online-mass-surveillance-between-switzerland-and-abroad-put-to-the-test

Online mass surveillance between Switzerland and abroad put to the test

The digital society association, which campaigns for civil rights and consumer protection in Switzerland, has achieved a stage victory in front of the Swiss Federal Supreme Court together with private complainants. The court overturned a previous judgment by the Federal Administrative Court. The judgment concerned the so-called radio and cable reconnaissance, with which the Federal Intelligence Service (NDB), in cooperation primarily with the Armed Forces Center for Electronic Operations (ZEO), monitors the telecommunications connections that lead from Switzerland to other countries. E-mail traffic and internet communication between Switzerland and other countries are then searched using keywords and IP addresses.

Monitoring of all people in Switzerland However, since a large part of the online communication of the Swiss population is routed via servers and networks abroad, ultimately all people are in residing in Switzerland and moving online affected by the surveillance measures.

Against this “cause-free and suspect-independent mass surveillance”, according to the digital society, the same began to take action on the grounds that the radio and cable intelligence was violating the fundamental rights enshrined in the Federal Constitution (BV) and in the European Convention on Human Rights (ECHR). First, the complainants 2017 turned to the intelligence service itself and essentially demanded that the measures be discontinued. The FIS rejected the demands and stated that no fundamental rights guaranteed by the constitution and the ECHR would be violated. The FIS implemented the Intelligence Service Act, which the parliament passed and the voters accepted in a referendum.

The digital society and the complainants – among them Journalists and the Swiss lawyer Edward Snowdens then lodged a complaint with the Swiss Federal Administrative Court (BVGer), which, however, denied them the right to complain in June 2019. The reason given by the BVGer was, among other things, that the right to information under data protection law gives the possibility of complaining about the violation of fundamental rights by the secret service. A “lawful surveillance” could be enforced in court.

No possibility of complaint against surveillance itself The association contradicted this representation and argued that monitored persons could not have a right to information about a secret surveillance: “A – limited – right to information exists only for data that is subsequently stored in a secret service information system. Such storage by the secret service only takes place after the scanned data streams led to a hit and such a hit was assigned to a person “. That overturned the judgment of the Federal Administrative Court and referred the matter back to the court. “This will have to examine materially whether the radio and cable reconnaissance violates fundamental rights of the complainant according to the BV and ECHR and, if so, what legal consequences are to be attached to it”, the Federal Court announced. In addition to the legal basis, “any internal guidelines and instructions, the effective enforcement practice of the authorities as well as the actual control practice of the supervisory authorities must be taken into account” by the BVGer result from Article 13 ECHR, so the Federal Court. As a result, an alleged victim of a violation of the Convention is entitled to lodge an effective complaint with a national authority. In its case law, the European Court of Human Rights (ECHR) has emphasized the central importance of domestic legal protection when reviewing secret mass surveillance systems, writes the Federal Supreme Court in its press release. With this, the Federal Supreme Court admits that the Swiss radio and cable reconnaissance could involve mass surveillance. Such an overall system must at least be able to be examined by an independent authority before those affected can lodge a complaint with the ECHR.

oneplus-9-5g-prototype-just-sold-for-$3,000-on-ebay

OnePlus 9 5G prototype just sold for $3,000 on eBay

Leaks and prototype units are just a part of the smartphone “game” nowadays, but this is not your usual story. If you haven’t been keeping up with the news – the OnePlus 9, 9 Pro and possibly a OnePlus 9E/9 Lite are one the way and likely expected to arrive in mid-March – a bit earlier than usual. There has been no shortage of leaks on the trio, including detailed renders. One source, however, want above and beyond and actually posted high-res, close-up shots of a prototype unit, complete with hardware details and software screenshots. Now, the exact same unit has been spotted on eBay and is officially sold for the whopping sum of $3,000.


OnePlus 9 5G prototype

How do we know it’s the same unit? Well, the product photos in the eBay listing feature the same distinctive carpet-like surface as a background and otherwise match-up with the earlier leak. Plus, the description of the now finished auction states that:

The leaked images on all internet sites are similar to this because I took the pictures and leaked this to all of them when I purchased it.

