Text archives Help


Re: [projectvrm] Vendor entitlement run amok


Chronological Thread 
  • From: Don Marti < >
  • To: Patrick Devine < >
  • Cc: Devon M T Loffreto < >, "T.Rob" < >, ProjectVRM list < >
  • Subject: Re: [projectvrm] Vendor entitlement run amok
  • Date: Wed, 19 Aug 2015 10:49:39 -0700

What Oracle strategy would look like if applied to
a non-software business:
https://en.wikipedia.org/wiki/Amy%27s_Baking_Company
(Just blaming "Internet haters" for reported problems
doesn't usually work.)

begin Patrick Devine quotation of Wed, Aug 19, 2015 at 04:52:42PM +0000:
>
> Oracle’s CSO wrote a blog (since removed but saved for posterity see link
> )below lamenting the fact that their customers took the time and effort to
> discover zero day security vulnerabilities in their software and
> embarrassed Oracle by publicly the facts if Oracle did not respond to the
> information.
>
> Epic Fail
>
> http://seclists.org/isn/2015/Aug/4
>
> Patrick
>
> From: Devon M T Loffreto
> [mailto: ]
> Sent: Wednesday, August 19, 2015 6:46 PM
> To: T.Rob
> Cc: ProjectVRM list
> Subject: Re: [projectvrm] Vendor entitlement run amok
>
> TRob,
>
> Agree with you in full. What can a little acronym do about it?
>
> VRM is not turning into anything... its just a lightning rod.
>
> At the base are people...engineers in some cases... each with personal
> context and motivations...and increasingly, given the nature of
> participation in the "market", one must consider whether sharing specific
> strategies protecting Individual participation is smart.
>
> My question: when does the "market" begin?
>
> These abuses to some, capabilities to others, have their own origin story
> wired so deeply into the fabric of Society, how can any business pitch a
> fix with a straight face...knowing they are building solutions on a
> foundation that introduces the problem at a root much more deeply impactful
> than any business outcome can pursue?
>
> Its 2015... people are just waking up to the fact that they are leveraged
> data. In retrospect...thats not real positive... forward moving... the
> question revolves around what people do about it...meaningful or
> meaningless conversations may now ensue...
>
> Clue: when do you (human) first become data? What is your root structure?
>
> Devon
>
>
>
> On Wed, Aug 19, 2015 at 12:02 PM, T.Rob
> < <mailto: >>
> wrote:
> My main issue with vendors turning us into instrumented data sources isn't
> the data so much as the lack of consent. My Fitbit knows a lot about me but
> it's an add-on that I self-selected and it provides value to me. The
> tracking in my browser is not something I can easily avoid since the browser
> is now an integral part of my life. Between those extremes there are lots of
> IoT devices that you can currently choose a private version but where that
> choice is rapidly disappearing. You can still buy a dumb light switch but
> not a dumb car, for example. Your shiny new GT phones home.
>
> Among the vendors who seem to feel an entitlement to our data is Microsoft,
> whose Windows 10 is basically a box of spyware disguised as a
> user-productivity-gaming-and-cat-video-watching platform. I've already
> written about the issues there, how to mitigate them, and the disheartening
> number of those "features" that can't be disabled. Yet as bad as all that
> is, this latest revelation still managed to surprise me across several
> metrics: the lack of consent, the extent of the invasion, the degree of
> exposure, the fact that it's already been exploited to infect user devices,
> the fact that the entity who exploited it is a "legitimate" vendor, and the
> fact that said "legitimate" vendor egregiously exposed the exploit to the
> Internet.
>
> Ars Technica is reporting that Microsoft has included in Windows 8 and above
> the ability to load executables from the device firmware. This means that
> even a clean install of Windows on wiped hard drives will run the
> executables from the firmware. This is intended for anti-theft protection
> which is generally exposed to the user in the BIOS and can be disabled.
> However, Lenovo used it to load software that reports information about the
> device, downloads executables over the Internet and installs them into
> Windows, overlays some of Microsoft's system files, is riddled with bugs
> such as buffer overflow, updates itself unsecurely, and does all this over
> plaintext HTTP connections.
>
> http://iopt.us/1LkR5D2
> http://arstechnica.com/information-technology/2015/08/lenovo-used-windows-an
> t
> i-theft-feature-to-install-persistent-crapware/
>
> The design of the firmware executable injection features to support
> anti-theft has always been a compromise. We give up some security in the OS
> and firmware to get the ability to retrieve/wipe the PC if it is stolen or
> lost. However, it opens the possibility of malware taking up residence in
> the hardware and there are examples of this being exploited. The delta in
> difficulty between stealing a laptop versus exploiting the firmware
> bootloader injection results in this feature being a net security benefit
> but not by a very big margin. Should it become easier to exploit the
> firmware bootloader injection, this could turn very bad, very fast.
>
> Microsoft and Lenovo, in stunning examples of the pervasive attitude of
> vendor entitlement, significantly reduced the degree of difficulty for
> exploiting firmware bootloader injection to where any script kiddie can root
> the device. Worse, it was done without the ability for the user to disable
> it. The patch released by Lenovo reportedly disabled the function but even
> people comfortable using the BIOS setup will have difficulty disabling it.
>
> Microsoft has effectively weaponized firmware bootloader injection.
>
> Lenovo has not only exploited it, but their code is so incompetent as to
> make a new class of vulnerability available remotely, anonymously, and with
> almost no skill requirement whatsoever.
>
> In terms of privacy invasion, this is not a difference in degree. It's a
> difference in kind. It's a new line that has been crossed and which, due to
> the technical complexity of explaining the risk to regular folks, will fly
> completely under the radar. It's custom-designed to root your device without
> knowledge, consent, or recourse, so functional that "legitimate" vendors
> apparently find malicious uses irresistible, and impossible to constrain to
> "legitimate" vendors. If you have a Lenovo PC today and haven't disabled
> this "feature", all sorts of uninvited guests can come camping out in your
> firmware and you won't be able to kick them out. If you have any other brand
> of device running Windows, well it's just a matter of time now.
>
> But try telling any vendor - or your representative - that just because we
> can doesn't mean we should. Nobody treats this as a privilege. Access to our
> data and the internals of our devices is assumed to be an entitlement, even
> when the implementations are clearly incompetent and capable of causing
> significant emotional, financial, and even physical harm to the owner of the
> device or user of the service.
>
> So let's say there's a vendor with retail customers who wants to improve
> their profitability. Do they consult with the merry band of VRM minstrels?
> Why should any vendor treat unlimited and intimate access to us as a
> privilege when the competition sees it as a right, capably exploits it, and
> the current regulatory regime fully supports that approach? VRM doesn't
> become mainstream until there's a line imposed by the market such that
> vendors need a way to remain competitive without crossing it. Not only are
> vendors crossing that line today, they are having long jump competitions to
> see who can go the furthest, and then advancing the line while we aren't
> looking.
>
>
> Blogged here:
> http://iopt.us/1NuI0Y2
> https://ioptconsulting.com/vendor-entitlement-run-amok/
>
> Kind regards,
> -- T.Rob
>
> T.Robert Wyatt, Managing partner
> IoPT Consulting, LLC
> +1 704-443-TROB (8762) Voice/Text
> https://ioptconsulting.com
> https://twitter.com/tdotrob
>
>

--
Don Marti
< >

http://zgp.org/~dmarti/
Are you safe from 3rd-party web tracking? http://www.aloodo.org/test/



Archive powered by MHonArc 2.6.19.