Podchaser Logo
Home
Not So Fast - GPS Vulnerabilites, VPN Flaw

Not So Fast - GPS Vulnerabilites, VPN Flaw

Released Wednesday, 8th May 2024
Good episode? Give it some love!
Not So Fast - GPS Vulnerabilites, VPN Flaw

Not So Fast - GPS Vulnerabilites, VPN Flaw

Not So Fast - GPS Vulnerabilites, VPN Flaw

Not So Fast - GPS Vulnerabilites, VPN Flaw

Wednesday, 8th May 2024
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:00

It's time for security now. Steve

0:02

Gibson is here. You'll talk about

0:04

Gps, fussing, how it works, what

0:06

one can do to avoid it.

0:09

You've all heard about that Vpn

0:11

flaw that Ars Technica says makes

0:13

all Vpn useless. Not so fast.

0:15

Steve explains why it is not

0:17

anything to panic about and then

0:19

speaking, I'm not so fast. Google

0:21

has stopped progress on abandoning third

0:24

party cookies. Steve now knows why.

0:26

He will explain all that a

0:28

whole lot more coming up. Next

0:30

Security Nasty. Room

0:33

I guess you love

0:35

from people you trust.

0:39

Was his tweet. This.

0:45

Is Security Now is Steve Gibson

0:47

episode Nine Hundred Seventy Three Recorded

0:49

Tuesday, May seventh. Twenty Twenty Four.

0:52

Not so fast. It's time for

0:54

Security. Now the show. We cover

0:56

the latest security and computer news

0:59

and privacy news. And of course

1:01

it was. I find Tv thrown

1:03

in with this guy right here.

1:06

Steve Gibson, the arbiter of all

1:08

that is good and kind L

1:10

as well. Go for that. Yeah,

1:13

Elo Leo. Although here yard the

1:15

beginning. Of May. And.

1:19

As I promised. I. Did have

1:21

some time. To. Dig into.

1:24

The. Issue that came up

1:26

actually two weeks ago. When.

1:29

In the middle of the show you said

1:31

hey, Google just. Change

1:35

their plans on third party cookies and I

1:37

said. But. Ah, Anyway,

1:39

so. We're going

1:42

to talk about that. The

1:44

today's episode is titled Not

1:46

So Fast. Which. You

1:48

know, As if that expression

1:50

not so fast there. which

1:54

is what the uk as they do google

1:57

but we're going to first look at what

1:59

danger is bruce presented by the world's current

2:02

and growing dependence upon GPS,

2:05

and why is that any concern, has

2:09

the sky fallen on all VPN

2:11

systems as the tech press has

2:13

been reporting since yesterday when a

2:16

blog post really went a little out

2:18

of control. I was really hoping, and

2:20

I wanted you to explain option 102

2:22

or whatever. Option 121. Yes,

2:26

I really want to move on. We'll know all about

2:28

that by the time we're done today. Thank you. Also,

2:31

a couple

2:33

questions more from our listeners, still

2:37

bogged down in what is arguably

2:39

a quagmire of network authentication options.

2:41

So I'm going to spend a

2:44

little more, continuing to come into

2:46

CRISPR focus for me, so I

2:48

figured let's spend a little more

2:50

time on what's going on there. Also

2:53

we may have an answer to what

2:55

Apple was doing with the iCloud

2:57

keychain deleting and what was going

2:59

on, something that absolutely makes sense,

3:02

so we're going to cover that.

3:05

And also, finally, as I

3:07

said, I invested

3:10

no little bit of time. You'll

3:14

hear the term bureaucracy used

3:18

more times probably than any large word

3:20

in this podcast

3:22

because, boy, I guess

3:26

any kingdom that's been around as long

3:28

as the United Kingdom has

3:31

continued to survive has also developed

3:34

quite a system of bureaucrats, and

3:36

they all want

3:38

to weigh in on Google's plans. So anyway,

3:40

I think another great podcast for our listeners

3:43

and a picture

3:46

of the week that's kind of a hoot too.

3:48

Oh, good. Always enjoy the pictures of the week.

3:51

Well, SecurityNow is ready to get underway. I

3:53

hope you are as well, boys and girls,

3:55

cats and kittens, club

3:57

members, and others. Now,

4:00

you club members, you don't have to hear this because

4:02

it's time for a commercial. Our

4:04

show today brought to you by, you

4:07

know the name, Melissa, the data quality

4:09

experts. Since 1985,

4:13

did you know Melissa's global

4:15

address verification and validation service,

4:18

I mean when they say global, they mean it, works

4:20

in 240, 240 plus countries and territories. I

4:24

didn't even know there were that many. Now,

4:27

why is that important? Well, no matter where

4:29

your business is located, now you can improve

4:31

deliverability worldwide, reduce costly

4:33

errors, you can boost your

4:35

address data accuracy everywhere, increase

4:38

delivery speed, boost ROI.

4:40

It is ultimately all about the return

4:42

on investment. That's why Melissa offer free

4:45

trials, sample codes, flexible

4:47

pricing. They know your bottom

4:49

line is important to you. They also

4:52

know your data is important to you.

4:54

And Melissa secures your data with the

4:56

highest quality standards. They are FedRAMP authorized.

4:59

Now, that's a huge deal. Of course, it doesn't

5:01

matter if you're not a government agency, but everybody

5:03

benefits from that security level. It's the best you

5:05

can get. All

5:08

Melissa users benefit from that also,

5:10

of course. Melissa's solutions and

5:12

services are GDPR and CCPA compliant.

5:14

They mean SOC 2 and HIPAA

5:16

high trust standards. So your information

5:18

is absolutely secure with Melissa. But

5:20

they can do so much with

5:22

it to really improve your

5:24

customer data. And better

5:27

customer data means a better bottom

5:29

line. Download the free Melissa

5:31

Lookups apps if you want to try it.

5:33

They're on iOS and Android. They're absolutely free.

5:35

Melissa Lookups with an S. You

5:38

don't even have to sign up. You can validate

5:40

addresses and personal identities in the US or Canada.

5:43

You can check global phone numbers, global IP

5:45

address information and more. It's really a handy

5:47

little tool. Get started today. 1000

5:50

Records Clean for free. Just to give you

5:52

a sample of what Melissa can do on-prem

5:54

in the cloud as a SaaS application. They

5:56

have an API so you can build it

5:58

in your own software. Go to

6:00

melissa.com/twit to know more.

6:04

Melissa, melissa.com/

6:08

twit. And we thank them so much for

6:10

the support of the good work, the important work

6:12

that Steve's doing right here at

6:14

Security Now. Well, the

6:16

important work will be appearing

6:19

shortly. Hey, this is

6:21

important work. Do not knock this work. Now

6:25

we have a picture, our picture of the

6:27

week, from somewhere looks like in the U.S.

6:31

Southwest. There's

6:33

no signs of any telephone poles

6:36

or structures, so we're kind of

6:38

out in the desert somewhere. And

6:42

so one of the things that people want

6:45

is they want their cell phones to

6:47

work out in the middle

6:49

of nowhere. And actually this is a problem

6:52

I have with many movies these days which

6:54

seem to forget that it's necessary to have

6:56

a cell tower not too

6:58

far away from where your

7:01

cellular device is in order

7:03

for it to get any connection. We

7:05

see people wandering out in the middle

7:08

of literally nowhere and they're on the

7:10

phone, unless the writers don't want

7:12

them to be, in which case they're holding the phone up,

7:15

scanning around, trying to find a signal. Well,

7:19

the way we solve the problem

7:21

of people wanting cell phone

7:23

coverage wherever they are, yet

7:25

nobody wanting to despoil the

7:27

landscape as a means of

7:29

providing it, is we come

7:31

up with stealth cell

7:34

phone towers. And

7:36

I'm not sure how truly

7:38

stealthful this is because it looks

7:41

a little square to be a

7:44

cactus. But I gave

7:46

this picture, they captioned, oh don't

7:49

mind us, we're just putting the lid

7:51

back on the cactus. Because

7:54

this is clearly a cell phone

7:56

tower cactus Which is meant

7:59

to... Don't read it

8:01

actually. if ya, it's got a little

8:03

extra. I wouldn't call

8:05

it arm off the side of the

8:07

cactus. Good looking, a little more to

8:10

make of whole thing, looking for more

8:12

tact the slightest As as said so

8:14

and actually you could see some cat

8:16

died in the neighborhood that look decidedly

8:18

less mechanical. They're not stay this way

8:20

all over Mexico, the city so are

8:22

of cactuses and I guess the southwest

8:25

as well. So be it are you

8:27

see it with a hundred others you

8:29

probably wouldn't look twice. Sexy.

8:31

However with sir it's certainly not Bruno

8:33

an eyesore looking like this thing would

8:35

look like at with the lid off

8:38

would I can see or because they

8:40

did it was a success at it.

8:42

At a crazy either billet is often

8:44

the crane is has is lifted the

8:46

yeah the lid off the cactus Anyway

8:49

I just got a kick out of

8:51

this just as and I I've seen

8:53

fake palm trees and I know that

8:55

here in on on the so called

8:57

the Sword now the famous four or

8:59

five in Southern California. Are

9:01

there are. Power. Lines

9:04

that run alongside the freeway

9:06

and. And. Every

9:08

like very often, there's a

9:11

big cluster of of of

9:13

cells. Equipment on these power

9:15

lines because it's a perfect place for

9:18

them to be. You know it's over,

9:20

there's already or I have a right

9:22

away there's saw ability to to to

9:24

run a service vehicle along the back

9:26

and and so forth and I many

9:28

many many moons ago it's back in

9:30

the spin Right actually was actress been

9:32

right to because I remember I was

9:34

working on Spin Right Three I built

9:36

a building. When. A lease.

9:39

So the a whole and I go

9:41

to a corporate headquarters. or twenty thousand

9:43

square feet, two stories and one point

9:45

so more my acres of land. That

9:47

so for now anyway. Ah, the cell.

9:50

Companies. came to me and

9:52

said hey ah this building is like

9:55

up on a point on a bluff

9:57

look at out over this valley you

10:00

can make some extra money by

10:03

letting us put some self things

10:06

along you know I'd like ringing along the edge

10:08

of your roof well you

10:10

know what my answer was you said

10:12

no answer you know this is a

10:14

beautiful building I'm not gonna have it

10:17

you know warts of self

10:19

crap all over that they're there now

10:22

Steve they are I

10:25

mentioned that because I drove by

10:28

not long ago you know looking

10:30

wistfully up at the building and

10:32

there it was just I don't

10:34

know I don't think you could

10:36

you could get more cell tower

10:38

crap around the perimeter of

10:40

this roof than there is there now

10:42

but not while I was in

10:44

control but immediately after I left

10:47

here anyway such

10:49

as the world you know and that's why I also have

10:51

no ads on my site I've Mark Thompson

10:53

made a case of what point he

10:55

said Steve there's something wrong

10:57

now with a website that doesn't have

11:00

a yeah what's wrong with you yeah

11:02

no thank you

11:06

anyway I wanted to

11:08

start off this week by sharing an important

11:12

piece of interesting news that's not

11:14

internet security related but is

11:16

nevertheless potentially quite a

11:18

big and serious issue in the

11:20

real world last

11:23

Thursday's headline and wired was

11:26

the dangerous rise in

11:28

GPS attacks with the

11:30

subhead thousands of planes and

11:32

ships are facing GPS jamming

11:34

and spoofing experts

11:37

are warning these attacks

11:39

could potentially impact critical

11:41

infrastructure communication networks and

11:44

more okay so I thought

11:46

that was interesting got my attention they

11:49

said the disruption to GPS services

11:51

started getting worse on Christmas

11:53

Day meaning at the end of 2023 planes and

11:55

ships moving around southern Sweden.

12:00

And Poland loss connectivity.

12:02

As. The radio signals were interfered with.

12:05

Since. Then the region

12:07

around the Baltic Sea,

12:09

including neighboring Germany, Finland,

12:12

Estonia, Latvia, and Lithuania

12:14

has faced persistent attacks

12:16

against Gps systems. Tens

12:19

of thousands of planes flying

12:21

in the region of reported

12:23

problems with their navigation systems

12:25

in recent months amid widespread

12:27

giant jamming attacks which make

12:29

Gps inoperable as the attacks

12:31

have grown. No. Surprise

12:34

to anyone. Russia. Has

12:36

increasingly been blamed with

12:38

open source researchers tracking

12:40

the source to Russian

12:42

regions such as Kaliningrad,

12:44

In. One instance, signals were

12:47

disrupted for forty seven hours

12:49

continuously. On. Monday murky

12:51

one of the most serious

12:53

incidents yet airlines thin Air

12:55

council it's flights to Tart

12:57

to Estonia for a month.

13:00

After Gps interference forced to have

13:02

it's planes to abort their landings

13:04

at the airport and turn around.

13:06

Part. About dependence on Gps apparently

13:09

uses can't land anymore without it.

13:12

The jamming in the Baltic region they

13:14

wrote which was first spotted an early

13:16

Twenty Twenty Two is just the tip

13:18

of the iceberg. In. Recent years,

13:20

there's been a rapid uptick

13:22

in attacks against Gps signals

13:24

and wider satellite navigation systems

13:27

known as G and Ss

13:29

as jill generic satellite navigation

13:31

including those of Europe, China,

13:33

and Russia. The attacks could

13:35

jam signals, essentially forcing them

13:37

off line or spoof the

13:39

signals, making aircraft and ships

13:42

appear as false locations on

13:44

maps, which you can imagine

13:46

my be even more damaging

13:48

than just jamming outright. Beyond

13:51

the Baltics war zone areas around

13:53

Ukraine and the Middle East have

13:55

also seen sharp rises and Gps

13:57

disruptions including signal blocking then to

13:59

disrupt airborne attacks which actually as

14:01

will see lil bit later the

14:04

I think is is the did.

14:06

The. Actual goal of this? because of

14:08

that the degree to which drones

14:10

are now using Gps. Wired.

14:13

Wrote now government's tell com

14:15

and airline safety experts are

14:17

increasingly sounding the alarm about

14:20

the disruption have the potential

14:22

for major disasters. Foreign ministers

14:24

in Estonia, Latvia, and Lithuania

14:26

of all blamed Russia. For.

14:29

Gps issues in the Baltics this

14:31

week and said the threat should

14:33

be taken seriously. Jamie. Adamson,

14:35

the Chief of public affairs for

14:37

the Swedish Navy, told Wired quotes

14:39

It cannot be ruled out that

14:41

this jamming as a form of

14:43

a hybrid warfare. With. The

14:45

aim of creating uncertainty and

14:47

unrest. Of course, there

14:49

are concerns mostly for civilian

14:51

shipping and aviation that an

14:54

accident will occur, creating an

14:56

environmental disaster. There's. Also a

14:58

risk that ships and aircraft will

15:00

suspend their traffic to this area

15:03

and thereby effect global trade. Your.

15:05

Wagner. A spokesperson from Germany's

15:07

Federal Officer Information Security told

15:10

Wired a growing threat situation

15:12

must be expected in connection

15:14

with Gps jamming. Wagner.

15:17

Said there are technical ways to

15:19

reduce its impact. Officials and villain

15:21

say they've also seen an increase

15:24

in airline disruptions in and around

15:26

the country. And a spokesperson for

15:28

the International Telecommunication Union, a United

15:31

Nations agency, told Wired that the

15:33

number of jamming and spoofing incidents

15:35

have increased significantly. Over. The

15:37

past four years. And. Interfering with

15:40

radio signals is prohibited under the

15:42

I to Use rules. g. using.

15:45

Russia has slowed down by

15:47

a Nato agency the International

15:50

Telecommunication Union saying well, you

15:52

should be doing math. right?

15:55

Attacks against Gps and the

15:58

wider Gnss category. In

16:00

two forms. First, Gps jamming

16:02

overwhelms a radio signals that

16:04

make up Cbs and make

16:07

the systems unusable. Second, spoofing

16:09

attacks, which actually are far

16:11

more sophisticated. Ten replaced the

16:13

original signal with a new

16:15

location Spoofed ships can, for

16:18

example, appear on maps as

16:20

if they're at inland airports,

16:22

and actually, that did happen

16:24

recently. Both types of interference

16:27

have increased in frequency disruptions

16:29

at least. At this stage

16:31

mostly impact planes flying at high

16:33

altitudes and ships. They can be

16:35

an open water not people's individual

16:38

Phones are other systems that rely

16:40

on Gps within the Baltic region.

16:43

Forty. Six thousand aircraft

16:45

showed potential signs of

16:47

jamming between August Twenty

16:49

Twenty Three and March

16:51

this year. According to

16:53

reports and data from

16:55

tracking service, Gps jam

16:57

Ben was Seagate. And.

16:59

An academic at the Zurich University

17:02

of Applied Sciences who also runs

17:04

alive Gps spoofing map there is

17:06

such a thing says there had

17:08

been an additional forty four thousand

17:11

spoofing incidents logged since the start

17:13

of this year. Earlier.

17:15

This month, more than fifteen

17:17

thousand planes earlier this month.

17:20

More. Than fifteen thousand planes

17:22

had their locations spoofed to

17:25

be rude Airport. According.

17:27

To data that Sergei shared

17:29

with Wired, more than ten

17:31

thousand were spoof to the

17:34

Cairo Airport, while more than

17:36

two thousand had their locations

17:38

showing in Yarrow Slavic Russia.

17:40

The data shows. Separate.

17:43

Analysis from Geospatial Intelligence Company

17:45

Geo Collect shared with Wired

17:48

showed that on April sixteenth,

17:50

around fifty five ships. Broadcasts.

17:53

Their location as being or

17:55

hover the main runway. At.

