silveradept: A librarian wearing a futuristic-looking visor with text squiggles on them. (Librarian Techno-Visor)
[personal profile] silveradept
Okay, this may be "old man yells at cloud" territory, but being an Old on the Internet and watching technology develop over time sometimes means you notice the trivial things and wonder.

I most recently completed a few modules of our workplace's new-and-outsourced mandatory cybersecurity training. Which, for the most part, was find in what it was. It appropriately put the focus on the idea that people are easier to hack than computers are, but apart from "treat anything that's unfamiliar as suspicious until you confirm it isn't," a few possible flags for what might be phishing or other attack vectors, and a request for a certain amount of social media discipline regarding what personal information you post, there weren't exactly a lot of practical steps on reducing your attack surface, and even one of the modules, hosted by someone who has done their fair share of hacking, pointed out and then demonstrated there are weaknesses in the ways that calendars, e-mail, and other elements are displayed that make malicious things look legitimate, and that only by doing counter-intuitive things like hovering over links to see where they lead, looking at return addresses to see if they're correct, and really thinking hard about where a person is being asked to go on the Web can a person potentially determine whether or not they're being phished or otherwise attacked. And this is also in combination with having listened to an episode about how good deepfakes can be with someone who has spoken aloud enough to have their voice used as a training corpus. Because I could easily see someone walking away from this training with the message of "the really crude ones will be easy to spot and delete, and the really sophisticated ones will be impossible to spot, so why are we doing this?" (And also, the bit in there about not posting about how much you dislike your work or about compromising things about your workplace to social media is...not that cut and dried. Understandably, if you want to stay employed with your employer, there's going to be a certain amount of self-censorship or necessary anonymizing done if you're going to criticize them, and even more so if you're going to whistleblow on them, but it should never be a blanket "say nothing bad about your employer for security purposes.")

I think I did the modules in reverse order, though, starting with the top and going back, because the top modules made references to concepts and other elements that were present in lower modules, which is a UX fail in its entirety. If some things were supposed to be required or recommended before others, it behooves the environment that is offering the courses to signpost which order they are supposed to be done in. Even then, there were more than a few things in the "review" quizzes that made reference to things that had not been covered at all, either in that module or in previous modules. For example, in a quiz question about what constructed good passwords, there was a ticky indicating "using a password manager" as an option of what would make for good password practice, despite the fact that password managers had not been mentioned once before that point.

Despite that, there seemed to be a certain amount of in-the-past-ness about some of the modules. Like, the one that walked through what a good idea of a password might be said "Type the first letters of this line of a popular song, [All-Star, in this case] then add a few numbers, then type out the name of an emoji" as a good password generation scheme, rather than using xkcd #936 ("Correct Horse Battery Staple") as a method for generating difficult to crack but easy to remember passwords (an objection says that your password manager is better than you at generating and remembering your passwords, and that the most important part should be not only limiting the number of passwords a person should use, but also in hardening passwords against the likelihood that they've been used by someone else and are thus easier to crack. Which is less about the correctness of the battery horse staple and much more about the sheer number of passwords that are required at this point and the lack of ingenuity of people in generating and remembering them all. (Thus, the password manager doing the remembering for you.))

There was one thing that I was aggravated by in the training, even as I know and fully understand the reason why it's there. One of the security recommendations for people and their mobile phones was "don't root or jailbreak your phone." Which, y'know, makes perfect sense, and also makes me wonder when exactly this particular guide was completed.

It's absolutely true that root access on Android used to require the running of specific exploits and security vulnerabilities present in the operating system so that a superuser state could be achieved. And for iProducts and Apple devices, that's still the thing that's needed to jailbreak them. So, yeah, anyone who wanted to root or jailbreak essentially needed to run a privilege escalation attack on their own device, which took advantage of an exploit or weakness in the security of the device. If you want to run homebrew on a game console, same thing. (I don't entirely know how the modern systemless root solutions like Magisk work to know whether they still require privilege escalation or whether they operate on an entirely different paradigm.) Security leaks are bad, and companies don't want them existing in the wild, because arbitrary code execution is not good for the integrity of a device, and arbitrary code execution that uses a known vulnerable pathway or knows to look and see if superuser access is available makes things easier for malice to do what it does best. And if it's a device that has work secrets or is connecting to networks that have work secrets, having vulnerabilities and the like is not good for a corporation or other entity.

