Tag Archive for Security

How Lava Lamps Secure the Internet

How Lava Lamps Secure the InternetThe web performance and security company, Cloudflare provides security and domain name services for companies such as Cisco (CSCO),  FitBit, OKCupid, Uber, and Zendesk. It serves a total of 10 million website domains and the average Internet user touches its services around 500 times per day, according to its website.

CloudflareThe company hopes to leverage its solid reputation for its secure encryption into a 2019 $3.5 billion IPO. Cloudflare’s reputation is based in part on a shelf full of lava lamps.

The lava lamps in the lobby of Cloudflare’s San Francisco headquarters ensure randomness for generating encryption keys. ID Quantique explains that the strength of any cryptographic system lies in its keys – the random stream of bits used by the cryptographic algorithm to transform plain text into ciphertext and back again.

Lava laps provide Internet security

The secret to a secure key is the amount of randomness, or entropy used to generate the key. The greater the degree of entropy, the more secure the key is. Because conventional computers cannot generate true randomness, information from inputs such as mouse movements, disc interrupts, or system timers are all placed into a ‘pool’ of numbers, from which a ‘seed’ is picked. This ‘seed’ is then used in the pseudo-random number generation (PRNG) which generates the keys.

Instead of using mouse movements, disc interrupts or system timers, Cloudflare videotapes its wall of colorful constantly morphing lava lamps and translates that video information into unique cryptographic keys. The lava lamps work because fluid dynamics are hard, and no one has figured out how to predict the movements inside a lava lamp, let alone a wall of them. That means the random numbers being used in Cloudflare’s encryption are effectively random.

Nick Sullivan, Cloudfare’s head of cryptography, explained that instead of relying on code to generate these numbers for cryptographic purposes, the lava lamps and the random lights, swirling blobs, and movements are recorded and photographs are taken. This footage is then turned into a “stream of random, unpredictable bytes.” According to Mr. Sullivan, “… this unpredictable data is what we use to help create the keys that encrypt the traffic that flows through Cloudflare’s network.”

Cloudflare wall of entropy

Mr. Sullivan continued,

Every time you take a picture with a camera there’s going to be some sort of static, some sort of noise,” . “So it’s not only just where the bubbles are flowing through the lava lamp; it is the state of the air, the ambient light — every tiny change impacts the stream of data.

The information is then fed into a data center and Linux kernels which then seed random number generators used to create keys to encrypt traffic.

rb-

Who didn’t have a lava lamp in college? Not only is Cloudflare’s wall of entropy fun, but it makes it harder for bad actors to break encryption.

groovy vintage lava lamp

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

All The Famous People You Shouldn’t Google

All The Famous People You Shouldn't GoogleIt’s the most dangerous celebrity time again. For its 12th annual survey of risky famous people online, cybersecurity firm McAfee recently crowned Ruby Rose the most dangerous celebrity on the internet. McAfee says that searching for Ruby Rose on the Intertubes was more likely to land users on websites that carry viruses or malware than any other celebrity in 2018.

Ruby Rose the most dangerous celebrity on the internetRuby Rose has played some dangerous characters, like an inmate in “Orange Is the New Black” and a scientist battling a prehistoric shark in “The Meg.” But the actress herself is now officially dangerous. Rose is a model and MTV VJ who may have gotten a burst of online interest when she was named to play Batwoman on an upcoming CW series. Ms.Rose unseated last year’s most dangerous celeb, Avril Lavigne.

The rest of the 10 most riskiest famous people

McAfee identified the riskiest celebrities around the world include:

  • Debra MessingJann Arden is the most dangerous celebrity to search online, in Canada.
  • Kim Kardashian is the most dangerous celebrity to search for online in the UK and Belgium in 2018.
  • In India, Bollywood actor Ileana D’Cruz is the riskiest.
  • Lucy Liu topped Australia’s list of the Most Dangerous Celebrities.
  • Diana Kruger was named the riskiest celerity in Germany.

McAfee says the survey highlights the danger of clicking on suspicious links. The cybersecurity firm urges internet users to think before they click and consider the risks associated with searching for downloadable content. They also urge users to apply updated security fixes. The company used its own site ratings to compile the celebrity list and used searches on Google, Bing, and Yahoo.

rb-

This is McAfee’s 12th annual dangerous celebrity search. I have covered this since 2009. Some of the riskiest celebs alumni include Heidi KlumBetty WhiteTom BradyEmma Watson, and Will Smith.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Protect Yourself from Facebook

Protect Yourself from FacebookJust in case you have been sleeping under a rock the past couple of weeks, social media giant Facebook (FB) was hacked again. In a presser on 10/12/2018, the social networker admitted that nearly 30 million Facebook users were hacked. This is on top of the 50 million user accounts that Mark Zuckerberg’s company allowed Cambridge Analytics to steal.

