The Future of Security 331
Kvorgette writes "Scott Berinato in The Future of Security presents a very dark future of security in the years around 2010. Several computer security experts expect that a major security-related problem (a 'digital Pearl Harbour') will change software development procedures and remove the freedom in computer use we are striving for. The worst part is, most experts apparently think removal of software tools and access to information from the majority of computer and Internet users would be a good thing."
Charles in charge of our days and our nights (Score:4, Funny)
Still, unless you count Buddy, Charles provided a great role model and environment for the kids to grow up in. Security through education, not necessarily obscurity or technological whizbangitry.
To reiterate: 1) Security can only be achieved through education. 2) I would have liked to fuck the older sister on that show.
Leave it to Microsoft (Score:4, Insightful)
People cant see the forest for bare trees...
Re:Leave it to Microsoft (Score:5, Insightful)
Monopoly suppliers can produce good code, but this places an excess of trust in the end user - a group who historically have not been eager and diligent in software patching.
Security loopholes become an issue when the software becomes omnipresent, as in Windows today.
Re:Leave it to Microsoft (Score:3, Insightful)
The next phase of the deception will be (and IMHO it started about 2 years ago) to shift the emphasi
Re:Leave it to Microsoft (Score:2, Insightful)
Re:Leave it to Microsoft (Score:5, Insightful)
'Requiring' signed drivers is just a tech support cost cutting measure.
Particularly with 3d video cards MS was getting too many (difficult,time-consuming,deeply technical) tech support calls from people having problems with leaked/alpha/pre-release drivers. So they added driver signing to screen some junk out.
and how else can Microsoft be sure that someone truly is running an 'official' driver than by requiring it to be signed?
it's not as if you can't -install- an unsigned driver. It's just an extra 'ok' button to click.
Re:Leave it to Microsoft (Score:5, Informative)
There is currently a *large* market for someone that can create a simple solution to the security problem that exists with complex operating systems. For example: I work for a large financial company that does not allow any corporate access from non-corporate PCs because of obvious security reasons (i.e. - it would be easy to install a keystroke logger on just about any PC, Windows, Apple or otherwise). So everyone is stuck lugging their laptops around.
its not like some else will/can step in to take over.
This is very far from the truth.
Using the previous example, if someone created a Knoppix-like bootable "secure" distro that allowed a user to bypass the existing OS on a given PC, a company could allow users to use most any PC for access. Install some VPN software, simple self-checking environment, and perhaps a user-specific token and things become very secure. There would even be a market for a network bootable version.
But we are all going to sit on the sidelines while MS fixes the problem with trusted computing. All because of a lousy attitude problem.
Re:Leave it to Microsoft (Score:2, Insightful)
First of all, it's not any harder to install software on company machines than personal machines unless the machines are locked down tight-- both physically and systematically. Second, that approach suc
Re:Leave it to Microsoft (Score:3, Insightful)
a company could allow users to use most any PC for access.
Which would cover the software sniffers but not hardware, which is pretty cheap and easy to get [thinkgeek.com].
Secure distro (shameless plug) (Score:3, Interesting)
if someone created a Knoppix-like bootable "secure" distro
That's exactly what we are doing here! Askemos [askemos.org] is a (gpl'ed) P2P layer, distributed on Knoppix-booted CD. It has a permission system as widely applicable as set theory can get you. And set theory is the means we use to proof that you can't abuse the administrative account.
FUD? (Score:4, Insightful)
Re:FUD? (Score:2)
Principles vs. Success (Score:5, Interesting)
Certainly, the average joe not having access to the internet would make the internet secure, so that would appear to be successful.
The only issue is that this would be in violation of principles about freedom, principles which many people may not care about.
It's the same reason that having a corporate systems with owners removed from responsibility is problematic: only successfulness is considered, not right and wrong.
Re:Principles vs. Success (Score:2)
The only issue is that this would be in violation of principles about freedom, principles which many people may not care about.
Absolutely right. And has been said looong time ago. See Jung's "Present and Future". He warned against treating people as if they were all like the average.
Unfortunately, even though there may be better solutions, people (specially politicians
FUD (Score:2, Insightful)
nothing like a clueless journalist to drive sales of security products up
the sky is falling again oh no
so anyone want to buy some insurance/security products/golem ?
Re:FUD (Score:3, Insightful)
At home, my email etc comes through a series of diverse operating systems, each doing at least some checking and filtering, none by M$ of course, before it arrives at the client program. I no longer ever use a M$ product on the internet. At work of course, I must use what is there, sadly a very disfunctional browser (IE) and Lotus Notes.