The flip side of this, however, is that most devices that we have in this space will outlast the support that their manufacturers and carriers will provide for them. At a certain point, Android and iOS stop supporting a particular device, usually by requiring specifications that are beyond what a particular device has. Long before that, however, most device manufacturers stop sending support and updates to the devices to make sure they are patched against known security vulnerabilities. I think most devices can expect maybe two years of support from their manufacturer, if that, and then there's no further support, leaving a person to have to decide between shelling out for a completely new device or continuing on with the device they have that is going to become increasingly obsolete, not because the circuits or technology on it is failing in any particular way, but because the "minimum requirements" for the operating systems and applications will slowly start going past the place where the device is able to keep up. [edit] Apple has been particularly vicious in the past about this planned obsolescence for their iProducts and computers, while simultaneously removing the market for used devices to circulate, because the minimum version of iOS needed to run any apps will be beyond what the device can do. [/edit] (There's no official documentation about how long Apple intends to keep supporting certain devices, but unofficial sources show closer to five or six years of support for iPhones starting at the 6S stage, as is suggested by an anonymous commenter whose claims I then researched. I wonder if this extended support has more to do with the general design and kit of the iPhone standardizing such that iOS can continue to be built for older models without having system requirements change that much, due to Apple being the only hardware manufacturer of iOS devices. It's the macOS/Windows situation all over again, just on mobile devices.)

Unsurprisingly, a lot of people are going to be caught in the Sam Vimes Theory of Economic Injustice when it comes to purchasing devices, even with trade-in discounts for devices that are relatively new, and device manufacturers make it very difficult for someone to buy and hold a particular device to last them through a long period with the assurance that they'll be able to keep getting updates from the manufacturer for the life of the device. Which, in turn, contributes to increased electronic waste and pollution generated from gathering the raw materials and manufacturing the devices themselves. (Yes, there is recycling of electronics and their components, certainly.)

Then there is the headache of transferring data and setup options to a new device, which rarely seems to be a complete transfer from one device to the next (although it is presumably getting better, so long as you stay within the same device manufacturer) and the further difficulty of having to adjust to a new device's form factor and size, which may very well be either too large or too small for the hands that intend to hold the device.

Which brings us back to the reasons why people would jailbreak or otherwise turn to their communities for support. Because there are lots of people who have perfectly functional devices that they have no intention of giving up on, but who do not want to run completely outdated software or an operating system version that is no longer being actively maintained. Despite meeting the system requirements for the new operating system. At which point it becomes a question of which security risks you want to take, the ones involved with having an operating system and applications that are old and potentially flawed, or the ones associated with having to trust that a maintaining community and additional software repositories are going to keep patching and releasing and won't introduce malicious applications into your devices (at least, no more malicious than whatever is already provided by your device manufacturer). So that you can, in fact, get the device to last as long as it can physically do so.

And the choice of whether to replace or turn to community support is, for the most part, entirely illegal under the DMCA, as doing such things is circumvention of digital locks meant to prevent someone from owning their device and using it for their own purposes. We don't get prosecuted for it because the Librarian of Congress has exempted the practice, but we certainly could be if that changes. (Insert rant here.)

So, yeah, old man yells at cloud, because the security program is saying sensible things for security reasons that conflict with other things that someone might do to improve the security of their devices on a different vector.
Depth: 1

Date: 2020-09-10 09:05 pm (UTC)
momijizukamori: (space dad)
From: [personal profile] momijizukamori
Actually the song lyric one is pretty good, and is the one we teach at work (and the one I use for passwords I have to memorize, like my root login pw that I have to cycle every three months) - the XKCD one provides more entropy if you pick four truly random words but the chances of those four words being something you can both remember and spell are much lower, so most people cut down the search space a great deal in an attempt to come up with something they can remember (can you tell I've watched security researches have intense Slack debates about this?). That said, yeah, 'use a password manager where possible' and 'sign up for haveibeenpwned notifications' are also top-tier recommendations, along with 'don't make people rotate their passwords unless they've been compromised' (we have to do it because some of our big money clients require it and everyone hates it).

The other big piece is principle of least access on the organizational side, such that one person getting phished doesn't bring down everything - only give people access to what they need to do their job, rather than 'everything'.