Interestingly-enough, it goes on to also explain that:

This is a prototype model with a beta oxygen os Android 11. I cannot guarantee a software update for this phone. This phone has a permanent set of numbers and letters displayed at the bottom that cannot be removed as of now. This is the phone only, no charger or anything else included in this sale … I will be doing a tech review of the phone before shipping and cannot guarantee it will be shipped at a specific time due to the holidays and the review. Once the review is done I will immediately ship the phone and send the link to the review when completed. Again I do not know when I will do the review at this time but it will be done in the next 2 weeks.

This is the really odd part here, since the seller/leaker is definitely aware that he/she has a prototype unit. Hence the lack of update and support guarantees. Apparently, however, they were not quite aware what that “permanent set of numbers and letters displayed at the bottom” was there for. In case you are wondering, it is there to identify prototype units and trace them to the source to prevent exactly these kinds of situations.

Some manufacturers use software-based identifiers like this, while others rely on more-permanent hardware markings, like dots, dashes and other patterns on the frame of the device. The original leaked photos of the phone had the identifier string blurred, but the eBay listing initially featured a photo with the ID fully-visible. Likely an oversight that was eventually corrected, but not quick enough for the internet to not remember it forever.


OnePlus 9 5G prototype

That being said, we are interested to see whether the seller/leaker will still go through with the review in the next two weeks, as promised. We’ll be keeping an eye out for that extra bit of potential weirdness to add to the story.


OnePlus 9 5G prototype

As for a quick leak recap of what to expect from the OnePlus 9 5G – it willfeature a 6.55-inch flat HDR display of 120Hz refresh rate and FullHD+ resolution. The Snapdragon 888 chipset will be paired with 8GB of RAM and 128GB of non-expandable storage, while the back will have 48MP main and 16MP ultrawide cameras.

Inside will be a 4,500 mAh battery charging at 65W, while on the outside we’ll see a metal frame.

Source 1 | Source 2 | Via

rc3:-mastodon,-matrix-&-co.-–-building-blocks-and-hurdles-for-decentralized-online-systems

rC3: Mastodon, Matrix & Co. – Building blocks and hurdles for decentralized online systems

Internet users spend a lot of time in the central silos of Google, Amazon, Facebook, Apple and Microsoft. The US giants benefit from network effects that are driving more and more users to the platforms. A wide range of technical initiatives have set themselves the goal of combating the resulting monopoly structures in online services and building decentralized alternatives. Even proponents of such projects admit that most of them are still emulating the central figures: they have to catch up or develop their own killer apps.

Far from a breakthrough Web hacker Will Scott gave an overview of the current state of affairs at the remote Chaos Communication Congress (rC3). According to him, 2020 have both federated communication networks like the messenger service Matrix and decentralized platforms like the social network Secure Scuttlebutt (SBB) , the InterPlanetary File System (IFPS) and – in a broader sense – cryptocurrencies have become more widespread. But most of them are still far from a breakthrough and are confronted with many big questions about growth options.

BitTorrent is one of the experts in censorship-resistant web Applications with three to four million users a day to one of the largest decentralized entities. The peer-to-peer network (P2P) offers around 2.5 million active torrents. In order to keep an eye on these and to download them in a resource-saving manner, there are around 400 special open tracker applications. There are distributed hash tables (DHT) with over four million torrents for searching.

Good year for Twitter alternatives (Image: rC3 media.ccc.de, CC BY 4.0)

Mastodon also had a “good year” according to Scott. The Twitter alternative now contributes around three million active users and about 5000 busy servers to the social media world “Fediverse”. 70. 000 Members regularly post content themselves, the rest is limited to reading along. The number of Matrix users was said to have risen to 2.5 million at the same time, which the server on 2500. The significant increase is due, among other things, to the fact that the Bundeswehr and parts of the German education system had decided to switch to the open communication protocol. In addition, Matrix is ​​also subsidized by the government in France.

IPFS, which works similarly to BitTorrent, has exceeded two million users, of whom 20 Percent operated their own desktop nodes, said the computer scientist happily. It includes a total of 5000 guaranteed DHT nodes and around eight million daily CIDs (Content Identifiers) for recognizing content. Planetary.social has also expanded a special SBB protocol to the mobile Internet. The self-hosted, mesh-networked social media system SBB itself comes to around 10. Members, several hundred of whom posted content and pushed the underlying P2P protocol .

