


I like nonsense, it wakes up the brain cells. Fantasy is a necessary ingredient in living, It's a way of looking at life through the wrong end of a telescope. Which is what I do, And that enables you to laugh at life's realities. Dr. Seuss
From: Culver City Site Events
Sent: Thursday, September 18, 2008 6:51 PM
Subject: From Facilities - Film Shoot- 22 Sept
Sony Pictures will be doing a location shoot in the warehouse lot across Slauson Ave (5933 Slauson Avenue) north of the 800-900 Buildings. Filming will commence on Monday Sept 22nd 7am-8pm. Filming will involve pyrotechnic work- shooting and explosive devices but in a contained area within the lot so it should not disturb occupants. Sony has permits in place and a fire safety officer will oversee the pyrotechnic work.
Thank you.
it's not that i've run out of things to say. far from it.only that the weight of responsibilities and concerns sometimes inhibit the words.the products have launched and i am on a plane back from tokyo.
more on this later.i could not force my fingers to do more work with a gun to my head. burnt 100% toasty right now.time for a break.
so here come all the suppressed syllables of recent weeks.
i finally remembered to get my haircut before doing media in japan. why? nearly every journalist totes around a camera and takes fotos of you to accompany their story. it's interesting doing media in japan; one of the better aspects is that the japanese are genuinely interested in talking about products and want to know about the people behind them. US tech media have to take their product news with a spoonful of sugar (usually fodder on the latest trends or something), otherwise they feel like they are being sold. anyways, i was asked if i ever had a security problem myself, how old i was/where i was born, what my favorite anime was and what omiyage i was bringing back. the journo was stoked when i proudly reported that i had 3 rolls of authentic manga toilet paper i was hustling back into the country for gifts :-)
so lilo is a lesbian. think disney is lining up a "herbie 2" for her? ahem. at least she chose mark ronson's sister. i wouldn't bet sarah palin's lipstick on the longevity of this relationship. now that's a debate i'd like to see; can we get lilo on the camera with sarah palin to discuss foreign policy, stem cell research and immigration? it's be more entertaining and as insightful as the rubbish we hear from the election coverage thus far. how can i have watched politics since the beginning of the year and still be so clueless on where the 2 candidates stand on critical issues? instead we get mccain in faux outrage over an analogy obama used which thousands of other people use every day. does he think just b/c it was part of the punchline of a palin's "tougher than nails" hockey mom joke that every mention of cosmetics is now somehow tied to his campaign?
i saw another black widow the other day in the garage. i decided to test the theory that they were far too fast to be simply stomped out of existence. squish. myth busted. turns out all of that flourocarbon induced torching was lots of fun, but unnecessary. i can't tell you how disappointing this was.
my laptop died. well, at least nearly. i was lucky enough to score an x300. having used a macbook air, i can tell you the x300 not nearly as sexy. it's a helluva a lot more biz ready though and i am now addicted to logging in with my finger via biometrics. after 1 week, logging in with a user/pass seems crude and clumsy. it's funny how unexpected conveniences can become compelling, necessary. good food for thought as we plan next year's releases.
after far too long an absence emiliana torrini is finally set to release a new album. the single she released, "me and armini", is a winner. jaunty reggae flavored beat with a few nice effects punctuated by her breathy vocals. just downloaded the full length from amazon, the rest of the camel from fat freddy's drop is hopefully next. until then, vampire weekend, yoav, pacifika, and apparat remain in heavy rotation.
someone tell me why we never hear people talking about keeping insanely smart people in the country when immigration control is brought up. andy grove i believe once said we should staple a green card to every diploma we hand out for an advanced degree. bravo. i've played hockey with a bunch of guys who were masters and phd students at UCLA for the better part of 9 years now. i've watched a few of them come and go due to the difficulty of getting through the convoluted, restrictive employment process we have established for non-citizens. one of them was an exceptionally good winger, so double bummer when he left :-) i shudder to think of how many brilliant ppl we have educated only to send them back home or someone else due to our inability to get out of our own way.
whole foods opened last week about a 5 minute walk from our place. we've already had breakfast, lunch, dinner and jane did a wine-tasting there this past week while i was in tokyo. the first time we walked in it was like the clouds parted, the sky rent open and god smiled upon us. we had always joked about the 5 dollar bananas they sell and all the other overpriced products but i'll be damned if we have not swallowed the lure hook, line and sinker. the placement of the store is interesting-- it's right b/w a 99 cent store and laundrymat! 2 weeks before it opened jane and i saw a homeless guy walking down the street while peeing himself. if he did that now, the whole foods security guards would take him down faster than valencia foreclosure, lest his presence soil the organic figs by mere proximity 40 feet from the produce aisle. if i have to choose b/w the homeless guy urinating on the sidewalk and overpriced fruit, ring me up another 5 dollar banana, carlos.