17:59

Us. Semper

18:02

All Paul International Airport in Crimea,

18:04

Ukraine. The airport is around ninety

18:06

miles inland from the Black Sea.

18:09

Words Believe the ships were actually

18:11

located. So yeah, it's no longer

18:13

possible to the believe what Gps

18:15

is showing you. You need to

18:18

look out the window and see

18:20

where you actually are. Zoc

18:23

Clements, a graduate research assistant at

18:26

the University of Texas here in

18:28

Austin, said the biggest change in

18:30

the past six months is definitely

18:33

the amount of spoofing. As I

18:35

said, spoofing as far more sophisticated

18:38

and difficult than just jamming and

18:40

potentially far more dangerous. He said

18:42

for the first time, we're seeing

18:45

widespread disruptions in civil aviation, especially

18:47

in the Eastern Mediterranean, the Baltics

18:50

and the Middle East in prior

18:52

years. There were reports of spoofing

18:54

impact the marine vessels. But. Not

18:57

aviation. Clemens. Says there

18:59

appear to be three spoofers that can

19:01

be traced back to Russia. One.

19:03

Open Source Intelligence L is going

19:06

by the pseudonym Marcus Johnson has

19:08

located jamming in the Baltics. At

19:11

which and that which impacted the

19:13

finish airline this week. So that

19:16

was the one that that was

19:18

the causing them troubled to Kaliningrad

19:20

of and other Russian locations. Research

19:23

group has suggested disruption near Poland

19:25

impacted Russia's own Gnss system less

19:27

than others. Not surprisingly, Russia doesn't

19:30

want to hurt themselves. That is

19:32

one of. A. Disturb everybody

19:34

else. And. Russia

19:36

has a long history of interfering

19:39

with Gps signals are both was

19:41

in Us borders and internationally Russia's

19:43

embassy, not surprisingly, in the Uk.

19:46

Did. Not respond to a request for

19:48

comment. The. disruptions can

19:50

cause uncertainty and potential safety

19:53

issues for airline pilots and

19:55

their passengers doubt no kidding

19:57

a spokesperson for euro control

20:00

European Aviation Organization with more than

20:02

40 countries as members

20:04

says its analysis shows disruptions

20:07

are happening in the eastern

20:09

Mediterranean areas around Ukraine

20:11

and the Black Sea as well as the

20:13

Baltic states during one week in

20:15

March four

20:18

thousand three hundred and eighty

20:20

seven aircraft reported issues the

20:23

euro control spokesman says for the same

20:25

time last week there were 2646 flights

20:29

reporting problems the

20:32

euro control spokesman says planes

20:34

can fly safely without GNSS

20:37

but interference quote puts

20:39

a higher workload on pilots and

20:41

air traffic control a safety

20:44

note is issued by the UK Civil Aviation

20:47

Authority this month says loss

20:49

of GNSS which is

20:51

just you know general satellite based navigation

20:54

can result in serious

20:57

navigation issues incorrect emergency terrain

20:59

warnings that the plane is

21:01

too low to the ground

21:03

and failure to various other

21:06

systems and

21:08

finally in a NASA report

21:10

detailing GPS instance there was also

21:12

published this month one pilot said

21:14

I have flown with

21:17

crew members who were not fully

21:19

aware of this problem other

21:21

pilots said they'd received false terrain

21:23

warnings that caused them to pull

21:26

up and the pilot

21:28

yes and the pilot should have

21:30

a thorough review of jamming effects

21:32

on the different aircraft systems as

21:34

part of their training and then

21:36

here's the problem of course because

21:39

this is a relatively new phenomenon

21:41

relative to when the pilots were

21:43

trained it may

21:47

just be the fact that the pilots are

21:49

trusting their avionics and no

21:51

not being sufficiently skeptical

21:54

so it does look

21:56

like these GPS

21:58

disruptions are coinciding with

22:00

Russia's full-scale war in Ukraine

22:03

and also it looks like

22:06

Israel's attacks in Gaza have

22:09

also been tied into

22:11

this. As we know,

22:13

disrupting GPS as part of

22:15

electronic warfare has become

22:18

common on Russia and

22:20

Ukraine's battlefield as a way to try

22:22

to limit the operation of drones. And

22:25

while Iran launched a barrage of missiles

22:27

and drones against Israel last

22:29

month on the 13th, Israeli GPS

22:32

disruption designed to limit the impact

22:34

of the attack also impacted mapping

22:36

and taxi services as well as

22:39

food delivery. So here was

22:41

an instance of Israel

22:43

doing some GPS jamming

22:45

which was somewhat

22:47

indiscriminate and the mapping

22:49

and taxi services as well as food

22:52

delivery within their own country took

22:54

a hit as a consequence. Kevin

22:57

Henke writes Wired, the founder

22:59

of cybersecurity company Hensec whose

23:01

work includes detecting GPS disruption

23:04

says jamming and spoofing technology

23:06

has become cheaper and

23:08

smaller over the years to the extent

23:11

that individuals can install them in their

23:13

cars to hide their own movements. That

23:15

is, you know, you're blocking your own

23:17

GPS receiver so your car doesn't know

23:20

where it is. However,

23:22

Henke says more sophisticated attacks use

23:24

equipment that can cost huge sums.

23:26

Yes, anything you anytime you're doing

23:28

spoofing as I said spoofing is

23:30

is a whole other level than

23:32

than just blanket jamming. He

23:35

said in conflict zones in military

23:37

terms and in professional terms this

23:39

spoofing is very sophisticated and it

23:41

always goes hand in hand with

23:44

jamming. Okay,

23:46

so since both

23:48

the jamming and the location spoofing

23:51

disruptions are enabled through the

23:53

use of very powerful

23:55

Local radio transmitters which over

23:57

help which overwhelm the reception.

24:00

The of the authentic signals

24:02

being beamed down from the

24:04

Gps satellites systems in orbit.

24:07

So. long as you're not in the

24:09

region, Of. The Baltics,

24:11

And all were Russia appears to have

24:14

taken it off. Serious.

24:16

Action To create Major disruptions.

24:19

The good news is these

24:21

attacks are inherently local in

24:23

nature and I'll. Hear the

24:25

U S. Were. Not being

24:27

affected by it at all,

24:29

as as most of Europe,

24:31

they are inherently very local.

24:33

But the problem for those

24:35

who are in the region

24:37

is it Gps and the

24:39

wider Gnss which again global

24:41

Navigation satellite system have always

24:44

been. Incredibly. Reliable

24:46

sources and not just of

24:48

of location but also of

24:51

time they they are masters

24:53

sources of of especially time

24:56

of day and as we

24:58

know when something is both.

25:01

Very. Useful. And. Has earned

25:03

a reputation for also being very reliable.

25:06

I mean, you know these things are

25:08

up in the sky beaming down at

25:10

us? Did. They. End up

25:12

creating a strong dependence. We

25:14

end up becoming very dependent

25:16

upon them. So many. Modern

25:19

non military commercial systems

25:21

have become so reliant

25:23

upon Gps that the

25:25

deliberate disruption of that

25:27

service for military purposes

25:29

such as Russia, as

25:31

has likely been perpetrating,

25:33

can cause dramatic collateral

25:35

damage. The.

25:38

us that day the gps system

25:40

which is i put out

25:42

by the u was conceived quite

25:44

a while ago a little over

25:47

fifty years ago back in

25:49

nineteen seventy three it took five

25:51

years to package this in the

25:54

first satellite that began launching at

25:56

that time and today we have

25:58

twenty four satellites in up

26:01

in the GPS constellation. They've

26:03

been up and operating since 1993. And

26:08

talk about depending upon something that's more

26:10

fragile than we might want. Our

26:13

phones and automobiles today only know

26:15

where they are largely thanks to

26:17

GPS signals coming from space. We've

26:19

talked about the mind. I only

26:21

know where I am thanks to

26:23

GPS signals. Yeah. Forget the car.

26:27

Yeah. I can't drive without GPS.

26:29

And I'm sure sports

26:32

wristwatch, health tracking wristwatches

26:35

are doing the same thing. We

26:39

have recently been talking about the

26:41

militarization of space and

26:44

the idea that having satellites attacking

26:46

one another up there

26:48

is not a

26:50

worry of James Bond science fiction.

26:53

You know, it's actually happening.

26:56

In some cases, robot

26:58

satellites are there in order to

27:00

repair others. But the same robot

27:02

that can function, you know, to

27:04

fix a broken antenna can also

27:06

go over and break one off

27:08

of some other satellite. So,

27:11

you know, unfortunately, they also have

27:13

multiple purposes. And

27:15

unfortunately, as global political tensions increase, we

27:17

can hope and we need to hope

27:20

that no major powers having

27:23

space based military capabilities, nor

27:25

the ability to kill satellites

27:27

from the ground, believe

27:29

that denying the entire world these benefits

27:32

would create an advantage for them. Because

27:35

it's difficult now to conceive

27:37

of a world where, you

27:39

know, GPS was just shut

27:42

down. It was like

27:44

destroyed deliberately by a power

27:47

hostile to, you know,

27:50

it wouldn't even necessarily have

27:52

to be hostile to the US. It

27:54

could be, you Know, because everyone's

27:57

using GPS, killing it for.

28:00

For Air Air, everyone also succeed

28:02

in killing it for a specific

28:04

targeted country. Before.

28:06

Gps. The. Only way

28:09

for something you know where it was.

28:11

Was. Through a system of

28:13

inertial navigation, Inertial.

28:15

Navigation, like his name suggests,

28:18

is a closed system. Which.

28:21

Relies upon the systems

28:23

precise measurement of it's

28:25

own linear and angular

28:28

accelerations. It integrates

28:30

those over time to

28:32

determine it's velocities. And.

28:34

That integrates those overtime to

28:37

determine his position. Even.

28:39

Though inertial navigation systems are

28:41

still in use due to

28:43

the nearly instantaneous position and

28:46

especially angular feedback that they

28:48

provide, The. Errors that tend

28:50

to creep in overtime can only

28:53

be eliminated with the use of

28:55

slower but far more accurate input

28:57

from the global Gps system. I

29:01

suspect Russia's primary concern is

29:03

with the use of autonomous

29:05

military drones which may rely

29:08

upon Gps to determine their

29:10

in location. But since the

29:12

risks presented by Gps jamming.

29:15

Although. They have been prevalent

29:17

at it has a been

29:19

a big concern for airline

29:22

pilots until recently Oscars they

29:24

are operating over there. The

29:26

East in the Baltic areas

29:28

says jamming has been a

29:30

possibility for some time. I

29:32

suspect that the latest technologies

29:34

are much more immune to

29:36

Gps outages than those in

29:39

Russia might wish. Vivid all

29:41

of the advantages and the

29:43

advantage of the advances made

29:45

in vision. and in

29:47

real time recognition i would

29:49

be surprised if the latest

29:51

autonomous technologies were not able

29:54

to fly nearly as well

29:56

by sight as they can

29:58

these days by gps They

30:00

might well use GPS as a first

30:03

choice, but use vision

30:05

to detect location spoofing while

30:08

also being able to switch to

30:10

pure vision if GPS should fail

30:12

completely. And another likely

30:14

strategy, which again you don't worry about

30:17

or deal with until it becomes a

30:19

problem, is that

30:21

since GPS signals will

30:23

always be originating from

30:25

above, would be to shield any

30:27

GPS receiver and its antennas. Oh, from

30:29

below. Yes. Because

30:32

the jammers are on the ground. Exactly.

30:35

That's clever. Yeah. So

30:37

planes can do that because they're

30:39

well above ground. Unfortunately, it's probably

30:41

not practical for ships at sea.

30:45

Yeah. I mean, when you listen to ground

30:47

air traffic control, talking to an airplane, which I

30:49

used to always do on United Channel 9, I

30:52

used to love to do that. They

30:54

often have visual markers.

30:57

They say turn right at

30:59

the big rock candy

31:01

mountain and things like that. I

31:04

don't know if they still do that. I haven't

31:06

listened in a while, but I bet they do.

31:10

You always want redundancy in any

31:12

system like that, right? Yeah.

31:15

And of course, the problem is that we all...

31:20

Okay. I remember,

31:23

Leo, when I guess this must

31:25

have been in driver ed. We were

31:27

supposed to go out

31:30

and walk around our car to

31:32

check all four tires. Yeah. We

31:34

don't do that anymore. No. Do

31:37

you do that? When was the last time

31:39

anybody did that? Pilots do that. Commercial

31:41

jet pilots do that. And I thank goodness that

31:43

they do. I think that's really great. But

31:46

no, I haven't done that to my car in a while. I figure if

31:48

it's flat, I'll know. Right?

31:51

It'll go from... That's right. From...

31:53

That's right. But I do remember

31:55

being told that's what we're supposed to do. So

31:58

here we have a problem where... G

32:02

been so reliable and

32:04

relied on that that

32:06

I'm just hoping I mean the

32:09

in this NASA report last week where one

32:11

of the guys said you know I've

32:13

been with flight crews that

32:15

just assumed that the GPS was telling

32:18

the truth even though they were

32:20

suddenly being told to pull up because you're about

32:22

to hit the rock candy mountain that

32:24

would not be good. Pull

32:28

up, pull up. Take another break

32:30

and then we're going to talk about

32:32

whether the sky is falling on all

32:34

VPN systems. Yeah. As the tech press

32:37

seems to believe. I was counting on

32:39

you to cover this because I read

32:41

the stories. Thank God

32:43

you're covering it before I actually did

32:45

the stories. Keep me out

32:47

of trouble. Please. We

32:49

are very proud to say that our show this

32:52

portion of the show brought to you by

32:54

collide. We're going to meet with collide tomorrow

32:56

at RSA. Great people with a great product.

33:00

In fact I was so happy when I heard

33:02

and maybe you heard too that collide was just

33:04

purchased by one password. That's

33:06

really good news. Two

33:08

companies leading the industry

33:10

in creating security solutions that put

33:12

users first. They belong together. For

33:14

over a year we've been telling

33:16

you about collide device trust helping

33:18

companies that use Okta make sure

33:20

that only known and secured devices

33:23

can access the data.

33:26

Okta authenticates the human.

33:30

Collide authenticates the hardware. That's

33:32

a big deal and

33:34

they're going to still doing that as part of one

33:36

password. In fact they're going to even be better at

33:38

this. If you've got Okta and you've been meaning to

33:40

check out collide this is the

33:42

time. Absolutely collide is easy to get

33:44

started with. They come with a pre-built

33:46

library, a pre-built device posture check so

33:48

you can get up and running right

33:50

away all the basic stuff you would

33:52

want. But if you have some specific

33:54

devices or software or situations you'd like

33:56

to check for it's very easy to

33:58

write your own custom. checks for just

34:01

about anything you can think of. Another point

34:03

I really like, you

34:05

can use Collide on devices without MDM.

34:08

That means your Linux fleet or your

34:10

contractor devices, you can't tell them, put

34:12

our MDM on your device and

34:15

of course every BYOD phone and laptop

34:17

that sneaks into the company, all

34:19

of them can be protected by Collide. Now

34:22

that Collide is part of OnePassword,

34:24

it's only going to get better.

34:27

This is the time to check

34:29

it out. collide.com/security now. Learn more,

34:31

watch the demo today. k-o-l-i-d-e.com/security now

34:33

and if you're at RSA go

34:36

visit them. They're at us

34:38

RSA too. Starting, I think it starts

34:40

tomorrow in San Francisco. Collide.

34:42

Thank you Collide for supporting

34:44

Steve and his very important

34:47

mission. Now what's all

34:49

this about VPN Steve? Okay,

34:52

so yesterday

34:55

ours Technica got a little carried away

34:57

in their reporting of

35:00

what amounts to a clever hack that

35:02

a Seattle Washington based pen and

35:05

pen testing firm known

35:07

as the Leviathan security

35:09

group posted in their

35:11

blog and of course the rest

35:13

of the tech press picked up on it quickly too.

35:16

The blog posting carried the

35:18

headline how attackers

35:21

can decloak routing based

35:23

VPNs for a total

35:25

VPN leak and

35:27

what I found curious

35:29

was that they assigned, they meaning

35:32

the Leviathan security group, assigned a

35:34

CVE number to their discovery

35:36

even though nothing about

35:39

this is a bug or a

35:41

flaw. Oh. It's just a clever

35:43

local exploit of a little used

35:45

feature of DHCP servers. Unfortunately,

35:48

ours Technica's

35:51

headline for their story was novel

35:54

headlined novel attack

35:56

against virtually all VPN

35:59

apps neuters their

36:01

entire purpose. Ahhh!

36:05

Run away! Okay,

36:08

which of course makes this sound more like

36:10

the end of VPNs as we've known them.

36:13

It isn't. Here's what's going on. Okay,

36:16

so I'm going to do a bunch

36:19

of propeller head cool stuff in order

36:21

to get a real grip

36:23

on this. Our PCs

36:26

all interact with both

36:28

internal and external networks

36:30

through network interfaces. Most

36:33

systems typically have a single physical network

36:35

interface or NIC, but it's

36:37

possible for a machine to have

36:39

more than one physical network interface

36:41

with each interface connected to a

36:44

different physical network. In

36:46

that case, it's important for

36:48

outgoing network traffic to

36:51

know which physical interface any

36:54

given packet should be routed out through.

36:58

To answer that question, our machines

37:00

contain a routing table. The

37:03

routing table performs a

37:05

most specific match function

37:07

based upon the destination IP address.

37:10

And in years past we talked

37:12

about internet routing tables and

37:14

all of this, so we've covered this

37:16

in detail, but the key here is

37:19

most specific match and that

37:21

all of our PCs, every one of them,

37:24

pads, phones, you name it,

37:26

anything that's networked using internet

37:28

protocol, IP protocol has a

37:30

routing table. Under

37:35

Windows, for example, opening a

37:37

command prompt and entering

37:39

the command route space

37:41

print will display a

37:44

list of the system's

37:46

interfaces followed by the

37:48

IPv4 and IPv6 routing

37:51

tables respectively. And

37:53

they're interesting and you can get a

37:55

sense for the fact that there's a

37:57

lot going on under the covers. that

38:00

we don't appreciate, we normally don't even

38:02

see. Okay, so

38:05

this set of network communication,

38:08

that is IP-based network communication,

38:10

comes in so handy that

38:13

in addition to true physical

38:15

interfaces, many of

38:17

our machines will have one or

38:19

more virtual network interfaces. In fact,

38:22

the so-called local host,

38:25

127.0.0.1, that's

38:28

a virtual network interface that

38:30

all stacks have. And

38:33

for example, the use of virtual

38:35

machines has become very popular and

38:37

they create their own virtual network

38:39

interfaces to talk to their host

38:41

machine as well as to the

38:44

outside world. Okay,

38:47

so here's the main point. Many

38:50

VPNs, like OpenVPN

38:52

for example, operate

38:56

by creating their own virtual

38:58

interface in the hosting machine.

39:01

It looks like and operates

39:04

like any other network interface.

39:07

But being a VPN, a virtual

39:09

private network, which is used to

39:11

transact privately with encryption,

39:14

any packets sent out of

39:17

that virtual interface are

39:19

first encrypted, then rerouted

39:22

out of an actual

39:24

physical interface to be

39:26

sent to the VPN's matching endpoint.

39:29

Since the typical VPN user, while

39:32

using a VPN, wants all of their

39:34

machines' traffic to be tunneled through

39:37

the VPN, when

39:39

the VPN tunnel is brought up, the

39:42

VPN software dynamically

39:44

edits the system's

39:46

global routing table in

39:49

such a way that instead of

39:51

the system's traffic by

39:54

default being routed out

39:56

through its normal actual

39:58

physical interface, All

40:00

of its traffic is instead routed

40:03

to the VPN's software-created

40:05

virtual network interface. This

40:08

is the way that deep down inside the

40:10

guts of our machines, all of

40:13

the traffic that is normally unencrypted

40:15

suddenly becomes encrypted when we

40:18

activate our VPN. Essentially,

40:20

it's like a man in the middle.

40:22

It sticks a shim into our network

40:24

so that all of the traffic that

40:26

would normally just go straight out the

40:29

physical interface instead is routed

40:32

to the VPN. And that's done,

40:34

as I said, by making just

40:37

a slight change to the routing

40:39

table so that all of

40:41

the traffic instead of going out the physical

40:43

interface goes to the VPN. We

40:46

need one other piece of information just to be

40:48

certain that everyone's on the same page. DHCP

40:53

stands for Dynamic Host

40:55

Configuration Protocol. By

40:57

default, when any networked

40:59

machine boots up and gets itself

41:02

going, it needs to be

41:04

using an IP address for itself on

41:06

its local network that's unique for

41:08

that network. And it

41:10

needs to know the IP address to which

41:13

it should address packets bound for the outside

41:15

world. In other words, the

41:17

network's gateway IP. It

41:19

may also want to know the IP

41:21

addresses of some DNS servers that will

41:24

honor its requests for domain

41:26

name lookup. It's

41:29

the network's inward-facing

41:32

DHCP server that

41:34

answers all these needs. When

41:37

any networked machine starts up, by

41:39

default, it will emit a broadcast

41:41

packet onto the network, announcing its

41:44

presence and asking for

41:46

any listening DHCP server to please

41:48

provide it with all the information

41:50

it requires to become a well-behaving

41:52

citizen on the local network and

41:55

to connect to the rest of

41:57

the global internet. DHCP

42:01

cleanly organizes the various types

42:03

of information it can supply

42:05

into like to the clients

42:09

who are requesting it by

42:11

number. Each

42:14

one of these is known as an option where

42:17

the option number is a single byte,

42:20

thus having a value from 0 to 255. 0

42:24

is a null option and it can be used for

42:26

padding. 255

42:28

is the marker for the end of the

42:30

list of options. So the

42:33

options are provided as a list

42:35

of information terminated by option

42:37

255, which of course you

42:40

know is a byte of all 1s. So

42:43

for example, option 1

42:45

provides the network's subnet mask

42:48

to the requesting client. Option

42:51

2 specifies the offset of

42:53

the client's subnet in

42:56

seconds, that is in real

42:58

time, from UTC,

43:01

Coordinated Universal Time. Option

43:04

3 specifies a list of

43:06

the IP addresses of routers

43:08

on the client's subnet, what we know

43:10

as the gateway IP. Option

43:13

4 specifies a list of time servers

43:15

which are available to the client. Option

43:18

6 provides a list of DNS servers

43:20

for the client's use. And

43:23

there's a bunch of them, all

43:26

kinds of different things that have been added

43:28

through the years and there are even some

43:30

surprises. For example, options 69 and

43:33

70 provide the IP addresses

43:35

of SMTP and POP3 email

43:38

servers, which I thought was

43:40

kind of cool. We're

43:42

all used to specifying those ourselves, but back in

43:44

1997 when this was first created, that

43:49

information was available via

43:51

DHCP. Something

43:54

else that DHCP was able

43:56

to provide is the

43:58

source of today's webinar. trouble.

44:01

The RFC's definition for

44:04

option 33 defines

44:07

it as the static

44:09

route option and

44:11

says quote this option

44:14

specifies a list of static

44:16

routes that the client should

44:18

install in its routing

44:21

cache. Okay now everybody

44:23

who's been paying attention and

44:25

you know enjoys networking stuff

44:28

just went aha and knows

44:30

what the problem is. This

44:33

thing continues if multiple routes to

44:35

the same destination are specified they're

44:37

listed in descending order of priority.

44:40

The routes consist of a list

44:42

of IP address pairs. The first

44:44

address is the destination address and

44:46

the second address is the router

44:49

for the destination. Again

44:51

if some of you just said oh crap

44:54

that would be the correct reaction.

44:57

What this means and

44:59

it would mean you're paying attention good job.

45:01

That's right that's right. What

45:04

this means is that the

45:06

response from a DHCP server

45:09

can be used to mess

45:11

with a machine's routing table

45:15

and as we noted earlier a machine's traffic

45:18

is routed to the

45:20

VPN's virtual interface through

45:22

a dynamic modification of

45:25

the machine's routing table. Now

45:28

as it happens option 33 is not really the problem

45:32

because it was defined back in 1997 when IP networks

45:35

were all class A, B, or

45:41

C. That meant that

45:43

networks were defined to always have

45:45

exactly one, two, or

45:48

three bytes of host

45:50

machine addresses. As

45:52

we know this was extremely

45:54

wasteful of IP addresses for

45:56

networks falling into intermediate sizes.

45:59

So something known as CIDR,

46:01

which stood for classless

46:07

inter-domain routing was adopted. That's what we

46:09

have today where the network mask can

46:11

have any number of contiguous bits set,

46:13

thus allowing scaling of networks by factors

46:16

of two all the way

46:18

from one machine, well technically up

46:20

to 4.3 billion, but no one

46:22

network has that except the internet

46:24

itself. Okay,

46:27

so the adoption of

46:29

CIDR obsoleted option

46:31

33 forcing its replacement five

46:33

years later in 2002 under

46:38

the guidance of RFC 3442 which introduced

46:40

option 121 which allows for exactly

46:47

the same thing but for

46:50

the but under the specification of

46:52

classless static routes. Now

46:56

I mentioned that I was

46:59

surprised that these LaVaya LaVaya

47:01

Thonsor security group guys had

47:03

arranged to get a CVE

47:06

assigned for this since technically

47:08

this is a feature not a

47:10

bug and all the way back in

47:12

1997 the

47:15

fundamental vulnerability of

47:18

DHCP was quite well

47:20

understood. Again 1997 section

47:24

7 of the original RFC

47:26

2131 dated March of 1997 is titled if it

47:28

was section

47:32

number 7 security considerations

47:35

it says DHCP

47:37

is built directly

47:39

on UDP and

47:41

IP which

47:43

are as yet inherently

47:46

insecure. Furthermore

47:48

DHCP is generally

47:50

intended to make maintenance of

47:53

remote and or diskless

47:55

hosts easier. While perhaps

47:57

not impossible configuring such

48:00

hosts with passwords or keys may

48:02

be difficult and inconvenient. Therefore,

48:05

DHCP in its

48:08

current form, which by the way is the

48:10

form it has today in 2024 because,

48:13

you know, if it's not broke, in

48:16

its current form is

48:18

quite insecure, says

48:20

the RFC from 1997. They

48:24

said unauthorized DHCP servers may

48:26

be easily set up. Such

48:29

servers can then send false

48:32

and potentially disruptive information to

48:34

clients such as incorrect or

48:36

duplicate IP addresses, incorrect

48:39

routing information, including

48:42

spoofing routers, etc.,

48:44

incorrect domain name server addresses

48:47

to spoof name servers,

48:49

and so on. Apparently

48:51

they wrote, once this seed

48:53

information is in place, an

48:55

attacker can further compromise affected

48:57

systems. Okay,

49:01

so here's how the

49:03

Leviathan folks described the

49:05

attack they've devised by

49:07

abusing option They

49:11

said, our

49:13

technique is to run

49:15

a DHCP server on

49:18

the same network as a targeted

49:20

VPN user and to

49:22

also set our DHCP configuration to

49:24

use itself as a gateway. When

49:28

the traffic hits our gateway, we

49:30

use traffic forwarding rules on the

49:33

DHCP server to pass traffic through

49:35

to a legitimate gateway while we

49:37

snoop on it. We

49:41

use DHCP option 121

49:44

to set a route on

49:46

the VPN user's routing table. The

49:49

route we set is arbitrary and

49:52

we can also set multiple routes if needed

49:55

by pushing routes that are more

49:57

specific than a slash zero signup.

50:00

range that most VPNs use,

50:03

we can make routing rules that have

50:05

a higher priority than

50:07

the routes for the virtual

50:10

interface the VPN creates. As

50:13

we know, because that

50:16

means it's a more specific

50:18

route, so the routing system

50:21

will always route a

50:23

more, will always take the

50:25

most specific route available. So

50:27

by doing something creating

50:30

a network smaller than the slash zero,

50:33

which is the everything, the

50:36

routing table ends up routing

50:38

to the intercepting

50:40

DHCP server rather than

50:43

to the users VPN.

50:46

They said we can set multiple

50:48

slash one routes to recreate the

50:50

zero dot zero dot zero slash

50:52

zero all traffic rule

50:55

set by most VPNs. Pushing

50:58

a route, they wrote, also means

51:00

that the network traffic will be

51:02

sent over the same interface as

51:04

the DHCP server instead

51:06

of the virtual network interface. This

51:09

is intended functionality that is

51:11

not clearly stated in the

51:13

RFC. Therefore, for

51:16

the routes we push, it

51:18

is never encrypted by

51:20

the VPNs virtual interface but

51:22

instead transmitted by the network

51:24

interface that is talking to

51:26

the DHCP server. As

51:29

an attacker, we can select which

51:31

IP addresses go over the tunnel

51:33

and which addresses go over the

51:35

network interface talking to our VPN

51:37

or our DHCP server. So in

51:39

other words, they're able to literally

51:42

select by destination IP.

51:44

If they don't want

51:46

everything, they can say, ah, just give

51:49

us this chunk of your traffic. You

51:51

think it's going through your VPN, but

51:53

it's not. They said

51:55

we now have traffic being

51:58

transmitted outside the VPN. encrypted

52:00

tunnel. This technique can

52:03

also be used against an

52:05

already established VPN connection once

52:07

the VPN users host needs

52:09

to renew a lease from

52:11

our DHCP server. We

52:14

can artificially create that scenario by setting

52:16

a short lease time in the

52:18

DHCP lease so the user updates

52:21

their routing table more frequently. In

52:23

addition the VPN control

52:25

channel is still intact

52:27

because it already uses

52:30

the physical interface for its

52:32

communication. That is you

52:34

know the control channel meaning the

52:37

channel to the remote end that is outside of

52:39

the tunnel. They said in

52:41

our testing the VPN always

52:44

continued to report as

52:47

connected and the kill switch

52:49

was never engaged to drop our

52:51

VPN connection meaning there was never

52:53

a panic that the VPN was

52:56

concerned that it was being intercepted

52:58

and so shut things down. So

53:02

then to their credit they raised

53:04

the question that we've

53:06

had all along by asking

53:08

is tunnel vision a vulnerability

53:11

and I appreciated their answer

53:13

they wrote this is debatable.

53:17

We're calling it a technique because

53:20

tunnel vision doesn't rely

53:22

on violating any security

53:24

properties of the underlying

53:26

technologies. From our perspective

53:28

tunnel vision is how

53:31

DHCP routing tables and

53:33

VPNs are intended to work.

53:36

However it contradicts

53:38

VPN providers assurances

53:42

that are commonly referenced

53:44

in marketing materials. In

53:46

our opinion tunnel vision becomes

53:48

a vulnerability when a VPN

53:51

provider makes assurances that their

53:53

product secures a customer from

53:55

an attacker on

53:57

an untrusted network. big

54:00

difference between protecting your data

54:02

in transit and protecting against

54:04

all LAN attacks. VPNs

54:07

were not designed to mitigate

54:09

LAN attacks on the physical

54:11

network and to promise otherwise

54:14

is dangerous. In

54:16

our technique, we have not

54:18

broken the VPN's cryptographically secured

54:20

protocol and the VPN is

54:22

still fully functional. An

54:24

attacker is instead forcing a

54:27

target user to not use

54:29

their VPN tunnel. Regardless

54:31

of whether we classify this as

54:34

a technique, VPN users are affected

54:36

when they rely on assurances that

54:38

a VPN can secure them from

54:41

attackers on their local

54:43

network. Hmm, interesting. Finally,

54:46

That is one of the primary uses, isn't it,

54:48

for a coffee shop and other open Wi-Fi networks?

54:51

Exactly. But that's been

54:54

around forever. Yes,

54:56

exactly. And

54:58

they finished. As for what systems are

55:01

affected, the short version is everything

55:03

except Android. That's funny.

55:08

Android doesn't support option 121, so

55:10

it's completely excluded from these attacks.

55:13

They wrote, In our

55:15

testing, we observed that any

55:18

operating system that implements a

55:20

DHCP client according to its

55:22

RFC specification and has support

55:24

for DHCP option 121 routes is affected. This

55:30

includes Winix, Windows,

55:34

Linux, iOS, and Mac OS. Notably,

55:41

they wrote, it does not affect

55:43

Android as they do not have

55:45

support for DHCP option I

55:49

wonder why not. Which really is interesting. I

55:52

do too because I did some

55:54

digging and there have actually been

55:56

instances where Android's lack of option

55:59

121 support has

56:01

caused problems for Android users

56:03

because it turns out this

56:05

is not obscure Leo

56:08

this is the first time we've ever talked

56:10

about it on the podcast because it's just

56:12

never come up you know we've covered DHCP

56:14

in depth in the past okay

56:16

so just to be clear about the

56:19

scope of the danger presented

56:21

by the potential abuse of

56:24

DHCPs option 121 this

56:26

is strictly a local

56:29

landside attack but Leo as you

56:32

correctly point out you know we

56:34

do operate in essentially

56:37

land networks

56:39

where we're assuming a VPN

56:41

is going to trust us

56:43

where untrusted peers

56:47

are on the same land we

56:49

are so that's

56:51

a thing the

56:57

attacker needs some means

56:59

of defeating the network's

57:01

actual DHCP server since

57:04

DHCP clients will and

57:06

do accept

57:09

the first reply to their

57:11

query simply being

57:13

a faster to reply is

57:16

typically all that's needed and you

57:18

know as we know most routers

57:20

use the slowest chip that the

57:22

manufacturer was able to get away

57:24

with boy I tell

57:26

you those web interfaces on routers it's

57:28

like okay I click the button hello

57:30

hello did

57:32

you you know try click it again or just wait

57:34

no so the point is it's not going to be

57:37

quick to fire off a

57:39

DHCP reply because it doesn't need

57:41

to write that's going to be

57:43

way down the priority queue of

57:45

traffic that it needs to deal

57:47

with so an attacker probably doesn't

57:50

have any choice have much difficulty

57:52

being able to respond with DHCP

57:54

queries faster so it's

57:56

definitely conceivable also

57:59

in an

58:01

enterprise environment that if

58:05

you had somebody untrusted on

58:07

an enterprise network that

58:10

would be a problem. And it also

58:12

turns out that option 121 is not the

58:15

least bit obscure in the enterprise.

58:17

It turns out it's under heavy

58:19

use. I found two little samples

58:22

through a quick search. A posting

58:24

over on Stack Exchange says, I'm

58:27

running OpenVPN on a

58:29

CentOS 7 server. The

58:32

DHCP server on the LAN

58:34

uses option 121 to tell

58:37

other devices to use

58:39

this CentOS server if they

58:42

want to get to the VPN

58:44

subnets the OpenVPN servers

58:46

connected to. This works

58:48

great. The problem is that

58:51

this CentOS server is getting these

58:53

same routes from the DHCP server

58:55

which breaks things. And then he

58:57

goes on to talk about how

58:59

he can manually remove the static

59:02

routes that the CentOS server is

59:04

receiving from DHCP. But my point

59:06

is here's an example of

59:09

where option 121 is being

59:12

used to inform

59:16

machines on the LAN

59:19

where to route the traffic they

59:21

want to go through the

59:24

CentOS 7 servers

59:27

VPN subnets. So

59:30

it's very useful for that. And

59:32

also just as recently as last

59:34

Tuesday someone posted to the what

59:37

I have to categorize as

59:40

the embarrassingly useless Microsoft

59:42

answers forum. I don't

59:45

know if anybody has ever seen any

59:47

of the crap that is there.

59:51

But you know if Microsoft

59:53

really wants to lead in AI

59:55

they should remove whatever

59:57

you whatever poor humans they have.

1:00:00

that are being forced to respond

1:00:02

to forum postings there and put

1:00:04

chat GPT 12 or

1:00:06

something in there instead it is I mean

1:00:08

it is it is excruciatingly

1:00:12

bad anyway Someone

1:00:14

posted and news will say they

1:00:16

got no useful answer when connected

1:00:18

to my office network It's

1:00:21

DHCP server meaning

1:00:23

his offices Network DHCP

1:00:26

server will use option

1:00:29

121 to assign three different networks

1:00:31

to be reached using a router

1:00:33

which is not the default gateway

1:00:37

This works absolutely the networks

1:00:39

appear in my routing table

1:00:41

in active routes everything works

1:00:43

Networks are reachable anyway So he

1:00:46

wrote that and I just grabbed that as a little

1:00:48

snippet of another example of like you know Option

1:00:50

121 is really out there and it

1:00:53

turns out has you know Really

1:00:56

been useful as I said he goes

1:00:58

on to explain in some length He's

1:01:00

complaining that when he boots his PC

1:01:02

without any network connectivity Then

1:01:05

it has a problem Yeah,

1:01:09

that would be a problem. So

1:01:11

anyway, I wanted to

1:01:13

point this out again that this

1:01:15

this this DHCP option is

1:01:19

In heavy use within more

1:01:21

complex corporate networks What

1:01:23

that means is that simply like? Blacklisting

1:01:26

option 121 is not viable in My

1:01:32

opinion it would be extremely unlikely

1:01:35

for anyone at home to ever

1:01:38

have anything You know to

1:01:40

worry about Though

1:01:42

it's still instructive to paint a picture the

1:01:45

way I can see this might occur

1:01:47

to somebody at home Would

1:01:49

be if some malicious device were

1:01:51

connected to a residential

1:01:53

network and wish to

1:01:55

capture all of the users Traffic whether

1:01:58

tunneled through a VPN or not By

1:02:00

being the first device to respond

1:02:04

to any DHCP query, such

1:02:06

a malicious device could establish

1:02:08

itself as the network's

1:02:11

gateway to receive, inspect, and

1:02:13

forward all traffic from

1:02:15

the network's many machines. And

1:02:18

then, by additionally using option

1:02:21

121, such a device could

1:02:23

use that to also insert

1:02:25

entries into the user's routing

1:02:27

table to prevent their VPN,

1:02:30

if any, from tunneling

1:02:32

the user's traffic. Even

1:02:34

though the VPN would show that

1:02:37

everything was working and the user's

1:02:39

traffic was protected, none

1:02:41

of it would be. The VPN tunnel

1:02:43

would be up and established, but it

1:02:45

would not be carrying any of the

1:02:48

user's traffic. Since there

1:02:50

are many environments where option 121 is not

1:02:52

needed and is never used, like probably

1:02:57

most of ours at home, I think

1:03:00

it would be nice for our operating

1:03:02

systems to provide the option to hard

1:03:07

disable it, but I

1:03:09

dug around that I couldn't find any

1:03:11

indication that that's being done. I

1:03:14

would imagine the Windows firewall could be

1:03:16

configured to

1:03:19

look for any incoming DHCP

1:03:21

port. What is it? It's

1:03:24

been so long. Is it 163? No

1:03:26

idea. The DHCP? I don't

1:03:29

remember now. The port number. The

1:03:32

best mitigation would be turn off option

1:03:35

121, but that's not an option for

1:03:37

us now. Can

1:03:40

VPN software be updated to have that as

1:03:42

a feature? The

1:03:46

problem is this gets in underneath

1:03:48

the VPN software. I

1:03:53

suppose it could be updated

1:03:55

to monitor the routing table

1:03:58

and proactive. determine

1:04:01

whether or not it's been

1:04:04

rerouted. So that's

1:04:06

certainly something that could be done.

1:04:08

Right now, when you bring up

1:04:10

the VPN title, it

1:04:12

inserts a new default route

1:04:15

for everything and

1:04:17

points it at its virtual interface

1:04:20

so that it receives everything. What

1:04:23

it would need to do would be to send itself a

1:04:25

test ping from an IP in the user's IP

1:04:39

space and verify that its

1:04:42

virtual interface receives that

1:04:44

ping. If

1:04:46

it doesn't receive the ping, that

1:04:49

tells it something has interfered with

1:04:51

the routing between the user's

1:04:54

local host IP and its

1:04:56

own interface. So

1:05:00

yeah, that would be a cool

1:05:02

feature for a VPN to add. Meanwhile,

1:05:04

there's not really a mitigation, is there? No.

1:05:08

No. And I

1:05:10

think your use case is exactly

1:05:12

the right one, Leo, because where

1:05:14

do people deliberately bring up a

1:05:16

VPN? It's

1:05:18

when they're in a hotel, in a

1:05:20

cafe, in any untrusted environment, and they

1:05:22

don't want

1:05:27

to be sharing their traffic with everybody else. Yeah.

1:05:31

I wonder if commonly used hacking

1:05:33

tools like Wi-Fi, Pineapples and stuff are able

1:05:35

to do this. They

1:05:38

probably are. I mean, it's been around for 30 years.

1:05:41

Yeah, but well, so you mean

1:05:43

whether they're able to perform the hack. Yeah. I

1:05:47

bet that the intercepting ... That

1:05:49

seems like something you build in. Well,

1:05:51

and intercepting DHCP is such a juicy

1:05:53

target. Yeah. I mean,

1:05:55

I'll bet you that hacking tools have

1:05:57

a ... have

1:06:01

DHCP server spoofing

1:06:04

and are able to get a

1:06:06

response out immediately. Interesting. Wow,

1:06:11

this is good stuff. Thank you. Because this

1:06:13

has been everywhere, this story, and I was

1:06:15

really curious what you thought of it.

1:06:18

Yeah, so it's a problem. Again, what are

1:06:20

you going to do with the CVE? Hello?

1:06:24

Okay, I mean

1:06:26

maybe that gets it more attention. Yeah,

1:06:30

unfortunately some, apparently GPT something is

1:06:32

able to read the CVE and

1:06:34

immediately design a hack that

1:06:36

the scriptkitties could then use. So great.

1:06:41

Would you like to take a break? Is that what you're looking at

1:06:43

me like that for? I

1:06:47

know that look. We

1:06:50

will have more with Mr. Gibson in just a

1:06:52

little bit. Every

1:06:54

week there's a story or two that in

1:06:57

my mind, and I bet your mind too, you go,

1:06:59

I wonder what Steve has to say about that. That's

1:07:02

why we love you, Steve, and that's why we listen to

1:07:04

the show. We're so glad to carry the show. Today

1:07:08

our sponsor for this segment, Lookout.

1:07:11

This is kind of timely. Every company

1:07:13

today is a data company, right? We all have data

1:07:15

and we're all out in the cloud. We're all out

1:07:17

and about. Every company's at

1:07:19

risk with cyber threats,

1:07:21

breaches, leaks. This

1:07:24

is all the new normal. And

1:07:27

cyber criminals, they're getting better and more sophisticated by

1:07:29

the minute, especially with the help of

1:07:31

AI. At a time when boundaries no

1:07:34

longer exist to work, what

1:07:36

it means for your data to be secure

1:07:38

has really fundamentally changed, which

1:07:40

is why you need Lookout. From the

1:07:42

first phishing text to the final

1:07:45

data grab, Lookout stops

1:07:47

modern breaches as swiftly as they

1:07:49

unfold, whether on a device in

1:07:52

the cloud, across networks, even

1:07:54

working remotely at the local coffee shop,

1:07:57

which now we know is a little

1:07:59

hazardous. Lookout gives

1:08:01

you clear visibility into all your

1:08:03

data at rest and

1:08:06

in motion. You'll monitor, assess, and

1:08:08

protect without sacrificing productivity and employee

1:08:11

happiness for security. With

1:08:13

a single unified cloud platform,

1:08:15

Lookout simplifies and strengthens for

1:08:18

me imagining security for the

1:08:20

world that will be today.

1:08:22

Visit lookout.com today to learn

1:08:24

how to safeguard data, secure

1:08:26

hybrid work, and reduce IT

1:08:29

complexity. That's lookout.com. Thank you, Lookout,

1:08:31

for supporting Steve and

1:08:33

the work he does here. And thanks also

1:08:36

to all of our Club Twit members whose

1:08:38

donations make this show possible. You know, if

1:08:40

you find this valuable and you're not yet

1:08:43

a Club Twit member, it's just seven bucks

1:08:45

a month. We have corporate memberships too. Get your

1:08:47

whole company involved. Probably everybody in your IT department

1:08:49

should be listening to this show every darn week.

1:08:52

Go to twit.tv slash Club Twit to find

1:08:54

out more. And to those

1:08:56

of you who are already members, thank you. We

1:08:58

appreciate you supporting. On we go with

1:09:01

Mr. G. Okay, so a bit

1:09:03

of feedback. Dave Brenton tweeted,

1:09:05

Mr. Gibson, quickly may

1:09:08

I say as a machine language coder, I

1:09:10

admire your work in that area. I'm

1:09:12

a spin-right owner user and long-time fan

1:09:15

since near the beginning of security now.

1:09:17

My question is about security keys. I

1:09:19

hope this is not too long a question. And

1:09:21

it wasn't. He says I'm about to

1:09:23

make the transition to YubaKey. And

1:09:26

so I intend to purchase two to

1:09:29

have a safe fallback in case of loss.

1:09:32

I'm also planning to convert the wife

1:09:35

over to the Passkey world. My

1:09:37

question is, can the Passkeys

1:09:40

be paired across two user accounts,

1:09:43

thereby ensuring recovery in case

1:09:45

of loss with only three

1:09:47

keys. My mental model says

1:09:50

it made sense, but I do not know for

1:09:52

sure. One, can the same

1:09:54

key be applied to two different people?

1:09:57

Two, To assure full backup

1:09:59

protection? Than in all three keys

1:10:02

be coded into both users. May

1:10:05

be a silly notion but it could

1:10:07

work but could it work or should

1:10:09

I just by Four Keys to begin

1:10:11

with: Thank you for all your good

1:10:13

work and propeller had installments on to

1:10:15

Nine, Nine Nine and beyond. Yes Days

1:10:17

Zazzle I set of the beginning of

1:10:19

the show out on episode nine seven

1:10:21

three we are close it at all

1:10:23

Nine Nine we be yet we're no

1:10:25

longer fearful of that is fatal number

1:10:27

of be so sad a before you

1:10:29

get to the answer I just one

1:10:31

as well actually do the answer and

1:10:33

them. And when asked about. Missing

1:10:35

language and assembly. I have since.

1:10:39

Oh Crap. Oh okay, so I

1:10:41

chose to share Daves question. Because.

1:10:43

It's so perfectly demonstrates the

1:10:46

near total mess of the

1:10:48

user authentication world has fallen

1:10:51

into. today. It's it is

1:10:53

just a catastrophe. I'm hopeful

1:10:56

this may just be a

1:10:58

transition phase, but truth be

1:11:00

told, All. of

1:11:03

our collective experience also

1:11:05

leaves me feeling somewhat

1:11:07

skeptical. I. Worry that

1:11:09

all we have done. By.

1:11:11

Adding the Fido groups. Of

1:11:14

of I'm sorry by having

1:11:16

the Fido group lower the

1:11:18

bar for entry. From.

1:11:20

Requiring physical t dongles

1:11:23

to allowing pretty much

1:11:25

anything else Smartphones and

1:11:27

Pcs running simple software

1:11:29

pesky clients is. To.

1:11:32

Expand upon the number

1:11:34

of available options with

1:11:36

an additional and. Difficult

1:11:39

as it is to believe in this

1:11:41

day and age. Not very well thought

1:11:43

out system. A We've

1:11:46

added this new and not

1:11:48

well thought out system without

1:11:50

removing. Any of the

1:11:52

previous options. Have. Traditional

1:11:54

user name and passwords been

1:11:56

replaced. Know. are

1:11:59

they ever going to be Not in

1:12:01

this lifetime. Have the

1:12:03

I forgot my password links gone

1:12:05

away? No. Are they

1:12:07

ever going to? No. What

1:12:10

about those time-based one-time passcodes? Are

1:12:12

they going away? No. Any

1:12:14

plan for that? No. What about

1:12:17

OAuth, which brings us the log

1:12:19

on with your Google or Facebook

1:12:21

or some other account? Have those

1:12:23

been obsolete and removed? Nope.

1:12:26

Can they be? Well, not easily,

1:12:28

since many sites only know

1:12:30

their users thanks to their

1:12:33

redirection through another web services

1:12:35

authentication. And so,

1:12:37

through this pile of

1:12:39

existing half-baked remote

1:12:41

network authentication solutions,

1:12:44

we're now adding passkeys, a

1:12:47

mysterious new solution that its

1:12:49

designers all say is amazing,

1:12:52

and far more secure, which works

1:12:54

sort of like magic, right

1:12:57

up until it doesn't work at all. And

1:12:59

when that happens, what do we do? Well,

1:13:02

we fall back to send me

1:13:04

an email. What

1:13:07

we've wound up with is

1:13:09

the well-known and often observed

1:13:11

phenomenon of solution spread. We

1:13:15

invent a better idea than

1:13:17

what we had before. Perhaps

1:13:19

it's because the times have changed,

1:13:21

and the older solutions are no

1:13:23

longer adequate. Or perhaps we

1:13:26

have more technology and available processing

1:13:28

power than we had before, so

1:13:30

new solutions are available than were

1:13:32

previously. But the problem is, we

1:13:35

rarely are able to kill

1:13:37

off the things that came

1:13:39

before. Why? Because

1:13:41

by the time we can do something

1:13:43

more, too many people have

1:13:46

come to depend upon the previous solution,

1:13:49

and the one before that, and the one

1:13:51

before it. And

1:13:53

this solution spread doesn't just

1:13:55

apply to the authentication domain.

1:13:58

Just look at Windows. without

1:14:00

getting bogged down into the details,

1:14:03

every few years Microsoft comes up

1:14:05

with a new and much improved

1:14:07

way of writing applications for their

1:14:10

Windows OS. And they

1:14:12

promote the hell out of it, explaining

1:14:14

how and why it's so much better

1:14:16

than everything that came before. And

1:14:19

do they then kill off the previous

1:14:21

ways of programming Windows? No, of course

1:14:23

not. They can't. They were

1:14:26

once promoting the hell out of those

1:14:28

previous solutions and they got lots of

1:14:30

people on board using them then. So

1:14:32

even though they no longer love them

1:14:34

and are urging everyone to use the

1:14:36

new system, that never happens. I've

1:14:39

heard Paul over on Windows Weekly saying

1:14:42

that the original Windows API, Win32, should

1:14:45

have died off long ago. That's

1:14:48

what all of my Windows are written in.

1:14:51

And not just mine, a gazillion others

1:14:53

as well. And that's gazillion with a

1:14:56

g. I

1:14:58

am certain Paul knows that

1:15:00

Microsoft will never abandon Win32.

1:15:03

They can't anymore than websites

1:15:05

will ever be able to

1:15:07

stop offering username and passwords

1:15:10

with an I forgot how email

1:15:13

link. So just

1:15:15

to be clear, the industry has

1:15:17

added a bright and shiny additional

1:15:22

way for people to log

1:15:24

into their accounts. But

1:15:26

none of the existing ways are

1:15:29

or will be removed.

1:15:33

Remember that today in

1:15:35

2024, only one out of

1:15:38

every three internet users is

1:15:40

using any form of

1:15:42

password manager. I

1:15:45

really don't know what the rest are doing. These

1:15:47

are people whose iOS and Android

1:15:50

support for Passkeys is mostly aimed

1:15:52

at. These

1:15:54

people don't know, don't understand,

1:15:56

and don't care about their online

1:15:59

identity. So, when Apple or Google

1:16:01

comes along and asks, how would

1:16:03

you like to log in instantly

1:16:06

with Passkeys and never worry about

1:16:08

another password? Well, that sounds

1:16:10

great. But that's

1:16:12

not Dave. Our

1:16:14

listener whose questions launched me into first

1:16:16

taking a bit of a rant into

1:16:19

a wider view of where we stand

1:16:21

today. So, let's look at

1:16:23

Dave's situation. Dave says he's

1:16:26

planning to convert his wife over

1:16:28

to Passkeys. I'm sure

1:16:30

he means that he would like

1:16:32

to have his wife begin to

1:16:35

use Passkeys since it's not possible

1:16:37

to convert over to Passkeys

1:16:39

in any meaningful way when

1:16:42

so few websites offer the

1:16:44

option at all. The

1:16:47

caution there, since we do

1:16:49

not yet have Passkey transportability,

1:16:52

is to be careful about which

1:16:54

app is holding a site's Passkeys.

1:16:56

As I mentioned last week, iOS,

1:16:59

Windows, Android, and now an

1:17:01

increasing number of traditional password

1:17:04

managers will all be vying

1:17:06

to be the app

1:17:09

that generates the Passkey to

1:17:12

be provided to a website. Since

1:17:15

only that app will

1:17:17

then be able to authenticate the user

1:17:19

to that site with a Passkey, the

1:17:22

only sound strategy will

1:17:24

be to only and

1:17:26

always use a single

1:17:28

platform for Passkeys. This

1:17:33

issue and Dave's other questions

1:17:35

require a quick bit of

1:17:38

foundation about the operation of

1:17:40

Passkeys. When

1:17:43

an application prompts its user

1:17:45

about whether the user wishes to

1:17:48

have it create a Passkey, that's

1:17:51

exactly what's happening. The

1:17:53

application generates a

1:17:55

cryptographically strong secret and

1:17:58

private key which

1:18:00

never leaves the application

1:18:03

and which the application guards carefully.

1:18:05

And in this case, I'm using

1:18:08

key and application interchangeably. From

1:18:10

that closely held private key,

1:18:13

it then generates a public key.

1:18:16

And only the public key is

1:18:18

sent to and retained by the

1:18:21

website. In the

1:18:23

future, that website will use

1:18:25

the public key it

1:18:27

holds to verify the signature

1:18:29

of a challenge that it sends to

1:18:31

the user's past key authenticator. So

1:18:34

my point here is that

1:18:36

today there is no

1:18:38

provision for these private

1:18:40

keys which were

1:18:43

generated internally and have

1:18:45

ever since been guarded by the

1:18:47

application to ever leave

1:18:49

that application's control. And

1:18:51

a security conscious organization like

1:18:54

Apple can make the

1:18:56

defensible claim that since

1:18:58

all of the past key's security

1:19:01

derives from the secretness of

1:19:04

these private keys, which

1:19:06

is crucial, no

1:19:09

other application, including its

1:19:11

user, can or

1:19:13

should be entrusted with

1:19:15

their stewardship, with the stewardship

1:19:17

of the past key's private

1:19:20

key. Since this

1:19:22

represents a powerful platform

1:19:24

lock-in, it's not at all

1:19:26

clear to me that Apple will ever allow

1:19:28

for past key's export. That

1:19:30

being the case, I

1:19:33

think that a very strong case can be

1:19:35

made for only ever

1:19:38

storing past keys in a third party

1:19:40

past key's client, such as a browser

1:19:42

extension. In theory, it ought to

1:19:44

be possible for a website to allow

1:19:47

its user to replace one past

1:19:49

key with another, so if

1:19:51

Apple or Android were to inadvertently become

1:19:53

the generator and holder of a past

1:19:56

key, if a

1:19:58

website supported past key replacement,

1:20:01

it should be possible to migrate

1:20:03

away from one passkey application to

1:20:05

another. And if, and I was thinking

1:20:07

about this, if a

1:20:09

website doesn't explicitly allow you to

1:20:12

migrate between passkeys, hopefully it allows

1:20:14

you to delete a passkey, in

1:20:16

which case your account would not

1:20:18

be associated with one, and then

1:20:20

you could re-associate it with a

1:20:22

passkey from the provider that you're

1:20:24

wanting to switch over to. So,

1:20:29

so the, the,

1:20:32

the real point here is that it

1:20:36

is the application that generates the

1:20:38

passkey. It is never something that

1:20:40

we're able to supply from the

1:20:42

outside. So, just

1:20:45

to put a bit of frosting

1:20:47

on this discussion before we talk

1:20:49

about the platforms with hardware, with

1:20:51

hardware authentication doggles, I

1:20:53

wanted to share a few points from

1:20:56

Google's Chrome FAQ.

1:20:59

This is Google's Chrome browser

1:21:01

FAQ about passkeys. They

1:21:04

start off, of course, with all the

1:21:06

glowing bits. Under manage

1:21:08

passkeys in Chrome, they say

1:21:11

you can use a passkey to

1:21:13

sign in easily and securely with

1:21:16

just a fingerprint, face scan, or

1:21:18

screen lock. Passkeys

1:21:20

are a simple and secure way to sign in

1:21:22

to both your Google account

1:21:24

and all these sites and apps you

1:21:27

care about without a password. You

1:21:29

may be asked to sign in to

1:21:32

a website with a passkey or create

1:21:34

one to improve your account's security. Then

1:21:36

they have a little tip. Passkeys are

1:21:39

built on industry standards, so

1:21:41

you can use them across

1:21:43

many platforms. I love those

1:21:45

industry standards. Oh,

1:21:47

Leo, that's the happy news. That

1:21:50

all sounds terrific. And of course,

1:21:52

we ask, what here? What could

1:21:54

possibly go wrong? Well, here's what

1:21:56

Google had to say about that.

1:22:00

under store pass keys in

1:22:02

Windows. They said if

1:22:04

you have Windows 10 or up you

1:22:06

can use pass keys. To

1:22:09

store pass keys you must set up

1:22:11

Windows Hello. Windows Hello

1:22:13

does not currently support synchronization

1:22:15

or backup. So pass keys

1:22:17

are only saved to your

1:22:19

computer. If your computer is

1:22:21

lost or the operating system is reinstalled,

1:22:24

you cannot recover your pass keys. Oops.

1:22:28

Or store pass keys in Mac

1:22:30

OS. You can save pass keys

1:22:32

in your Chrome profile where

1:22:35

they're protected by a Mac

1:22:37

OS keychain. Then under important they

1:22:39

said Chrome cannot save or

1:22:41

use pass keys stored in iCloud

1:22:44

keychain. If your computer is

1:22:46

lost or your Chrome profile is

1:22:48

deleted, you cannot recover your

1:22:50

pass keys. And third,

1:22:53

you can use a security key to

1:22:55

store your pass keys. Important, pass

1:22:57

keys stored on security keys are

1:22:59

not backed up. If you lose

1:23:02

or reset the security key, you

1:23:04

cannot recover your pass keys. What

1:23:07

a wonderful system. This clearly

1:23:09

represents a huge leap

1:23:12

forward. Psi. Wow.

1:23:15

It's clear that unfortunately what

1:23:17

we have at the moment

1:23:19

is an extremely fragile system.

1:23:23

The problem is the extreme

1:23:25

secrecy surrounding the private

1:23:27

keys which create the

1:23:29

pass keys. It's true that they

1:23:31

do not... I'm sorry.

1:23:34

I'm sorry. It's true that they do need to

1:23:36

be guarded. Unfortunately at the

1:23:38

moment they're being jealously guarded. How

1:23:42

Microsoft could possibly

1:23:44

imagine that it's practical

1:23:46

to have all of a user's

1:23:48

pass keys locked up in a

1:23:51

single machine unable to

1:23:53

synchronize with any of a

1:23:55

user's other's devices is beyond

1:23:57

me. But we're

1:23:59

ready. Ready to entertain the second part of Dave's

1:24:02

question where he asked, can the

1:24:04

past keys be paired across two user

1:24:06

accounts, thereby ensuring recovery in case of

1:24:08

loss with only three keys? He

1:24:11

says, my mental model said it made sense, but I

1:24:13

do not know for sure. Can

1:24:15

the same key be applied to two different

1:24:17

people to assure full backup protection? Can all

1:24:20

three keys be coded into both users? The

1:24:24

answer is that

1:24:26

not one of

1:24:28

those operations Dave

1:24:31

is asking for is

1:24:33

available, not one. And

1:24:36

what's more, I just double

1:24:38

checked. As we learned last

1:24:40

week, YubaCo's YubaKeys have the

1:24:42

most ample storage for past

1:24:45

keys of any hardware

1:24:47

past key dongle in the

1:24:50

industry. And even it

1:24:53

is limited to a total of only 25.

1:24:57

And they are utterly and absolutely

1:25:00

non-exportable. A

1:25:03

YubaKey is at its heart

1:25:05

an HSM, a hardware security

1:25:07

module. The internal

1:25:09

YubaKey dongle hardware contains

1:25:12

a very high entropy

1:25:14

random number generator that's

1:25:16

used to synthesize a unique private

1:25:18

key. That

1:25:21

private key never leaves the

1:25:23

device. There is no way

1:25:25

to export it. The exportation

1:25:27

does not exist. There's

1:25:31

no way to put a past key

1:25:33

in and no way to take a past key

1:25:35

out. This would not be

1:25:37

a problem if sites were to allow multiple

1:25:39

past keys to be registered

1:25:41

for a single account. And

1:25:44

there's no reason that would not be possible,

1:25:47

but how many sites today

1:25:49

support the use and management

1:25:51

of multiple passwords for a

1:25:54

single account? I've

1:25:56

never seen one. So it's

1:25:58

unclear why so many people are using a past key. Support for

1:26:00

multiple pass keys would ever

1:26:03

be created even though nothing

1:26:05

prevents it. With

1:26:07

Yuba keys having a 25 pass

1:26:09

key limit other than

1:26:12

for experimentation, they seem

1:26:14

most practical for higher-end

1:26:17

enterprise-grade security applications and

1:26:20

perhaps for eventually signing into

1:26:22

only a few of the

1:26:25

most secure sites where the

1:26:27

inconvenience of having an absolute

1:26:29

hardware lock is warranted by

1:26:32

its ultimate level of hardware-level

1:26:34

security. And as we noted

1:26:36

last week, a Yuba key might be used

1:26:38

to unlock a password manager, which is

1:26:41

where we would all have

1:26:43

to conclude all of a

1:26:45

user's pass keys should probably be stored.

1:26:48

The only sane conclusion we can

1:26:50

draw is

1:26:53

that while this is all

1:26:55

very interesting, none of this is

1:26:57

yet ready for prime time. Poke

1:27:00

at it, experiment with

1:27:02

it, but wait until

1:27:04

Bitwarden's pass key supporting

1:27:06

mobile clients emerge from

1:27:08

their current beta testing

1:27:10

state, at which point

1:27:12

it will be practical

1:27:14

to start depending upon

1:27:16

pass keys because they

1:27:18

will be in a

1:27:20

single sane multi-platform client.

1:27:23

And Bitwarden, which is, we should say, a

1:27:26

sponsor of the Twit network, will

1:27:28

likely be offering backup

1:27:31

and support and

1:27:34

exportation of those once

1:27:36

the security protocol for doing

1:27:38

that, which is reportedly underway

1:27:41

within the FIDO group, is

1:27:44

concluded. So Bitwarden

1:27:47

will then generate and

1:27:49

hold our pass keys even when

1:27:51

other pass key clients on iOS or

1:27:54

Android might be trying to. And then

1:27:56

of course, as we said last week,

1:27:58

the challenge is... making sure

1:28:01

that your chosen

1:28:04

PASCE authenticator is universally used

1:28:06

even in an environment where

1:28:08

multiple authenticators are all vying

1:28:11

for attention. I

1:28:14

have to say, the reasonable

1:28:17

things that people would want to

1:28:19

do are not available.

1:28:22

They cannot be done. Wow. Yeah.

1:28:26

Yeah. I

1:28:29

saw there was a Hacker News story about,

1:28:31

somebody wrote about why it's 100 times harder

1:28:34

to implement PASCEs on your website than you might

1:28:36

imagine. I think this is going to be,

1:28:38

I feel like people

1:28:41

are going to throw up their hands and say, okay,

1:28:43

fine, never mind. And

1:28:45

that's depressing. Right. Right.

1:28:48

And as we said last week, if it doesn't

1:28:50

achieve critical math, then it'll just

1:28:53

be, exactly as one

1:28:55

of our listeners said, or no,

1:28:57

no, it was the

1:28:59

guy who did the Rust

1:29:01

web-authent client. He said, I

1:29:04

feel that this will, you know, it'll

1:29:06

be like ad blockers. A small percentage

1:29:08

of people take the trouble to do

1:29:10

it, but it's sort of a niche

1:29:12

and it never really becomes a problem

1:29:14

for ad companies. And in this

1:29:16

case, it just never takes hold.

1:29:20

So speaking of- It is a mess. It is

1:29:22

a mess. And it's not getting any better.

1:29:24

Rust did not solve it. We've been

1:29:26

trying, I mean, I remember when Microsoft tried the

1:29:28

single sign-on thing 20 years

1:29:30

ago. We've been trying to solve it. And

1:29:32

they had something called Passport. That's what I was talking about.

1:29:35

Passport, exactly. It was a single sign-on. And

1:29:37

it didn't get adopted and that's that. And-

1:29:41

Yep. Oh, well. Oh,

1:29:43

well. So one last

1:29:45

piece of feedback from Will you stop? Before you

1:29:47

do that, can I answer you a question? Yeah.

1:29:49

About assembly language. Yeah. I was talking

1:29:51

the other day about how one debugs

1:29:53

in a higher level language. You'll write a print

1:29:56

statement, for instance, and it'll tell you

1:29:58

all your stuff. You must have some- macros you've

1:30:00

written over the years to help you debug

1:30:02

assembly or do you? No.

1:30:07

I knew it. You

1:30:11

just write it right the first time. Well,

1:30:14

so for not for debugging,

1:30:16

but for example, one

1:30:20

of the reasons it would be

1:30:22

difficult for me to share my assembler

1:30:24

is that I have built up a

1:30:27

macro archive of things I do.

1:30:30

For example, I use a macro

1:30:32

called zero and

1:30:34

it takes a

1:30:37

register name. Well,

1:30:39

it simply expands to XOR register comma

1:30:41

register. Right, to zero it out. Because

1:30:44

you know when you XOR something, exactly,

1:30:46

when you XOR something with a self

1:30:48

you get zeros and it's very fast

1:30:51

because it doesn't depend upon a memory

1:30:53

fetch or the previous data

1:30:56

or the previous contents of the

1:30:58

register. The

1:31:00

point is if I wrote XOR

1:31:03

something comma something, I would

1:31:06

have to look at it and say

1:31:08

okay XOR and then look at what

1:31:10

am I doing and then realize oh,

1:31:13

I'm wanting to zero that. Well, it's much

1:31:15

better if I just say zero and then

1:31:17

the thing. Anyway,

1:31:21

and you cannot do that for

1:31:24

variables. That is the

1:31:26

Intel architecture will not allow you

1:31:28

to XOR memory

1:31:30

with another memory. You can only

1:31:33

XOR register with a register or register

1:31:35

with memory, but not memory with memory.

1:31:38

I have a variable, I use the

1:31:40

macro reset which moves

1:31:43

a zero into it. But you don't

1:31:45

have any macros for kind of displaying

1:31:47

the contents of the stack purely

1:31:50

for debugging. You don't have anything like that. You just

1:31:52

look at the code and figure out what's going on.

1:31:55

Oh, no, no. So, I definitely have a

1:31:57

debugger. Oh, God. Oh, yeah, yeah.

1:32:00

Yeah, yeah. So... Masm comes with

1:32:02

a debugger, right? Or no? So,

1:32:04

Masm doesn't, but there were back in

1:32:06

the day a bunch of third party

1:32:08

debuggers. I use something called Periscope, which

1:32:11

was written by a guy named Brett Salter

1:32:13

years ago. I don't remember that yet. He

1:32:15

passed away a few years ago. There was

1:32:17

also something called Softus, which

1:32:20

was an ice stands for

1:32:22

in-circuit emulator. And in

1:32:25

the really old days, you would

1:32:27

pull the processor off the motherboard

1:32:29

and plug in this paddle that

1:32:32

then had a cable running through a

1:32:34

bunch of things that emulated the processor

1:32:36

that allowed you essentially to get inside

1:32:39

the processor. Wow. That's

1:32:41

wild. So that was called an ice,

1:32:43

an in-circuit emulator. And so Softice was

1:32:45

essentially using protected mode to

1:32:47

do all the same sorts of

1:32:49

things. So there have absolutely always

1:32:51

been debuggers. And one of the,

1:32:54

one of the banes of

1:32:56

developing for Spinrite was that

1:32:58

I'm, you know,

1:33:00

DOS and 16 bits. And

1:33:04

it was very difficult to create

1:33:06

an environment where I was

1:33:08

able to have networking in order for

1:33:11

my code to get down into the

1:33:13

target machine and debugging at the same

1:33:15

time. So one of

1:33:17

the things I'm really looking forward to as I move

1:33:20

to my own environment is,

1:33:23

for example, this RTOS32

1:33:25

that will be the home for

1:33:28

Spinrite 7, it works

1:33:30

with Visual Studio transparently. So

1:33:33

I get to just live in

1:33:35

a really nice, gooey IDE and

1:33:37

do all of my debugging. And

1:33:40

what's really cool, Leo, I bought so

1:33:42

many motherboards and so many random hard

1:33:44

drives through eBay when our

1:33:47

testers were reporting that on my

1:33:49

Gymcrack 27Z, it does such and

1:33:53

such. And I was like, oh

1:33:55

my God. So I'd have to go look, I'd go

1:33:57

to eBay, search for Gymcrack 27Z. and

1:34:04

I would buy one and so my amazing

1:34:07

wife put up with having motherboards everywhere.

1:34:09

Oh, for the dining room table, I'm

1:34:11

sure. So what's very

1:34:13

cool about RTOS32 is

1:34:16

it allows internet, trans-internet

1:34:18

debugging. Oh, nice. So

1:34:21

if something is happening

1:34:23

on that guy's JimKrak27Z,

1:34:26

I'll be able to actually have him

1:34:28

contact me and debug it on

1:34:31

his machine. Oh, that's really cool.

1:34:34

Wow. Yeah. Very

1:34:36

neat. Oh, okay. So you have some pretty

1:34:38

good tools, it sounds like. Oh, yeah. And in

1:34:40

fact, one of the

1:34:43

things that I've learned is invest

1:34:45

in your tooling infrastructure before

1:34:47

you do anything. It

1:34:49

is so nice to have a

1:34:52

convenient debugging environment. Absolutely.

1:34:56

On we go. I'm sorry, I didn't mean to

1:34:58

interrupt. I was just curious. I was debugging the other night

1:35:00

and I was thinking, I wonder how Steve does this. Now

1:35:02

I know. Yeah, you absolutely have to

1:35:05

have a good deal. It allows you

1:35:07

to see the stack and the contents of the

1:35:09

registers and what's in

1:35:11

memory and what your local

1:35:13

variables are. All of that is

1:35:15

made really very nice with Visual

1:35:18

Studio. Nice. Okay.

1:35:20

Willie Scott. He says, okay,

1:35:23

he has some feedback and advice

1:35:26

about the operation of the iCloud

1:35:28

Keychain and I bet you

1:35:31

he knows what's going on or at least

1:35:33

gave us enough of a clue. He said,

1:35:35

hi, Steve. In regards

1:35:37

to your discussion of pass keys

1:35:40

on last week's show, the part

1:35:42

about the author's partner losing her

1:35:45

iCloud Keychain passwords intrigued

1:35:48

me. After the

1:35:50

last pass hack, I decided to

1:35:53

switch to using iCloud Keychain for

1:35:55

my passwords because I'm in the

1:35:57

Apple ecosystem and wanted to start

1:35:59

using using pass keys instead

1:36:01

of passwords wherever possible. I'm

1:36:04

writing to mention that I

1:36:06

too have had

1:36:08

passwords and two-factor authentication

1:36:10

codes wiped from my

1:36:13

iCloud keychain. Although

1:36:18

my keychain has never been

1:36:20

fully wiped like the poor

1:36:22

partner's keychain did. As

1:36:24

near as I can tell, I believe I

1:36:26

know the culprit of why it may

1:36:29

be wiping credentials from iCloud keychain and

1:36:31

wanted to pass this along to anyone

1:36:33

who might still be using iCloud keychain

1:36:35

to store their passwords or

1:36:37

who knows somebody who may. When

1:36:41

I started changing all my passwords and

1:36:43

adding accounts into iCloud keychain, I

1:36:46

noticed that an old

1:36:48

Amazon password that I don't

1:36:50

use anymore was already stored

1:36:52

in there, probably

1:36:55

from when the Amazon app asked, Do

1:36:57

you want me to remember your password?

1:37:00

It was an old password that I don't use

1:37:02

anymore so I deleted it. However,

1:37:04

a couple of days later, I noticed

1:37:07

that even though I deleted that

1:37:09

password, or so I thought, it

1:37:12

had somehow reappeared in

1:37:14

my iCloud keychain. Not

1:37:16

only that, but I also noticed that

1:37:19

one or two accounts that I had

1:37:21

recently added to the keychain were missing

1:37:24

and this process repeated itself a

1:37:26

few more times. So

1:37:29

that's when I started investigating. While

1:37:31

digging through the settings, I

1:37:33

went through my Apple ID account

1:37:35

settings and that's when I realized

1:37:38

that my old iPhone

1:37:41

6S Plus, which

1:37:44

was running an old version of

1:37:46

iOS, iOS 14

1:37:48

to be exact, was still

1:37:50

signed into my iCloud account

1:37:53

and had iCloud keychain turned

1:37:55

on. I

1:37:57

removed that old iPhone from my iCloud account.

1:38:00

out account and ever since I

1:38:02

did that no passwords

1:38:04

have been wiped. If

1:38:07

you are in an Apple ecosystem it

1:38:09

is always a good idea to keep

1:38:11

your devices up to date but it

1:38:13

might also be a good idea to

1:38:15

do some spring cleaning and remove old

1:38:17

Apple devices from your iCloud that you

1:38:19

don't use anymore. Having

1:38:22

said all that I sadly was

1:38:24

agreeing with a lot of the points

1:38:26

you were making about Passkeys

1:38:29

and I think I've decided

1:38:31

that I will probably switch over

1:38:33

to Bitwarden once Passkeys become officially

1:38:36

supported in Bitwarden using

1:38:38

and he says https://bitwarden.com. Thank

1:38:42

you. Of course. Yes

1:38:44

sir. Special sponsor link. Which

1:38:47

I think we are about to talk about. Yes we are actually.

1:38:50

Thank you for a great show. I look

1:38:52

forward to it each week. I'm also a

1:38:54

proud Spinrite owner and can't wait to start

1:38:56

using 6.1 on my SSDs and a troubled

1:38:58

hard drive. So this

1:39:02

mysterious iCloud credential

1:39:04

removal has all

1:39:07

the feel of

1:39:09

something Apple would be

1:39:11

deliberately doing out of

1:39:13

their typical abundance of

1:39:15

caution. I'll bet there's

1:39:18

a security model behind it. For

1:39:21

example while an older

1:39:23

iPhone is also

1:39:25

signed into an accounts

1:39:28

iCloud keychain Apple might

1:39:30

be deliberately limiting what

1:39:32

they're willing to save

1:39:34

into that shared keychain

1:39:36

while an older and

1:39:39

presumably lower security device

1:39:41

also shares access. In

1:39:43

other words it's a feature not

1:39:46

a bug. I

1:39:50

guess it could be that. I

1:39:52

don't like that kind of unexplained behavior

1:39:54

however. It sounds like

1:39:57

Apple though to say oh we're

1:39:59

not going to let you hurt yourself, you

1:40:01

know, we're gonna delete your, you know,

1:40:05

the keys you've just saved because

1:40:07

otherwise one of your insecure devices

1:40:09

might get them. Ay yay yay.

1:40:12

Yeah, I'll make sure that you always should

1:40:14

remove old devices. That's maybe why I've never

1:40:16

run into this. I always remove the old

1:40:18

devices. So hmm. Yep.

1:40:21

Very interesting. I do happen to

1:40:23

have an iPhone 6 right here.

1:40:25

Wow, look at that. That doesn't

1:40:28

work anymore. Look at that

1:40:30

home button and think fondly on it

1:40:32

because Apple has, as of today, discontinued

1:40:34

all the devices that had

1:40:36

home buttons. The last one

1:40:38

you could buy was the iPad base model

1:40:41

and that's now been superseded. So the

1:40:43

home button is officially a thing of

1:40:45

the past, as is the

1:40:48

headphone jack, I think. I

1:40:50

think with it all, facial recognition?

1:40:52

Yeah. It's all Face

1:40:54

ID now. Yep, makes sense.

1:40:58

Let's talk about it, Warden, and then I

1:41:00

want to talk about your subject matter for

1:41:02

the day. Indeed. What's

1:41:05

going on with Google in the UK? What

1:41:07

is happening here? Why are

1:41:09

they putting off the third party cookie?

1:41:12

Not so fast. What's the deal, man?

1:41:15

This portion of the show brought to you by Bit Warden.

1:41:17

The password manager I use, the password manager

1:41:19

Steve uses, and pretty much everybody I know

1:41:21

uses. We were talking Mac Break Weekly. There's

1:41:24

something that happens in the geek community where we, without

1:41:27

coordinating with one another,

1:41:29

converge on the best solution.

1:41:32

Neelai Patel, the laser printer that

1:41:35

everybody uses but nobody mentions, the

1:41:38

screen cleaner we all use but nobody mentions.

1:41:41

I would say Bit Warden has

1:41:43

become like that. The password manager

1:41:45

of choice for anybody who's

1:41:47

really paying attention. Now,

1:41:49

there's a good reason for this. It's open

1:41:51

source. It's

1:41:53

feature rich. It is

1:41:56

great for home, great for office. They have

1:41:58

a Teams and an enterprise. account.

1:42:02

They support Yuba keys and now good

1:42:04

news they just announced they officially support

1:42:07

Pascis. They've supported it for a while but now

1:42:09

they support on the browser extensions and

1:42:11

mobile devices. So it's a really

1:42:13

good solution if you're saying I don't want

1:42:15

to have my Pascis tied to a physical

1:42:17

device use Bitwarden for your

1:42:19

Pascis. I've been doing this for a while and now

1:42:22

everywhere you go on Android

1:42:25

iOS Mac Windows Linux you've got

1:42:27

your Pascis. Pascis

1:42:29

on mobile are available on iOS open beta

1:42:31

going on right now on Android. We'll talk

1:42:33

more about it as time goes

1:42:35

by. But that's

1:42:38

what happens when you have an open

1:42:40

source product. It's how Argon 2 got

1:42:42

in there as a replacement for PBKDF2

1:42:44

which is you know not memory hard

1:42:46

and has some issues. I

1:42:48

use Argon 2 now and that's because one of our

1:42:50

listeners Quax and wrote an Argon

1:42:52

2 implementation submitted it

1:42:55

to Bitwarden on their github account. Bitwarden

1:42:58

analyzed it assessed it and said yeah we're

1:43:00

gonna adopt this this is good and

1:43:03

now we all have it. I love that.

1:43:07

I love that and this is

1:43:09

the one more reason why I know you use a password

1:43:11

manager but you know you've got friends and family and you

1:43:13

know they are in that

1:43:15

75% of people who just you

1:43:17

know I use the same password over and over again.

1:43:20

Get them to use Bitwarden and when they say well

1:43:22

I don't want to pay for a password manager tell

1:43:24

them it's free forever. Open source

1:43:27

free for personal use unlimited

1:43:30

passwords Yubikey, Pascis everything.

1:43:34

World Password Day we didn't really mark it but

1:43:36

it was May 2nd was five days ago. For

1:43:39

in honor of World Password Day

1:43:41

Bitwarden surveyed 2,400 individuals from the

1:43:43

US, UK, Australia, France, Germany, and

1:43:45

Japan. Just to learn a little

1:43:47

bit about current password practices we're talking about that a little

1:43:50

bit earlier. 31% of US respondents

1:43:53

almost a third reuse passwords across

1:43:56

sites. They're lying it's probably

1:43:58

more like 50 to 60. 60

1:44:00

to 70 percent, but okay. 31

1:44:03

percent admit to it. That's maybe the better way to put

1:44:05

it. Now, to get this, 42 percent

1:44:08

incorporate personal information. They're

1:44:11

using their middle name and their birth date,

1:44:13

their dog's name, their mother's maiden name, that

1:44:15

kind of thing, which really raises concerns about

1:44:17

the password, strength, and security. It'd

1:44:19

be one thing if you reused a completely random password,

1:44:22

but they're not doing that. 58

1:44:25

percent of respondents continue to use

1:44:27

memory. Get

1:44:29

your password manager. I get it all

1:44:32

up here. Good luck with

1:44:34

that. And 34 percent continue to use pen

1:44:36

and paper for password management.

1:44:39

Now, that wouldn't be so bad at home, but we're talking

1:44:41

about work. They've

1:44:43

got something in their desk drawer, probably more likely

1:44:46

a post-it note under the blotter with

1:44:49

all the passwords there. Nearly a quarter

1:44:51

of respondents view their workplace security habits

1:44:53

as risky. They even know it. 45

1:44:57

percent storing passwords

1:44:59

insecurely. 44

1:45:01

percent using weak credentials. I

1:45:05

love it, Bitwarden kind of understates this. They say

1:45:07

these findings suggest areas for

1:45:09

improvement in organizational

1:45:13

cybersecurity practices. You

1:45:15

need Bitwarden. Let's face it. They

1:45:18

empower enterprises, developers, individuals to store

1:45:20

and share sensitive data, not just

1:45:22

passwords, all sensitive data safely. It's

1:45:25

transparent because it's open source. It's

1:45:27

the right way to do it. You can even

1:45:29

self-host. If you say, oh, I don't want to

1:45:31

give anybody my passwords, fine, run your own server.

1:45:33

But I honestly think I don't run my

1:45:35

own server. Bitwarden is going to do a

1:45:38

better job securing it than I ever am. And with all that

1:45:40

encryption and Argon 2 password hardening

1:45:42

and all of that, I'm

1:45:44

not worried. I think my passwords are as safe

1:45:46

as it could possibly be. A lot safer

1:45:48

than they'd be up here in the

1:45:50

brain. Bitwarden makes it easy for

1:45:53

you and all its users to extend robust

1:45:55

security practices to all of your online experiences.

1:45:57

And if you are an employer, you should

1:45:59

be looking forward to it. listening because people

1:46:01

are doing bad things down the hall at

1:46:04

your job. Get going.

1:46:06

Get started with Bitwarden's free trial of

1:46:08

a team or enterprise plan or

1:46:11

of course as an individual get started

1:46:13

for free across all devices at bitwarden.com/twit.

1:46:17

You can see he used

1:46:19

the right address bitwarden.com slash

1:46:22

twit. This is almost a public service

1:46:24

announcement. I mean it's an ad but

1:46:26

really start using

1:46:28

it folks and get your friends and family to

1:46:31

do the same. Bitwarden.

1:46:34

Okay, Steve. I think

1:46:37

that it's the second

1:46:40

order effect for our listeners. I

1:46:42

can't imagine we have a single listener. I

1:46:44

mean I know not everyone

1:46:46

is using Bitwarden, right? I'm

1:46:48

sure every single person is

1:46:51

using something. I hope so. I

1:46:54

can't conceive of it today. So tell

1:46:56

your friends, family, your boss, your

1:46:58

employees. Today's

1:47:00

podcast is titled Not So Fast

1:47:03

because that's the absolutely best way to

1:47:06

characterize what's going on in the United

1:47:08

Kingdom with Google. As we

1:47:10

know during our podcast two weeks ago,

1:47:12

Leo dropped the news that

1:47:14

Google's third-party cookie deprecation would

1:47:17

not be happening as had

1:47:19

been long planned for this

1:47:21

summer. And of course

1:47:23

I was getting all excited about that

1:47:25

because I've been on this third-party cookie

1:47:27

thing for a long time. I think

1:47:29

it was in 2008 I

1:47:33

created that whole cookie forensics

1:47:35

facility. GRC understands

1:47:40

which types of assets carry cookies and

1:47:42

which ones are first party and third

1:47:44

party and everything. And there were back

1:47:46

then browsers were not handling cookies correctly.

1:47:48

When you turn them off sometimes they

1:47:51

didn't get turned off or turning

1:47:54

them off would keep new ones from

1:47:56

being stored but would not cause old

1:47:58

ones to start getting blocked. and there

1:48:00

was just all kinds of screwy things that were going on.

1:48:02

So, you know, this has been a hobby

1:48:05

horse of mine for decades. So

1:48:11

it is the case that the

1:48:14

abandonment and deliberate blocking of all

1:48:16

third-party cookies and other web tracking

1:48:18

hacks represents such a dramatic

1:48:21

sea change for the web

1:48:23

that, I get it, many

1:48:26

understandably skeptical observers doubt it

1:48:28

can or ever will actually

1:48:30

come to pass. And

1:48:32

you know, we've been abused for so long,

1:48:35

it's difficult to imagine that could ever end.

1:48:37

So, self-confessed technology

1:48:40

fanboy that I am,

1:48:42

I wanted to determine what was

1:48:45

going on. Were some

1:48:47

stuffed-shirt bureaucrats somewhere going to screw

1:48:49

this all up? When

1:48:52

I went to take a look at that

1:48:54

for last week's podcast, I quickly became lost

1:48:56

in a paper shuffle. I decided

1:48:58

that whatever was going on was worthy

1:49:00

of understanding since I consider this single

1:49:03

forthcoming change that, you

1:49:06

know, the largest browser maker

1:49:08

in the world by far wants

1:49:11

to make to be

1:49:13

one of the most important things that's going

1:49:15

on today. And the question

1:49:17

about, you know, are we going to

1:49:19

keep our conversations encrypted in

1:49:21

messaging apps which the EU seems

1:49:24

determined to say no to? As

1:49:27

I previously said, this represents a

1:49:29

complete, what Google is doing

1:49:31

represents a complete reconceptualization of

1:49:33

the way the Internet will

1:49:36

finance itself going forward. And

1:49:39

we could have it soon. So

1:49:42

the news that Leo had picked up on

1:49:44

came in the form of an announcement that

1:49:47

left actually more questions

1:49:49

than it answered on the 23rd of

1:49:51

last month, which was, you know, Tuesday

1:49:53

before last, on their

1:49:56

privacysandbox.com site. Google

1:49:58

posted under the headline, Update on

1:50:01

the plan for phase out

1:50:03

of third party cookies on

1:50:05

Chrome. That's. Very clear.

1:50:07

Their brief introduction said

1:50:09

the U K's Competition

1:50:12

and Markets Authority. Known.

1:50:14

As the see I may and will be using

1:50:16

that acronym a lot here. Are.

1:50:18

Abbreviation of. And

1:50:21

google. Publish. Quarterly Reports

1:50:23

To update the ecosystem on

1:50:25

the latest status of privacy

1:50:27

sandbox for the web As

1:50:29

part of Googles First Quarter

1:50:31

Twenty Twenty Four report, we

1:50:33

will include the following update

1:50:35

that is in the report.

1:50:38

About the timeline for phasing out

1:50:40

third party cookies in chrome in

1:50:43

the April Twenty Sixth Report: Okay,

1:50:45

so the update very short. It.

1:50:47

Simply reads: We're. Providing

1:50:50

an update on the plan for

1:50:52

third party cookie deprecation on Chrome.

1:50:55

They. Said, We recognize that

1:50:57

there are ongoing challenges related

1:51:00

to reconciling divergent seat back

1:51:02

from the industry regulators and

1:51:04

developers, and will continue to

1:51:07

engage closely with the entire

1:51:09

ecosystem. It's also critical, but

1:51:12

the See I May has

1:51:14

sufficient time to review all

1:51:17

the evidence, including results from

1:51:19

industry tests which the See:

1:51:22

Ebay has asked market participants

1:51:24

to provide. By the end of

1:51:26

June. Okay, Now that

1:51:28

means essentially. June as one

1:51:30

third party cookies were supposed to be ending

1:51:33

but. They. Are there things

1:51:35

are taking longer than expected?

1:51:37

given both. Of. These

1:51:40

significant considerations we will

1:51:42

not a complete third

1:51:44

party cookie deprecation until.