I'm an Expert (Score:5, Insightful)
Like it or not, that's what it comes down to--freedom and choice. Our job is not, like in other fields, to "get to the bottom of the problem", but to fix the symptoms. Because, frankly, the cure would be worse than the disease.
Currently, you and I, as "clued" users, have access to the resources we need. We would be needlessly crippled by DRM, technical restrictions, whatnot. We all saw how effective US export controls on encryption technology were in the long run, and a lot of us have run into situations at work where we simply couldn't do the job with the given tools (all of which had to go through months of committees and acceptance testing, whatever.)
I'll grant you that corporations have more leeway in this; a company environment is more likely (and legitimately so) to be less flexible regarding software tools available to employees. But for general use?
I've been following loads of discussions among ISPs, for example, who see nothing fundamentally wrong with limiting traffic to ports 25, 110 and 143. Nice prospects, you say? Well take this a step further--when "someone" decides that the grannies of this world, whose PCs are currently spitting worms left and right, should be locked down, do you think that the type of legislation and technological restrictions necessary to do this will differentiate between the grannies and the "clued" users?
I don't have the answers, but I strongly suspect they go in the direction of continuing education. A few years ago, most people couldn't spell "virus" (well, they probably still can't, but they at least know what it is.) Putting the spotlight on security holes and spam and and and for the average joe is what gets results, not locking shit down.
Sorry for the ramble.
Re:I'm an Expert (Score:5, Insightful)
Putting the spotlight on security holes and spam and and and for the average joe is what gets results, not locking shit down.
In the long term, yes. But unfortunately locking shit down does get results in the short term, just not the ones we'd like. And that's where most companies and governments look.
Re:I'm an Expert (Score:5, Insightful)
Kind of goes along the same line as blaming parents for delinquent kids--it's fascinating, how few senior management types are willing to hold lower management accountable for what their people do all day, instead preferring quick-fix surveillance "solutions".
Re:I'm an Expert (Score:2)
Wow, no port 80 for us ? yay. And, of course, limiting traffic to port 110 is really more secure. Like, I couldn't use some remote Http-RPC interface to telnet, (or use a POP3 email very dumb vb virus). Or a port-80-downloaded spyware.
Re:I'm an Expert (Re: Education) (Score:2)
I agree that more computer users need to understand more about the powerful machines that they use. The current Internet's design makes it too easy for one person
Re:I'm an Expert (Score:3, Funny)
And even if they can spell it, they most certainly can't spell its plural!
Re:I'm an Expert (Score:2)
You've confused your bedroom with the real world of B2B, VPNs and everything else - Port Numbers don't cause insecurity either.
A suggestion (Score:5, Interesting)
Relying on OS patches is useless because the true dark-side hackers won't publicise any holes they've found until they've used them.
What could be useful is - dare I suggest it - holding essential OS kernel files in ROM. Slightly awkward if you want an upgrade, but not insurmountable with socketed chips. If you use UV-erasable ROM chips, you can still burn upgrades at home but remote hacking is impossible. And your PC would start up in the blink of an eye!
Re:A suggestion (Score:5, Insightful)
(if you can design your ROM code well enough that it won't allow a remote attack to take control from it, then it didn't need to be in ROM in the first place)
OS in ROM is good for other things, though (speed, impossible-to-mess-up failsafe boot, etc).
Re:A suggestion (Score:2)
Even easier is to have workstations without hard drives and boot them all from a central NFS server. Configure the export to be read-only and the NFS server so that it cannot be exploited (no route to net). As an added bonus you can turn off the workstations without shutting down (no fsck needed), no drives making noise / burning watts and less maintenance since individual workstations don't need to be installed.
Re:A suggestion (Score:2)
But what security point will it solve ? Either you have a 'secure' OS and it might guarantee that untrusted sources are kept off the priviledge data, or you'll have a software somewhat 'insecure' (like, 100% of software is today). And then, it'll not be possible to patch the s
Re:A suggestion (Score:2)
I believe the word you are looking for is "Knoppix".
Re:A suggestion (KNOPPIX, ...) (Score:2)
More FUD from Redmond and Studio City? (Score:5, Insightful)
My predictions. (Score:3, Funny)
More Gnome developers will be assinated by the Korporation. Three have already.
Linux torvolds will be arrested, become a slave for mirosoft.
The trolls on slashdot will take over, and the GNAA members will kill micheal sims and cowboyneal
Microsoft will take Linux, KDE, and use it for the version of windows beyond longhorn, and call it Windows Kinux.
This post will be moderated -1, insightful.
