Cory Doctorow NONCONSENSUAL BLUE TICK Profile picture
Nov 9, 2022 69 tweets 17 min read Read on X
I've got trust issues. We all do. Some infosec pros go so far as to say #TrustNoOne, a philosophy more formally known as #ZeroTrust, that holds that certain elements of your security should *never* be delegated to *any* third party. 1/
If you'd like an essay-formatted version of this thread to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:

pluralistic.net/2022/11/09/inf… 2/
The problem is, it's trust all the way down. Say you maintain your own cryptographic keys on your own device. How do you know the software you use to store those keys is trustworthy? Well, maybe you audit the source-code and compile it yourself. 3/
But how do you know your *compiler* is trustworthy? When Unix/C co-creator Ken Thompson received the Turing Prize, he admitted (or joked) that he had hidden back doors in the compiler he'd written, which was used to compile all of the other compilers:

pluralistic.net/2022/10/11/ren… 4/
OK, say you whittle your own compiler out of a whole log that you felled yourself in an old growth forest that no human had set foot in for a thousand years. How about your hardware? 5/
Back in 2018, @business published a blockbuster story claiming that the server infrastructure of the biggest cloud companies had been compromised with tiny hardware interception devices:

bloomberg.com/news/features/… 6/
The authors claimed to have verified their story in every conceivable way. The companies whose servers were said to have been compromised rejected the entire story. Four years later, we still don't know who was right. 7/
How do we trust the Bloomberg reporters? How do we trust Apple? If we ask a regulator to investigate their claims, how do we trust the regulator? Hell, how do we trust our *senses*? And even if we trust our senses, how do we trust our *reason*? 8/
I had a lurid, bizarre nightmare last night where the most surreal events seemed perfectly reasonable (tldr: I was mugged by invisible monsters while trying to order a paloma at the @dnalounge, who stole my phone and then a bicycle I had rented from the bartender). 9/
If you can't trust your senses, your reason, the authorities, your hardware, your software, your compiler, or third-party service-providers, well, shit, that's pretty frightening, isn't it (paging R. Descartes to a white courtesy phone)? 10/
There's a joke about physicists, that all of their reasoning begins with something they know isn't true: "Assume a perfectly spherical cow of uniform density on a frictionless surface..." 11/
The world of information security has a lot of these assumptions, and they get us into *trouble*. 12/
Take internet data privacy and integrity - that is, ensuring that when you send some data to someone else, the data arrives unchanged and no one except that person can read that data. 13/
In the earliest days of the internet, we operated on the assumption that the major threat here was technical: our routers and wires might corrupt or lose the data on the way. 14/
The solution was the ingenious system of packet-switching error-correction, a complex system that allowed the sender to verify that the recipient had gotten all the parts of their transmission and resend the parts that disappeared en route. 15/
This took care of integrity, but not privacy. We mostly just pretended that sysadmins, sysops, network engineers, and other people who *could* peek at our data "on the wire" *wouldn't*, even though we knew that, at least some of the time, this was going on. 16/
The fact that the people who provided communications infrastructure had a sense of duty and mission didn't mean they wouldn't spy on us - sometimes, that was *why* they peeked, just to be sure that we weren't planning to mess up "their" network. 17/
The internet *always* carried "sensitive" information - love letters, private discussions of health issues, political plans - but it wasn't until investors set their sights on *commerce* that the issue of data privacy came to the fore. 18/
The rise of online financial transactions goosed the fringe world of cryptography into the mainstream of internet development.

This gave rise to an epic, three-sided battle, between civil libertarians, spies, and business-people. 19/
For years, the civil liberties people had battled the spy agencies over "strong encryption" (more properly called "working encryption" or just "encryption"). 20/
The spy agencies insisted that civilization would collapse if they couldn't wiretap any and every message traversing the internet, and maintained that they would neither abuse this facility, nor would they screw up and let someone else do so ("trust us," they said). 21/
The business world wanted to be able to secure their customers' data, at least to the extent that an insurer would bail them out if they leaked it; and they wanted to *actually* secure their own data from rivals and insider threats. 22/
Businesses lacked the technological sophistication to evaluate the spy agencies' claims that there was such a thing as encryption that would keep their data secure from "bad guys" but would fail completely whenever a "good guy" wanted to peek at it. 23/
In a bid to educate them on this score, @EFF co-founder John Gilmore built a $250,000 computer that could break the (already broken) cryptography the NSA and other spy agencies claimed businesses could rely on, in just a couple hours. 24/
The message of this DES Cracker was that anyone with $250,000 will be able to break into the communications of any American business:

cryptome.org/jya/des-cracke… 25/
Fun fact: John got tired of the bar-fridge-sized DES Cracker cluttering up his garage and he sent it to my house for safekeeping; it's in my office next to my desk in LA. If I ever move to the UK, I'll have to leave it behind because it's (probably) still illegal to export. 26/
The deadlock might have never been broken but for a key lawsuit: Cindy Cohn (now EFF's executive director) won the *Bernstein* case, which established that publishing cryptographic source-code was protected by the First Amendment:

eff.org/cases/bernstei… 27/
With cryptography legalized, browser vendors set about securing the data-layer in earnest, expanding and formalizing the "public key infrastructure" (PKI) in browsers. 28/
Here's how that works: your browser ships with a list of cryptographic keys from trusted "certificate authorities." These are entities that are trusted to issue "certificates" to web-hosts, which are used to wrap up their messages to you. 29/
When you contact "foo.com," Foo sends data encrypted with a key identified as belonging to "foo.com" (this key is Foo's "certificate" - it certifies that its user is Foo). That certificate is, in turn, signed by a "Certificate Authority." 30/
Any Certificate Authority can sign a certificate - your browser ships with a list of CAs, and if any of them certifies the bearer is "Foo.com," that server can send your browser "secure" traffic. 31/
Your broswer will dutifully display the data with all assurances that it arrived from one of Foo, Inc's servers. 32/
This means that you are trusting *all* of the Certificate Authorities that come with your browser, and you're also trusting the company that made your browser to choose good Certificate Authorities. This is a lot of trust. 33/
If any of those CAs betrays your trust and issues a bad cert, it can be used to reveal, copy, and alter the data you send and receive from a server that presents that certificate. 34/
You'd hope that certificate authorities would be very prudent, cautious and transparent - and that browser vendors would go to great lengths to verify that they were. 35/
There are PKI models for this: for example, the "DNS root keys" that control the internet's domain-name service are updated via a formal, livestreamed ceremony:

cloudflare.com/dns/dnssec/roo… 36/
There are 14 people entrusted to perform this ceremony, and at least three must be present at each performance. The keys are stored at two facilities, and the attendees need to show government ID to enter them. 37/
(Is the government that issued the ID trustworthy? Do you trust the guards to verify it? Ugh, my head hurts.)

Further access to the facility is controlled by biometric locks (do you trust the lock maker? How about the person who registers the permitted handprints?). 38/
Everyone puts a wet signature in a logbook. A staffer has their retina scanned and presents a smartcard. 39/
Then the staffer opens a safe that has a "tamper proof" (read: "tamper resistant") hardware module whose manufacturer is trusted (why?) not to have made mistakes or inserted a back-door. A special laptop (also trusted) is needed to activate the safe's hardware module. 40/
The laptop "has no battery, hard disk, or even a clock backup battery, and thus can’t store state once it’s unplugged." Or, at least, the people in charge of it claim that it doesn't and can't. 41/
The ceremony continues: the safe yields a USB stick and a DVD. Each of the trusted officials hands over a smart card that they trust and keep in a safe deposit box in a tamper-evident bag. The special laptop is booted from the trusted DVD and mounts the trusted USB stick. 42/
The trusted cards are used to sign three months worth of keys, and these are the basis for the next quarter's worth of secure DNS queries. 43/
All of this is published, videoed, livestreamed, etc. It's a real "defense in depth" situation where you'd need a *very* big conspiracy to subvert *all* the parts of the system that need to work in order to steal underlying secrets. 44/
Yes, bottom line, you're still trusting people, but in part you're trusting them not to be able to all keep a secret from the rest of us. 45/
The process for determining which CAs are trusted by your browser is a *lot* less transparent and, judging from experience, a lot less thorough. Many of these CAs have proven to be manifestly untrustworthy over the years. 46/
There was Diginotar, a Dutch CA whose bad security practices left it vulnerable to a hack-attack:

en.wikipedia.org/wiki/DigiNotar 47/
Some people say it was Iranian state hackers, seeking signing keys to forge certificates and spy on Iranian dissidents, who are liable to arrest, torture and execution. Other people say it was the NSA pretending to be Iranian government hackers:

schneier.com/blog/archives/… 48/
In 2015, the China Internet Network Information Center was used to issue fake Google certificates, which gave hackers the power to intercept and take over Google accounts and devices linked to them (e.g. Android devices):