Bitcoin has around one million active accounts and 11 . “Full Nodes”, which generated new blocks for the production of the digital coins, performed Scott. There is a big gap between users and servers here. This is due to the fact that a complete node alone requires around 70 gigabytes for the blockchain. Basically, the scientist also counted about six million SMTP and good 500. 000 WordPress server and 20 Millions of Jitsi users to the decentralized network.

Problems of growth While some of the offers still require a critical mass of users, the more successful of them are already suffering from growing pains. The goal of federated network services was to externalize and better balance the heterogeneity of resources between clients and servers, explained Scott. Some of the connected instances have more storage space and are more available. How much all members benefit from it depends heavily on the heuristics used and the algorithms created with them.

The different models

(Image: rC3 media.ccc.de, CC BY 4.0)

In mesh networks, messages and content often spread like rumors, which required additional synchronization efforts, clarified the hacker. Often there is no catchy concept for the structure of the network, so that its properties are also difficult to implement. DHT, on the other hand, grow massively quickly with the number of users who bring data and resources with them, so they scale poorly and, in abstract form, can be compared with a central database. The achievability of the goal of getting content as close as possible to the location of one’s own computer again depends on the quality of the algorithms.

According to Scott, broken nodes also lead to crashes and delays. There must therefore be incentives not to do anything “bad” in the network. However, this approach also leads to more centralization, since individual units that acted in an exemplary manner received more power. If you wanted to identify individual users, this could be done via an external authority. However, this raises data protection problems. Even now, metadata such as IP addresses are not protected by some decentralized service providers. Advanced encryption and at least pseudonymization solutions are required here.

Decentralization against the power of the great The researcher identified bandwidth as a further problem, especially for P2P networks: uploads are still designed for only half the capacity of downloads on most Internet connections. The latency between neighboring nodes is comparatively low, but connections between end users are usually not well developed. For Scott there is still no doubt: “We need decentralization, otherwise the power of the big ones will increase.”

(mho)

rc3:-massive-vulnerabilities-in-apps-from-mobile-network-providers

rC3: Massive vulnerabilities in apps from mobile network providers

Florian Schweitzer presented his personal collection of vulnerabilities in the area of ​​Cross Site Request Forgery (CSRF) in web applications of Austrian mobile phone providers at the remote Chaos Communication Congress (rC3). The hackers described the security gaps, also known as “session riding” or “sea surf”, and the attacks based on them as “particularly dramatic” because they were “very easy to exploit”.

Simple attack, difficult to detect Unlike attacks on the Signaling System 7 (SS7) used in 3G, there are no CSRF Access to a gateway and no know-how about network operation required, the hacker explained. Sea surfing attacks could start with a “boring, annoying newsletter”. A click on an allegedly redeeming “Unsubscribe” link contained therein is often sufficient for an intruder to set up a call diversion for a target person. This also enables the passwords of e-mail accounts with providers such as Google, Yahoo or Microsoft that are linked to the phone number to be reset and the accounts to be adopted.

When unsubscribing from a newsletter, only a website appears on the user’s screen, after which one has successfully unsubscribed, Schweitzer explained the procedure. If you then try to log into your e-mail inbox, you are locked out. Anyone who then connects to the called up link can possibly see a form with two invisible fields in the source code of the page that pops up.

One of them is directed to the site of the mobile phone provider, where a new telephone number is automatically entered and the call diversion is set in the background, the activist reported. An invisible iframe is loaded and automatically sent when the link is opened. Google and other e-mail providers also persuade users to supposedly store a mobile phone number to protect their account in order to prevent forgetting a password. Such an account can also be reset.

No new problem According to Schweitzer, CSRF in itself is nothing new and has already been described as a “confused deputy” problem in the 1980 er. In principle, one program with fewer privileges will get a second with more rights to do something. The authentication can also be done with IP addresses. The attacker sends a link and thus induces the user to visit a compromised page. This sends a get request and receives the payload back in the form of a form. This is sent to another site where the target person is already authenticated. The server then believes that the victim has sent the command or the request and is taking the desired action.

In demos, the security expert demonstrated how relevant loopholes at Austrian providers can be exploited. Ventocom, a provider that enables third parties to operate their own mobile phone brand, has proven to be vulnerable. Rapid Mobile, a Linz cable operator and Aldi-Süd subsidiary Hofer Telekom (HoT) make use of this offer. The latter alone has issued over a million SIM cards in Austria and around a hundred thousand in Slovenia.