Sooner Than We Think? (Score:3, Interesting)
Remember, and this is just a term off my head, an ant can support it's body mass on tiny tiny legs, enlarge the ant to human size, its legs are no thicker than a pencil, it cannot support itself
The net has became an unchecked, unpoliced medium, growing every day, there will be more than half a billion new users by 2008, the digital Pearl Harbour may come sooner than we think
I use it for Slashdot, other than that... nada
"unpoliced" ? (Score:2)
Do you really think the internet is "unpoliced" ?
Re:Sooner Than We Think? (Score:2)
But at it basic meaning, the internet means the ability to pick up someone (a person or a machine) and talk to it.That is the reason why you don't want to restrict it. You want free flow of information.
Restrictions only benefit the people in power becau
if you think about it (Score:5, Interesting)
He has some points (Score:3, Insightful)
If compilers are criminalized, then only criminals will have compilers
Open source software tools don't kill networks, people do
Comment removed (Score:5, Insightful)
Re:Today is not 2010. (Score:2)
I agree the article seemed to leave in abeyance any positive developments and extrapolate the negatives we currently face. The existence of the article and our awareness of the potetial problems speak to the potential to develop antidotes.
Security Experts expect Security Problems?? (Score:5, Insightful)
Secure package management to avoid trojans (Score:4, Funny)
Trusted apt-get is a fully secured, digital rights managed version of the popular package management system for Debian. However, Trusted apt-get differs in many ways. In order to avoid the situation of people being tricked into installing trojan-containing .deb files, all Trusted apt-get packages come from secured, trusted servers. Many of these are hosted in former Russian military data centres, and are easily identified by their '.ru' domain names. This is a mark of trust. Secondly, the Trusted apt-get source code has undergone a line-by-line security audit by Theo from OpenBSD. A lot of people believe that Theo isn't all that keen on Linux, but it's mostly been due to the lack of security focus. Trusted apt-get changes that. The final component is a DRM layer in apt-get, which allows for trusted, copyrighted closed source packages to be easily installed on any Debian system. This DRM layer is implemented using standard UNIX crypt() calls, so it's really portable, yet really secure.
We can all look forward to the day when downloading trusted, trojan free software is as simple as issuing a 'trusted-apt-get install gator' command (followed by a reboot. Rebooting flushes insecure code from the processor execution stack, and is the only NSA-approved way to install software safely on a UNIX/Linux system). I believe Trusted apt-get will be available as the standard package manager from Debian 4.0 onwards. Until then, apt-get play it safe.
Re:Secure package management to avoid trojans (Score:2)
Great! We only have another 20 years to wait then!
That's stupid! (Score:5, Insightful)
Security should be simple (Score:5, Interesting)
If I install a text editor, I probably don't want it to be able to access the Internet. It should be possible to say, "for this app here, don't let it do anything network related". That way, no matter how badly the text editor is written, it can't do any harm beyond the data it is allowed to work with. If I then want to use the text editor to print to a network print, I should be able to tweak a few options to make that possible (without enabling anything else).
Ideally, all of this would happen when an application is installed. If there were some UI that said, "This here program is asking for the following rights, is that OK?", I would immediately know what I was letting myself in for.
I know there are various ways of doing this kind of thing at the moment (virtual machines, using permissions more effectively or using different accounts for software) but none of them are particularly easy to get going.
With all of this implemented correctly, it should be possible to run any application (no matter where it came from) with out risking all the data on a PC and connected resources and to deal with security in a way that any normal user would understand.
Re:Security should be simple (Score:2, Informative)
For Windows (sigh), you can use ZoneAlarm (free edition) to do exactly this. It would be nice to have something like that in the Linux kernel.
Re:Security should be simple (Score:2)
No, it is not. (Score:5, Insightful)
What happened next is that when somebody wanted to visit an Internet page, or collect or send some email, that firewall would first ask permission for the app to contact the Internet. The first question was whether the app was allowed to contact host X.X.X.X at UDP/53. This off course, means bollocks to the average user.
The moral of this story is that you need in depth knowledge of computers, software and (TCP/IP)networks in order to tell your computer if an action can be conisidered save.
You could pose that a text-editor does not need Internet connectivity. How many of you guys use freeware/shareware that is ad-supported? How many (even payware) apps 'phone home' nowadays before even displaying anything like a splash screen?
Security of software and operating systems is primarily the responsibility of the writer thereof. You can NOT trust your average user to know what's safe and what's dangerous. You simple can't.