1:51:47

Upside. Deprecation during the second

1:51:49

half of queue for. We.

1:51:52

Remain committed to engage in closely

1:51:55

with the see a May and

1:51:57

I see. Oh and we hope

1:51:59

to conclude that process this you

1:52:01

you're assuming we can reach an

1:52:03

agreement. We envision proceeding with third

1:52:05

party cookie deprecating starting early. Next

1:52:08

year. So. Early. Twenty

1:52:10

Twenty Five. Glued.

1:52:12

By noting, once published, you'll be

1:52:15

able to view both Google and

1:52:17

the Cms full report. Those reports

1:52:19

republish three days later. On.

1:52:22

April twenty six. So this is on

1:52:24

the twenty third. They said this surprise

1:52:27

the industry. Three. Days later,

1:52:29

on the twenty six, we got the whole story. So

1:52:32

the entire issue is best

1:52:35

described by the following statement.

1:52:38

On. Jan on seven

1:52:40

January. Twenty. Twenty

1:52:42

One. Okay, So. Little

1:52:45

over three years ago, a

1:52:47

January seventh, Twenty Twenty One,

1:52:49

the see I May commenced

1:52:51

at investigation under Section Twenty

1:52:54

Five of the act some

1:52:56

it All Uk. Not.

1:52:58

Yell the equivalent of. Of.

1:53:03

Legislation to prevent of and I'm

1:53:05

monopoly misbehavior you know as he

1:53:07

trusts We have your the Us.

1:53:11

In relation to Googles

1:53:13

privacy sandbox proposals, The

1:53:15

See I'm A subsequently

1:53:17

informed Google that the

1:53:19

See Ebay was concerned

1:53:21

that Google proposals, if

1:53:23

implemented without regulatory scrutiny

1:53:25

and oversight, would be

1:53:27

likely to amount to

1:53:29

an abuse of a

1:53:31

dominant position. So.

1:53:33

Basically. Little. Over

1:53:36

three years ago, Google says we're going

1:53:38

to change the way the internet is

1:53:40

financed. Ah, And among

1:53:42

those things were going to kill

1:53:45

off third party cookies. There's no

1:53:47

question that people in the Uk

1:53:49

whose income. And livelihoods

1:53:51

depend upon tracking like get

1:53:53

out there of their data

1:53:55

resellers. They. Said

1:53:57

whoa whoa whoa whoa. One

1:54:00

third party cookies to go away.

1:54:02

We like third party cookies. so

1:54:04

uk. Bureaucrats, Please

1:54:07

tell Google no. Please. Tell

1:54:09

Google We need those cookies. Okay,

1:54:12

so. I.

1:54:14

Don't know that for a fact. it's

1:54:16

unclear and is frankly not really important.

1:54:18

Know the genesis of the inquiry, but

1:54:21

it's probably something like that since we're

1:54:23

talking about the elimination of all third

1:54:25

party cookies and the curtailment of what

1:54:27

had become the widespread practice of tracking

1:54:29

internet users around the web as a

1:54:32

means of determining their interests. It.

1:54:34

May well have been the advertising

1:54:36

technology companies based in the Uk.

1:54:39

Which. Were crying foul behind the scenes

1:54:41

and see what is more suited?

1:54:43

Really? Yes. Yes! Yes, What?

1:54:46

Ensued was about what

1:54:48

you'd expect from any

1:54:50

healthy and well established

1:54:52

bureaucracy. as old and

1:54:54

wise and as the

1:54:56

United Kingdom experts were.

1:55:00

Experts in i am me that even

1:55:02

the name united Kingdom sort of suggest

1:55:04

so. What

1:55:09

exactly is this? Experts

1:55:12

were found a neutral

1:55:14

third party monitors were

1:55:16

enlisted. And Google created

1:55:18

a document describing the and

1:55:20

boy are you could hear

1:55:22

this word, The Commitments. It

1:55:25

was prepared to make with

1:55:27

a capital C. Minute Sounds

1:55:30

religious. Almost. These are our

1:55:32

commitments. A document titled investigation

1:55:35

into Google Privacy sandbox browser

1:55:37

changes opens with the assertion

1:55:40

that quotes the see I

1:55:42

May has accepted commitments. Offered.

1:55:45

By Google that address

1:55:47

the see a competition

1:55:49

concerns resulting from investigating

1:55:51

Googles proposals to remove

1:55:53

third party cookies and

1:55:56

other functionalities from it's

1:55:58

Chrome browser. Period. Which.

1:56:00

Begs the question, what

1:56:03

exactly are. These. Commitments

1:56:05

that the see I may

1:56:07

has accepted. I

1:56:09

found the points of concern

1:56:12

in the description of the

1:56:14

roles of the appointed technical

1:56:16

experts that will be supporting

1:56:18

the monitoring agents. The documents

1:56:21

states on the twenty sixth

1:56:23

of September, twenty Twenty two

1:56:25

the see I may approve

1:56:28

the appointment of S. Siphon

1:56:30

are M Intelligence and Risk

1:56:32

Consulting limited by the Monitoring

1:56:35

Trustee which is the I

1:56:37

N G Bank and. Dot

1:56:39

V as an independent

1:56:41

technical experts to support

1:56:44

both monitoring trustee in

1:56:46

monitoring compliance with a

1:56:48

following provisions of the

1:56:50

binding commitments accepted by

1:56:52

as the Cia on

1:56:54

February Eleven. Twenty. To

1:56:57

prove okay Abed The good news

1:56:59

is this deck July the short

1:57:01

Google use of data. Paragraphs,

1:57:04

Twenty Five. Through. Twenty

1:57:07

Seven. Nondiscrimination.

1:57:10

Paragraphs: Thirty And Thirty

1:57:12

One. And. With

1:57:14

respect to those provisions anti

1:57:16

Circumvention Paragraph Thirty three, the

1:57:19

role of the technical expert

1:57:21

is to provide specialized knowledge

1:57:23

to support the monitoring trustee,

1:57:25

particularly in relation to monitoring

1:57:28

data flows and understanding the

1:57:30

possible impacts of the privacy

1:57:32

sandbox changes on ad tech

1:57:35

markets. Okay so we

1:57:37

have the I N G

1:57:39

Bank serving as the neutral

1:57:41

monitor and this monitor has

1:57:44

a point is another from

1:57:46

with the required technical expertise

1:57:48

and everything is focused upon.

1:57:51

His. In a small handful

1:57:53

of paragraphs somewhere. I.

1:57:56

Found out where they are

1:57:58

in Appendix One A. Are

1:58:00

the latest version of the

1:58:03

Googles final commitments document. The

1:58:05

first set of paragraphs twenty

1:58:07

five to twenty seven basically

1:58:10

amount to Google promising not

1:58:12

to use any personal data

1:58:15

from a user's past Chrome

1:58:17

browsing. History. A

1:58:20

customers Google Analytics account or

1:58:22

to in any way track

1:58:24

users. So.

1:58:27

That's all. Pretty much what

1:58:29

Google has explained to be

1:58:31

it's intentions and goals. So.

1:58:33

It appears that the see amaze

1:58:36

just wanted that very clearly and

1:58:38

says simply spelled out. The

1:58:40

Non discrimination. That's Paragraphs Thirty

1:58:43

and thirty One states that

1:58:45

Google promises to click to

1:58:47

create a totally level playing

1:58:50

field. Having. Examined explored

1:58:52

and shared on his Podcast

1:58:54

the operation of Googles cookie

1:58:56

replacement technologies as they've evolved

1:58:59

through the through the years.

1:59:01

This was still. It was

1:59:03

always clear to me and

1:59:05

those who understood this that.

1:59:08

This was inherently level. The

1:59:10

playing field was. That. Is

1:59:12

very they don't Google was

1:59:14

getting a very proscribed about

1:59:16

of information at everybody was.

1:59:19

Your equally had he had

1:59:21

equal access to it. Is

1:59:24

implicit throughout Googles design.

1:59:27

Though. I have to

1:59:29

as agreed that the Googles design

1:59:31

has grown to be much better

1:59:33

thanks to all of feedback and

1:59:36

criticism the various pieces have received

1:59:38

through the years. So yes, it's

1:59:40

a good thing we did not

1:59:42

get stuck with Googles first idea.

1:59:44

what we've got is something far

1:59:46

better than what we would have

1:59:48

had if you know if this

1:59:50

if there was sufficient scrutiny done

1:59:52

and there was so. I

1:59:57

didn't understand how bureaucrats who

1:59:59

will never or understand how

2:00:01

Google topics a P I

2:00:03

functions need a simple okay

2:00:05

but. But but. What does

2:00:08

it mean? Spelled. Out in

2:00:10

English since this is crucial to the

2:00:12

except as of Googles technology are just

2:00:14

a vessel a co op as I

2:00:16

two paragraphs limit or share them. Paragraph

2:00:18

Thirty says. google. Will design,

2:00:21

develop and implement the privacy

2:00:23

sandbox proposals in a manner

2:00:25

that is consistent with the

2:00:27

purpose of the commitments and

2:00:30

take account of the development

2:00:32

and implementation criteria. Google will

2:00:34

ensure that does not distort

2:00:36

competition by discriminating against rivals.

2:00:38

In favor of Googles advertising

2:00:41

products and services, in particular,

2:00:43

Google will not a We

2:00:45

have three things. Design.

2:00:48

And develop the privacy sandbox.

2:00:50

Proposals are ways that will

2:00:52

distort competition by cells preference

2:00:54

sing Googles advertising products and

2:00:56

services. Also. Will not

2:00:59

implement the privacy sandbox in

2:01:01

ways that will distort competition

2:01:03

by self preferences Googles advertising

2:01:06

products and services, and finally,

2:01:08

also will Not use competitively

2:01:10

sensitive information provided by an

2:01:13

ad tech provider or publisher

2:01:15

to Chrome for a purpose

2:01:17

other than that for which

2:01:20

it was provided. That.

2:01:22

As as for the avoidance

2:01:24

of doubt privacy sandbox proposals

2:01:27

the deprecate Chrome functionality. You

2:01:29

will remove such functionality for

2:01:31

Googles own advertising products and

2:01:33

services, as well as for

2:01:36

those of other market participants.

2:01:39

That. Was paragraph thirty and. Just.

2:01:41

I mean, that's that's exactly what Google

2:01:43

has said. There have been a do.

2:01:46

But. Essentially, what has

2:01:48

happened is a legally

2:01:51

binding contract. Has. Been

2:01:53

created. That Google. That's

2:01:55

what these commitments are. Which Google

2:01:57

the saying. They're going to honor.

2:02:00

And. Paragraph Thirty Just says

2:02:02

Google will Not change its

2:02:04

policies for customers of Google

2:02:07

Ad Manager Campaign Manager Three

2:02:09

Sixty Display and Video Three

2:02:12

Sixty or sir, sad, Three

2:02:14

Sixty to introduce new provisions

2:02:16

restricting our customers use of

2:02:19

non Google technologies both for

2:02:21

the removal of third party

2:02:23

cookies and less exceptional circumstances.

2:02:27

Such circumstances to be discussed by with

2:02:29

a Cama or as required by law.

2:02:33

For the duration. Of

2:02:35

the commitments Google will inform the

2:02:37

see I may I head of

2:02:39

any such change These policies. And.

2:02:44

This leaves us. With. The

2:02:46

final anti. Circumvention.

2:02:49

Paragraph Thirty Three, which is just

2:02:51

a blessedly single line. Which.

2:02:54

Reads: Alphabet, Inc,

2:02:56

Google Uk Limited, and

2:02:59

Google L. L C

2:03:01

will not in any

2:03:03

way, whether by acts

2:03:05

or omissions, directly or

2:03:07

indirectly circumvent any of

2:03:10

the commitments. Now.

2:03:13

That. Sort of language will be

2:03:15

familiar to any businessman or

2:03:17

anyone has been involved in

2:03:20

any contractual agreements were attorneys

2:03:22

are engaged else boilerplate, right?

2:03:24

And it's important to understand

2:03:26

that both the United Kingdom

2:03:28

government and Googles various corporations

2:03:30

recognize those provisions to be

2:03:33

now. Contractually. And

2:03:35

legally binding. So.

2:03:38

It has been upon those

2:03:41

representations which are enumerated as

2:03:43

commitments with a capital see

2:03:45

that. The Uk then proceeded

2:03:47

to carefully examined Googles proposal.

2:03:49

So now he returned to

2:03:51

the timeline for phasing out

2:03:53

third party cookies. That work

2:03:55

appears in a document titled

2:03:57

see I'm a Quarter One.

2:04:00

The Twenty Four Update report on

2:04:02

implementation of the privacy sandbox commitment

2:04:04

data last month. April Twenty Fourth.

2:04:06

I mean Eight or eight. April

2:04:08

Twenty Twenty Fourth as he was

2:04:10

able to. My sixth. Of

2:04:13

the documents summary. Lays.

2:04:16

Out the entire story and it's interesting enough

2:04:19

and short enough to share. They

2:04:21

said this report. says. Out

2:04:23

the see Amaze! updated views

2:04:26

on the issues we identified

2:04:28

in our January Twenty Twenty

2:04:30

Four Repaired. So. January

2:04:32

was the previous report now, so

2:04:34

it's if basically quarterly, right? So

2:04:36

this is the result of the

2:04:38

queue up as of the first

2:04:41

quarter to this is from January

2:04:43

Twenty Twenty Four, where are we

2:04:45

now? Words in in April? So

2:04:47

we've had the first Quarter go

2:04:49

by our analysis based on the

2:04:51

framework for assessment set out in

2:04:53

the legally binding commitments that Google

2:04:55

made in February Twenty Twenty Two

2:04:57

to address competition concerns relating to

2:04:59

his proposals to remove third party

2:05:01

cookies from. Chrome. So in other

2:05:03

words, the F: This is a

2:05:05

big deal for the entire internet.

2:05:08

It's a big deal. The January

2:05:10

Twenty Twenty Four report said out

2:05:12

our provisional views on the impact

2:05:15

of the privacy sandbox on competition,

2:05:17

publishers and advertisers, and user experience.

2:05:19

We outline Googles response to the

2:05:21

concerns we identified in that report,

2:05:24

the January reports, and the steps

2:05:26

it has taken to resolve pending

2:05:28

issues. We've also consider the see

2:05:30

back received from market. Participants on

2:05:33

these points. We've included a summary

2:05:35

of this feedback in the below.

2:05:37

This report also incorporates the preliminary

2:05:40

assessment of the at the I

2:05:42

see Oh is the Information Commissioner's

2:05:45

Office. On the

2:05:47

privacy and data protections impacts of the

2:05:49

privacy sandbox. Having consulted with the I

2:05:51

See Oh, we set out our current

2:05:54

views on these concerns for each of

2:05:56

the A P eyes, although there are

2:05:58

a number of concerned. The work

2:06:00

through based on the available evidence

2:06:02

we consider that are in the

2:06:04

first of January, twenty twenty Four

2:06:06

through the Thirty First of March,

2:06:09

Twenty Two A for the relevant

2:06:11

reporting period. google. Has

2:06:13

complied with the commitments,

2:06:16

This. Means that in our view,

2:06:18

Google has followed the required process

2:06:20

set out on the commitments as

2:06:22

engaging with us and the I

2:06:25

see Oh to resolve our remaining

2:06:27

concerns ahead of third party cookie

2:06:29

deprecation. However, further progress is needed

2:06:32

by ghouls resolve our competition concerns

2:06:34

ahead of deprecation. We. Will

2:06:36

continue to work with Google to

2:06:38

resolve our concerns. Between now and

2:06:40

the point at which Google triggers

2:06:43

the standstill period, We will provide

2:06:45

an update on progress in our

2:06:47

next update report. Testing of the

2:06:49

Privacy sandbox tools is also currently

2:06:51

underway. The test results will form

2:06:54

part of a wider evidence base

2:06:56

that we will use to assess

2:06:58

the effectiveness of the privacy sandbox.

2:07:00

The test period runs until the

2:07:02

end of June this year. And.

2:07:05

And as I said before, because this

2:07:07

is running through June, that's what kept

2:07:10

the cookies from being. It off

2:07:12

for for them to for the beginning

2:07:14

of a deprecation to to start. Off.

2:07:16

As the end of June. They.

2:07:19

Said given time be the time

2:07:21

needed to resolve outstanding issues and

2:07:24

take account of testing results. We've

2:07:26

agreed with Google that there should

2:07:28

be a limited delay to third

2:07:30

party cookie deprecation subs to resolving

2:07:33

of remaining competition concerns. Google as

2:07:35

now aiming to proceed with third

2:07:37

party Cause You deprecation starting in

2:07:40

early Twenty Twenty Five Under the

2:07:42

commitments it is for Google to

2:07:44

decide when the standstill period is

2:07:46

triggered. We. Encourage market

2:07:49

participants taking part in testing

2:07:51

to submit their results directly

2:07:53

to Us by the end

2:07:55

of June deadline. We. Also,

2:07:57

rec welcome any additional feedback.

2:08:00

Stakeholders in the concerts identified in

2:08:02

this report or contact deals are

2:08:04

included. The report. Okay, so

2:08:06

one last thing, this made

2:08:08

reference to a standstill period

2:08:10

several times, so I tracked

2:08:12

that down in the earlier

2:08:14

Commitments documents. On. It

2:08:17

appears to be just more

2:08:19

bureaucracy for it's own sake.

