Comments

wiredog December 7, 2023 7:17 AM

“Now that this method has become public we are updating our transparency reporting to detail these kinds of requests.”

I wonder what the chances are that someone at Apple leaked what was going on to a Senate staffer? And the chances that Apple’s higher-ups knew about it?

I’d say “almost certain” and “pretty high”.

Clive Robinson December 7, 2023 8:39 AM

@ ALL,

As noted in the last paragraph of the Reuters article,

‘Earlier this year French developer David Libeau said users and developers were often unaware of how their apps emitted data to the U.S. tech giants via push notifications, calling them “a privacy nightmare.”‘

Yup not just a nightmare, but for many now a “lifelong” one…

To me, it’s been obvious all of this century so far hence my no personal email, social media, messaging apps and the like, and me saying continuously they are a bad idea.

At the very least for “push” to work some central point has to know exactly where your device is all the time.

In essence this is the case for all end to end mobile communications, that move from node to node in a communications net. You need a “Rendezvous Protocol” to permit leaf nodes such as mobiles to reach each other trying to make these protocols anonymous to “observers” is well neigh impossible.

Whilst similar applies to “pull” you as the holder of the mobile can chose the time and place you “connect” to a central service.

On analysis of “traffic” you will probably find that most of your data based communications do not need to be “Push” in the slightest. Further “Push” is bad for your mental health, especially if it disturbs your sleep and rest patterns that are essential for bodily physical health.

Major US Social Media Corps are well aware of these health issues, but they also know that “Push” becomes like an addictive drug, and you become hooked and drawn in thus exploitable. Which is why almost everything these days “requires” that you sign up for “Push”.

People still wonder why I won’t “sign up” to such nonsense, and some have rather less than implied I’m paranoid or not a team player etc in the past[1].

The point is in most Western Nations you have a right to a private home life and the peace and quiet that should go with it.

It does not matter is it’s Law enforcment, an employer, or corporation or obnoxious/stalker type, it’s recognised that you have a right to a private life that should not be abused.

Push technology is fundamentally an abusive process on it’s own. The fact others want to hitch onto that bandwagon and abuse you even further for their own profit at your expense, should tell you why you should not alow it, no matter how much “think of the children” dressing up they give it, they want it to abuse you or others, treat them like you would someone who abuses children and they might start getting the message.

[1] I’ve also had fun telling micro manager type Bosses that “my phone etc” is “personal thus private” and not for “work, work related, or their conveniance” with the important “and the law agrees with this viewpoint”. So if they want to be in contact outside of paid work hours, then they had better pay for the privilege in a form that I find equitable.

Apparently I’m not a “team player” etc etc to which I have responded “nor am I a doormat” 😉

yet another bruce December 7, 2023 9:30 AM

@Clive

I expect you can also “pull” through TOR or similar for additional privacy. It seems like you should be able to construct an obfuscated “push” protocol along the same lines as TOR.

JonKnowsNothing December 7, 2023 9:48 AM

@wiredog, All

re: I wonder what the chances are that someone at Apple leaked what was going on to a Senate staffer?

(USA) Our congressional security committees, Congress and Senate, would know about this without having someone at Apple leak it to them. They would be fully briefed by the 3Ls (CIA, FBI, NSA) about how this works. The FISA Courts would know too.

Within these committees is a Security Clearance ranking. The farther up you go in rank, the more information is disclosed. As you move farther up in rank, there are sub-sets of the committee getting restricted information. Anyone below rank is Not Invited.

As you move up in rank, the amount of information that can be disclosed publicly gets limited. These are “security issues” and the public is not supposed to know, because if it’s “public” then everyone knows and well….

This is one reason why some of the most prominent members, who challenge the 3Ls and their extensions, do not seek higher security rank as it would inhibit what little they are able to disclose by “hints” during the official 3L Q&A meetings and reports.

So, the committees more than likely know. They know how it is used, not necessarily how it works past a Simple Simon 1 page presentation slide. They cannot tell anyone outside of the proper ranking.