Viewed in that light, locking down a users rights, even on his/her own box, seems like a decent idea. It would save a lot of spam and virus trouble, and spyware firms would be out of business before the week is over.
I however think that I know what I'm doing, and I demand my rights. I'm willing to take a test of competence if needs be, but I will under no conditions give up the control of my system to anybody, especially to companies or governments.
Re:No, it is not. (Score:3, Informative)
Re:No, it is not. (Score:3, Interesting)
IE is trying to access the internet. Malicious or not? [theregister.co.uk]
For many programs, malicious depends on the context, something you aren't going to get from a database.
Software firewalls are getting a little better (Score:2)
Re:Security should be simple (Score:2)
It could still write a bat file to ftp off
Re:Security should be simple (Score:2)
Re:Security should be simple (Score:2)
It seems most of the security holes that turn up on Windows sy
Re:Security should be simple (Score:3, Insightful)
Nah, that's just crazy talk.
oh, wait [bell-labs.com]
Re:Security should be simple (Score:2)
Then let's all say bye-bye to emacs. (After all, vi is the One True Editor!)
Such a thing already exists (Score:2)
Re:v.0.1 ObviousEdit (Score:2)
Re:SubEthaEdit (Score:2)
Windows point ou view - why? (Score:2, Interesting)
In 6 years probably Windows will be vanishing. And there will be more Linux or other OS OSes based desktops than Windows.
Enforcing laws stopping users from using some services won't give anything. It's like using robots.txt to stop people from mass downloading. I can easily get wget sources and modify them not to use robots.txt file. In open source world such restrictions does not apply.
Regards
I don't get this.. (Score:5, Insightful)
What the article suggest is that we should have a 'standard' ways of doing this, "standard software patches". Now what if someone breaks that standard and introduces a bug/backdoor a standard patch which everyone will recieve? We'll have a situation much worse that what can possible happen today.
"The federal government will mandate that users must authenticate their identity to access the Internet itself"
-Wow! Only one place 'to hit' to deny access for everyone to the internet.
What if I identify myself as someone else? Of course it will happen, then someone can wreak havoc and later the innocent neighbor will be arrested because:
'It was him, without doubt, that did all this and that on the internet. Proof? We have logs which clearly showes the perpetrator logging on to the net'
Standards and centralizing is what will bring us a 'digital Perl Harbor' (what a stupid name).
Death of the Internet predicted; film at 11 (Score:5, Insightful)
"Then the lights wink out. Everywhere.
Then it begins to get cold."
Naturally, it leads into a Big Brother state from that point on. The article's a troll; it engages in emotive button-pushing.
This guy is a muppet. (Score:5, Interesting)
This guy is utterly clueless, I mean look at this:
Five factors distinguish the digital Pearl Harbor from the virus attacks we've suffered to date.
First, it disrupts backup systems. Fragile networks heretofore have been mitigated largely with backup. Disrupt that and badness follows.
Second, it leads to cascading failures. All of those massively inconvenient attacks people previously referred to as Pearl Harbors pile up. Due to the loss of backup, corporate earnings data is irretrievably lost. This panics Wall Street and destabilizes the financial sector.
OK, a couple of things. First, "it disrupts backup systems". Riiiight. So this Flaw in 'the internet infrastructure' can also get to tape backups in safes? OH NOS!!!1!
Second, "it leads to cascading failures. All of those massively inconvenient attacks people previously referred to as Pearl Harbors pile up."
"it attacks the Internet infrastructure--such as domain name servers and routers--and industrial systems connected to the Internet, like utility control systems.". I'm sorry but if someone connects utility control systems to the net then they are the ones who should be strung up.
The point is that bugs aren't a risk to 'national security', they are a big problem, and will be very costly to business I'm sure, but an attack or accident that has a serious detrimental effect on peoples lives, caused by security holes just shouldn't be possible.
This important infrastructure should not be connected to a fundamentally insecure network, and if you're looking for scapegoats, they should be those who allow that sort of level of insecurity. Look at that power station that got Blaster...
Re:This guy is a muppet. (Score:2)
I'm sorry but if someone connects utility control systems to the net then they are the ones who should be strung up.
I was dozing in a dull control systems keynote at a conference the other day (I'm a process systems engineer) when I was woken up by a slide titled "Process Control Web Interface" with a screenshot of a web page, complete with pretty coloured sensor output, valve status etc.
The next slide had their network topography - with [Process Control], [Firewall] and [Internet] blocks.
From what I u
YAWP (Score:4, Funny)
I predict in the next or previous six months you had a birthday.
And also that it will rain on July 14th sometime in the next 50 years in Ottawa.
Can I get a published article too now?
Tom
Relative security of Linux distributions (Score:4, Funny)
Surveillance doesn't scale (Score:5, Interesting)
The AMOUNT of information you collect can scale, but the UNDERSTANDING of that information is limited by the processing capability of the organization collecting it. Not to mention its power and ethical use are in the hands of one organization.
I'm hoping by 2010 we will have remembered not to trust the government too much. Power corrupts, and post Sept. 11 is no different than pre as far as that goes. Nor is post digital Perl Harbor different from pre.
Bad things can happen - we have to accept that or do our society great damage. Any fixed target is a soft target, and computers and the internet are no different from anything else that way. The biggest liability right now on the net is unpatched Windows machines. Fixing the problems isn't enough - the fixes must be put into action. How do we solve that problem? Dunno, unless we do it right the first time (www.eros-os.org). But a free society has to be worth any price, or it will collapse. I won't accept government oversight as the price of keeping my computer safe - that price is too high. Particularly when it won't solve anything.
It Just takes a little Planing (Score:2)
that and a 9mm
oh, and a DVR loaded with stuff to catch up on.
there, that's it.
Re:It Just takes a little Planing (Score:2)
Oops, sorry, your DVR got wiped by the Digital Pearl Harbor virus. I sure hope your 9mm isn't digitially controlled!
pearl harbor? (Score:5, Insightful)
The entire assumption is that some rogue power will launch a suprise attack on mothership america, when really, a bit of crappy code created by a monolithic company will cause widespread harm to the network and the economy.
It's already happened, look at Blaster/Nachi. The amount of background noise on the Internet caused by worm traffic in the core will only increase, and interestingly, probably to the point where it will make bandwidth expensive again.
As a security professional, it is always embarrassing to hear colleagues talk like this. It's self serving, unsophisticated, and politically motivated.
Get off it.
Hmmm (Score:2)
You can prise gcc from my cold, dead hard drive!
Article is dead on.... :( (Score:2, Interesting)
At this time I am 2 years into a software developer's career. I work at bankS (multiple). At every stage I realise how horribly lacking my education was in security. I realise that as a "professional" I cannot tell how secure a system is. I make fundamental sercurity errors in my code.
In Skule, the only course that mentioned security was a mostly theoretic Software Engineering course. THe security it mentioned was a fault
No kidding, Sherlock... (Score:2)
*sigh*
Show of hands for all of you out there who are sick and tired of reading stuff like this combined with lack of action to deal with the matter.
Cost, skill, time (Score:5, Insightful)
Ultimately the market decides winners in the software space (usually), and everyone needs to see security as a feature worth paying more for, in terms of employees designing and building the systems, to QA testers performing thorough audits before deployment, to users comparing choices in the corporate or consumer software space.
The author argues that it will take a digital pearl harbor to affect this change. I doubt it will be as drastic. We are already seeing consumers, users and businesses move towards more secure systems (and adding more diversity - breaking the monoculture)
The pain is only going to increase as attacks grow more and more prevalent, and damage more and more severe. Instead of a single, high profile event, I think we are going to see the current trend continue and accelerate: more and more people spending more money on secure systems, and diversifying their environments.
In the software market consumers and producers are equaly responsible for the state of security - it costs more time and money and skill to build secure systems: are people paying more for the secure alternatives on the market? do people make a thorough effort to address security before purchase? Until the answer is yes, the current methods will remain the market leader. Those that ignore security (to the extent they can) will come to market faster and cheaper than their more secure alternatives.
Those that put a premium on secure systems will spend more for a solution that gives them the stability and features they require, and understand the tradeoff involved in terms of cost, time and skill.
Redundancy is where? (Score:5, Insightful)
If you have separate wires for power, telephone and internet and an entirely separate mobile phone network you have a fair chance that enough of them are going to stay working to allow you to repair the ones that aren't.
If your voice communications are running over IP over your powerline and the phone companies throw out their phone switches and replace them with VoIP routers which are also switching internet traffic and, incidentally, providing virtual private networks which link the utility companies' control and monitoring systems, then the chances of everything going down together are significantly increased.
The only way to stop this tendency is to change the definition of "bottom line" and that can only be done through our old friend regulation.
Executive summary (Score:2)
(I would also suspect there to stupidness and obtuseness.)
Microsoft has to sharpen up on security. They, and the rest of the IT industry, will sharpen up by innovating less. (Gawd. Is that, like, negative innovation?)
Companies don't think enough about the common good.
Hawaiians would be wise to spend the 7. of December 2008 off line.
