The function of encrypted disks is twofold. One is that, assuming an "evil
maid" multi-visit attack is not the issue, it protects data in the event of a
police raid or "burglary." The second is that recovery and failure to penetrate
one such encrypted computer deters future raids and "burglaries," on grounds or
limited manpower and resources. People don't fish in places where the fish
don't bite. Doesn't work all the time, but as part of "defense in depth" it
helps a LOT. They sure as hell never made another attempt to get computer
information from me.
There is a serious privacy concern in Ubuntu, hopefully not in Ubuntustudio by
default-Zeitgiest, with so far lacks controls to turn off logging. I remove it,
accept that Unity's menus won't work at all, and turn ~/.recently-used.xbel
into a directory. This both protects people I give an unencrypted build of the
OS I use (because they don't want to be bothered with memorizing a secure
passphrase) ands removes a file of great use to a skilled attacker if one finds
a way to read it online.
The other factors you mention are beyond the scope of a default OS install for
the most part. I will now discuss some of the measures that are used with
encryption when it is necessary to presume that a national government and not
just a local police department is the opposition. One should always prepare as
though the most capable adversary they will face will be the opponent. I will
now discuss encryption and computer "tradecraft" for this level:
CRT monitors should never be use where security is an issue, their RF
radiaiton is far too strong. In rural areas where you can control a large space
and move back the listening post (LP), RF signals travel a hell of a long way.
In urban areas they die really fast-but the LP could literally be on the other
side of the wall, so that's a wash. In the US, the codeword for the defense
against this mode of attack is "TEMPEST" and a tempested installation is one
that is RF shielded, by shielding the room, the installation, or both against
RF leakage. In the real world, RF chokes on power and other leads, an LED
monitor, a case with NO plastic panels lacking metal backings, and reportedly
not using analog VGA cables to the monitor all reduce RF leakage and force the
LP to be much closer and more easily detected. I've never heard of a TEMPEST
attack beng sucessfully used by the FBI against any activist in the US. If they
have it and don't want to admit to it, the data becomes far less useful.
ISP and phone snooping is another matter. No connection registered to the user
by a real name is safe, no home connection is safe, even wireless broadband
with GPS jammed and prepaid with fake personal info could be triangulated and
the right house guessed-or ALL houses in the triangulation zone raided in some
countries or low density areas. Assume your carrier copies everything you do
and keeps it forever. Use SSL for any site that supports it. Presumably
intellegence agencies can crack it, but Carnivore cannot, and neither can your
ISP. What your ISP cannot read, they cannot pass on to the FBI. the secret
police, or whoever.
Just using Ubuntu instead of an Adroid or iOS smartphone and using it on the
road is a big start, because the latter two OS's have been revealed to often
contain commercial spyware alled "CarrierIQ" that reports back URL's visited,
etc to the carriers. Once there, the security forces have access to it. Then we
can get into MAC address spooking, disposable external USB wifi cards on the
hardware side, and site selection on the user side.
I would not worry about raw video files being copied over the Internet, that
requires more bandwidth than most connections have. I suppose the FBI could
order a cable provider to give them a fast connection into someone's system
though. Raw photos this might be possible, same for text. Monitor your
bandwidth, watch for suspicious activity or processes
The "evil maid" boot keylogger attack is harder to implement against Ubuntu
than against Truecrypt, as everyone's initramfs is a little different and the
attack script will have to generate it locally without access to
/etc/initramfs-tools, just the existing initramfs. There are no published
reports of any intelligence service using this in the field, if this is an
issue keeping /boot on a falsh drige on your physical keyring makes this
attack impossible without access to that keyring.
The real dangers, assuming you use disk encryption, are this:
1: ANY unencrypted email on ANY server containing infomation that cannot be
told to a cop and a reporter at the same time.
2: A poorly-motivated member of the crew with custody of important information
snitching under pressure-NEVER share passphrases between users!
3: :Weak passphrases vulnerable to dictionary or publised-writing attacks,
widely used by the Secret Service.
4: : Smudges left on touch screens from password entry-this is a known and
published from of pass-pattern recovery.
5: Using public access wifi without consideration for the locations of
security cameras, or using the same site repeatedly for secure work.
6: Logging into personal email or social networking from any location while
doing secure work
7:Browsers that snoop: Chrome or Chromium without turning off the spyware, ANY
browser in it's default settings
8: THE WORST OFFENDER: Facebook! Don't use it at all.
9: Google. They keep EVERYTHING, always use Tor and/or the Scroogle anonymizer
to reach them
> Subject: Re: RE Re: Ubuntu ISO Testing team: New buildnotification-why
> encryption support is needed
> Message-ID: <op.v5uuiwdrqhadp0@suse11-2>
> Content-Type: text/plain; charset=iso-8859-1; format=flowed; delsp=yes
>
> Note, at least if you are using a CRT, no disc encryption isn't your
> biggest issue, since everybody able to use an antenna, is able to see
> everything on your screen from the house from the other side of the road.
>
> "Explicit" anarchistic data has no place on a computer. Encryption is
> completely safe. No intelligence service is able to do refactoring of
> primes, assumed the encryption avoids pseudo-primes, such as some Fermat
> numbers.
>
> The weak spot is the computer in general, there are several ways to spy,
> if a computer is used.
>
> Anyway, I agree that for states like China, encryption of discs is
> important, for western countries we need other methods to be more safe,
> assumed the data is explicit-explicit anarchistic. Writing about weed to
> e.g. some southern states in the USA, you only need 1024 encryption for
> your mails.
>
> Note, anonymous surfing and mailing isn't safe, if everybody is able to
> get access to e.g. your two telephone cables.
>
> 2 cents,
>
> Ralf
>
>
--
Ubuntu-Studio-devel mailing list
[email protected]
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-studio-devel