
  vehicles or on passengers.  PGN]

------------------------------

Date: Tue, 10 Jan 2017 11:11:11 -0800
From: RISKS-request () csl sri com
Subject: Abridged info on RISKS (comp.risks)

 The ACM RISKS Forum is a MODERATED digest.  Its Usenet manifestation is
 comp.risks, the feed for which is donated by panix.com as of June 2011.
=> SUBSCRIPTIONS: The mailman Web interface can be used directly to
 subscribe and unsubscribe:
   http://mls.csl.sri.com/mailman/listinfo/risks

=> SUBMISSIONS: to risks () CSL sri com with meaningful SUBJECT: line that
   includes the string `notsp'.  Otherwise your message may not be read.
 *** This attention-string has never changed, but might if spammers use it.
=> SPAM challenge-responses will not be honored.  Instead, use an alternative
 address from which you never send mail where the address becomes public!
=> The complete INFO file (submissions, default disclaimers, archive sites,
 copyright policy, etc.) is online.
   <http://www.CSL.sri.com/risksinfo.html>
 *** Contributors are assumed to have read the full info file for guidelines!

=> OFFICIAL ARCHIVES:  http://www.risks.org takes you to Lindsay Marshall's
    searchable html archive at newcastle:
  http://catless.ncl.ac.uk/Risks/VL.IS --> VoLume, ISsue.
  Also,  ftp://ftp.sri.com/risks for the current volume
     or ftp://ftp.sri.com/VL/risks-VL.IS for previous VoLume
  If none of those work for you, the most recent issue is always at
     http://www.csl.sri.com/users/risko/risks.txt, and index at /risks-30.00
  Lindsay has also added to the Newcastle catless site a palmtop version
  of the most recent RISKS issue and a WAP version that works for many but
  not all telephones: http://catless.ncl.ac.uk/w/r
  ALTERNATIVE ARCHIVES: http://seclists.org/risks/ (only since mid-2001)
  <http://the.wiretapped.net/security/info/textfiles/risks-digest/>
 *** NOTE: If a cited URL fails, we do not try to update them.  Try
  browsing on the keywords in the subject line or cited article leads.
==> Special Offer to Join ACM for readers of the ACM RISKS Forum:
    <http://www.acm.org/joinacm1>

------------------------------

End of RISKS-FORUM Digest 30.39
************************


Current thread: