Crypto Leash for Laptops? 243
timman999 writes "New Scientist reports a new device that will automatically encrypt all the data on a laptop when it is separated from its owner. It uses a small receiver and the user has to wear a transmitter on his wrist."
and it is 100% worthless.. (Score:1, Insightful)
Anyone wanting to steal a laptop for it's data will find trivial ways around anything that is a "add-on" solution. It has to be a part of the hard drive it's self or all content on the hard drive needs to be encrypted already and the "device" only allow's access.
Re:and it is 100% worthless.. (Score:3, Insightful)
Re: (Score:2)
Re:and it is 100% worthless.. (Score:2)
This is my exact point.. and why it is 100% worthless for a truely secure use.
The unit needs to use a password or biometric input to allow access, and require that input every 10 minutes or on power up. (opening, whatever)
Re:and it is 100% worthless.. (Score:2)
Stake it out for a day or two, making sure you're close enough to sniff the "handshake" that the laptop and watch go through... then spoof it.
Authentication that broadcasts everything over the airwaves borders on mental retardation.
Re:and it is 100% worthless.. (Score:2)
There are suprisingly few secure handshake procedures, and it doesn't help them when you broadcast the damn thing in a 40ft radius all around you.
Re:and it is 100% worthless.. (Score:2)
Not true. If the decryption key is stored on the device worn by the user it doesn't matter which way you wire the receiver.
Re:and it is 100% worthless.. (Score:2)
Umm... lets see... yank the HD before the user is out of range, all data is now unencrypted. The only solution (worthwhile) is for all the data to already be encrypted by the HD and decryption only to take place on access.
Re:and it is 100% worthless.. (Score:2)
Druggies and fences aren't a problem (Score:2)
The financial risk of an unencrypted CEO's laptop that gets stolen by your competitors with your corporate 5-year plan, updates from subordinates on new product progress, etc. is in comparison absolutely enormous.
Something like the described system is designed to reduce the second case to being no worse than the inconvenience presented by the first case.
Forget the Crypto... (Score:4, Funny)
Noble says the system would work well with a prototype computer wristwatch developed by IBM. This watch uses the Linux computer operating system and can communicate with other devices through the Bluetooth radio protocol.
...I want the linux powered wristwatch
And, more important (Score:2)
Re:Forget the Crypto... (Score:2)
Not as a status symbol, I hope. Every time I use my Indiglo light people assume my watch is running Windows.
Drat! Foiled again! (Score:5, Funny)
Re:Drat! Foiled again! (Score:4, Insightful)
Re:Drat! Foiled again! (Score:2)
I think your estimate of the % of corporate users is seriously off, but it hardly matters. The bottom line is that (doing my own made up estimate) if a laptop is "liberated", 99%+ of the time it's just going to be reused, even if the information is more valuable than the hardware and even if it is Larry Ellison's. And unless the thief if really clueless, the data will be wiped before the sale so that the new owner doesn't easily track down the old owner. But in those few cases where the device is taken for the information it, the thief will certainly not be stopped by this technique from getting those corportae secrets with a value that could be in the billions. About all this gimmick might do is convince the user that the data was safer than it really is.
Re:Drat! Foiled again! (Score:2)
Re:Drat! Foiled again! Gimic! (Score:2)
OK, you and I differ in the use of one word in what I wrote. Shall I take you that you agree with everything else I said?
I'd buy one (Score:2)
Depending on (Score:2)
Re:Drat! Foiled again! (Score:2)
Oh, hell... they'ld just loose the damn watches, too.
How to steal (Score:1, Interesting)
1) steal it (many means available)
2) as soon as possible, remove the battery.
3) profit
Encryption takes a whole lot of time to do, especially on the monster hard drives available today. What might be a better way would be to have the system already encrypted, and just delete any cached keys, etc. when the laptop goes out of range. This will really only stop clueless people who wouldn't have profited off any data on the computer anyway.
Travis
Re:How to steal (Score:1)
from the article:
To speed up the encryption process, most of the files is already encrypted and only a cached portion is automatically decrypted when the user is in range. This means it takes around six seconds to encrypt and decrypt data.
Re:How to steal (Score:3, Insightful)
The article states that the encrytion/decryption only adds about a 6 second lag to normal operation. Most of the data on the computer is kept encrypted except for a cached version of the data currently being used (the lag in encrypting/decrypting that).
Overrated: poster did not read article (Score:2)
You, sir, are yet another bozo here who did not read the article. The hard drive is always encrypted. Only the cache is decrypted; power off and there is no decrypted data anywhere.
RTFA
take me, take me! (Score:2)
And one nice side effect of this for the discerning footpad: A simple radio receiver listening for the bluetooth watch can be used to alert you when someone is bringing a highly valued prize your way!
Re:How to steal (Score:2)
Re:How to steal (Score:2)
Wouldn't it be easier... (Score:2, Interesting)
Re:Wouldn't it be easier... (Score:4, Insightful)
But that doesn't solve the problem that this is aimed to solve, which is either the laptop is stolen while on (and therefore decrypted) or the user walks away from the machine (leaving it decrypted).
As the article said, this could have a real application for people in busy semi-open areas (like a trading floor) who have to sometimes go away from their machines - even traders sometimes have to answer the call of nature or the boss.
This simply automates the encryption process once user and machine are separated by a specific physical distance. I particularly like the fact that it auto-decrypts when the user returns, although the potential exploits involving a detatched body part returning are rather disturbing...
Re:Wouldn't it be easier... (Score:2)
Many of the current solutions work like screen savers. If there's no activity for a while everything gets decrypted. The RFID solution is just a little better in that it narrows the time window during which the owner is absent and part of the data is still in decrypted state.
the potential exploits involving a detatched body part returning are rather disturbing...
Actually, if there is a detached body part involved, it usually doesn't matter whether the key is stored in the aforementioned body part or the user's head. Unless, of course, you have been trained by the very best...
D-oh! (Score:2)
Sigh. I meant encrypted, of course.
Re:Wouldn't it be easier... (Score:2)
So that only really leaves someone running up and grabbing your laptop while it's running and you're using it. While this could happen, it doesn't seem a major security concern to me.
Re:Wouldn't it be easier... (Score:4, Insightful)
Users are stupid.
How do you plan against the idiot who says, "I'm not wearing that stupid watch", takes it off and sets it next to the laptop? Or, in traditional user fashion, fastens it securely to the laptop?
At my last place of employment, we instituted strong password requirements. That didn't stop half the users from writing them on post-it notes and sticking them to their laptops. When caught, it was always, "Well you make me change it every 90 days! And you make me put NUMBERS in it! I can't remember that!"
"I can't wear that silly watch" will replace "I can't remember that" if this device is put into real world use.
So if you... (Score:2)
Re:So if you... (Score:5, Funny)
Humans == weakest link (Score:1)
Exploit already found.... (Score:3, Funny)
messy, and would elevate theft to a felony.
Here's a noble application.... (Score:1)
http://news.com.com/2100-1020-950155.html [com.com]
No, removing the battery wouldn't work... (Score:3, Insightful)
Time to find another loophole...
Re:No, removing the battery wouldn't work... (Score:2)
Unless, like the article states, you're the US Army and you lost track of 600 laptops in the last years. Not every one of them contained highly sensitive info (well, I think), but it's still disturbing to know that somebody else can get access to the information which was on those.
If your data is important enough to you to warrant some kind of wrist gadget, it's probably important enough to somebody else who can try to get access to it by stealing your laptop for the info rather than for the hardware.
Re:No, removing the battery wouldn't work... (Score:2)
Didn't checked back the article a second time, and now it's back to byte me.
Re: (Score:2)
Isn't that backward? (Score:4, Informative)
Cool But.... (Score:2)
Wouldn't this just be annoying?
Re:Cool But.... (Score:2)
RTFA (Score:2)
I swear this is one of the worst articles for write-only idiots.
Laptop and Communicator... (Score:1)
A whole new emergence in the field of crime, pickpockets and laptop thieves combining forces, united at last!
this would be great for our government! (Score:3, Interesting)
Although I'm afaid our government will probably have just as hard of time keeping track of the transmitter that goes around the wrist.
better for pirates.. (Score:2)
Now I can download mp3s and pr0n.. hack all day and 0wn the pentagon but when they confiscate my PC then "oops, no more evidence!"
So Now I Can Misplace... (Score:3, Insightful)
Anyone who is concerned enough about their laptop security to consider bothering with one of these should already have good crypto security in place. And preferably security where the 'key' can't be stolen off the nightstand. These will attract the gadget happy crowd and CFO's who don't understand info sec and want to see a physical product. Anyone who feels the need to be able to point to their security device shouldn't be making security decisions.
Re:So Now I Can Misplace... (Score:2)
Just remember the info sec triad: good security is a combination of something you are, something you have, and something you know. For that reason, if this physical key had a passphrase requirement (don't know if it does, didn't read the article as per
If the physical key was the ONLY thing required, then I agree that it would be BAD THING.
Handcuffs (Score:2)
Insufficient information (Score:2)
The implication is also that data is in an unencrypted state for some period, a risk in itself (just pop the battery when you take the laptop, remove the hard drive and attach to another system to see what's unencrypted). An encrypted filesystem seems more appropriate if you are really concerned about security.
Does anyone know how this product really works?
Yeah, some of us read the fscking article (Score:2)
Does anyone know how so many
Re:Insufficient information (Score:2)
A small decypted (volitile) cache is similar to a filesystem cache. If properly implemented, no re-encryption is needed, just flush it, right? Otherwise you have unwritten data in a volitile store (bad for most general applications). If the cache is nonvolitile, that's back to the security risk on loss of power.
If my understanding is correct, just set the max age in the cache to a reasonable value and you can get rid of the wrist device.
Re:Insufficient information (Score:2)
UK Ministry of Defense (Score:2)
Article is somewhat wrong... (Score:4, Informative)
The research paper [acm.org] on this will be presented at ACM MobiCom 2002 [acm.org], the premier conference on wireless networks and such.
Re:Article is somewhat wrong... (Score:2)
Yeah, right (Score:2)
It seemed to me to be a lot like those security systems based on a fingerprint -- the finger doesn't have to be attached to the owner to give access to the presenter.
I thought the best security had three criteria -- something the user has, something the user knows, and something the user is (physically). I'm sure someone can elaborate better than I.
Link to Paper (Score:5, Informative)
As always it is difficult to discern the technical details of how a system works from a news article. If you are interested, I urge you to read the technical paper. My papers [umich.edu]
FYI, the data sits on the disk encrypted and in the page cache decrypted. Keep in mind this is a technical paper and a research prototype and not a product.
UK 600+, FBI 400+ Missing, Lost & Stolen Lapto (Score:2)
A laptop in each hand, connected by a string running through their sleeves. Twice the computing power, and no more missing laptops!
Just a thought.
Someone call FBI... (Score:2)
DOS and batteries (Score:2)
New way for DOS attack!
Then, when their battery in the "watch" dies? Or better, xmits the decrypt key over WAP or some such and is snooped and possibly CHANGED.
And the non-volatile RAM that stores the decrypt key proves to be a bit more volatile than thought?
etc., etc., etc.
Or a stink bomb (Score:2)
I've got a better solution (Score:5, Funny)
Re:I've got a better solution (Score:4, Funny)
Great, I just spit my tea all over my monitor. Dammit, when will I learn not to eat or drink while reading
Sounds good to me... (Score:2)
However the device is essentially a crypto-filesystem that uses a wireless token. Except for the obvious attack of stealing the token as well, this is pretty secure. The problem with a conventional crypto-filesystem is that it usually remains open until reboot or keeps bothering the user with requests to give the key again. In the first case a thief just needs to keep the laptop running in order to copy the data.
Barring implementation problems, I don't see this being hackable in any "easy" way. Of course there might be all kinds of implementation or fine-design mistakes. And of course you can still steal the token as well or "convince" the owner to cooperate. The advantage of this device is just that an easy attack (Stealing a running laptop) does not work anymore. If you use a conventional crypto-fs and make sure your laptop is well-guarded as long as it is on, you are as secure. Probaly more so.
Re:Sounds good to me... (Score:2)
You didn't read the article, did you?
The data is already encrypted on the hard drive, and only a cached portion is decrypted into RAM while the key is nearby.
Re:Sounds good to me... (Score:2)
Re:Sounds good to me... (Score:2)
Only the rest of my posting is about the system. And yes, a crypto filesystem does on-demand decryption. Otherwise it would be insecure on power-fail. The "small cache" is nothing special. First there is the ordinary buffer-cache or the OS (No, not a cached portion is the decrypted. A decrypted portion is cached! Otherwise this does not make sense.). And second, using a fast cipher (e.g. AES) it does not really matter that much.
The one inovative idea is that the crypto-fs as implemented here refuses to serve further requests when a distance to the user is exceeded. The techniques used for securing the filesystem itself are standard (at least in Linux).
Any "Real" Options? (Score:2)
something smaller than a laptop to break or vanish (Score:2)
I still love the door... (Score:2)
I want those all over the place.
my credit cards would never work in person.
Only encrypt what needs to be safe, not everything (Score:3, Interesting)
On the laptop, I have an encrypted home directory [jetico.com]. I never suspend my laptop, so I always log in/out when I use it in different locations. If someone stole it, they'd have a nearly impossible time getting to my personal files.
On the fileserver I use it via Samba and NFS mounts. This is why I chose BestCrypt over some other kind of encrypted filesystem/volume, actually. My wife can mount a volume file from her Windows machine via Samba and I can mount them via NFS (or via Samba when I'm booted into Windows game mode).
Best part is that there's no batteries, bracelets, rings, whatever to worry about. Just remember your passphrase and you're good to go. I'd recommend BestCrypt to anyone.
-B
I don't need encryption... (Score:2)
err.. or maybe if they just create an NTFDOS [systernals.com] diskette.. damn.
This is really a dumb solution - better one here. (Score:4, Insightful)
1. Use the software to encrypt your disk contents
2. To decrypt (on the fly), you need the password
3. Set your screensaver to lock, with a (different) password.
Voila. Done. Rebooting to get by the screen lock unmounts the drive, rendering it useless.
This is really, really easy. What's the big deal about all this gadgetry nonsense?
Re:This is really a dumb solution - better one her (Score:3, Insightful)
And when forced to not use a trivial password they then write the password down on a sticky pad that gets attached to the notebook or put in the notebook carry bag?
Re:This is really a dumb solution - better one her (Score:2, Insightful)
Next, the silly corporate users forget their passwords, and at the same time they used a really secure one. Now the drive is fubar and all data is lost.
Next up, the user lost/breaks the key. Or even the key goes fubar itself. All data is lost again. Grrrr..
But then again, whats stopping the attacker/theif from recording the Key exchange somehow and duplicating it later back in the garage.
Re:This is really a dumb solution - better one her (Score:2)
If the laptop gets stolen, the thieves can change the public key on the HD, but that simply allows them to use a different token. The token they substitute doesn't have the key to decrypt the encryped disk block keys.
If all of the transissions get recorded, they can't be played back to the laptop, becuase the laptop will never (statistically speaking) send the same nonce twice before the Sun gets old and bakes the Earth to a crisp.
If you record all of the transmissions and steal the token, you can play them back to the token and get the disk keys, but that doesn't help, since all of the data stays on the laptop. If you're really worried about this, use an interactive signature algorythm on the shard secret so that it can't be replayed to the token.
If you steal the laptop, guess the password used to encrypt thesig nature key, then get a transmitter near the token (wristwatch), you can trick the token into accepting a shared key o your choice and then sucessfully querry the token for the encryption keys. You could also steal the laptop and use hardware to boost the transimmsion range so the token and laptopstill think they're close together. Having a panic button on the token (wristwatch) to turn off the crypto functions will eliminate both of these attacks as long as the owner realizes the laptop has been stolen and quickly hits the stop button on the token. The second attack can be prevented by having the latop place strong limits on the querry latencies.
Of course, if both the token and the laptop are stolen and the password to decrypt the signature key is gussed, it's game over. Kindapping and torturng the owner of the laptop (with the laptop and the token) also results in a game-over scenario. (Unless you use the rubber-hose filesystem.) There are ways to minimize even these attacks. For instace , if the owner's pulse gets too low (chloroform or arm cut off) or too high (torture) then the token writes over the area of memory used to store the secret used to calculate the disk block keys. However, the false alarm rate would be too high for systems like this and the HD would neeed to be reformatted too often.
There is no perfect way to get security, other than melting down the laptop as soon as you put sensitive information on it. However, using the public key encryption, interactive signatures, and shared key system, you can get reasonable throughput and very good security.
so much technology, such a lame fix (Score:2)
Of course, there's still a good chance that someone has stolen my laptop, and even less of a chance that anyone will look at the files on a lost laptop and get it back to me. My data is protected but still lost to me. As is my laptop. With all that technology, why not just save my critical data to the watch? It's not on the laptop so there's no chance an attack will break the crypto. And I still have my copy, unless the thief gets my fancy computer watch; when I get to another system I will not have lost my work.
Seems to me like NT and XP already have some encryption in the NTFS file system, but most users refuse to use it 'cause you have to think and type in a password when you start to use your computer. Is a techno watch the answer? Should your laptop start encrypting your files every time you go to the bathroom? Will this really accomplish anything when the average user is about as bright as the power led on the laptop when it's running on battery? If you can't store the data on the watch, why not just have the smart watch do the login, and make sure that proper sharing rules are enforced on the files?
Sigh. Another one... (Score:2)
When the laptop comes back into relation with the watch, the encryption chip wakes up the l;aptop, decypts the RAM cache, and life goes on.
See that wasn't that hard to understand was it.
I'm asking this for a friend... (Score:4, Funny)
Re: (Score:2)
Advocating this for a while (Score:2)
What range? (Score:2)
Something is really wrong with those people (Score:2)
But the main ideas should be -- if the data is not supposed to be read by someone else, it should be encrypted already, and if user is not at the keyboard, the thing is not supposed to be running in the first place. And no one should rely on anything that happens when user is already away.
Desktop system? (Score:2)
I don't particularly need the encryption side of things, I just don't want anyone messing with my machine in my office.
Anyone know of such a device for less than a small fortune?
increase the number of laptop user dismemberings (Score:2)
i'll keep my hand rather than attach a key controlling access to millions dollar secrets to it.
Re:good idea, but not practical. (Score:2)
A joke about geeks and girl friends is trying very hard to force itself through my teeth but I'm fighting it.
Sigh. Yet another Poster... (Score:2)
The communication between the watch and the laptop is, itself, encrypted. The key pair could be established in the hardware of both chips, and would be destroyed upon attempts to physically access the chip.
Re:Sigh. Yet another Poster... (Score:2)
Bob leaves his laptop on and goes down to the 1st floor breakroom to get a snack. Presumably his computer begins encrypting what little data remains unencrypted when he passes out of range. This takes about 6 seconds, according to the article.