Apple knows too. So do all the telecoms that process the data packets. So do all the other services and hardware providers of big routers and gateways.

It’s likely to have gone on for a long time.

Geordie W Korper December 7, 2023 10:30 AM

Based on my understanding of push notifications, unless the app developer willfully ignores Apple’s recommendations this isn’t all that big an issue. A well designed app would only send an encrypted transaction id or similar in the push notification. Then the application uses that id to retrieve the real data from their own servers. Knowing that there was a notification has some small value but it’s only a very tiny part of the puzzle. It’s certainly not on the same level as call detail records.

J-R Conlin December 7, 2023 11:30 AM

The pubic RFC Webpush standard requires encryption. (I’ll note that Firefox has always supported just the Webpush standard.)

Google and Apple both support WebPush (Apple is a bit late to the party, but none the less.)

In short, folk, use the standards. You don’t get all the whizzy junk, but folk also don’t get to spy on you and your customers.

Stevie December 7, 2023 12:01 PM

When you get a push notification on your Apple or Google phone, those notifications go through Apple and Google servers. Which means that those companies can spy on them

No, it doesn’t mean that; implementation choices by Apple and Google mean that (free choices, outside of China and a handful of other countries). Different choices could make it so that they couldn’t understand the notifications going to any particular user (as Geordie and J-R said), or even so that the companies couldn’t know which exact user it’s going to (as “yet another bruce” said).

This isn’t even new technology; does anyone remember the “Pynchon Gate” proposal from 18 years ago? Since then, zk-SNARKs and zk-STARKs have been developed, and Apple’s got “Private Relay” servers, all of which could be helpful.

John Beattie (jkb) December 7, 2023 1:46 PM

@Stevie

Agreed. The information is the metadata, i.e.

who gets notifications from what app when.

Clive Robinson December 7, 2023 2:52 PM

@ yet another bruce,

“It seems like you should be able to construct an obfuscated “push” protocol along the same lines as TOR.”

Push to where…

The problem is a mobile device could be connected to any node in the network so two mobile devices would have no knowledge of where the other is.

The only practical way for them to establish any kind of device to device communications when there is more than just a handfull of devices or nodes is through a central service at a known node. The mobiles say who they are and where they are every so often and the central service updates the information held about the mobiles status in a central database[1].

A similar way would have to be done with TOR which means “state information” has to be,

1, Kept in a database
2, The database is known
3, The database service can be served with legal papers etc.

I’ve spent some years off and on trying to make such a service “fully anonymous” and so far there is always a “thread” lrft hanging that authoritarians can “pull at” one way or another.

Which is why I switched my thinking to the use of an anonymous broadcast service rather than a central database. The problem is now how to get the traffic levels down.

[1] In practice though mobiles “go missing” in the central database for a number of reasons, and to get around this the database is in fact partially distributed to limit the lost device and times of peek or disrupted traffic sudden power loss etc. That is each node maintains a list of the mobiles currently and previously connected to it and how they were disconnected –hand-off, reconect time-out– going back some hours in time, this way location data becomes not just more reliablw but of a lower priority on the network compared to traffic that earns revenue. So if a mobile missing in the central database gets such profit earning priority traffic for it the network tries the last known node in the central database first, then walks the nodes around that node looking for the mobile or refrence to it in those node lists with their hand-off information, untill either the mobile is found or it’s last known location is. When a mobile becomes re-connected to a node after service loss, it sends it’s location as a higher priority. The downside of this is that it chews through the mobile battery looking for a node, which is why those “Faraday-bags” are not such a good idea from a users perspective.

Stevie December 7, 2023 4:49 PM

A similar way would have to be done with TOR which means “state information” has to be,

1, Kept in a database
2, The database is known
3, The database service can be served with legal papers etc.

