summary: desktop hardening, ¡sí! punting online privacy, ¡no!
details:
David Schwartz[1]
>> It would appear that the defendant in this case is basically arguing
>> Heisenburg's Uncertainty Principle is at play, in that the use of a trojan
>> to identify and spy on his machine may have resulted in the files they found
>> there to have come from unspecified sources,
It would so appear if you didn't read the decision[2] :-) But if you *did*,
you'd discover, on page 2,
Henry Coke Morgan, Jr, US vs Matish, 21 Jun 2016[2]
> Defendant seeks to suppress "all evidence seized from Mr. Matish's home
> computer by the FBI on or about February 27, 2015 through the use of a
> network investigative technique, as well as all fruits of that search."
The US Government does not deny seizing files from Matish's computer via
malware, because those files are its case!
David Schwartz[1]
>> the term "online privacy" is an oxymoron, encryption not withstanding. Use
>> the interwebs at your own risk.
So you support legalizing attacks by any party on any system? Or are you merely
special-pleading for governmental attacks? Either way, your position seems
absurd. Yes, online privacy is under attack, but that empirical claim in no way
justifies the normative claim that one has no *right* to privacy--that's an
elementary category mistake. (To which, BTW, any competent
introduction-to-philosophy course cure will increase immunity. Repeat after me:
you can't get "ought" from "is.")
der.hans[3]
>>>> Maybe it's time to notch up the desktop security series to be a desktop
>>>> hardening series.
WFM. This might also be good for outreach-type events: e.g., "easy FOSS ways
you can make linux much more secure than whatever you're using now." Some
topics one might include (numbering purely for identification, and this list is
not meant to be comprehensive):
1. Firewall configuration. Esp now that easy-to-use tools like `gufw`[4] are
being included with popular distros.
2. Identifying and closing open ports ...
2.1. ... and how to test for and recover from port-closing problems (i.e.,
identifying when you have hosed services that you really want, and restoring
them)
3. Disk encryption: e.g.,
3.1. installing LUKS on both new and in-use systems
3.2. LVM integration issues: e.g., is it better to manage LVM volumes on a
LUKS-encrypted disk or partition, or to encrypt individual volumes?
3.3. encrypting backups: e.g., is it better to encrypt the disk and write files
"normally," or to keep the disk unencrypted and write encrypted backup files
(with, e.g., `duplicity`)?
4. Degrade on login failure:
Eric Oyen[5]
>>> If I had the option like I do on the iPhone, I could set it up so that so
>>> many [login] retries would erase the system.
WFM: I have good backups <genuflection to the Backup Gods/>. But the obvious
problem (IIUC--please correct me if not) is that a true erasure would take a
very long time for current-normal PC disk sizes: presumably the attacker would
just pull the battery or powercord after less time than erasure would require.
OTOH, there might be ways to do something quickly that would make data recovery
significantly more difficult/time-consuming, esp for already-encrypted contents.
5. OS hardening for {desktop users, mere mortals}:
5.1. introduction to <your tool here/>, SELinux (emphasis on "for mere mortals"
:-), LSM, AppArmor
5.2. how to test for and recover from configuration problems
6. Using self-hacking tools, e.g., Kali Linux, Metasploit
FWIW, Tom Roche <[email protected]>
[1]: http://lists.phxlinux.org/lurker/message/20160712.072528.e187e802.en.html
[2]: https://www.eff.org/files/2016/06/23/matish_suppression_edva.pdf
[3]: http://lists.phxlinux.org/lurker/message/20160712.053026.f25b8ec0.en.html
[4]:
https://en.wikipedia.org/wiki/Uncomplicated_Firewall#GUIs_for_Uncomplicated_Firewall
[5]: http://lists.phxlinux.org/lurker/message/20160712.064246.80f8300c.en.html
---------------------------------------------------
PLUG-discuss mailing list - [email protected]
To subscribe, unsubscribe, or to change your mail settings:
http://lists.phxlinux.org/mailman/listinfo/plug-discuss