Facebook did not apologize for exposing its users’ informationDuring the presser, Facebook did not apologize for exposing its users’ information but noted that it was cooperating with the FBI, the US Federal Trade Commission, the Irish Data Protection Commission, and other authorities on the data breach.

The attack involved the capture of Facebook “access tokens,” or digital keys that allow websites to recognize who someone is and keep them logged in. Using accounts they already controlled, the attackers used an “automated technique” to exploit Facebook’s “View As” functionality and steal access tokens for some 400,000 people. Hackers then used friend lists from those 400,000 accounts to obtain access tokens for another 30 million people (Here’s how to find out if you were hacked). Facebook tracked this hack to a change it made to its video uploading feature over a year ago in July 2017, and how that change affected View As.

Facebook confirmed on Friday that the hack compromised the personal and contact information of 30 million users. The compromised personal data includes:

  • Information sharingName
  • Phone number
  • Email address
  • Username,
  • Gender,
  • Locale/language,
  • Relationship status,
  • Religion,
  • Hometown,
  • Self-reported current city,
  • Birthdate,
  • Device types used to access Facebook,
  • Education,
  • Work,
  • The last 10 places they checked into or were tagged in,
  • Website,
  • People or Pages they follow and,
  • The 15 most recent searches.

rb-

Mozilla Firefox web browserI have been warning about the dangers of Facebook since 2011. I use the Facebook Container extension for Firefox to helps prevent Facebook from tracking me around the web. The Facebook Container is an extension to the Desktop Firefox 57 and higher (it does not work on Firefox for mobile).

The Facebook Container is a tool to limit what data others can obtain from you. It works by isolating your Facebook identity into a separate container that makes it harder for Facebook to track your visits to other websites with third-party cookies.

When you install the extension it deletes the Facebook cookies on the computer and logs you out of Facebook. The next time you navigate to Facebook it will load in a new blue-colored browser tab (the “Container”).

Facebook containerYou can log in and use Facebook normally when in the Facebook Container. If you click on a non-Facebook link or navigate to a non-Facebook website in the URL bar, these pages will load outside of the container.

Clicking Facebook Share buttons on other browser tabs will load them within the Facebook Container. You should know that using these buttons passes information to Facebook about the website that you shared from.

Because you will be logged into Facebook only in the Container, embedded Facebook comments and Like buttons in tabs outside the Facebook Container will not work. This prevents Facebook from associating information about your activity on websites outside of Facebook to your Facebook identity.

 Facebook Share buttons passes information to Facebook about the website that you shared fromIn addition, websites that allow you to create an account or log in using your Facebook credentials will generally not work properly. Because this extension is designed to separate Facebook use from use of other websites, this behavior is expected.

It is important to know that this extension doesn’t prevent Facebook from mishandling the data that it already has, or permitted others to obtain, about you. Facebook still will have access to everything that you do while you are on facebook.com, including your Facebook comments, photo uploads, likes, any data you share with Facebook connected apps, etc.

It is important to remember that other ad networks will try to correlate your Facebook activities with your regular browsing.

In addition to using the Facebook Container extension, you can further protect yourself from Facebook by changing your Facebook settings, using Private Browsing, enabling Tracking Protection, and blocking third-party cookies.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Security Vendor Consolidation Continues

Security Vendor Consolidation ContinuesThe private equity firm Thoma Bravo, LLC has announced (10/11/2018) they are acquiring NASDAQ traded cybersecurity firm Imperva for $55.75 per share in cash. Imperva develops DDoS protection (Incapsula), database security, (SecureSphere), and Breach prevention (CounterBreach) product lines — which protect websites, applications, APIs, and databases from cyberattacks while ensuring compliance.

ImpervaFor its third quarter of 2018, Imperva expects to generate revenues of $90.0 million to $92.0 million, the company revealed. The $21.B purchase further consolidates the PE firm’s role in the cybersecurity software and technology market. Thoma Bravo most recently purchased Barracuda Networks and owns a number of other software and technology firms including:

The purchase is not a done deal yet. The merger agreement provides for a 45-day “go-shop” period, during which Imperva’s Board and advisors may actively seek alternative acquisition proposals and enter into negotiations with other parties, the announcement disclosed.