The customer login to hot.at is password-free using a PuK code, which can be sent by e-mail can leave. All kinds of changes can be made in the internal area, including the customer password. For this you have to enter the old one. If you enter a new e-mail address or set up call diversion, this is not necessary. The attacker can use a fake newsletter with the problematic link to enter an electronic mailbox controlled by him and receive an access link there.

Improved protection in Chrome Schweitzer also showed the next steps with call diversion, changing the password on Google over the phone and taking over a Gmail account. For hot.at, there is already a valid session cookie in the target person’s browser that opens access to the customer account. The post request running in the background via an iframe works with Safari, Firefox, Samsung Internet, Opera and Internet Explorer, where even phone calls can then be completely recorded. Chrome have introduced stricter rules for cookies in Mitte 2019 with the “SameSite attribute” and thus significantly improved protection against CSRF.

With the provider “Drei” the hacker came across a comparable vulnerability, which affected 3.9 million accounts in Austria. Anyone who accesses the Internet via the provider’s cellular network is immediately identified by their number and can always log into their account automatically. This leaves the choice between a valid session cookie and the default activated auto-login for the further procedure. A permanent account takeover and eavesdropping are not possible here, however, since logging in only works with a current click due to an implemented function against “clickjacking”.

Even with the A1 subsidiary Yesss, which operates as a Schweitzer found such gaps to act as a service provider for ten virtual mobile phone providers, such as the newspapers Kurier and Krone, as well as an energy supplier. This affected over 5.4 million customers. Since he – in contrast to the other providers – has found a contact person for IT security here, the weaknesses have since been remedied after a hint from him. An attacker was even able to set a customer password for an entire number porting and, for example, read SMS and reset Twitter accounts. The web app from T-Mobile Austria (Magenta) was “safe”.

Dozens of million devices in Europe are vulnerable Schweitzer estimates that a total of 40 percent of Austrian citizens were (were) affected by the gaps. Across Europe there are likely to be tens of millions, as things look hardly any better there. Vulnerable endpoints could be identified in a short amount of time. Actually, it is forbidden in the EU to offer such attack surfaces in important infrastructures. Apparently the sanctions are too low and nobody is checking whether security standards are being met. A heise online reader recently noticed a vulnerability on the Vodafone Germany website that allowed a similar attack via “Reflected Cross-Site-Scripting”.

The expert recommends developers to use anti-CSRF To implement tokens, to set a strict “SameSite” rule and to require a password for important changes to account data. The “same-origin policy” of browsers does not offer any remedy. Users should not use their phone number to restore accounts, as mobile operators are “the weakest link in the security chain.” You should not log into important accounts with the standard browser, deactivate auto-logins and actively log out.

(mho)

the-best-smartphone-camera-of-2020-–-six-high-end-devices-compared

The best smartphone camera of 2020 – Six high-end devices compared


Tweakers uses cookies Tweakers is part of DPG Media. Our sites and apps use cookies, JavaScript and similar technology, among other things, to provide you with an optimal user experience. It also allows us to record and analyze the behavior of visitors and add this information to visitor profiles.

Cookies can be used to show advertisements on Tweakers and to recommend articles that match your interests. Third parties can also track your internet behavior, as is the case with embedded videos from YouTube.

Cookies can also be used to display relevant advertisements on third party sites. More information about this can be found at tweakers.net/cookies.

To view pages on Tweakers, you must accept the cookies by clicking on ‘Yes, I accept cookies’.

Click here to login.

vodafone-activates-the-lte-m-network-for-iot-devices

Vodafone activates the LTE-M network for IoT devices

Vodafone has expanded its network to include the LTE-M standard. The technology for the Internet of Things is now available on more than 18 percent of the area of ​​Germany, the telecommunications company announced on Tuesday. “LTE-M is the next component in our network so that people, machines and sensors can communicate with each other at any place and at any time,” said Chief Technology Officer Gerhard Mack.

