Content note: this talk is about online abuse as some of the content may be upsetting
Got pulled into this after a screenshot of a class assignment sending folks to post on 4chan to post about race/gender/etc issues got posted on 4chan without the email address... so the 4chan folks thought it was @gianluca_string. It wasn't, but they doxxed and harassed anyway
This coordinated attack is a "raid". If even white, male profs are getting these, imagine who else gets them worse
~2-5/day
How can computer security people help?
* we study coordinated malicious activity by code
* this is coodinated malicious activity by people
Can we use techniques from one on the other?
What is 4chan?
[If you don't know, that may make you the winner. Especially if you don't know about 8chan.]
* public, anonymous image board where content ages out
* released a dataset with all the posts
Threat model
* someone calls for attack
* organization thread
* delivery across many platforms
* harm
Focused on YouTube because it's the most popular platform linked from 4chan
Identifying raided videos on YT -- spike in hate comments
[note: this is using some kind of API to identify hate speech, which has some real limitations, especially on certain dialects]
What to do about raids?
* too many videos, too many comments, can't look at them all
* developed a risk score which can identify with AUC .94 whether a video will be raided at upload time
Latest threat: zoombombing
* attacker posts link to meeting room
* people join to disrupt
Measuring zoombombing
* pulled out links from 4chan and twitter
* labeled posts
* analysed
74% of the calls for zoombombing target classes, 70% by students in the class [for the lulz]
93% target meetings happening in real time
We need to rethink our defense mechanisms
* passwords don't work (because the insider can pass it on)
* waiting rooms don't help (the insider attackers supply names of real students to spoof)
Instead use one-time unique links [note that Zoom has this in some modes]
[end of talk]
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Last talk of #enigma2021 by Marcus Botacin: "DOES YOUR THREAT MODEL CONSIDER COUNTRY AND CULTURE? A CASE STUDY OF BRAZILIAN INTERNET BANKING SECURITY TO SHOW THAT IT SHOULD!"
The outcomes I get from my analysis of malware I find in Brazil were quite different than what I saw in analysis of malware from other researchers. Why? Because the malware attacks were different!
The Brazilian banking system:
* let's move banking to computers (80s)to keep up with hyperinflation
* desktop clients for users... and the attackers migrated from physical to fake desktop app attacks -- that would only work in Brazil because that's where the banking was
Kicking off the last session of #enigma2021, @katestarbird is speaking about an extremely pressing topic: "ONLINE RUMORS, MISINFORMATION AND DISINFORMATION: THE PERFECT STORM OF COVID-19 AND ELECTION2020"
This talk is going to go through the experience pushing the boundaries on sandboxing in the Chrome browser
What is sandboxing?
* breaking something into lower/higher privileged process
* necessary for browers, OSes, VMs etc.
Chromium uses to reduce the amount of privilege of the application: also to reduce the amount of privilege for code that touches websites (renderer)
* split different websites into different processes
* good defense against logic bugs (e.g. same-origin policy)
Next up at #enigma2021, Alex Gaynor from @LazyFishBarrel (satirical security company) will be talking about "QUANTIFYING MEMORY UNSAFETY AND REACTIONS TO IT"
Look for places where there are a lot of security issues being handled one-off rather than fixing the underlying issue
We tried to fix credential phishing mostly by telling people to be smarter, rather than fixing the root cause: people being able to use phished credential.
Zoom's launched end-to-end encryption 5 months after the white paper was published
* prevents eavesdroppers between users who are speaking to each other
* protection against compromised servers