rysiek

joined 5 years ago
MODERATOR OF
[–] rysiek@szmer.info 2 points 1 month ago (4 children)

As long as they’re not using Russian-purchased sims to manage and post to the channels, how does this change their security model going forward?

If IStories' reporting on GNM's connection to FSB and GNM's access to Telegram's traffic is correct – and I have no reason to believe otherwise, this has gone through two rounds of fact-checking and these are people who had been sued for "defamation" in the most journalist-hostile, oligarch-friendly jurisdiction in the world (UK) and have repeatedly won – then this means the threat model now includes the FSB potentially being able to:

  • figure out where a user is in the world just by observing their Telegram network traffic, live or close to live;
  • with some additional analysis, based on timing and packet sizes correlation, probably figure out who that user is communicating via Telegram.

Both of these globally, regardless of what SIM card was used to register any of accounts involved, and without having to ask Telegram for any data.

I don't know if FSB is actually using this capability, and to what extent, and against whom. But based on IStories' reporting and on my own packet captures analysis it is entirely possible for them to do so if they choose to.

[–] rysiek@szmer.info 5 points 1 month ago (1 children)

I guess the xAI thing might just be a money grab for Telegram and Durov.

The Russian MPs thing might be a red herring, there's been plenty of stuff recently aimed at distracting from this Telegram story – including a brand new interview by Tucker Carlson with Durov.

Telegram and Durov knew for weeks this is coming, as the investigative journalists had tor each out for comment. So they had time to prepare their little games.

[–] rysiek@szmer.info 5 points 1 month ago

Thank you, it is refreshing to see someone honestly and earnestly engaging in a conversation about this. The "Tor is a honeypot" thing is very often an all but religiously held belief.

It would be great to have real analysis knowing which data centers or actors have the biggest control of exit nodes. If there’s really a way to de-anonimyze any traffic from there.

To truly and reliably de-anonymize Tor traffic, one would need to run over 51% of all Tor nodes. Since the US is not the only entity potentially interested in that (Russia and China might be as well), unless these entities coordinate and share data, they will thwart one another from reaching that kind of saturation.

Since we are on the topic, another concern regarding Tor network is the possibility of correlation attacks.

It might be possible to somewhat fuzzily reason about Tor users by observing traffic on both sides of the tunnel, using timing and packet sizes for analysis. But a). it is going to be very fuzzy; b). it requires global network observation capability. NSA might or might not have that to some extent, but they would not risk exposing that for anything but the most valuable targets.

I'd rather just stay away from it entirely and use a VPN for my privacy when searching media and stuff.

VPNs are a specific tool for a specific thing, they don't "preserve privacy" in the general sense. You are basically trading ISP's or local spooks' ability to observe your traffic for VPN's operator's and the local spooks' there ability to do so. In some cases it makes sense, in some – not so much.

Depends on your threat model.™

[–] rysiek@szmer.info 8 points 1 month ago

It's trivial for a nation state, they have lists of these groups. These groups are promoted in other groups and other channels and other forums and eventually reach somebody who will make a note of them.

[–] rysiek@szmer.info 9 points 1 month ago* (last edited 1 month ago) (5 children)

Soatak

Soatok. At least get the name right.

The simplest thing for [Soatok] to have done would be to ignore the message

Which also happens to be the simplest thing you could have done, even simpler as none of the toots you quote were addressed to you. Instead, you are dragging this one random exchange into this thread about something else entirely.

[–] rysiek@szmer.info 10 points 1 month ago (2 children)

There were reports (claims I suppose) that the fsb were using telegram to organise the stochastic gig job sabotage across Europe

No no, reports: https://www.msn.com/en-in/news/world/russia-uses-telegram-to-recruit-spies-and-saboteurs-in-europe/ar-AA1xshqO

Does what has been found here shed any more light on that?

Not really/not directly, I would say. What you are describing is FSB using Telegram for recruitment. That does not require network-level observability and surveillance. That's a different "feature", so to speak.

[–] rysiek@szmer.info 23 points 1 month ago (2 children)

I hate it when I don’t know an acronym, but this one is particularly hurtful to my brain since everyone is saying “yeah, that link to the FSB was obvious glad someone demonstrated it.” So… I will just assume FSB=KGB and be done.

Russian FSB is the successor of the Soviet KGB, so yeah, that works.

Take for example Tor network (high number of exit nodes are controlled)

I substantiated my claims about Telegram by a pretty deep technical analysis. Mind at least providing a link for your pretty strong claim about Tor?

Except those apps or protocols that are truly decentralized (e.g. OMEMO in XMPP), these are good.

Nope. Decentralization is important from power dynamics standpoint, but can actually be detrimental to information security due to (among others) metadata and complexity.

[–] rysiek@szmer.info 11 points 1 month ago

(I defend infrastructure and perform hacks against cryptograph & protocols for a living)

If you need to say it…

[–] rysiek@szmer.info 11 points 1 month ago* (last edited 1 month ago) (14 children)

Regarding Soatok, I am prone to completely ignore impolite individuals.

Please feel free to ignore me as well then, because saying that technical analysis by an expert can be outright ignored just because the expert happened to be impolite that one time might make me become somewhat impolite.

Imagine getting dozens of randos in your replies asking about dozens of random chat apps. At some point I am pretty sure you'd also reach a breaking point. Some would call that kind of behaviour a bit impolite, I'd wager.