(I suspect the 'don't root your phone' bit is mostly about the fact that on a rooted device, apps can bypass all the OS security controls, and we can't convince people not to trust some random executable they found on Google.)
Depth: 3

Date: 2020-09-11 12:35 am (UTC)
momijizukamori: Green icon with white text - 'I do believe in phosphorylation! I do!' with a string of DNA basepairs on the bottom (Default)
From: [personal profile] momijizukamori

Yeah, it has the advantage of having a built-in mnemonic already, and is relatively easy to make decently long (just use more lines). I tend not to throw random punctuation at the end, and rather incorporate punctuation from whatever source I'm using (easy with quotes from books or plays, slightly harder with songs though sometimes I add implied commas between lines). I find LastPass at least is pretty good about giving options for what types of characters to include/what length to do, though with special characters sometimes you have to refresh a few times to get one if the website only lets you use some rather than the full set. PINs are harder though I usually use either fictional character birthdays or a date of a historical event not related to me that I will remember. My personal frustration is websites that won't let you auto-fill/copy&paste into the password field. Please don't make me have to swap back and forth between your site and my password manager as I try and accurately type my 16 character random password. Especially don't make me do it on mobile.

The joys of capitalism! And it does have security implications too, because abandoned devices won't get the latest security updates. The Android One program was designed to somewhat combat that (guaranteed two years of OS updates and three of security patches), though more years of security updates would be better. That said, I think there are fewer in-the-wild exploits of mobile devices and the bigger issue is smart devices/Internet of Things which typically are terribly secured to begin with and which are frequently abandoned rapidly.

(and now I'm curious if my first Android phone, which was the second commercially available model and thus is over ten years old, still boots/sees signals)

Depth: 1

Date: 2020-09-11 12:46 am (UTC)
syntheid: [Elementary] Watson drinking tea looking contemplative (Default)
From: [personal profile] syntheid

I do think the first letter of a phrase/lyric works out alright if you can remember the phrase (and it's long enough), but you still want to be careful about reusing it too much so mostly that and the multiple-word-password are best used as master passwords to your password manager that comes up with truly random ones for all your one-offs. When I was attempting to make do without a manager, I was patterning my password a lot to remember it in other sites (ie '$0meP4$sworD-SiteShorthand') and that wasn't good. The forced rotation [personal profile] momijizukamori mentioned has a similar issue of people often picking some sort of 'root' and then just alternating on some kind of pattern which is less secure than just picking a good password that doesn't have any similarities to previous passwords or passwords used elsewhere. But good luck getting corporate places not to enforce constant password changes.

Work made me swap from LastPass to 1Password, and I did find it interesting that 1Password offers an option to give you a memorable password giving you four less common words separated by hyphens as well as just jumbled letter-number-symbols. It seems like most password managers have some sort of ability to work on phones and most browsers these days, so access is less of an issue at least, but yeah can still be an issue too.

One thing that I recently found Firefox is offering that I'm curious if it'll catch on more is free email aliasing so you can easily pass a throwaway email out and monitor it and quickly dump the aliases that get compromised. It's not a new idea entirely, that +something alias trick has been around a while and Yahoo also used to allow limited aliasing, but this is completely disconnected from your actual email account so you could in theory never actually give out your real email which would make it more difficult to get email hacked.

Depth: 1

Date: 2020-09-12 05:06 pm (UTC)
From: (Anonymous)
Point of order: iOS 14, coming out probably in the next few weeks, supports devices as old as 2015 (iPhone 6S). So even if the 6S is deprecated in the next major release, that's still six years of support.
Depth: 1

Date: 2020-09-13 02:08 pm (UTC)
squirrelitude: (Default)
From: [personal profile] squirrelitude
The root thing also a case of "the personal is political", and not just the planned obsolescence part. If manufacturers supplied a condoned way of bypassing some of these restrictions that did not require full root, then perhaps people would be safer and not caught between security advice and vendor nonsense.

Profile

silveradept: A kodama with a trombone. The trombone is playing music, even though it is held in a rest position (Default)
Silver Adept

January 2026

S M T W T F S
     12 3
4 56 78 910
1112 1314 15 16 17
18 1920 2122 2324
2526 2728 2930 31

Most Popular Tags

Page Summary

Style Credit

Expand Cut Tags

No cut tags
Page generated Feb. 1st, 2026 09:28 am
Powered by Dreamwidth Studios