If that database is zero-knowledge, the legal papers won’t help them. If it’s sufficiently distributed, and the user switches “notification targets” constantly, they won’t even know whom to send the papers to (and if international, that complicates legal attacks). For what it’s worth, I’ve been running non-exit Tor relays for upward of a decade and have never heard anything from anyone about them—maybe because its “database entries” rarely live for more than a few minutes.

The real challenge is to do any of this very quickly. For whatever reason, most cellphone users seem to want to know within seconds when someone sends them an e-mail or “likes” something they posted. It’s not gonna work with the Pynchon Gate’s 24-hour cycle, and even most blockchains are too slow (nevermind the cost). I suspect any such system will end up looking like the “anonymous broadcast service” you’re describing, though probably more “multicast to anonymity groups” once optimized.

Clive Robinson December 7, 2023 6:49 PM

@ Stevie,

“If that database is zero-knowledge, the legal papers won’t help them.”

I’m not entirely certain you understand all that a “Rendezvous Protocol”(RP) has to do and why.

It’s intent is to provide information about a first party to a second party so the second party can have communications with the first party in a timely and reliable fashion, for all accesses.

For a RP you therefore have to assume the general case that,

1, Neither party has had direct or indirect contact, so no “Root of Trust”(RT) has been exchanged.

2, All signalling traffic should be uniform to avoid creating distinquisher meta-data.

3, All user devices are continuously transient from network node to network node (mobile phone in a car etc).

4, Network Signalling Traffic has to be minimized, otherwise signal trafic will consume available network bandwidth. At an increasing rate of N for a centralised system and ~N^2 for a mobile to mobile system, where N is the number of mobile devices.

5, All parties need fast access to the information. So the design of a distributed system is constrained and at best forms an optimal tree structure with minimal layers thus minimal access nodes.

6, Assume that the adversary can find and monitor all access nodes even with Tor.

After “first contact” and an exchange of “roots of trust” the constraints could in theory be eased up. But then you introduce a “distinguisher”(2) into the system and that is realy bad for security. Put simply no matter how you try to hide a distinguisher, the chances are there will be a “side channel” you can not stop or mitigate and worse there may be a deliberate “subliminal channel” put in that you have no chance of finding or stopping even with full transparancy[1]. This is in part because you will be unaware of such channels, in part because of timing, in part due to power signiture, in part… and the list goes on as you go up the stack from the physical layer to the point where the mathmatics says “You are so out of luck”.

[1] Have a look at the work that’s now a quater of a century old on “Cryptovirology” by Adam Young, and Moti Yung, which can be seen as a follow on from the works of Shannon and Hartley back pre WWII that founded “Information Theory” in the 1960’s that gave rise to the realisation that “Redundancy” was key to communications, but with it came perfect secrecy, channels within channels and in the 1970’s through to early 1980’s with Gus Simmon’s “Prisoner Problem” that has given us his “Subliminal Channels” which can be seen as the use of perfect secrecy to create a channel within a channel even the NSA et al can not demonstrates exists. As far as I’m aware all mathmatics used to create currently known Public Key systems are vulnarable.

vas pup December 7, 2023 7:00 PM

@Bruce – just got error message – too many posts in a short time and my post

was not posted.

Please me enlight on the following:
1. What is this limit of the post per blogger per time – number, size, both?
2. Is 1. applied equally to all bloggers or there tiers on this?

Thank you.

PS. Post was within nature and policy of the blog and source was bbc site.

I hope deep state did not put their finger on that.

5.58 PM CST, 12.07.2023

Stevie December 7, 2023 8:12 PM

I’m not entirely certain you understand all that a “Rendezvous Protocol”(RP) has to do and why.

I’m not entirely sure I do either. But I do disagree with some of your assumptions. For example, in point 1 that “no Root of Trust has been exchanged”. The Tor network has central servers (together being the “root of trust”) giving out the relay addresses and public keys; a user can therefore have trust anchors for relays they’ve never communicated with, unless you count the relay list itself as “indirect communication”.

Then there’s “Assume that the adversary can find and monitor all access nodes even with Tor”, its counter-assumption being explicitly called out by Tor developers as important for Tor’s security. In other words, your assumption is very close to “Tor is totally broken”. I recall you being quite critical of it, so maybe that’s your exact assumption, but it’s not a consensus view here.

I’m considering the cellular layer to be out of scope, perhaps handled by something like Pretty Good Phone Privacy or perhaps totally insecure (as we consider home internet connections to be). My understanding is that the “push notifications” we’re talking about are going from app-developing companies to end users, through insecure networks (internet, then cellular), and the discussion is about how some reasonable security can be added—even if it’s not perfect.

If we hypothesize a system based on Tor, we’d have tiny bits of data being stored at relays. Which I guess is already kind of the case, with a distributed hash table holding onion service “introduction points”. The user’s phone would tell a service where to put its notifications, and would watch there for a while until rotating to another node. To whom would one issue a legal order to get the notifications? Apple and Google aren’t involved at all, the relay operators are all over the world, and the data’s gone after maybe tens of minutes. The handful of central servers is tempting; but they’re independently operated, designed to detect their counterparts “going rogue”, and hold no non-public data, so what exactly would one order them to do?

That pushes the problem to the app companies: legal processes will go to them (many being in California), unless they take further steps to avoid knowing whom they’re sending these notifications to—steps most won’t take. So the above text is merely a half-baked sketch of a possible design to partially eliminate the two “juiciest” targets. I think that’d be a useful step anyway; Apple and Google shouldn’t have any more information about the end-users of their operating systems than a fridge-compressor manufacturer has about fridge users.

If you do manage to come up with a better system, we can switch to it later, especially if people have come to expect privacy. The campaign to get HTTPS on all popular web sites didn’t try to solve the Certificate Authority problem; but it was useful, and Certificate Transparency and CA audits were happening in parallel, and I don’t think we’ll be going back to “Plaintext Everywhere”.

Clive Robinson December 7, 2023 9:52 PM

@ vas pup,

“just got error message – too many posts in a short time and my post”

If it contains the number 29, then that has been found to occur –we think– when two people post close enough in time for the blog software to choke…

Grnerally hit your browser back button, to get your original back, make one very small change like add a space, punctuation mark, letter, word or conversly take one away (just to beat the “hash” process of you’ve tried to post twice) wait fpr about a minute and then post again and it usually goes through.

ResearcherZero December 7, 2023 10:23 PM

You can unload/disable push services if you do not require it. Android for instance will often enable push service again after an update. Uninstalling push is a little bit of a hassle, but can be done. It would be far simpler to anonymise such services and encrypt them for the sake of security and privacy, and to prevent companies and governments from automating the process of analyzing and summarizing large volumes of data.

By My Eyes
https://www.nytimes.com/2023/07/18/technology/openai-chatgpt-facial-recognition.html

Recognize Specific Individuals

‘https://openai.com/blog/chatgpt-can-now-see-hear-and-speak

As Microsoft said, “Soon there will be a Copilot for everyone and for everything you do.”

Almost Ripened December 7, 2023 10:29 PM

One thing Bruce mentioned in one of his books and on this blog in the past which is often overlooked is that citizens modify their behaviour once they become aware of the all pervasive surveillance.
Namely, self censorship has started shaping our societies and is slowly but surely leading us towards totalitarianism

Cyber Hodza December 7, 2023 10:52 PM

Has anyone actually done any studies on benefits of surveillance be it to national security or for corporate interests? Could it be that the governments and multiple corporations are being sold snake oil with these omnipresent products by other companies which have run out of anything useful to sell?

Clive Robinson December 7, 2023 11:15 PM

@ Stevie,

“The Tor network has central servers (together being the “root of trust”) giving out the relay addresses and public keys”

You realy need to read the work of Gus Simmon’s on Subliminal Channels,

https://en.m.wikipedia.org/wiki/Subliminal_channel

And the work of Adam Young and Moti Yung on Cryptovirology their book is an easy read,

https://books.google.com/books/about/Malicious_Cryptography.html

“I’m considering the cellular layer to be out of scope”

I was not talking about “mobile phone networks” in particular but ALL networks with nodes to which devices that are “physically mobile” can attach to and still commubicate whilst moving thus have a hand-off or hand-over process from node to node. You can build such networks with WiFi, Bluetooth, LoRa etc, even Zigbee if you have the patience.