To be secure, we should hire 3rd world labor to read our keystrokes, or maybe
Ironic (Score:3, Interesting)
... what the article proposes is something near a monoculture of software... and thats is exactly what can cause the problem... "ok, now all follow that way of program" is a good recipe for a future disaster. Heh, maybe a better solution is to close down microsoft, or open code windows, or whatever that neutralizes that single point of failure.
With software diversity an unified attack will be at least harder, and with freedom on discussing the problems (thing that goes a bit against what is proposed in the article) certainly helps to avoid or minimize their effects.
Those that sacrifice freedom for security deserves to lose both, and that could be particulary true in the digital world.
Altimit (Score:2)
Which is the reverse of how things work. As long as there isn't a monoculture, it's simply too much work to make a computer virus that attacks more than one or two types of systems. FWIW, the Morris Worm was designed for two, Sun 68K and VAX/BSD I think, but one could only spread via Sendmail debug mode. I'm pretty sure
The Apocalypse 2k4 (Score:5, Insightful)
The apocalypse:
1) Predict utter destruction for the whole mankind
2) People freak out
3) Enforce your own agenda ("Give me your lands and you will be saved when the world ends in year 1000")
4) Profit! The church is the richest state in the world.
This FUD:
1) Predict utter destruction for the whole mankind
2) People freak out
3) Enforce your own agenda ("Give me your freedom and you will be saved when the time comes!")
4) Profit! Corporations control mankind.
It seems so obvious to me that's scary! A few points worth considering - let's dispel the FUD:
- The article says that every computer has 200,000 bugs in 2010. Omits to mention that in a multi-cultured internet (different computers, OSes, software) most computers would have a different set of bugs and therefore an attack couldn't possibly take down the whole, totally redundant infrastructure.
- If the internet goes down, everything (economy, electricity...) falls with it. Omits to mention that such statements should be proved.
- A more rigid security system would be more secure. False, people like Kevin Mitnick have been getting inside the world's most secure servers with very little problems, by using social engineering. Now, unless you can actually program the way the mind of people works, well, there's little you can do about it.
- Look who's talking. Uhm, a security expert suggesting more security - more than a little conflict of interest there...
I'm sure there are many more loopholes in this article, I leave to the reader the task of finding them
By the way, if someone told you "You're gonna die tomorrow! Do as I say and you will be spared!", how would you regard him/her?
Isn't Linus our "Martin Luther" already? (Score:2)
With something open like Linux it would be much harder to get in that kind of trouble. And if not that, then Microsoft has to reform itself with Linux as a counterpart.
Look, there still is a catholic church, even now that Luther is a few hundred years dead. But still he made a difference. The catholics pope had to make a change if he wanted his church to survive, and so
"Bromidic" (Score:2)
That's a word I haven't actually heard in used since... um... since... um... Oscar Hammerstein II used it in the lyrics to a song in "South Pacific." ("I'm as trite and as gay as a daisy in May/A cliche comin' true!/I'm bromidic and bright/As a moon-happy night/Pourin' light on the dew!")
Which makes about as much sense as the article.
Bromo-Seltzer, anyone?
What about software liability? (Score:2, Insightful)
Instead of a big bang scenario I could imagine a change through software liability.
Just imagine some slightly bigger then average small country (France? UK? Germany?) picking up the lead and explicitly cover product liability for software products. No more chickening out with boilerplate "click I AGREE" licenses.
Software companies would either have to be good enough or gone from that market. In this scenario e.g. Microsoft might have a really hard time to hold up against the courts. They might decide
Pearl Harbor? Who would notice? (Score:5, Interesting)
Try to bring up a Windows2000 workstation, freshly installed with no patches, and connect it to the Internet. In minutes it will be infected by a virus. Any one of the major security stories of the past five years would far exceed Pearl Harbor in terms of actual impact upon the information world. In fact, problems such as SQL slammer are more like the invasion of the Mongols, and the spam problem is global thermonuclear war.
Compiler == gun, headers == bullets (Score:2, Troll)
Any criminal will, of course, simply ignore a law that prevents them from doing what they want to. That is after all the definition of a criminal -- someone that commits a crime (breaks the law).
The only thing that restricting access to any tool does, is stop those people you don't care about -- those that obey the law. Everyone really knows this, but this is really about control, not security or safety.
Could have been worse in Q4 2003. Couldn't it? (Score:5, Insightful)
Look at it this way; the viruses and worms that haunted the net at the time was more or less friendly, concept-like viruses. It could've been much worse. What if the viruses that roamed the the net would:
Destroy your data / the operating system silently (shredding your files so that they can't be recovered).