Under terms of the Thoma Bravo deal, Imperva will delist and operate as a privately held company. The firm will keep its corporate headquarters in Redwood Shores, California, and continue to be led by its current executive team, both companies indicated.

rb-

Thoma Bravo is acquiring quite a tech portfolio.

Most recently they bought Apttus Corp., a contract lifecycle and digital commerce solution provider. Their portfolio has included brands such as:

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Russia Trolls Public Health

Everything you see on the Internet is trueHey here is a surprise – things on Facebook are fake. GovInfo Security is reporting that social media trolls sponsored by Russia have been actively stirring up the mindless vaccination debates. Researchers from George Washington University and Johns Hopkins University published their findings on (08/23/2018). They published a report, “Weaponized Health Communication: Twitter Bots and Russian Trolls Amplify the Vaccine Debate,” in the American Journal of Public Health. In the article, they based studied social media tweets collected from 2014 to 2017 on the vaccine debate.

Facebook profited from Russia-backed accounts trying to sway the 2016 U.S. presidential election

According to the research the Internet Research Agency, a company backed by the Russian government is at the center of the dis-information. The known Russian social media troll which specializes in online influence operations is linked to the spread of “polarized and anti-vaccine” misinformation via social media. The social media posts appear designed to undercut trust in vaccines. Such information could lead to lower vaccination rates and further contribute to a rise in mass outbreaks of measles, mumps, and rubella among children, among other viral infections.

How do anti-vaccine messages spread?

From 2014-2017, Twitter bots and Russian trolls disseminated anti-vaccine messages in trying to erode public consensus on vaccination in the U.S.

From 2014-2017, Twitter bots & Russian trolls disseminated anti-#vaccine messages in an attempt to erode public consensus on #vaccination in the US

The researchers’ review of anti-vaccine messaging on Twitter found the sources of disinformation are automated. There appears to be a steady stream of vaccine discussion being undertaken by social media bots. Social media bots are automated accounts. The researchers also identified and social media cyborgs’, that are hacked accounts taken over by bots. There are also social media trolls. Social media trolls are people who often disguise their identity and seek to sow discord.

The researchers also identified “content polluters.” Content polluters used anti-vaccine messages as bait to entice their followers to click on advertisements and links to malicious websites. The researchers contend that content polluters collate to high levels of anti-vaccine content. In the case of Russian trolls, however, their “messages were more political and divisive” and included both pro-vaccine and anti-vaccine content.

Trolls tied to Russia

Examples of Russian troll commentsTo identify accounts controlled by Russian trolls, the researchers used previously published information on Twitter accounts that intelligence agencies have tied to Russian government disinformation campaigns. As an example, CNN reports that one Russian troll account sent 253 tweets containing the #VaccinateUS hashtag among their sample. Among those tweets with the hashtag;

  • 43% were pro-vaccine,
  • 38% were anti-vaccine,
  • 19% were neutral.

By posting a variety of anti-, pro-, and neutral tweets and directly confronting vaccine skeptics, trolls, and bots “legitimize” the vaccine debate, the researchers wrote in the study. The researchers noted,

This is consistent with a strategy of promoting discord across a range of controversial topics, a known tactic employed by Russian troll accounts … One commonly used online disinformation strategy, amplification, seeks to create impressions of false equivalence or consensus through the use of bots and trolls.

amplification, seeks to create impressions of false equivalence or consensus through the use of bots and trollsThe prevalence of social media bots, trolls, and cyborgs – accounts in online discourse about vaccines threatens to skew discussions.  Researchers warn. “This is vital knowledge for risk communicators, especially considering that neither members of the public nor algorithmic approaches may be able to easily identify bots, trolls, or cyborgs.

The researchers found that the trolls, bots, and cyborgs goal is to create open-ended discussions designed to amplify online debates and disagreements. One tact cited in the article is rehashing discredited research published 20 years ago with fake claims of risks that have led to some parents opting to not vaccinate their children.