Thus the physical layer and layers above is a foundation, if it is “unsound” then all built upon it is like as not unsound as well though it may not be immediately visable.

“Then there’s “Assume that the adversary can find and monitor all access nodes even with Tor”, its counter-assumption being explicitly called out by Tor developers as important for Tor’s security.”

Those are the limited number of nodes to the central database. And yes they can be found and monitored in various ways. One such is by observing the thermal drift of the server CPU XTAL visable at the physical level and higher levels of the networking prorocol. I’m not going to go into the fun of Traffic Analysis again, There are reasons I advise against Tor and low latency is one of them. As for,

“it’s not a consensus view here.”

Where is “here” and remember there have been many many occasions in history where the “consensus” was wrong, such as the Earth being flat, or the center of the universe. The fact that some still chose to believe in an outdated and wrong consensus is shall we say a matter of whimsy.

Once a physical server is found an NSL can be presented to the owner or operator if in the US. Similar can be done in other countries. I’m not going to debate the legal niceties the fact that in the article Apple is quoted as saying,

“In this case, the federal government prohibited us from sharing any information”

Indicates that if the DoJ or FBI decide that records must be kept and kept secretly and made available to them or people will get unpleasent penalties, then few will say no.

Freddy December 8, 2023 3:17 AM

So I am not as technical as you guys are, but what is the exposure here? Are we looking at apps like Signal for example, and you receive a push notification about a new message. Does the data they are asking for within that push notification simple meta data like “Signal notification at 12/7/23 at 12:10am text message”? Or does it contain a preview of the photo, video or text you may have received that the notification shows? I guess I am asking how BAD is this? I also read that having Advanced Data Protection (iOS) on makes you immune to this.

My second question is since iMessages are E2EE, but LE can request iCloud back ups from users and can read iMessages that way. If myself and my neighbor were sending iMessages, but only one of us had ADP on, does that mean that LE can subpoena my neighbors iCloud backups and see our full conversations since one of us don’t have the ADP on?

Thanks for your patience and explanations.

Jason December 8, 2023 10:38 AM

Along with @Freddy

I turn nearly all Push Notifications OFF at the OS?? level. (i am generally not interested in the pizza coupon or that my package is 47 stops away)

When I do this, does it
1. Tell the App vendor not to push a notification to the Apple/Google Service
2. Tell the A/G Service not to accept a push from the App vendor
3. Tell the A/G Service not to forward the push to my device
4. Tell my device to not accept the push from the service
5. Tell my device not to show me the push notification

I imagine it’s 5.

Messeage sent. Message “acquired” by 3rd party (definitely not “collected”). Message received by person of interest. Who cares if it was ignored, the POI possesses the message.

Stevie December 8, 2023 1:50 PM

Clive,

“Here” was referring to the comment section of “Schneier on Security”; and Tor may well be totally broken, but I don’t find it reasonable to take that as a general assumption. I’ve downloaded the books you mentioned and will look up the papers, but will probably not be the person to develop the “perfect” protocols.

Regarding “thermal drift”, while I read the “hot or not” paper too, I’m talking about Tor relays (not client nodes). Look for the “cached-microdesc-consensus” file in any Tor installation, and you’ll have the full list (excepting “bridges”, which are only used for the first hop). The IP addresses and sometimes e-mail addresses are right there; but to whom would one send National Security Letters to break the system, and what exactly would such letters request?

Stevie December 8, 2023 1:56 PM

Actually, Sci-hub is just giving me a blank page entitled “DDoS-Guard” today, and most of the links from Wikipedia are dead (dsns.csie.nctu.edu.tw isn’t loading, and archive.org’s most recent snapshots are 404 pages), so I’m not gonna be able to view most of those papers unless someone provides working links.