Dear Sir,
I allow myself to get in touch with you regarding the MOHO project set up by students and professors from Stanford and two among the best universities in France (Centrale Paris Engineering School and ESSEC Business School).
It’s been a while since the last time I jotted down my thoughts in advance of an FTC workshop, but here I am again tapping away at the keyboard on my laptop on my way to Washington D.C. I’m doing last minute preparation for being on a panel tomorrow at FTC’s mobile marketplace workshop with another security professional from US CERT and an academic/engineer. While I’m normally guided by a slide deck, slides are verboeten on panels like this and the most important thing to be armed with is well-formed thoughts. So in the spirit of cementing the thoughts in my head after doing a few days of research and mulling things over, here’s my notes on the questions I’m expecting tomorrow.
fair warning: this ended up pretty techie...Who are the stakeholders in the mobile security market?
The carriers – it’s their job to keep the networks clean and running smoothly. Since they often get paid by how much services you use, they have a high level of incentive to make sure everything runs as smoothly as possible.
The handset manufacturers – they are responsible for making sure the hardware is designed with at least basic defenses in mind. For example, it would be great if they had onboard encryption, but they should at least make sure that the combination of the OS & hardware provide sufficient support for security related aspects of protocols such as GSM and UTMS.
The OS vendor – they have the same responsibility as the handset manufacturers to make sure all the basics are covered, but since they are also application providers (and service providers to phone applications) they have all the normal software security concerns (buffer overflows, dos conditions, etc.). Code re-use for windows exemplifies this, as the old IGMP DoS flaw was a direct carry over to Windows Mobile 5. Mobile OS have many years of security expertise to draw on from the PC space—in some areas the lessons seem to have been learned (code signing is standard), in other areas, they have not. There are also new issues here related to privacy & mobility, such as location tracking, which really are a bit different than the PC space (which assumes your device is not terribly mobile, probably not true anymore with laptop sales outpacing desktop sales, but I still carry my phone more places than my little thinkpad x60.
The user – given the movement of attacks to exploiting people, no matter how good a job the above players do, the user has to make the right decisions about what data to store on their phone (how sensitive?), how to protect it (use a password?), what to install on it (can I trust this file claiming to be a background or ringtone?), and what to connect it to (hotspot, Bluetooth device, etc.). The biggest risk here is loss or theft, phones are lost at 15 times the rate of a PC! Hence, the most important thing you can do is carefully consider how much sensitive data you store on your phone, password protect your phone, and use encryption when it is available. I use a password on my phone and store most of my sensitive data in other places, like on my lappie or in a file in gmail (not the best, but better than in a flat file in my phone).
Note that in systems that accommodate payment by phone, as you now see in Japan, you also have the merchants and more importantly the payment processor in the mix. Nothing really new here, just all the same security practices you would expect from players accustomed to handling credit cards and other payment instruments.
What is the future of malware & mobile phones? How is it different from PCs?
