Category Archives: Security

Securosis Warns Against Cloud

Mike Rothman warns in his blog entry called “RSA Guide 2011: Key Themes” that only a very elite and small group (himself included, of course) can understand the cloud, let alone the security issues.

Last year you could count real cloud security experts on one hand… with a few fingers left over.

[…]

The number of people who truly understand cloud computing is small. And folks who really understand cloud computing security are almost as common as unicorns.

Unless I am reading that wrong he is saying that no one really understands cloud computing security. How does one enter the cloud if no one exists that can understand how to make it safe? Is that a warning against it?

He probably means to say only he and his immediate colleagues are to be hired — they are the real deal and will save you from the cloud. Even that sounds to me like scare-mongering, marketing and hype. Perhaps he could just issue a new Securosis byline:

We are like unicorns in the cloud — and everyone else is dumb

The truth is that many people outside his sphere of influence understand cloud security and are actively working on tools, architectures and live deployments. Not all of them take the time or even want to give presentations. And let’s face it, cloud security actually is not that hard to understand. It is essentially applying controls to new engineering, architectures and technologies and then finding ways to address gaps. That is a familiar exercise for anyone who has worked in the past with security for product companies and development, especially within large shared environments.

Speaking of marketing hype, Mike gives a clear set of criteria for how to choose a good presentation, but then he appears to ask you to violate his own criteria for two presenters that are related to his company.

Skip over session descriptions that say things like, “will identify the risks of cloud computing” and look for those advertising reference architectures, case studies, and practical techniques (don’t worry, despite the weird titles, Rich includes those in his cloud presentation with Chris Hoff).

This is some odd advice. Don’t worry? On the one hand he warns about others who engage in a kind of behavior he wants you to find distasteful, and on the other hand he (and his colleagues) engage in it. Not sure what to make of that; much of what he says is interesting and well researched, but it is hard to overlook contradictions and double-standards. Why not just say “don’t worry” about the cloud?

Disclaimer: I am also presenting on cloud security at RSA and I do not believe in unicorns.

The History and Meaning of Finding Kumbaya

The NYT attempts to preserve or even restore meaning for the song often known only as Kumbaya

The lyrics told of people in despair and in trouble, calling on heaven for help, and beseeching God in the refrain, “Come by here.”

[…]

Far from compromise, “Come By Here” in its original hands appealed for divine intervention on behalf of the oppressed. The people who were “crying, my Lord” were blacks suffering under the Jim Crow regime of lynch mobs and sharecropping. While the song may have originated in the Georgia Sea Islands, by the late 1930s, folklorists had made recordings as far afield as Lubbock, Tex., and the Florida women’s penitentiary.

With the emergence of the civil rights movement in the 1950s, “Come By Here” went from being an implicit expression of black liberation theology to an explicit one. The Folkways album “Freedom Songs” contains an emblematic version — deep, rolling, implacable — sung by the congregation at Zion Methodist Church in Marion., Ala., soon after the Selma march in March 1965.

Like other songs I have mentioned before here, it was an encoded message among slaves to fight against injustice such as restrictions on speech.

To sing Kumbaya was to resist, perhaps even to signal to others an event that would need more resources — calling in backup. The peculiar characteristics of this song that originated in the American south are born out of resistance to authority; simple repetition with obfuscation helped ensure the availability, integrity and confidentiality of a message.

Also Folklife Center News, Volume 32, Nos 3-4, Summer/Fall 2010, in their exhaustive research of the song origins, explains how an alleged link is problematic and… Wikipedia tends to publish garbage.

The most common claim made today about the origins of “Kumbaya” is that it is from the Gullah-Geechee people of coastal Georgia and South Carolina. (The more outlandish versions of this theory, such as the one espoused on Wikipedia on April 2, 2010, claim that “Yah” is a remnant of Aramaic, and refers to God, despite the fact that “yah” means “here” in Gullah.) While a Gullah origin is certainly closer to the truth than either of the previous theories, AFC’s archival versions also call the Gullah claim into question.