Jennie December 8, 2023 7:32 PM

Could someone explain in what cases are these push notifications used? How would you know if you are using them?

Gilbert December 8, 2023 7:59 PM

What this shows is you CANNOT EVER, EVER, EVER trust any third party which is seeing packets or anything pass through them. Apple. Google, Microsoft, your Internet provider, your phone provider. Anything that is on the route CANNOT be trusted. It must be encrypted on the device, and only be decrypted on the end-receiving device at the very end. Any information going into a network can, and will, be captured.

I have been discussing phone technologies with a friend who works for a major chip designer. He explained to me that you cannot sell a phone in Europe unless it uses components for the radio-part that are approved by Europe. All the chips that receive the radio signal, before they give the data to your phone, MUST be approved. He told ne, and I have on idea how to verify if this is true, that EVERY approved chip can be contacted through the radio signal from outside (the towers that send signals to your phone) to turn on a “reply-back signal” that can be used to pinpoint the exact location of your phone (which does not happen in the normal use of those chips, and phones).

if it’s true, then there’s nothing we can do. Our phones are directly rooted by governments because they only allow on the market chips that have those “doors” installed. Those chips are the link between the phone and the radio signals received and emitted. Which is the perfect place to put backdoors. Your phone, its CPU, its operating system, there’s nothing they can do to counteract this. It happens on the chip and that chip is wired to the antena itself.

Strange December 8, 2023 11:26 PM

@Gilbert
All the chips that receive the radio signal, before they give the data to your phone, MUST be approved. He told ne, and I have on idea how to verify if this is true, that EVERY approved chip can be contacted through the radio signal from outside (the towers that send signals to your phone) to turn on a “reply-back signal” that can be used to pinpoint the exact location of your phone (which does not happen in the normal use of those chips, and phones).

if it’s true, then there’s nothing we can do. Our phones are directly rooted by governments because they only allow on the market chips that have those “doors” installed.

Would like to know more about this. For example, if pinpointing the location of the phone is the only possible use case of that ability?

Clive Robinson December 9, 2023 5:13 AM

@ Gilbert, ALL,

“What this shows is you CANNOT EVER, EVER, EVER trust any third party which is seeing packets or anything pass through them.”

As they old saying has it,

“Trust ye not, lest ye are betrayed”

Which is a shortening of what you find in the King James Bible,

“Trust ye not in a friend, put ye not confidence in a guide: keep the doors of thy mouth from her that lieth in thy bosom.”

Which some say is the prayer of spycraft, conspiracy and other villany.

But “third party”, heed well the words of, Benjamin Franklin,

“Any three may keep a secret if two of them are dead”

Second party betrayal is as common as mud beneath water. Most know of the story of Judas Iscariot and the “Thirty pieces of silver”. In fact the law encorages it with “Turning King’s/States Evidence” and some claim that is all the US Justice system is these days.

So with regards,

“It must be encrypted on the device, and only be decrypted on the end-receiving device at the very end.”

Of “End to End Encryption”(E2EE) whilst a very necessary minimum it is insufficient as a third party can turn a second party against the first party. You need deniability as well, which most encryption will not give you, in fact in most cases it will put the noose around your neck, which is why the UK “Regulation of Investigatory Powers Act 2000″(RIPA 2000) has serious penelties for not handing over encryption keys “upon request”[1]. Which many orher countries have no enacted similar.

Thus you need an encryption system that provides “Deniability against betrayal”.

Conventional “short key” encryption systems do not give this. As a rule of thumb, two blocks of a block cipher, or a little over 25 characters are enough to prove beyond reasonable doubt a second parties claim that they have the decryption key to the encrypted message you sent that the third party already has from the “Over The Air”(OTA) or Network.