Mail your documents to everyone in your contacts-registry. (Eg. mailing corporate files to competitors)
Hopefully; the reason why the viruses wasn't dangerous was because: If you have the skill to write such a virus, you can probably imagine the consequences.
What are your thoughts on the subject?
Who takes the fall? (Score:2, Insightful)
I've always seen it as my responsiblity to try and write code that is secure. At the end of the day I'm trying to protect against such attacks. But even for all my diligence there is going to be some sort of mistake that can be exp
Oh good grief. (Score:5, Insightful)
What about advances in security technology? Tageted IDS is still in its infancy. What about CERT's research into survivable systems engineering? Patch management software is going to suddenly go the way of the Dodo?
From my understanding the general concensus is that SOX auditing will eventually include all systems which run the business - not just the ones involved in financial reporting. That auditing requires a verified disaster recovery procedure and security documentation.
Am I saying there is absolutely no chance it could happen? No. But a lot of security people much better than me are going to have to be lobotomized before I think a digital "Pearl Harbor" is plausible.
misconceptions (Score:3, Interesting)
2)
in 2010 nobody will be using windows3)
This just does not and cannot happen in a heterogeneous IT environment such as the one we have today, and the one that we will have to an even greater extent in 5-10 years. A virus that destroys a win2000 installation is not going to have much effect on a Solaris system, or the other way round. Additionally, important backups are kept in a non-networked environment, for this very reason. The only way that these can (possibly) be taken out is to launch a gradual attack over a long period of time, but such an attack would not go unnoticed over the entire globe without the alarm being raised. Besides the author talks specifically of an instantaneous attack.4)
The authorities have proved startlingly ineffective when it comes to locating the point of origin of attacks in recent years. In the cases where a perpetrator has been (correctly) identified, this has generally been at the perps wishes (confession, inclusion of email address, registered server, IP address etc).5)
Again recent history has shown a remarkable lack of international cooperation when it comes to identifying and extraditing "hackers" (lets not pick up on the misuse of this word here). Additionally, where are you going to apportion for flaws in the open source software that the backbone of the internet mostly runs on today, and will do so almost entirely in the future?6)
There will be a surge in the corporate purchase of such software, but it will be extremely easy to circumnavigateAutonomous Systems (Score:3, Interesting)
I remember reading about an old computer system, I believe it was a Burroughs computer, that used software to enforce security policy. Executable programs would only be loaded and run if they had a magic attribute set. Users could not set the attribute. Only a limited number of trusted programs, like the system's compiler, could set the attribute. The compiler contained and enforced security policy. It would not allow the user to compile a program that violated the system's security policy. This allowed the system to have enforceable security checks that were implemented in software instead of special purpose hardware.
I believe that current popular operating systems are fatally flawed at the architectural level. Fixing the thousands of implementation bugs will not solve the architectural problems.
Pearl Harbor = Bad Analogy (Score:3, Insightful)
The only way Pearl Harbor would be applicable is if you were using it in the context of Microsoft deliberately allowing crippling attacks on it's software so as to push through a new system whereby it (MS) has ultimate control.
What a stupid article (Score:3, Insightful)
Tippett argues that if we simply extend the present situation into the future, the level of complexity and vulnerability we would create will make a digital Pearl Harbor inevitable--and before 2010.
If we simply extend the present situation... but who is simple-minded enough to believe our world works like this?
"That [scenario] is appealing because it's one of the simplest things you can do with computers: restrict their abilities," says Peter Tippett, CTO of security vendor TruSecure and noted security expert.
Dear Peter, if you want to restrict all abilities of a computer which can possibly be used in a dangerous way, you'll have to pull the plug.
Tom's Rules For Reasoning About Tool Security:
Surveillance inevitable because AAA won't scale? (Score:4, Insightful)
The twin notions: that 24/7 surveillance of every computer in the US is possible, and that a national AAA system is not possible are presented and no reason is given - we are just to accept these 'facts' because they appear in the article.
hmmm... (Score:4, Funny)
Re:The future more insecure? (Score:2)
**WARNING** Main banner has been hacked to GOATSE.
-
Re:No hack??? (Score:2)
Interesting, I'm guessing maybe there's a server caching the images somewhere along the route. It's definitely showing Goatse and no-spam logos from here in the US.
UPDATE! In JUST the last few seconds both images have been replaced with images of the following texts:
WARNING: THE OPERATORS OF THIS WEBSITE ENGAGE IN ILLEGAL AND DECEITFUL PRACTICES. DO NOT BUY ANYTHING FROM THEM!
and
DO NOT BUY FROM THESE SCAMMERS!