From Narrowband IoT to 5G In the Vodafone network, LTE-M represents one of four Building blocks. Machines and sensors should use it to communicate with people, for example in industry. Factory workers, for example, could control production machines with voice instructions, advertises Vodafone. However, private customers should also be able to use LTE-M, for example with fitness trackers, smart watches and smart home devices. Fitness trackers could, for example, automatically send an emergency call in the event of a fall.

In addition to LTE-M, Vodafone also offers the Narrowband IoT machine network, which is intended to ensure communication from machine to machine or from sensor to sensor. Smartphones and other mobile devices communicate via the better-known networks, LTE and 5G.

Similar to Narrowband IoT, LTE-M transmits on the low 800 – Megahertz frequencies with a long range. Underground garages, cellars or industrial halls should also be covered. Unlike Narrowband IoT, LTE-M does not rely on a fixed location, but uses the so-called handover. If the IoT object moves, the data is transferred from cell phone station to cell phone station. This means that the network is also suitable, for example, for tracking sensors on parcels, explains Vodafone.

LTE-M lines up as one of four modules with different specifications and transmission rates into the Vodafone network.

(Image: Vodafone)

Limited Bandwidth The maximum bandwidth of LTE-M is two MBit per second, which according to Vodafone is usually sufficient for data transfer from sensors. For applications with large amounts of data such as augmented reality, however, 5G should be used, with bandwidths of up to one GBit per second.

According to the company, technicians have more than to expand at Vodafone. . 000 Cellular stations modernized. Business customers can now use the network throughout Germany. Deutsche Telekom has already put its LTE-M network into operation in the middle 2020. (akr)

zoom-in-2020-–-roller-coaster-ride,-but-without-culture-change

Zoom in 2020 – Roller coaster ride, but without culture change


Tweakers uses cookies Tweakers is part of DPG Media. Our sites and apps use cookies, JavaScript and similar technology, among other things, to provide you with an optimal user experience. It also allows us to record and analyze the behavior of visitors and add this information to visitor profiles.

Cookies can be used to show advertisements on Tweakers and to recommend articles that match your interests. Third parties can also track your internet behavior, as is the case with embedded videos from YouTube.

Cookies can also be used to display relevant advertisements on third party sites. More information about this can be found at tweakers.net/cookies.

To view pages on Tweakers, you must accept the cookies by clicking on ‘Yes, I accept cookies’.

Click here to login.

rc3:-stress-test-leads-to-many-iphone-crashes

rC3: Stress test leads to many iPhone crashes

Communication chips that Apple uses in iPhones only withstand endurance tests to a limited extent. This was demonstrated by Jiska Classen from the research group for mobile radio security at the TU Darmstadt at the remote Chaos Communication Congress (rC3). Again and again you could see on their recordings how the devices “said goodbye” in an uncontrollable state – sometimes with unusual sound effects. They lost their “orientation” and some had to be reset to their original state.

Classen used the fuzzing method for her experiments. In this case, large amounts of random data are continuously sent to the system to be tested via one or more input interfaces in order to automatically check its robustness. The scientist focused on the baseband chip, which is responsible for network functions such as telephony, SMS transmission and internet access. By smuggling in manipulated data packets, according to their thesis, security gaps in the higher-level, actually shielded iOS operating system could then possibly be exploited in order to execute their own commands.

New approaches for mobile radio research This strategy is already very interesting from the perspective of reverse engineering, i.e. the replication of critical proprietary functions, stated Classen. In the resulting profiles you can see a lot of messages for baseband management. With iPhones, on which usage restrictions have been removed by jailbreak, you can smuggle in data packets and change the behavior of the modem without any problems. This paves the way for new approaches in mobile communications research.

Specifically, the expert initially felt the chips and devices via Wireless Protocol Fuzzing on the tooth, so subjected the protocol implementations for wireless communication to a stress test. To do this, she sent images to the image parser responsible for processing to see what was being executed and how. She combined the relevant files into a corpus and supplemented this with standard-compliant JPEGs and artificially generated images. So she could see which files caused a crash and what exactly was the cause.

Ddd-di-di-dd-di-d-di-d -di-d-dimm! Classen also succeeded in replacing bits and bytes with his own data and smuggling them in during ongoing calls or incoming short messages. After observing the effects that the manipulated data induced, she was able to refine the method and send large amounts of short messages to the baseband chip. The iPhone then received so many text messages in a short time that it no longer had time to play the typical dimming tone for each one. Instead, only an unspecific “Ddd-di-di-dd-di-d-di-d-di-d-dimm” could be heard.