thenextweb.com/news/google-to… 49/
In 2019, the UAE cyber-arms dealer Darkmatter - an aggressive recruiter of American ex-spies - applied to become a trusted Certificate Authority, but was denied:

reuters.com/investigates/s… 50/
Browser PKI is very brittle. By design, any of the trusted CAs can compromise *every* site on the internet. 51/
An early attempt to address this was "certificate pinning," whereby browsers shipped with a database of which CAs were authorized to issue certificates for major internet companies. 52/
That meant that even though your browser trusted Crazy Joe's Discount House of Certification to issue certs for any site online, it also knew that Google didn't use Crazy Joe, and any google.com certs that Crazy Joe issued would be rejected. 53/
But pinning has a scale problem: there are billions of websites and many of them change CAs from time to time, which means that every browser now needs a massive database of CA-site pin-pairs. 54/
It also needs a means to trust the updates that site owners submit to browsers with new information about which CAs can issue their certificates.

Pinning was a stopgap. It was succeeded by a radically different approach: surveillance, not prevention. 55/
That surveillance tool is #CertificateTransparency (CT), a system designed to quickly and publicly catch untrustworthy CAs that issue bad certificates:

nature.com/articles/49132… 56/
Here's how Certificate Transparency works: every time your browser receives a certificate, it makes and signs a tiny fingerprint of that certificate, recording the date, time, and issuing CA, as well as proof that the CA signed the certificate with its private key. 57/
Every few minutes, your browser packages up all these little fingerprints and fires them off to one or more of about a dozen public logs:

certificate.transparency.dev/logs/ 58/
These logs use a cool cryptographic technology called #MerkleTrees that make them tamper-evident: that means that if some alters the log (say, to remove or forge evidence of a bad cert), everyone who's got a copy of any of the log's previous entries can detect the alteration. 59/
Merkle Trees are super efficient. A modest server can easily host the eight billion or so CT records that exist to date. 60/
Anyone can monitor any of these public logs, checking to see whether a CA they don't recognize has issued a certificate for their own domain, and then prove that the CA has betrayed its mission. 61/
CT works. It's how we learned that @symantec engaged in *incredibly* reckless behavior: as part of their test-suite for verifying a new certificate-issuing server, they would issue *fake Google certificates*. 62/
These were supposed to be destroyed after creation, but at least one leaked and showed up in the CT log:

arstechnica.com/information-te…

It wasn't just Google - Symantec had issued *tens of thousands* of bad certs. 63/
Worse: Symantec was responsible for more than a *third* of the web's certificates. We had operated on the blithe assumption that Symantec was a trustworthy entity - a perfectly spherical cow of uniform density - but on inspection it was proved to be a sloppy, reckless mess. 64/
After the Symantec scandal, browser vendors cleaned house - they ditched Symantec from browsers' roots of trust. 65/
A lot of us assumed that this scandal would also trigger a re-evaluation of how CAs demonstrated that they were worth of inclusion in a browser's default list of trusted entities.

If that happened, it wasn't enough. 66/
Yesterday, the @washingtonpost's @josephmenn published an in-depth investigation into @TrustCor, a certificate authority that is trusted by default by Safari, Chrome and Firefox:

washingtonpost.com/technology/202… 67/
Menn's report is alarming. Working from reports from @UCalgary privacy researcher Joel Reardon and @ICSIatBerkeley security researcher @v0max, Menn presented a laundry list of profoundly disturbing problems with Trustcor:

groups.google.com/a/mozilla.org/… 68/
CORRECTION: A previous version of this thread reported that Trustcor had the same officers as Packet Forensics; they do not; they have the same officers as Measurement Systems. I regret the error. Thread continues here:

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Cory Doctorow NONCONSENSUAL BLUE TICK

Cory Doctorow NONCONSENSUAL BLUE TICK Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @doctorow

Sep 9
Broadly speaking, the role of an establishment economist is to come up with new ways of saying, "actually, your boss is right."

1/ Two suited business-men sit knee-to-knee in a luxuriously paneled boardroom, smiling broadly at one another. They are tinted green and limned with green. Behind them stands a rank of child laborers in 19th century workwear, looking miserable. Behind the laborer, a sack of gold coins looms into the frame, spilling a cascade of gold coins. On the coffee table before the men is a tiny guillotine with a tiny aristocrat about to lose his head while two tiny Jacobins look on.
If you'd like an essay-formatted version of this thread to read or share, here's a link to it on , my surveillance-free, ad-free, tracker-free blog:



2/pluralistic.net
pluralistic.net/2024/09/09/low…
In other words, the world we're living in is the best possible world, and the fact that you got contact burns from collapsing on the scorching sidewalk outside of the grocery store where you couldn't afford your weekly shopping is unfortunate, but unavoidable.

