IoT Goes Nuclear – Creating a ZigBee Chain Reaction / How they hacked your Philips Hue and made a worm

In this paper we describe a new type of threat in which adjacent IoT devices will infect each other with a worm that will spread explosively over large areas in a kind of nuclear chain reaction, provided that the density of compatible IoT devices exceeds a certain critical mass. In particular, we developed and verified such an infection using the popular Philips Hue smart lamps as a platform.
The worm spreads by jumping directly from one lamp to its neighbors, using only their built-in ZigBee wireless connectivity and their physical proximity. The attack can start by plugging in a single infected bulb anywhere in the city, and then catastrophically spread everywhere within minutes, enabling the attacker to turn all the city lights on or off, permanently brick them, or exploit them in a massive DDOS attack.
[…]
To make such an attack possible, we had to find a way to remotely yank already installed lamps from their current networks, and to perform over-the-air firmware updates. We overcame the first problem by discovering and exploiting a major bug in the implementation of the Touchlink part of the ZigBee Light Link protocol, which is supposed to stop such attempts with a proximity test. To solve the second problem, we developed a new version of a side channel attack to extract the global AES-CCM key that Philips uses to encrypt and authenticate new firmware. We used only readily available equipment costing a few hundred dollars, and managed to find this key without seeing any actual updates.

Source: IoT Goes Nuclear – Creating a ZigBee Chain Reaction

‘Trust it’: Results of Signal’s first formal crypto analysis are in

As explained in a paper titled A Formal Security Analysis of the Signal Messaging Protocol (PDF) from the International Association for Cryptologic Research, Signal has no discernible flaws and offers a well-designed and compromise-resistant architecture.

Signal uses a double rachet algorithm that employs ephemeral key exchanges continually during each session, minimising the amount of text that can be decrypted at any point should a key be compromised.

Signal was examined by a team of five researchers from the UK, Australia, and Canada, namely Oxford University information security Professor Cas Cremers and his PhDs Katriel Cohn-Gordon and Luke Garratt, Queensland University of Technology PhD Benjamin Dowling, and McMaster University Assistant Professor Douglas Stebila.
[…]
The team finds some room for improvement which they passed on to the app’s developers, namely that the protocol can be further strengthened with negligible cost by using “constructions in the spirit of the NAXOS (authenticated key exchange) protocol” [PDF]” by or including a static-static Diffie-Hellman shared secret in the key derivation. This would solve the risk of attackers compromising communications should the random number generator become fully predictable.

The paper does, however, cover only a subsection of Signal’s efforts, as it ignores non-Signal library components, plus application and implementation variations. It should therefore be considered a substantial starting point for future analysis, the authors say, rather than the final world on Signal.

Source: ‘Trust it’: Results of Signal’s first formal crypto analysis are in

Nvidia Tracking you on Windows now – and how to stop it (for now)

In the case of Nvidia, Telemetry gets installed alongside the driver package. While you may — and should — customize the installation of the Nvidia driver so that only the bits that you require are installed, there is no option to disable the Telemetry components from being installed. These do get installed even if you only install the graphics driver itself in the custom installation dialog.

Source: Disable Nvidia Telemetry tracking on Windows – gHacks Tech News

This starts with version 375.70

Come on, who told these companies it was alright to just suck stuff off your machine without consent? And a EULA isn’t consent!

Mimicking nature turns sewage into biocrude oil in minutes

the US Department of Energy’s Pacific Northwest National Laboratory (PNNL) has found a way to potentially produce 30 million barrels of biocrude oil per year from the 34 billion gal (128 billion liters) of raw sewage that Americans create every day.

According to PNNL, the problem with using sewage as a source material for biocrude is it’s too wet and requires drying before more conventional processes can handle it. PNNL’s approach is to use HydroThermal Liquefaction (HTL) to turn the sewage into oil, which removes the need for drying.

In HTL, the raw sewage is placed in a reactor that’s basically a tube pressurized to 3,000 lb/in2 (204 atm) and heated to 660° F (349° C), which mimics the same geological process that turned prehistoric organic matter into crude oil by breaking it down into simple compounds, only with HTL it takes minutes instead of epochs.

Source: Mimicking nature turns sewage into biocrude oil in minutes

Turkey Doubles Down on Censorship With Block on VPNs, Tor

In what’s a significant escalation in its censorship efforts, the Turkish government now wants to block the very same tools that tech-savvy citizens use to get around the government-imposed social media blocks.

On Friday, the Turkish information technologies and communications authority, or BTK, ordered internet providers in the country to block Tor and several other censorship-circumvention Virtual Private Networks or VPNs, such as VPN Master, Hotspot Shield, Psiphon, Zenmate, TunnelBear, Zero, Vypr, Express, according to multiple local reports.

Earlier in the day, the government had already blocked Twitter, Facebook and YouTube, and restrictions on messaging apps like WhatsApp and Skype were also reported. The independent monitoring organization TurkeyBlocks also reported throttling and other forms of censorship on Friday, linking the disruptions and blocks to the arrests of pro-Kurdish party leaders.

Source: Turkey Doubles Down on Censorship With Block on VPNs, Tor | Motherboard

Just in case you were in any doubt that Turkey is a dictatorship.

Teen in the dock on terror apologist charge for naming Wi-Fi network ‘Daesh 21’

An 18-year-old broke France’s anti-terror laws by naming his home Wi-Fi network “Daesh 21” – after the medieval murder bastards ISIS.

The unnamed teen was given a three-month jail sentence, suspended for now, after he was found guilty of essentially publicly condoning a terrorist act or group.

Source: Teen in the dock on terror apologist charge for naming Wi-Fi network ‘Daesh 21’

No. Humor is dead.

Buy Call of Duty Infinite Warfare from the Windows 10 Store: don’t get to play with Xbox or Steam players

According to an official Activision support page, both games will be available for separate purchase through Microsoft’s storefront. These will be entirely separate products from the Xbox One versions of the game and won’t take advantage of the Xbox Play Anywhere initiative. This eliminates both cross-platform multiplayer and purchases between Windows 10 and Xbox One, requiring two separate purchases to play on both platforms.

While it’s somewhat expected that Xbox One players and PC players should be separated, due to the accuracy gulf between controllers and mouse players, it’s a little unexpected that Windows 10 Store players will be isolated from other PC versions of the game.

Source: [Updated] Call of Duty Infinite Warfare is coming to the Windows 10 Store – with caveats

So… why buy from Win10? Dunno…

Cisco’s job applications site leaked personal data

Cisco has fixed a vulnerability in its Professional Careers portal that may have exposed truckloads of personal information.

The networking giant has sent an email to affected users in which it says a “limited set of job application related information” was leaked from the mobile version of the website, blaming an “incorrect security setting” placed after system maintenance on a third party site.
[…]
It says exposed data may have included real and login names; passwords; physical and email addresses, phone numbers; answers to security questions; users’ education and professions; cover letters and resumes.

Any hacker hoovering up that data would have also gained applicants’ voluntary information including gender, race, and veteran and disability status, and disability.

Source: Cisco’s job applications site leaked personal data