Classen was also able to force calls to hotlines to be dropped, whereby the tested iPhone repeated the last syllables of an announcement in a staccato manner. In another case, the user should re-enter his PIN; at other times, the test device constantly reported a busy line by mistake. In another demo, an SMS could no longer be deleted, so a reset was necessary. According to the researcher, the process can still be expanded, as many functions could not be carried out even with a good starting body.

Frankenstein module for Bluetooth Classen also showed in her lecture which fuzzers she used and how she adapted and combined these tools for the iPhone chips with her own code. So far, the research group has mainly examined Bluetooth chips. Team colleague Jan Ruge built a module called “Frankenstein” to emulate the Bluetooth firmware at the same speed as with conventional hardware and thus to be able to carry out realistic tests for complete protocol stacks.

As The scientist named ToothPicker, Frida as well as DTrace and American Fuzzy Lop (AFL) as other helpful tools. In some cases, she let this fuzzer run for several weeks and thus repeatedly generated crashes, for example on the iPhone models 7 and 8, and discovered weak points. Some problems would also have extended to the macOS desktop and laptop operating system. One hurdle was that the channels were closed after receiving some invalid packets when establishing a wireless connection. This behavior could be turned off with Frida.

Undocumented remote interface With the Analyzes revealed Classen differences between iPhone 8 models for the US and Europe. While the USA variant contains a Qualcomm chip with the documented MSM interface (QMI), the European variant contains an Intel chip with a previously largely unknown interface called Apple Remote Invocation (ARI). Data packets sent over the air could in principle control these two interfaces, even if an intermediate layer was built in. The two different libraries could be fuzzed with Frida. In some cases, the CommCenter was taken out of service, calls were lost and Internet connections had to be re-established. Sometimes the virtual communication center continued to run and also processed packets with incorrect values.

During the tests, Classen made an iPhone 8 almost unusable. The start-up procedure only ran until pongoOS before the actual boot process of the iOS. Normal starting was only possible after a few hours. The Intel variant noted log files totaling 500 megabytes, so that the internal memory quickly filled up. Then the deletion of photos no longer worked and SSH logins failed.

In general, fuzzing would “confuse iPhones very much”, explained the researcher. They requested reactivation, lost their location function and displayed flash messages highlighted in gray. There is still a lot of leeway for hackers to try out. But it is better not to use your private smartphone for this. Classen sent crash reports and information about possible security holes to Apple. The group has identified the major weaknesses with the iOS updates 14. 2 and 14. 3 closed.

(dz)

the-next-manufacturer-is-trying-to-make-faceplates-for-the-playstation-5

The next manufacturer is trying to make faceplates for the Playstation 5

Not every player likes the design of Sony’s new Playstation 5. Many fans on the internet repeatedly express the desire to have the option of replacing the white side panels with other color variants. Plain black seems to be particularly popular. Sony does not officially offer any alternative panels for replacement at the moment, and there is no information to suggest that this will change in the near future. Fortunately, however, there are third-party providers who have recognized the need and want to open up the niche in the market.

In the past an attempt to sell alternative side panels was stopped by Sony. At that time the company asserted that the name “Platestation” was chosen too similar to its own products. It remained unclear whether Sony was only interested in the name or whether the Japanese group wanted to prevent the sale of alternative panel designs in general.

Independent of Sony’s Another third-party provider has announced intentions to sell custom side panels for the Playstation 5 in the future. The company with the name Dbrand would like to start mass production at the end of this year, a market launch is to follow 2021. The first model presented comes in matt black, further colors and alternative designs are to follow. The company stated: “ The skills that we have honed over the past few years in the development of the Grip Case have put our company in a unique position To produce faceplates in OEM quality: those with all the presentation, the attention to detail and the unnecessarily complex packaging that you expect from Dbrand “.

At the same time, the possibility of pre-ordering is excluded, so the product should only be sold as soon as the side parts are actually in stock and ready for dispatch. You don’t want to sell an unfinished product, says Dbrand. Interestingly, the company explicitly mentions CD Project Red as an example of a rash, with the well-known consequences. Interested players can also register for a mailing list via the official website, which will notify them as soon as a launch date is announced.