at the trilogue meeting, secretly negotiating legislation to reduce web browser security - eviltoast
    • Godort@lemm.ee
      link
      fedilink
      English
      arrow-up
      25
      ·
      1 year ago

      There is no such thing as a backdoor that can only be used by one group of people.

      As soon as someone outside of that group figures out how to access it, then they have the keys to every system that uses that encryption method. And because the backdoor is there by design, they will have access in perpetuity until the system gets upgraded to use properly secure encryption.

      • skillissuer@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        edit-2
        1 year ago

        Great, now look at the actual vulnerabilities

        Zeroth of all, the people who have backdoor - EU intel agencies - don’t have any motive to attack TEA1 radios within their range. This might provide them with tools to snoop on non-EU firetruck radios, but that’s all. That’s some very limited NOBUS capability

        First of all, it’s an attack on something that is transmitted most usually on 430ish MHz - you need to be within few km of target just to listen. This is enough to break TEA1 if you know about the backdoor, but if you want to do anything more - like exploit CVE-2022-24401 - you need to be close enough to receive victim’s signal, but also you need to spoof part of base station signal - remember, you don’t wanna get caught, so you have to use low power and point directional antenna at cops - and you need to be even closer, maybe even following them within line of sight for it to work reliably

        Proof of concept code wasn’t published, you still need considerable resources to get to exploitation in principle in the first place and then you have to be physically close to decrypt some communications. This still doesn’t allow for sending forged messages because there’s also authentication mechanism that you’d also need to take care of. This is some state-level resources, not two dudes in a shed scale of resources

        • DudeDudenson@lemmings.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 year ago

          The concept still persists, normalizing stuff having backdoors shouldn’t be a thing. The government will do as government does but we shouldn’t just think it’s always safe and let them know we’re okay with it

          • skillissuer@discuss.tchncs.de
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 year ago

            I get what you’re saying, i’m saying that average joe hasn’t really been exposed much because distribution of this vulnerable technology is limited and actual exploitation has some serious constraints

    • Arthur Besse@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      18
      ·
      1 year ago

      Yeah, it’s used all over the world for not only cop radios but also control systems for things like power plants and railway switches, and ETSI’s backdoored cryptography is sometimes relied upon for authenticity as well as confidentiality. So, it is literally possible to exploit this backdoor and cause physical disasters with a radio transmission.

      The conspirators should be held accountable and should never be trusted again, but instead they’re having more of their future standards written into law. You can read an interview with the chair of ETSI’s Technical Committee TETRA and Critical Communications Evolution (TC TCCE) Brian Murgatroyd here.

    • trollercoaster@feddit.de
      link
      fedilink
      English
      arrow-up
      7
      ·
      edit-2
      1 year ago

      In addition to what others already said about the commercial version of TETRA (which is where the backdoors were discovered), the cops, by the nature of their job, do handle a lot of personal data, and transmit them over the radio. Theoretically, there should be safeguards in place to prevent misuse of the data handled by the police. In practise, this works more or less well, but at least there is some attempt at oversight. If their radio systems have a backdoor, every Tom, Dick, and Harry (and Sergeij from St. Petersburg) can get access to those data with exactly zero oversight and safeguards.

      Additionally, among the noncommercial users of TETRA radios are lots of other emergency services, including ambulance services. That data concerning people’s health are of a somewhat sensitive nature, and therefore need to be protected from unauthorised access, hopefully doesn’t need any further explanation.

      • Arthur Besse@lemmy.mlOP
        link
        fedilink
        English
        arrow-up
        9
        ·
        1 year ago

        The researchers found five different vulnerabilities. The one that can most unambiguously not be called anything besides a backdoor (internally reducing what were believed to be 80-bit keys down to 32 bits) was specific to TEA1, the export cipher for use outside of Europe and the US, but the other vulnerabilities applied to other ciphers also.

        The homepage for the research is https://www.midnightblue.nl/tetraburst

      • taladar@feddit.de
        link
        fedilink
        English
        arrow-up
        6
        ·
        1 year ago

        When it comes to the crypto-wars I assume that stands for “all cops are brain-dead”? Because that is roughly what you have to be to be for sabotaging encryption.