[conspire] Mandatory code-signing is for your protection
paulz at ieee.org
paulz at ieee.org
Sat Dec 19 14:44:00 PST 2020
But what can go wrong? Isn't there a guard with a photo book that has been updated to now include Bonnie and Clyde?
Seriously I suspect break-ins will not stop until at a minimum there is a staff of white hackers who have full access to read source code and permissions to try all sorts of things and lastly these people need to be well rewarded when they do find a third story window that was not locked.
I was going to suggest something about a cyber-watchman, but a good hacker will do her work at a low duty cycle so as not to draw attention to herself.
On Thursday, December 17, 2020, 01:18:48 PM PST, Rick Moen <rick at linuxmafia.com> wrote:
About a week ago, I wrote:
> I personally felt the critics underreacted to the _earlier_ change.
> Starting with Firefox 48 on 2016-08-02, Firefox refuses to run any
> extension not cryptographically signed by Mozilla, Inc. (There has been
> a temporary workaround by running the ESR or developer or nightly or
> unbranded builds and doing fiddly things in about:config to un-break
> ability to run your own choice of extensions, but the writing was on the
> wall.)
>
> IMO, if you cannot run code without someone else's permission, then it's
> not open source.
But mandatory corporate signing of publicly available code is for
everyone's protection, you see. We were supposed to forgive the minor
inconvenience of newer Firefox versions no longer running extensions
unless they'd been cryptographically signed by Mozilla Corporation at
the addons.mozilla.org Web site -- because, that way, Mozilla
Corporation could exclude malicious and criminally directed code from
the extensions market. Surely, the theoretical loss of user autonomy is
worth it, for the freedom from malware, etc., that it brings.
And the similar walled gardens of corporate signing by competing
browser publishers such as Google and Microsoft, why, that's the same
thing.
Oh, what's that fluttering of wings I hear? I believe it's the Irony
Fairy.
https://arstechnica.com/information-technology/2020/12/up-to-3-million-devices-infected-by-malware-laced-chrome-and-edge-add-ons/
SURPRISE —
Up to 3 million devices infected by malware-laced Chrome and Edge
add-ons
Security firm identifies 28 malicious extensions hosted by Google and
Microsoft.
DAN GOODIN - 12/16/2020
As many as 3 million people have been infected by Chrome and Edge
browser extensions that steal personal data and redirect users to ad or
phishing sites, a security firm said on Wednesday.
In all, researchers from Prague-based Avast said they found 28
extensions for the Google Chrome and Microsoft Edge browsers that
contained malware. The add-ons billed themselves as a way to download
pictures, videos, or other content from sites including Facebook,
Instagram, Vimeo, and Spotify. At the time this post went live, some,
but not all, of the malicious extensions remained available for download
from Google and Microsoft.
Avast researchers found malicious code in the JavaScript-based
extensions that allows them to download malware onto an infected
computer. [...]
Oh, say it's not so, Uncle Google and Auntie Microsoft. I thought you'd
promised to protect us with your holy signing keys!
Over the past few years, third-party add-ons have become a widely used
means for infecting people with malware and adware. Last year, a
researcher uncovered Chrome and Firefox extensions that collected and
published the browsing histories
(https://arstechnica.com/information-technology/2019/07/dataspii-inside-the-debacle-that-dished-private-data-from-apple-tesla-blue-origin-and-4m-people/)
of an estimated 4 million people.
The data divulged proprietary information from some of the biggest
names in tech, including Tesla, Trend Micro, Symantec, and Blue Origin.
Individuals’ tax returns, doctor appointment schedules, and other
personal information was also exposed.
In at least one case of extension tampering, malicious code was inserted
into extensions after attackers gained access to the accounts of
legitimate developers.
(https://arstechnica.com/information-technology/2017/08/after-phishing-attacks-chrome-extensions-push-adware-to-millions/)
In other cases, the extensions were published by developers who
managed to bypass vetting processes browser makers used in an attempt to
block abusive or malicious add-ons.
It's not completely clear what author Goodin means by the phrase 'bypass
vetting processes browser makers used', but I can think of possible
meanings, including developers of extensions with established user bases
getting bought out, and then the new owner putting out newer versions
primarily as malware delivery vehicles -- as the privacy engineering guy
at DuckDuckGo notes:
https://mobile.twitter.com/kdzwinel/status/885540551025676288
That is what happened with a low-end ad-blocker named Nano Adblocker /
Nano Defender:
https://arstechnica.com/information-technology/2020/10/popular-chromium-ad-blockers-caught-stealing-user-data-and-accessing-accounts/
A certain Hugo Xu, originator of this modestly successful
cottage-industry extension for Chrome, decided a couple of months ago
that he no longer had time to maintain the codebase, and sold the
rights to somebody-nobody-in-particular, who thereupon used it as a
malware delivery vehicle with a built-in, trusting audience.
I am reminded of the problem with trademarks/brands: We get accustomed
to using the brand identity as a proxy for getting to know and trust the
artisans behind the product, but unfortunately because we _don't_ know
those people, we are at risk when the brand gets sold to some bunch of
low lives. E.g.:
Polaroid
Remington
Bell and Howell
RCA
Zenith
Magnavox
The Sharper Image
Pan Am
Volvo
Hoover
Motorola
Stanley
Anyway, if you actually believe that code-signed walled gardens make you
safe, then, oh, gosh no.
_______________________________________________
conspire mailing list
conspire at linuxmafia.com
http://linuxmafia.com/mailman/listinfo/conspire
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://linuxmafia.com/pipermail/conspire/attachments/20201219/f369c35c/attachment-0001.html>
More information about the conspire
mailing list