PC | Mobile |
Homogeneous OS: Windows | At least 4 different OS (RIM, Apple, Symbian, Windows Moile), 1 with the most market share is Symbian at 65% -- Linux is out there too, and what about Motorola’s OS? Conclusion: threats cannot spread as easily since they cannot assume a single, dominant OS. |
Hardware abstracted from the OS: Single threat will run on any Windows-supported hardware (AMD, Intel processors make no difference as long as long as it is the same bit rating) | Hardware and OS more tightly linked—at least differences across platform force application development challenges such that you cannot compile for Symbian and then expect it to run across all Symbian devices—has to be recompiled for the specific processor used on the phone if not the phone itself Conclusion: not only can threats not assume a single OS, but even on that OS, threats cannot cross processor architectures (i.e.in 05, CommWarrior could not jump from a Nokia phone to a Sony Ericsson phone via BT or MMS, even though both used Symbian Series 60). |
Incentive: $$$ | Phones are not used for cash transactions in most places—yet. The data they store on average is more useful for spammers than anyone else. Conclusion: there is less incentive for malware to afflict a mobile phone since the authors cannot directly monetize their theft. |
Unauthorized installs quite easy along with exploits or fake alerts | Code-signing and platform issues (mentioned above) make this difficult, forcing attackers to resort to trickery and low volume attacks Apple gates this by forcing everything through iTunes (all apps have to register and be sold via iTunes). Symbian forces applications to be signed by them. MSFT has code-signing with Windows Mobile 6, unsigned apps will prompt the user once and will not have access to certain “dangerous” APIs. J2ME could facilitate this, but would have to vulnerable and installed on the vast majority of devices—and you would have to have a static IP address or some vector of exploit, such as a popular browser like FireFox. J2ME attacks will force prompts for every dangerous action, so social engineering a la RedBrowser may be effective, but self-replicating malware is unlikely. RIM uses same model as J2ME. Conclusion: Unauthorized, silent installs are unlikely without physical theft of a phone itself due to the level of control the OS/device manufacturers exert over the handset. |
No money trail for spamming | If someone is spamming via your phone, many users will receive an “out of whack” bill (SMS is not free for many), funny charges or have a monthly bill they are accustomed to receiving. Conclusion: Not foolproof, but it’s harder to remain unnoticed on a phone when spamming. |
Proximity unlimited—completely remote attacks are du rigueur | Remote attacks are possible today with repeaters and antennas, but there are still geographic limitations. |
ISPs serve as the transportation network—many of them and they sprang up quickly. Sharing relationship were new as they were not well acquainted with one another and intensely competitive. This is how phishing “takedown” services proliferate, basically they are go-betweens across ISPs for brands asking for fraud sites to be taken down. If ISPs had better fraud detection services and coordination, phishing would not be the problem that it is. Not to mention the existence of rogue ISPs like the Russian Business Network. | Telcos are the transportation networks—while very competitive, they have longstanding relationships and are more likely to work together to solve resolve a large threat than an ISP. |
What does the market for phone-based security services look like?
§ Easy data encryption and backup
§ Potentially includes privacy services
§ Identity protection
§ Safety services for file download & install, hotspot access, etc.
§ Parental controls (centralized, across devices)
What can consumers do to protect themselves?
1. Don’t store sensitive info on your phone.
Names and addresses are understandable, but don’t put your SSN and CC data on your phone. At least not unencrypyted.
2. Password protect your phone.
It’s irritating, but it will prevent most data theft if the phone is lost or stolen.
3. Back-up your phone data.
You never know when you will need it.
4. Set your device’s Bluetooth to undiscoverable.
Will prevent unsolicited requests and will not affected paired devices.
5. Don’t accept incoming BlueTooth requests unless you asked for it.
No good can come from it.
6. Review your monthly bill for any funny business.
Will help you identify fraudulent charges/spam impact.
7. Don’t install files from untrusted sources on your phone.
Might affect your phone performance, stability, or security.
Closing statement
§ Watch for transaction increases to drive more malware author incentive
§ Watch for IPv6 and dedicated IP addresses—promises for more issues and concern
§ Malware itself is not likely to target an OS platform, but rather the web which is quickly becoming the platform for all devices.
o Windows has been the target of choice b/c it is pervasive, the web is becoming this today given the proliferation of devices and increased functionality (i.e. web 2.0)
o Attackers in the future will aim for the web since it offers the biggest return, but even these attacks will be language specific (unless you can get at a global ad network)
§ Threats will therefore “merge” from the PC world to phones and other web-enabled devices where they will exhibit traits we are already seeing today
o More reliant on deception than technology exploits
o Service specific
o Language specific
And they will likely be non-persistent “flash” attacks.
So we won’t have to worry too much about self-replicating malware, but malware and spyware will be a worry, especially those that focus on install via deception (Trojans).
§ Nonetheless, we think the market is much broader than malware protection alone, it encompasses
o Easy data encryption and backup
o Potentially includes privacy services
o Identity protection
o Safety services for file download & install, hotspot access, etc.
o Parental controls (centralized, across devices)