2:08:21

It says not on know

2:08:23

Paragraph nineteen: Google will not

2:08:25

implement the removal of third

2:08:27

party cookies before the expiration

2:08:29

of a standstill period of

2:08:31

no less than sixty days

2:08:33

After Google notifies the see

2:08:35

I may have it's intention

2:08:37

to implement their removal. Google

2:08:39

may increase the length of

2:08:42

such a standstill period at

2:08:44

any time, giving between a

2:08:46

tie. Between getting such notice and

2:08:48

the periods expiration. At

2:08:50

the see amazed request, Google will increase

2:08:52

the length of the standstill period by

2:08:55

a further sixty days to a total

2:08:57

of one hundred twenty days. Okay,

2:09:01

so. What? Follows

2:09:03

all of that. Is.

2:09:05

Ah, That. Was the

2:09:07

documents summary. There are ninety

2:09:09

seven pages. Of. Interesting,

2:09:12

but ultimately mind

2:09:15

numbing. Back. And

2:09:17

forth detail as every

2:09:19

conceivable facet of this

2:09:22

big change. From.

2:09:24

Will be implementing. Is.

2:09:27

Examined under a bureaucratic

2:09:29

microscope. The. Real concern

2:09:31

is over Googles size

2:09:33

and whether the changes

2:09:35

is making will disadvantage

2:09:37

smaller ad tech players.

2:09:39

But what becomes clear

2:09:41

after reading at least

2:09:43

some. And that's what I did.

2:09:45

I could not go through ninety seven pages. As

2:09:47

I did my i started to cross and I

2:09:49

could see. It

2:09:52

is very clear that the

2:09:54

Uk is moving clearly and

2:09:56

Googles direction. Of.

2:10:00

Both parties are truly negotiating

2:10:02

in good faith that that's

2:10:04

one thing that also is

2:10:06

very clear: this is not

2:10:08

the Uk stonewalling and in

2:10:10

all being unreasonable of today,

2:10:12

it really is. As as

2:10:14

Leo portrayed in L A

2:10:16

A. A bureaucratic walrus

2:10:19

that is episode absolutely has If

2:10:21

you know doesn't have any idea

2:10:23

what is going on people are

2:10:26

are are are are nipping at

2:10:28

it saying this is bad You

2:10:30

can't let Google do this. So

2:10:32

Google is saying this is not

2:10:35

bad This has to happen. We

2:10:37

want to stop tracking on the

2:10:39

internet. People who make their living

2:10:42

from tracking are saying there but

2:10:44

we like tracking. Yes. Yes,

2:10:47

And so the Uk sort of stuck

2:10:49

in the middle google being reasonable they

2:10:51

are I mean I i i them

2:10:54

there must be like be. A

2:10:56

division of Google. Where.

2:11:00

They are intoxicated in a hot tubs

2:11:02

somewhere just in order to maintain their

2:11:04

sanity. That there's no way that the

2:11:06

developers are dealing with any of this

2:11:08

dogs as big as a mean. Ultimately,

2:11:11

that's what it is, but it's but

2:11:13

the Uk needs to be. Placate.

2:11:16

It. Through having this

2:11:18

explained in of what exactly

2:11:20

this is and does. So.

2:11:23

That's. What's Happening? Again,

2:11:26

it's. A Progress. Is

2:11:28

being made in the January Report

2:11:30

for example. There was and there

2:11:33

are. There was an instance where

2:11:35

death The ad tech companies were

2:11:37

trying to claim that because of

2:11:40

their sorta reads they were being

2:11:42

disadvantaged. The expert looked at it

2:11:44

under the watchful eye of the

2:11:47

monitor. And now in the eight

2:11:49

April report. Their. Conclusion

2:11:51

is no, that is

2:11:53

not the case. There

2:11:55

is no disadvantageous and

2:11:58

that is disadvantageous. I'm

2:12:00

handling based on size of

2:12:02

advertiser we see no evidence

2:12:05

of that will understand the

2:12:07

technology. That's not the case

2:12:09

so. Ah, It does

2:12:11

not appear to me that Googles

2:12:13

privacy sandbox technology is in any

2:12:16

trouble at all. The truth is

2:12:18

it. As I said, it represents

2:12:20

a massive change to the way

2:12:23

the internet pays for itself and

2:12:25

is gonna find itself in the

2:12:27

future. And is also true that

2:12:30

many companies whose revenue has been

2:12:32

entirely derived from the oh so

2:12:34

slimy practice of tracking users and

2:12:37

aggregating their data without our knowledge

2:12:39

or permission. for the purpose of

2:12:41

selling that dated anybody with a wallet. Will.

2:12:44

Be. Their income will

2:12:46

be impacted and not a good

2:12:48

way. So having read through the

2:12:50

documents I can understand that the

2:12:52

process is taking place and as

2:12:55

taking aim at. In retrospect, jan

2:12:57

although I would have never expected

2:12:59

this would happen, it is me.

2:13:01

It is at least understandable and

2:13:03

it appears the world will indeed,

2:13:06

Soon. Be. Receiving this

2:13:08

dramatic change and way internet based

2:13:10

advertising has carried out, it is

2:13:12

it off. Clearly far superior to

2:13:14

the status quo where we would.

2:13:16

We can't keep going on the

2:13:18

way we have been odds. and

2:13:20

it takes something no less large

2:13:22

than Google to just simply make

2:13:24

it an ultimatum we're at. We

2:13:26

are going to do this. So.

2:13:29

I understand they've gotta satisfy the

2:13:31

walruses of the world. Ill.

2:13:34

They. Are it looks like that process is close

2:13:36

to being done? I. Hope

2:13:38

so if course advertisers don't like

2:13:40

it. That's. Where we like it.

2:13:44

And I see Google. Obviously, we're trying to

2:13:46

balance the interests of both parties. Because they

2:13:48

are. They sell ads. They. Buy

2:13:50

ads. This their

2:13:52

businesses, their revenue. But.

2:13:55

They also understand that consumers are not happy and

2:13:57

I think they need to know I'm aware and

2:13:59

Leo. I'm. I'm. I'm

2:14:02

impressed by. The.

2:14:04

Them. Them minimization.

2:14:07

Of. The information that

2:14:09

google themselves. Are. Willing.

2:14:12

To. Obtain. I. Mean

2:14:14

it's as we've seen. Topics is not

2:14:17

invasive. they are that you have. No

2:14:19

one could be identified from their topics.

2:14:21

they are chosen at random. I mean

2:14:24

this. this. The system has incredible checks

2:14:26

and balances built in which we've talked

2:14:28

about on the podcast will be explained

2:14:31

it and I think will probably due

2:14:33

for a real explanation What it actually

2:14:35

goes into effect because you know it's

2:14:38

the way the world's going to work

2:14:40

and. And. I love the

2:14:42

comment about the reason my my machines

2:14:44

fans were spitting up was that my

2:14:47

Chrome browser or what I was reading

2:14:49

chrome web was busy holding auctions with

2:14:51

all of the world's ad agency. well

2:14:53

that's coming maybe? Anyway was the only

2:14:55

way. The only way to do this

2:14:58

is to make it user side. You

2:15:00

move it to the suit to the

2:15:02

user and then the the user's browser

2:15:04

chooses what they're gonna see. It's it's

2:15:06

brilliant. A. I'm

2:15:10

I'm going to tease next week's

2:15:12

topic. I believe I think next

2:15:14

week's topic will be Z T

2:15:16

Dns. Which. Stands

2:15:18

for Zero Trust Dns

2:15:21

last Thursday. Microsoft.

2:15:23

Published a preview of a

2:15:25

forthcoming security solution they call

2:15:27

Zero Trust Dns. It's been

2:15:29

clear for a long time,

2:15:31

the Dns represents as we

2:15:33

know both and achilles' heel

2:15:35

of network security and a

2:15:38

point where it's also very

2:15:40

possible if you're clever to

2:15:42

introduce a significant new level

2:15:44

of security. For. My

2:15:46

brief scan of the technology

2:15:48

microsoft as outlined It appears

2:15:50

that any of our listeners

2:15:52

who may have followed up

2:15:54

on my discovery a few

2:15:57

months back of Adam Networks

2:15:59

Dns solution. Which they call

2:16:01

don't talk to strangers. May.

2:16:03

Already be enjoying the benefits

2:16:05

of dramatically improved security thanks

2:16:08

to leveraging the power of

2:16:10

Dns. But.

2:16:13

I needed more time to dig into what

2:16:15

Microsoft is doing. So for now we're next

2:16:17

week's podcast. I plan to take a deep

2:16:19

look into what Microsoft has announced. Now.

2:16:21

One thing I should say

2:16:23

that immediately stood out was

2:16:25

that Microsoft might be attempting

2:16:27

to use this as a

2:16:29

way of driving Enterprises to

2:16:31

Windows. Eleven says enterprises don't

2:16:34

want Windows Eleven as we've

2:16:36

heard Paul Throttle mention many

2:16:38

times. know you'll know Been

2:16:40

really does have. And

2:16:42

in Microsofts diagrams which I

2:16:44

briefly scanned their explicitly labeling

2:16:46

the clients as Windows Eleven

2:16:48

Machines That might be Microsoft.

2:16:50

You know, because when As

2:16:53

Eleven is what. They're. All

2:16:55

using know to Zola actually

2:16:57

wants Windows Eleven says Windows

2:16:59

Ten. Still success, Says Windows

2:17:01

Ten still commands more than

2:17:03

twice the number of desk

2:17:05

tops as Windows Eleven and

2:17:07

a much greater percentage where

2:17:09

the Enterprise. Because most Israel

2:17:12

new computers com with Windows

2:17:14

Eleven, but it's oil, Enterprise

2:17:16

machines have been running for

2:17:18

ten years don't and since

2:17:20

a huge installed base of

2:17:22

machines won't even run Windows

2:17:24

Eleven. If. What

2:17:26

Microsoft is planning to do

2:17:28

is truly a Windows Eleven

2:17:31

only solution then the client

2:17:33

agnostics system that the Adam

2:17:36

Networks guys already have Working

2:17:38

and well proven. Seems.

2:17:40

Like a far more practical when to me. but

2:17:42

in any event by the end of next week's

2:17:45

podcast will know. Exactly what's going

2:17:47

on and l It's good thing that

2:17:49

Microsoft is stepping up here and will

2:17:51

and looking to improve Dns Security as

2:17:54

we all know it needs it. But

2:17:57

it seems. To be there's already a salute.

2:18:00

The Campaign. But. Not for Microsoft

2:18:02

and so when the big he does it

2:18:04

you know I remember Leo. It was fantastic.

2:18:07

Brad. Silverberg and Brad Chase came

2:18:09

down from Redmond and took me

2:18:11

out to lunch. And

2:18:14

said steve. We're

2:18:16

going to be announcing da six

2:18:18

pretty soon, you know and I said

2:18:21

her and they said were a little

2:18:23

self conscious about this. But.

2:18:27

Ah, We're adding something called

2:18:29

scan disk. Oh. Now.

2:18:33

I have them to warn you. Don't

2:18:36

worry, It

2:18:38

won't learned well as I do know

2:18:40

is it doesn't do what spinner I

2:18:42

just. And. I said

2:18:44

ah As great as

2:18:46

as jazz as a

2:18:48

wonderful was at. A

2:18:52

later than relying on risk because

2:18:54

there was a risk. Yes for

2:18:57

yes for the rest of our

2:18:59

existence we are answering question the

2:19:01

question. Well, I. Already have scanned

2:19:04

is what am I need? Spin right

2:19:06

for right? Anyway, the

2:19:08

point is, it matters when the giant. Ah,

2:19:11

It offers the best. oh it does

2:19:13

have I I've I've been there first

2:19:16

hand the I like Silverberg a lot

2:19:18

I didn't there, never was fond of

2:19:20

bread Chase you weren't to Sherlock's those

2:19:23

the the mack people call so that

2:19:25

for goodness snow nor did that he

2:19:27

says I tried. These

2:19:29

are gonna lurk. More copies of this

2:19:31

Doctor than he sold as the Spin

2:19:34

Room. Probably. Well

2:19:37

what he did. Was

2:19:39

when I refused to sell. started

2:19:41

right to Peter he said a

2:19:43

developer home with a copy of

2:19:45

it oh and said oh yeah

2:19:47

and we we know that because

2:19:50

one of my guys looked inside

2:19:52

and saw code is that. That.

2:19:54

Was our code? I mean that that there were

2:19:57

like there was a place where I needed to

2:19:59

see whether the. I was handled a

2:20:01

certain A P I call so

2:20:03

I put some specific random data

2:20:05

in the registers why I made

2:20:07

the call to see whether they

2:20:09

got changed. Of. As Good

2:20:11

or a Smoking Gun, their clone of Spin

2:20:13

or I to do same same values, the

2:20:15

same data because they didn't know what. I

2:20:17

didn't know what exactly is of a We

2:20:20

better do it this way cause we don't

2:20:22

know for those something of that up. The

2:20:25

good news is since they didn't

2:20:27

actually create of over the cold

2:20:29

or calibrate the world was there

2:20:31

clone says it and created. Their.

2:20:34

When when their customers called for

2:20:36

support they said well we're not

2:20:38

sure called Guinness and research. I'm

2:20:41

not kidding We gotta we gotta calls

2:20:43

from our support bills I was Norton

2:20:45

said to ask you about celebrate with

2:20:48

a while when you buy a copy

2:20:50

Spirit we will have it Has her

2:20:52

and that were real Dahlia Steve is

2:20:54

and at Jersey and still selling spin

2:20:56

right now. Version Six Point One many

2:20:58

moons later and it's even better than

2:21:01

ever and Sector now at speeds of

2:21:03

doing as a D doing really well

2:21:05

I go to her really congratulations Ah

2:21:07

if you go to Jersey that can

2:21:09

pick up a copy. Don't already

2:21:12

have one of the world's

2:21:14

best mass storage maintenance recovery?

2:21:16

And. Performance her form

2:21:19

and enhancing utility. We.

2:21:21

Have their their performance as a new feature.

2:21:24

A kind of serendipitous features. Pretty

2:21:26

great that. You can

2:21:28

also find a copy the show Their Steve

2:21:30

has the canonical sixty four kilobits. Stereo.

2:21:33

Audio Access: Mano audio the Us as

2:21:35

sixteen kilobit version for the bandwidth in

2:21:37

pairs and he has excellent transcripts written

2:21:40

by an actual human being. Know ai

2:21:42

involved lay first as a great job

2:21:44

on drc.com he's at Stg or see

2:21:46

on Twitter. few on a Dm him

2:21:49

said i'm a picture of the week

2:21:51

or whatever his sir his D Ems

2:21:53

are open. We have the sixty four

2:21:56

bit canonical version of it the audio

2:21:58

version of our website. The Tv

2:22:00

flash S N but you can also

2:22:02

find video there are. There is a

2:22:05

video channel on Youtube dedicated to security

2:22:07

now and of course you can subscribe

2:22:09

with his favorite podcast player in that

2:22:11

way of gives automatically. You could even

2:22:14

watch if you're really in a hurry.

2:22:16

If you like, you can't wait. You

2:22:18

can watch over Tuesday afternoon while we

2:22:20

do it because we stream the recordings

2:22:22

of all of our big shows on

2:22:25

you tube you to.com/twit This one's right

2:22:27

after Mack Weekly so times are very

2:22:29

one thirty. To two pm Pacific

2:22:31

five Pm Eastern Twenty one hundred.

2:22:34

You. T C. At the you

2:22:36

tube that com sliced. Ah

2:22:40

Club members thank you for your support

2:22:42

if you're not a club member. May.

2:22:45

I beg of you please join. Seven bucks

2:22:47

a month gets yeah free versions of all

2:22:49

the shows. It's a lot of extra stuff.

2:22:51

We're going to do a I watch party

2:22:53

on Thursday which to be a lot of

2:22:56

some the whole staff and more Port living

2:22:58

room watching a silent movie which is good

2:23:00

because we can make this they can make

2:23:02

the sounds for you or that will be

2:23:04

this Thursday. Club members look in the events

2:23:06

tab for more information was devoting. I'm Stacey

2:23:08

His book Club pick of the week couple

2:23:11

more days to. That's the best thing about

2:23:13

Com To It is the people. It's.

2:23:15

A community of really great people he

2:23:17

would like to know. If you're looking

2:23:19

for a great community line that safe.

2:23:21

That's. Friendly that smarts,

2:23:24

Twitter. Tv slice of. Twits.

2:23:28

Ah okay. Steve.

2:23:30

I'm gonna let you go. I'm a

2:23:33

take your ankle bracelet off and bush

2:23:35

soothsayer. Well, until next week, my friend.

2:23:39

Anybody see of our podcast?

2:23:41

Nine Seventy Four. Day

2:23:44

Yeah, we would be. We

2:23:46

would be right now going

2:23:48

oh no, there's only twenty

2:23:50

five Last, Oh no. Ah

2:23:54

okay thank you Steve. Have a great

2:23:56

wisdom of our listeners that sets as

2:23:58

of them that I'm. My okay

2:24:00

I'll stay now I'm traveling years I

2:24:02

have a year revised. Out

2:24:05

is gonna retire when you did

2:24:07

an Ama jim they cease to

2:24:09

exist in my. Watch

2:24:22

the total solar eclipse at Seneca

2:24:25

Resorts and Casinos. Join us on

2:24:27

Monday, April 8th for events filled

2:24:29

with food, drinks, DJs, viewing glasses,

2:24:32

and more. Family friendly at Seneca

2:24:34

Niagara and Seneca Elegany. 21

2:24:37

and up at Seneca Buffalo Creek. The first 200

2:24:39

guests at each property receive a

2:24:41

commemorative t-shirt. Book your overnight stay

2:24:43

now so you don't miss it.

2:24:45

Get all the details at senecacasinos.com.

2:24:48

Seneca Resorts and Casinos. Nothing else

2:24:51

comes close.

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features