Threats from online misinformation

The threat from online misinformation is that even fewer parents will vaccinate their children against measles, mumps, and rubella. The researchers wrote that vaccine-hesitant parents are more likely to turn to the internet for information and less likely to trust healthcare providers and public health experts on the subject … Exposure to the vaccine debate may suggest that there is no scientific consensus, shaking confidence in vaccination. The researchers warn,

Recent resurgences of measles, mumps, and pertussis and increased mortality from vaccine-preventable diseases such as influenza and viral pneumonia underscore the importance of combating online misinformation about vaccines.

Russian troll use Facebook to amplify online disagreementsAmplifying debates over vaccines appear to be part of what ambassador John B. Emerson described as the Kremlin’s 4D campaigns – for dismiss, distort, distract and dismay. In a 2015 speech, Mr. Emerson warned that the Russian government was becoming more expert at running these types of propaganda campaigns.

Intelligence experts in the U.S. and Europe have warned that these Kremlin campaigns continue. In February, U.S. Director of National Intelligence Dan Coats warned the Senate Intelligence Committee that the intelligence community expected Russia to attempt to amplify existing divisions in U.S. society to spread chaos for strategic effect. Ambassador Coats warned,

At a minimum, we expect Russia to continue using propaganda, social media, false-flag personas, sympathetic spokespeople and other means of influence to try to exacerbate social and political fissures in the United States.

Anti-Bot research

Little research has gone into researching how to identify social media trolls or bots that influence online discussions. (rb- I covered some of the efforts underway to detect bots in 2016.) In 2015, DARPA ran a contest in which it asked researchers to classify whether a stream of tweets it had harvested about vaccines in 2014 were bots. Researchers were given a data set with more than 4 million messages harvested from 7,000 accounts, of which 39 were bots.

MIT Technology Review reported the winner, data science and social analytics firm SentiMetrix, correctly identified all the bots, with only one false positive. SentiMetrix was able to use an algorithm to  look for “linguistic cues” the poster was fake, like

  • Little research has gone into researching how to identify social media trolls or botTweets that used bad grammar,
  • Output was similar to other chatbots like Eliza,
  • Profile pictures that used stock images,
  • Numbers of tweets posted over time,
  • Unusual posting patterns,
  • Female username with a profile photo of a bearded man. (rb- Sound familiar? I wrote about some of these same steps in 2016)

The research led SentiMetrix to identify 25 bots, which enabled it to train a machine-learning algorithm to pinpoint 10 more. Despite such work, “the public health community largely overlooked the implications of these findings,” the Johns Hopkins and George Washington researchers say.

The impact of social media bots on the vaccine debates is not an abstract concern. The U.S. Centers for Disease Control and Prevention reports they are investigating 124 cases of measles across 22 states and DC, including Michigan. That’s already more than the 118 cases counted in the U.S. during all of 2017.

Spreading measles in Michigan

WOODTV in Grand Rapids reports that cases of measles in Michigan have hit a two-decade high. Angela Minicuci with the MDHHS told WOODTV the state has “tallied 10 cases of measles so far this year — the highest case count since 1998.

The CDC says low vaccination rates are to blame for recent measles outbreaks. They report the majority of those who contract measles, which is highly contagious, have not been vaccinated.

One reason so many are at risk of spreading measles is that 18 states allow parents to opt-out of vaccinating their schoolchildren for non-medical reasons. In June 2018 researchers found  multiple “hotspot” areas,” at high risk for vaccine-preventable pediatric infection epidemics.” Included in these hotspots are Detroit, Troy, and Warren, Michigan. The DetNews reports these areas had more than 400 kindergartners receive the non-medical vaccination exemptions.

Grand Traverse AcademyIn 2017 an outbreak of measles and whooping cough forced Grand Traverse Academy in Traverse City Michigan to close for a week. Grand Traverse County has one of Michigan’s highest rates of schoolchildren opting out of vaccines — twice the state average and six times the national rate for kindergartners in 2013-14.

The problem is not limited to the United States. In Europe, there’s been a “dramatic increase” in measles infections. WHO says there were 23,927 cases of measles in Europe during 2017 and 5,273 in 2016.

rb-

They want you to ignore the truthRenée DiResta, who researches disinformation online at Data For Democracy, pointed out the obvious,  “This isn’t just happening on Twitter. This is happening on Facebook, and this is happening on YouTube, where searching for vaccine information on social media returns a majority of anti-vaccine propaganda,”

She says. “The social platforms have a responsibility to start investigating how this content is spreading and the impact these narratives are having on targeted audiences.

The Russians want us focused on our own problems so that we don’t focus on them. 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.