If you sti
Re:Only solution (Score:3, Insightful)
I think it's suprising that you posted that on Martin Luther King day. I think MLK and Ghandi might have had something to say about non-violent ways to secure liberty.
Re:Only solution (Score:3, Interesting)
I think it's surprising that a guy who calls himself "mental telepathy" would be surprised by anything at all.
That said...
The America MLK faced is a very different beast than what we're facing today. Nor is Ghandi's experience particularly relevant today either.
Power corrupts; and absolute power corrupts absolutely. Our masters will not cede such power by choice. And it seems to me the longer we wait to confront them, the harder
Re:Only solution (Score:3, Insightful)
Not to put MLK or Ghandi down, but I don't think either one would have had the same sort of success if they had been in North Korea or Eastern Europe under the Soviets, or even in the 18th-century British Empire. I think nonviolence is great for changing things in countries that are reasonably open, but it sucks for totalitarian states.
I would love a counterexample, however.
Vive la revolution (Score:2)
You talk of overthrowing power with violence as your tool
You speak of liberation and when the people rule
Well ain't it people rule right now, what difference would there be?
Just another set of bigots with their rifle-sights on me
But what about those people who don't want your new restrictions?
Those that disagree with you and have their own convictions?
You say they've got it wrong because they don't agree with you
So when the revolution comes you'll have to
Re:Agreement (Score:5, Insightful)
The author is the same one who wrote "Patch and Pray" [onlinesecurity.com], an article that starts off with "It's the dirtiest little secret in the software industry: Patching no longer works. And there's nothing you can do about it. Except maybe patch less." Somehow I sense a pattern of fearmongering and irrational, attention whoring claims by this guy.
But let's analyze the article slashdot posted on its own merits. Here are a few choice quotes taken directly from the article:
digital Pearl Harbors are happening every day.
That kind of defeats the point of calling something a "Pearl Harbor" doesn't it? The author is just trying to make things sound scary by wielding historical words.
TIPPING POINT: On Dec. 7, 2008, computer systems around the world go down simultaneously. They do not come back up.
That's right, they do not come back up. The machines all catch fire or something, so you can't repair them.
This panics Wall Street and destabilizes the financial sector. People run to their banks, but the banks cannot disburse funds; their networks are down. As are the credit card networks and the ATMs. If you don't have cash, you go hungry. Then the lights wink out. Everywhere. And it begins to get cold.
If you put that in a movie script, any studio would laugh in your face at the lack of realism. Yet this kind of nonsense flies in computer security articles?
People are hungry. Freezing. The old and the young begin to die. The strong turn against each other.
It just gets better and better! but there is a bright side if you read on....
"[in 2010] the average PC, while it may cost $99"
Yes. They are actually stating that they expect the average PC to cost $99 in 2010. This makes it obvious where they're getting the rest of their numbers from: straight line approximations. Take what's happened during the last two years and assume the same thing keeps happening for the next ten. There's a word for that, and its not statistics-it starts with b and contains an s.
Of course, to have a reformation, you need a Martin Luther...Perhaps a rebel within Microsoft who sacrifices his career to change the culture and practices he's experienced firsthand.
You mean like, oh, Bill Gates? Microsoft wants better security already-they just can't implement it correctly, and many of their plans are misguided. But anybody in MS who could avert the next Blaster would get a promotion, not the axe. The company isn't quite the demonic hive some
TSP and PSP have already been found to reduce coding errors by factors of up to 10 or more. Microsoft tried it and reduced bugs within a 24,000-line program from more than 350 to about 25.
Now this guy is trying to hype yet another crazy how-to-program-better-with-process scheme. Let me guess, he's co-authoring a book about TSP and PSP? Yep, they reduce coding errors by a factor of 10, cure cancer, and bring about world peace.
We're reaching our limit with the angst. Popeye once said, 'I've had alls I can stands and I can't stands no more.' We're reaching that point."
Just imagine how those lines would go over in a security presentation in your company. "Boss, we have too much angst!"
And even features within programs, like the ability to forward e-mail messages, will be shut off.
Yes, that's right, the article made that prediction. You won't be able to forward email. Sure.
The federal government will mandate that users must authentic
Re:I Agree (Score:2)
Apparently, Danielle Steele has taken some networking and comp-sci courses at her community college.
Re:And I predict that DNS will be the cause. (Score:2)
And why are you assuming that everyone has their DNS entries set to expire in a day? IIRC, taking in your assumption, it would take three days for those entries to expire. (Sorry i