3/
Read 46 tweets
Aug 19
*Corporate Bullshit: Exposing the Lies and Half-Truths That Protect Profit, Power, and Wealth in America* is @NickHanauer, @joanwalsh and @donaldrcohen12's 2023 book on the history of corporate apologetics; it's great:



1/ thenewpress.com/books/corporat…
The New Press cover for 'Corporate Bullshit,' by Nick Hanaeur, Joan Walsh and Donald Cohen.
If you'd like an essay-formatted version of this thread to read or share, here's a link to it on , my surveillance-free, ad-free, tracker-free blog:



2/pluralistic.net
pluralistic.net/2024/08/19/apo…
I found out about this book last fall when @ddayen reviewed it for the @TheProspect; Dayen did a great job of breaking down its thesis, and I picked it up for my newsletter.

3/
Read 37 tweets
Aug 17
Last weekend, I was at @Defcon 32, where I had the privilege of giving a talk: "Disenshittify or die! How hackers can seize the means of computation and build a new, good internet that is hardened against our asshole bosses' insatiable horniness for enshittification."

1/ A photo of me at a podium at Defcon 32, giving my speech.   Image: https://twitter.com/igama/status/1822347578094043435/ (cropped)  CC BY 4.0 https://creativecommons.org/licenses/by/4.0/deed.pt
If you'd like an essay-formatted version of this thread to read or share, here's a link to it on , my surveillance-free, ad-free, tracker-free blog:



2/pluralistic.net
pluralistic.net/2024/08/17/hac…
This was a followup to last year's talk, "An Audacious Plan to Halt the Internet's Enshittification," a talk that kicked off a lot of international interest in my analysis of platform decay ("enshittification"):



3/
Read 204 tweets
Aug 16
Once you learn about the "collective action problem," you see it everywhere. Democrats - including elected officials - wanted Biden to step down, but no one wanted to be the first one to take a firm stand, so for months, his campaign limped on: a collective action problem.

1/ A shelf of thick scientific tomes, protected by a gridwork of foreboding, rusting bars.
If you'd like an essay-formatted version of this thread to read or share, here's a link to it on , my surveillance-free, ad-free, tracker-free blog:



2/pluralistic.net
pluralistic.net/2024/08/16/the…
Patent trolls use bullshit patents to shake down small businesses, demanding "license fees" that are high, but much lower than the cost of challenging the patent and getting it revoked.

3/
Read 68 tweets
Aug 15
Every performer and creator on Patreon is about to get screwed out of 30% of their gross earnings, which will be diverted to Apple, the most valuable company on Earth. Apple contributes nothing to their work, but it can steal a third of their wages:



1/ news.patreon.com/articles/under…
A Vaudeville dancer on an old-fashioned stage, caught mid-dance-step, standing in front of a Patreon logo.. His pockets bulge with cash. He has been decapitated and blood fountains from the stump of his neck. His decapitated, bloody head lies in a pool of blood on the stage next to him. Over the stump of his neck is an original six-color Apple logo, modified so that the 'bite' is actually a bloody, fang-filled mouth. The scene is surmounted by the Apple 'Think different' wordmark.
If you'd like an essay-formatted version of this thread to read or share, here's a link to it on , my surveillance-free, ad-free, tracker-free blog:



2/pluralistic.net
pluralistic.net/2024/08/15/pri…
How is this possible? Enshittification:



Enshittification starts with companies being good to end users. In this case, Apple made a quality product - Iphones - and carefully tended its App Store.

3/pluralistic.net/2024/01/30/go-…
Read 65 tweets
Aug 14
Walmart didn't just *happen*. The rise of Walmart - and Amazon, its online successor - was the result of a specific policy choice, the decision by the Reagan administration not to enforce a key antitrust law.

1/ An early 20th century grocery counter before tall shelves stacked with dry-goods. A woman grocer turns to pluck an item off the shelves. Attached to the shelves in three places are binder clips supporting small notes; each note is emblazoned with a dark red guillotine blade. To the left of the image stands a shouting millionaire with a top hat and a money-bag.
If you'd like an essay-formatted version of this thread to read or share, here's a link to it on , my surveillance-free, ad-free, tracker-free blog:



2/pluralistic.net
pluralistic.net/2024/08/14/the…
Walmart may have been founded by Sam Walton, but its success (and the demise of the American Main Street) are down to Reaganomics.

3/
Read 53 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(