Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security

Cyberlock Lawyers Threaten Security Researcher Over Vulnerability Disclosure 87

qubezz writes: Security researcher Phar (Mike Davis/IOActive) gave his 30 days of disclosure notice to Cyberlock (apparently a company that makes electronic lock cylinders) that he would release a public advisory on vulnerabilities he found with the company's security devices. On day 29, their lawyers responded with a request to refrain, feigning ignorance of the previous notice, and invoking mention of the DMCA (this is not actually a DMCA takedown notice, as the law firm is attempting to suppress initial disclosure through legal wrangling). Mike's blog states: "The previous DMCA threats are from a company called Cyberlock, I had planned to do a fun little blog post (cause i ... hate blog posts) on the fun of how I obtained one, extracted the firmware bypassing the code protection and figured out its "encryption" and did various other fun things a lock shouldn't do for what its marketed as.. But before I could write that post I needed to let them know what issues we have deemed weaknesses in their gear.. the below axe grinderery is the results. (sic)" What should researchers do when companies make baseless legal threats to maintain their security-through-obscurity? Related: Bitcoin exchange company Coinbase has been accused of spying on a dark net researcher.
This discussion has been archived. No new comments can be posted.

Cyberlock Lawyers Threaten Security Researcher Over Vulnerability Disclosure

Comments Filter:
  • by Anonymous Coward

    Nobody threatened anybody. There was no saber rattling.

    Whoever posted this article is a moron.

  • My next "response" would be directly to Wikileaks...anonymously...
    • Perhaps, but realistically we now know two things:

      Thing the first: there is a vulnerability to these locks, and we should be using something else. This goes double since the company has demonstrated that they are more interested in hushing it up than fixing it.

      Thing the second: there is a vulnerability to these locks, and it would be interesting to try to find it. In essence, this event has enabled those amongst us who like to tinker with such things to narrow the search.

  • Streisand Effect (Score:5, Insightful)

    by Fire_Wraith ( 1460385 ) on Tuesday May 05, 2015 @09:34PM (#49625979)
    So, instead of a minor blip of a story that some piece of gear has a vulnerability, that then gets patched and largely ignored amid the chorus of other similar stories, you've now elevated the tale of your gear's vulnerability to the front page of various tech sites, not because it's a vulnerability, but because you threatened legal action to prevent disclosure of the vulnerability.

    That's some great work at shooting yourselves in the foot. I would have thought more people get that by this point in the internet age, but apparently not.
    • by rtb61 ( 674572 ) on Tuesday May 05, 2015 @10:12PM (#49626209) Homepage

      Never forget lawyers. Lawyers first advice, you need us to advise you, so that you can pay us for each and every phone call, for each and every letter read and response written, for each and every email read and response written and, for researching your problem (you pay them to learn how to solve the problems they create for you). The problem here is reaching for the lawyers, the advice they give you and that you pay for, usually will be to pay them more and they will wrap that up in some sell able story. Once you reach for the lawyers, you have already lost. So they did not shoot themselves in the foot, their lawyers tricked them into paying the lawyers to shoot them in both feet.

    • by Agripa ( 139780 )

      One point the researcher tried to make is that there will not be any patches. The locks have no ability to be updated short of replacement.

  • by Anonymous Coward

    Probably about the same as James Bailey did in response to Dale Cox on behalf of the Cleveland Browns:

    http://www.lettersofnote.com/2... [lettersofnote.com]

  • >IOActive's reverse engineering process required the use of skilled technicians, sophisticated lab equipment, and other costly resources not generally available to the public.

    Since when have the bad guys limited themselves to what was available to the general public? Or even limited themselves to what one person could do?

    I take it that the Cyberlock is effective, only when the attack is carried out by somebody like my next door neighbor. He is a very nice person, but due to Alzheimer's, people in the ne

    • by tlhIngan ( 30335 )

      Since when have the bad guys limited themselves to what was available to the general public? Or even limited themselves to what one person could do?

      Exactly. These locks are supposed to be used in very high security areas. You know, protecting stuff with lots of value. If the stuff inside is worth $10M, would $1M in equipment be expensive? Not really (especially if you know of another site with another $10M of stuff and can re-use your purchases).

      Even the mechanical destruction is a concern - unless the lock

  • by hyades1 ( 1149581 ) <hyades1@hotmail.com> on Tuesday May 05, 2015 @11:12PM (#49626471)

    This little circus shows security-conscious potential customers something very important about Cyberlock: their first response to an issue affecting the customer's security is to attempt to punish the person who found it.

    Seriously...who wants a company like that in charge of security? I'd like to see some lawsuits from existing clients over false advertising and failure to act as one would reasonably expect a security company to act.

  • by Anonymous Coward

    These Lawyers would be hard pressed in any case to prove malicious intent, given that the disclosure was made and was ignored.

    As a lot of posts here have commented on, the root of the problem is abuse of the legal system for monetary profit and to strong arm people into accepting the whims of "Idiots with money" or IWM in this case. The pervasive view that the purpose of the legal system is to use the law to to do anything but enforce the law, uphold fair-play in the society given these laws and ensure that

  • Now there are headlines about how shit Cyberlock products are, instead of a single blog post.

  • Evven in 1850 (Score:5, Interesting)

    by lskovlund ( 469142 ) on Wednesday May 06, 2015 @06:47AM (#49627807)
    Locksmiths were having this discussion at least as early as the mid-19th century.

    "A commercial, and in some respects a social, doubt has been started within the last year or two, whether or not it is right to discuss so openly the security or insecurity of locks. Many well-meaning persons suppose that the discussion respecting the means for baffling the supposed safety of locks offers a premium for dishonesty, by showing others how to be dishonest. This is a fallacy. Rogues are very keen in their profession, and already know much more than we can teach them respecting their several kinds of roguery. Rogues knew a good deal about lockpicking long before locksmiths discussed it among themselves, as they have lately done. If a lock -- let it have been made in whatever country, or by whatever maker -- is not so inviolable as it has hitherto been deemed to be, surely it is in the interest of *honest* persons to know this fact, because the *dishonest* are tolerably certain to be the first to apply the knowledge practically; and the spread of knowledge is necessary to give fair play to those who might suffer by ignorance. It cannot be too earnestly urged, that an acquaintance with real facts will, in the end, be better for all parties." -- Charles Tomlinson's Rudimentary Treatise on the Construction of Locks, published around 1850

    Amazing how little has changed... you'd think with improved communication and mobility (of goods and people), attitutes would have shifted in favor of disclosure.

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...