Alice enters the breakroom and buys a Snickers / chats up / seduces Bob. Unbeknownst to Bob, Alice has a wireless link in her purse that is rebroadcasting Bob's signal to Carol, who is currently in Bob's office, sitting at his laptop. Carol, in turn, rebroadcasts Bob's signal on the appropriate frequency to Bob's laptop and Bob's laptop begins unencrypting data again.
Nothing's been stolen -- the computer has just been fooled into believing Bob's in range again. (The article states that Bob's watch is a transmitter, not a transceiver, so there's no key-exchange or two-way communication going on, and thus no need to reverse the process and broadcast from Carol to Alice.)
Got it?
Or:
Carol and Alice could forget all the subterfuge and beat up Bob, stealing his wristwatch while he's unconscious.
Either way, not very secure.
Re:Sigh. Yet another Poster... (Score:2)
However, if the device in the watch is something more on the order of an RFID tag, then it only transmits it's information when appropriately irradiated. We used them to track pallets in a warehouse. The key chip transmits nothing when outside the range of the reader.
Certainly nothing is perfectly secure. But shrinking the window of vulnerability and increasing the cost of breaking in are good goals.
Of course, severed fingers and plucked eyeballs can certainly cause a security problem with biometric devices.
Re:Good Idea. Bad Implementation... (Score:2)
So while most files stay encrypted (and note: I did not imply the whole drive was being decrypted, a fact you would have noticed had you read my short post as well as I had read the article), the system decrypts some files automatically. I doubt the system is decrypting to RAM only - six seconds is a long time for a modern system, so I would infer that the system is decrypting all open files to shadow copies on disk. If it were simply decrypting the files as they were read into RAM, then I would expect the process to add fractions of a second.
The point of my post is that systems like this are much like locking the doors on a convertable - while you might feel safer, in true all you are doing is fooling yourself. REAL security is hard, it gets in the way, and it therefor unacceptable to most folks. You want to see real secure work, work with the spooks.
Re:Good Idea. Bad Implementation... (Score:2)
Also, a big bang security approach isn't a good one. This should be one of many layers in a security system.
I don't think that this is at all like locking the doors on a convertable, or that you're using a broad enough definition of HARD when you say that security is hard. Hard in this case means that if you leave your token thingy at home you're screwed, so you'd better remember it. That's the same problem as a deadbolt on a door, which provides much less security than good crypto. Yet, people seem to remember to lock their house every day.
Re:Doesn't protect from being stolen... (Score:2)
Re:Related Idea (Score:2)
Re:business maybe, military not likely (Score:2)
Man, I didn't know that the Nintendo Entertainment System was so powerful!
Re:I don't want this... (Score:2)
This is the logic of appeasement, which I believe is a bankrupt approach to dealing with hostility. In fact, the attitude that we should just give criminals what they want so they will go away is one of the biggest problems with our society today, IMO. The policy of appeasing hijackers was one of the things that allowed the Sep 11 attack to succeed. The everyday philosophy of appeasing criminals is encouraging more criminals.
Just watch, anyone who puts up a fight against a mugger or other robber is typically denounced by the media for being foolish and taking too much of a risk.
But I say fight to keep what is yours. Never give in unless someone has clearly got the drop on you with a weapon or whatever. Make it harder for criminals to succeed. Heck, if you just fork-over your wallet or purse, the cops probably won't even investigate the crime (depends where it happens), so you are basically letting the bad guy off scott-free.
Instead, scream, kick, punch, yell. If he's going to take something from you (I know, I'm assuming the perp is a male), make him assault you to get it. Then the cops will have to try to find the guy. If I thought this would result in a lot more assaults, I wouldn't be saying it. I think it will discourage the weak-spirited criminals, and allow law-enforcement effort to be focused on the worst offenders.
Also, if you can inflict wounds on the perp, they can help quite a bit in identifying him immediately after the attack. (Sorry officer, I didn't get a good look at him, but hear is his left ear.)
MM
--