[–] rysiek@szmer.info 5 points 1 month ago (1 children)

After reading the article, my understanding is that what was sent in “private chat” was in fact encrypted (for the most part) and can be considered secured (to the degree - something is off and, maybe we didn’t find out yet, how the encryption is compromised).

"Secret Chats", but otherwise spot-on, yes.

I am making a point of clarifying here because Telegram thrives on ambiguity. "Private chat" might mean anything in that system. "Secret Chat" is a specific feature that almost nobody uses but gives Telegram cover to claim they do end-to-end encryption.

But it would wise to treat all other conversations as something that is compromised. Is this a fair summary?

Yes, that's what I would say.

Telegram has access to everything that is not a "Secret Chat". They are responding to data requests. It's unclear what they include in these responses. They are also linked to FSB, through the same Vedeneev guy that owned GNM (the infrastructure provider).

[–] rysiek@szmer.info 14 points 1 month ago (1 children)

Thank you, that means a lot. For people working in information security it really feels sometimes that a). a lot of stuff is obvious, b). people just don't listen and don't care.

Your comment shows how incorrect this is. That really helps keep motivated.

[–] rysiek@szmer.info 25 points 1 month ago* (last edited 1 month ago) (20 children)

I would most definitely not recommend Matrix for private or sensitive communication, no.

https://soatok.blog/2024/07/31/what-does-it-mean-to-be-a-signal-competitor/
https://soatok.blog/2024/08/14/security-issues-in-matrixs-olm-library/

Matrix is fine as IRC replacement, it might also be a decent replacement for Telegram's channels thingy, sure. But I would not trust my family photos to it. Much less anything actually important.

 

Edit: DW changed the link after they published the piece. Sigh. Updated.
Edit2: again. What the fuck.

 

Dyrektor ds. Innowacji w Deutsche Welle namawia europejskie media publiczne, by dołączyły do fedi.

Edit: uaktualniony link, bo zmienili gamonie po publikacji. Edit2: zmienili znowu. ffs.

 

Wahałem się, czy wrzucać jako Dobrą Wiadomość. Bo to jednak strasznie kurwa smutne, że w XXI wieku ludzie chodzą głodni.

Ale uznałem, że — jakby powiedział pan Grześ — tak trzeba. Takich ludzi trzeba pokazywać, opisywać, chwalić. Czniać wszystkich obajtków i innych gamoni, chciałbym więcej takich tekstów o takich wspaniałych ludziach.

 

Znów piszę w Oko Press o technologii, tym razem nurkuję w temat e-wyborów.

 

Od kilku lat w internecie krąży obrazek autorstwa Johna Jonika. Przedstawiciel amerykańskiej władzy jest w sklepie. Ma przy sobie przy sobie pudełko, w którym znajduje się „kontrola komunikacji w internecie”. Sprzedawca pyta: „jak zapakować – w antyterroryzm czy ochronę dzieci”?

Pudełko mogłoby zawierać dowolne sposoby masowej inwigilacji. Najważniejsze jest jednak opakowanie, w które „owinie się” takie inwigilacyjne metody. A uzasadnienia kontroli są przewidywalne. Terroryzm lub ochrona dzieci.

W tym odcinku Wojciech Klicki rozmawia z ekspertem o skanowaniu korespondencji i o tym, czy taka kontrola realnie zwiększy bezpieczeństwo dzieci. Gościem Klickiego jest Michał „rysiek” Woźniak – specjalista ds. bezpieczeństwa informacji, który pracował m.in. z dziennikarzami i dziennikarkami ujawniającymi aferę Panama Papers.

Bezczelna autopromocja, przepraszam no. Ale nikt chyba jeszcze nie wrzucił, to wrzucam.

 

cross-posted from: https://szmer.info/post/1864213

Tech Won't Save Us to świetny podcast, krytycznie podchodzący do Doliny Krzemowej i ogólnie rewolucji technologicznej. Zalinkowany odcinek z Naomi Klein dotyka mnóstwa ważnych tematów, wychodzi mocno poza sam temat nowych technologii, dotyka np. kwestii tego, jak szeroko pojęta lewica zupełnie bez sensu oddaje różne pola i tematy prawicy, która następnie je gospodaruje i trzepie na nich kapitał polityczny.

Mocno polecam.

 

Tech Won't Save Us to świetny podcast, krytycznie podchodzący do Doliny Krzemowej i ogólnie rewolucji technologicznej. Zalinkowany odcinek z Naomi Klein dotyka mnóstwa ważnych tematów, wychodzi mocno poza sam temat nowych technologii, dotyka np. kwestii tego, jak szeroko pojęta lewica zupełnie bez sensu oddaje różne pola i tematy prawicy, która następnie je gospodaruje i trzepie na nich kapitał polityczny.

Mocno polecam.

 

Potrzebujemy dojrzałej polityki, która nie zatrzymuje się na światłowodach dociągniętych do każdej wsi, nowych aplikacjach dla obywateli, laptopach dla szkół i piaskownicach dla start-upów. Polityka technologiczna to zadanie dla rządu, a nie jednego Ministerstwa Cyfryzacji.

 
 

Szmering is caring!

Dzięki, dzięki, jestem tu cały tydzień.

view more: ‹ prev next ›