Deutsch   English   Français   Italiano  
<ln3ildFse54U2@mid.individual.net>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!2.eu.feeder.erje.net!feeder.erje.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: Sylvia Else <sylvia@email.invalid>
Newsgroups: comp.misc,comp.os.linux.advocacy,misc.news.internet.discuss
Subject: Re: Security? What "Security"?
Date: Mon, 14 Oct 2024 11:49:01 +0800
Lines: 42
Message-ID: <ln3ildFse54U2@mid.individual.net>
References: <1r19ri6.xu1j411x9lob6N%snipeco.2@gmail.com>
 <ln3h70Fse54U1@mid.individual.net>
 <uR6cneotZp_6DJH6nZ2dnZfqn_qdnZ2d@giganews.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net TU0jwETwZyu0vCgMmTU6zgpgJy/Wrj+cjBzSIUkDTLX4NUc5Pb
Cancel-Lock: sha1:wB4vzgh4nLpr1tAGtLRITxUlezI= sha256:D/9wpcrG7JQ+xXChVQG5IZKyae9DZfVTGfXinyOZxyc=
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101
 Thunderbird/102.15.1
Content-Language: en-US
In-Reply-To: <uR6cneotZp_6DJH6nZ2dnZfqn_qdnZ2d@giganews.com>
Bytes: 3017

On 14-Oct-24 11:35 am, % wrote:
> Sylvia Else wrote:
>> On 11-Oct-24 10:17 pm, Sn!pe wrote:
>>> My pet rock Gordon asserts that every networked device has a backdoor.
>>> Therefore, anything viewable in clear on that device is insecure and the
>>> quality of message encryption is moot.
>>>
>>
>> An initial question is what exactly is meant by "backdoor". Any 
>> networked device that is capable of remote update by the vendor can 
>> presumably be updated by the vendor to do anything that any device on 
>> your network can do. But this does not imply that anyone else can do 
>> that. Of course it does mean that you security depends on the security 
>> of the vendor, which is an unknown quantity. This is partly why the 
>> few remotely updatable devices that I do own are fire-walled off from 
>> the rest of my internal network.
>>
>> Few networked devices accept incoming connections, for the simple 
>> reason that they're unlikely to get past a gateway router. Most work 
>> by making outgoing connections to the vendor's server. The better 
>> implementations require an authenticated server certificate, which 
>> makes impersonation of the vendor pretty much impossible. Without a 
>> certificate the intending intruder may engage in something like a DNS 
>> cache poisoning attack, but they have become more difficult over the 
>> years.
>>
>> If one is to worry about back-doors, the main vulnerability is the 
>> router itself, and this has indeed been a problem in the past, 
>> especially where the ISP has the ability to update firmware or change 
>> settings, because now one is dependent on the security of the ISP, 
>> which is not always been up to the task.
>>
>> Commercially supplied routers have a bad record of vulnerabilities. I 
>> use a small single board computer as a gateway instead.
>>
>> Sylvia.
>>
> i have nothing to hide so i don't do anything

Not even information that could be used in identity theft?

Sylvia.