The Folklife Center News provides instead a self-dealing alternative story:

…the evidence from the American Folklife Center Archive does not fully support any of the common claims about the origin of “Kumbaya.” Instead, it suggests that “Kumbaya” is an African American spiritual which originated somewhere in the American south, and then traveled all over the world…. Although it is truly a global folksong, its earliest versions are preserved in only one place: the AFC Archive.

Coastal Georgia and South Carolina is somewhere in the American south, no? Perhaps too specific. Either way, Kumbaya is a fight song.

Facebook Malware App Builder

Websense explains how Facebook users are so often victims — they are targeted by the huge growth in inexperienced attackers due to inexpensive malware app builders.

You don’t have to be a developer, but a mere $25 can buy you a Facebook viral application toolkit and unleash all the unwanted content you want onto Facebook.

As an example, let’s look at a very similar fraudulent application that “can” allow Facebook users to know who “creeps” at their profile, called “Facebook Profile Creeper Tracker Pro”. The application asks for some permissions, shows an online survey/advertisements and tells the user at the end of the process that he/she is the one that looks at his/her own profile the most. In other words, this application should be revoked according to the terms and conditions of Facebook.

Should be revoked?

There appears to be no Facebook barrier to entry for attackers. The $25 is a nominal amount and easily recovered; victims generate revenue of at least $.20 — only 125 are needed to cover the initial expense and then it’s all profit. And that cost model is for attackers with no experience.

The burning question for regulators should be how a user can protect themselves against a Facebook scam like this permanently. In other words, why does Facebook continuously fail to provide reasonable privacy options, or offer users permanent protection?

The answer may be found in Facebook’s recent trickery with network privacy.

Two weeks ago, the social networking site proudly announced a new “secure browsing” option located under the Account Security menu which would allow people to enable HTTPS for all future visits.

However, at the moment, third-party apps don’t not work via HTTPS, because they load external content into the page.

This content cannot be signed by Facebook, therefore, the secure connection is broken each time an HTTPS client opens such an app.

Facebook prevents this from happening automatically via a dialog that reads “Sorry! We can’t display this content while you’re viewing Facebook over a secure connection (https). To use this app, you’ll need to switch to a regular connection (http).”

Pressing the continue button, however, doesn’t just remove HTTPS for that session, but clears the checkbox from the persistent “secure browsing” setting without any indication of doing so.

They take a one-time decision and turn it into a permanently insecure setting without notifying you.

Just in case you still have any doubt: Storing private information on Facebook is like putting your finances in a bank that offers partnerships to grand theft felons. You might really like working with the bank and their customers, but you need to be very wary of their business practices.

I strongly recommend to everyone they immediately delete all personal and valuable information from their account or at least only use fictitious information on Facebook including fake photos.

Even the founder himself has turned to the government to protect against Facebook-based attackers.

Scans Could Detect Liquid Explosives

An Associate Professor at UC Davis helped develop a scanner to find spoiled wine without opening the bottle.

“A Nondestructive Method of Determining Acetic Acid Spoilage in an Unopened Bottle of Wine,” A. J. Weekley, P. Bruins, and M. P. Augustine, J. Enol. Vitic., 53, 318-321 (2003).

A few years later, in 2006, the terror plot involving liquids inspired the researcher to think about another market — airline security.

Air passengers one day may be able to carry their soaps, shampoo and bottled water onto the plane again, thanks to technology originally developed at UC Davis to check the quality of wine.

The U.S. Department of Homeland Security’s Science and Technology Directorate recently awarded a contract to a Denver-based defense firm to develop a magnetic resonance scanner that could be placed in airports and used to check bottles and cans for explosives without opening them.

Might as well put this in refrigerators and pantries too. No need for improbable expiration dates any more. Have the kitchen do a daily scan and send you an email to alert you when your stocks are contaminated or spoiled.