Thus you need a system where you can have full communications deniability even though encrypted. The only system that most know of that gives you this is where the key works on a bit by bit basis and the bits are kept fully independent of each other thus the key is at least as long as the plaintext message. Such systems are more generally called “One Time Pads”, and have Claude Shannon’s “Perfect Secrecy” as the “unicity distance” is atleast as long as the key, and thus any and all messages under that key are “Equiprobable”.

Further you can also use Gus Simmons’ “Prisoner Problem” idea to put a low bandwidth “Perfect Secrecy” “covert channel” into a normal “Plaintext message”.

Such a “subliminal channel” has two advantages,

1, You cannot prove the channel exists from just the plaintext.
2, You can not prove the channel exists even with the key due to the equiprobability of perfect secrecy.

So providing you take other “real world” precautions the second party beyrayal gets the third party no “Kings evidence” that a prosecutor can use.

[1] Apparently Tony Blair and David Blunkett, were not prepared to “listen to experts” especially those who pointed out that being sent an encrypted message was in no way indicative that you had the key. Thus RIPA was a “God Send” to set anyone up…

Anyway nearly two decades later one of the two started having misgivings about the UK “Guard Labour” in the forms of “Security Services” and “Law Enforcment” going way way beyond what Parliment had envisioned,

https://www.theguardian.com/world/2013/nov/04/david-blunkett-review-laws-security-services

Judges however have treated this aspect of RIPA with a very long barge pole so far, but at the end of the day they are human and subject to pressure or inducement…

Clive Robinson December 9, 2023 6:22 AM

@ Gilbert,

Re : Mobile as a locator.

“Would like to know more about this. For example, if pinpointing the location of the phone is the only possible use case of that ability?”

It’s kind of true, but it’s not an illicit backdoor it’s built into the GSM standards and US legislation and has been for a very long time.

All done for “Health and Safety” reasons as I’ve indicated several times over the years on this blog.

What your friend may be talking about is an SMS(0) also called “SMS Type 0” or “Silent SMS” message. In effect it’s an SMS to the SIM not the user part of the phone. The phone sends back an empty reply. However the GSM physical network knows where you are to within a few meters even without GPS. So after the SMS(0) your phone position at the time of the reply is known to the network. That can be found by interegating via “Signalling System Seven”(SS7) from just about anywhere in the world as it requires no authentication…

But, prior to the US passing legislation mandaiting GPS in mobile phones fore “Health and Safety” reasons (so “First Responder” Emergency Services” could find your overturned car etc etc etc). Most mobile phones did not have GPS built in, and many 2G phones for the “Third World Market” which is extraordinarily price sensitive still don’t. Not that GPS matters that much, the phone network can generally pin you down within a comparable or lesser distance in urban and city areas (sometimes way better than GPS can).

If you doubt what I say as others have done in the past just look it up on the Internet and you will find many recent articles such as,

https://www.firstpoint-mg.com/blog/step-by-step-silent-sms-attacks/

But further, if you want something to make your blood pressure rise, long long before mobile phones were even thought of the “Plain Old Telephone System”(POTS) land lines had “operator listen in” as an unavoidable feature of opperation. This so upset an undertaker that he used a “collar box” and matches to design the “fickle women” out of the phone networks.

However the “operator listen in” was kept, because it was a usefull feature… Look at all phone standards since and somewhere you will find this feature as a requirment, again argued for “Health and Safety” reasons. But used by the likes of MI5 et al to “listen in”. All mobile phones have this feature, but… with the added advantage that a call does not have to be in progress. So your mobile is also a bugging device for “spying” not just location “surveilance”.

It’s argued that “there is no warning or defence” against such attacks. This is actually not true.

Whilst you can not –always– see from the “smart” part of a phone SIM to mobile network traffic you certainly can see the radiated signal from your phone with a “crystal detector/receiver” or even a very cheap AM radio.

GSM sends out data not as a continuous stream but as time sliced bursts. The envelope of such a signal can be picked up with a simple “Diode TRF receiver” or “Envelope Detector. Thus you can build with basic electronics a device you can have attached to your phone via a rubber band that gives out an audio alert when it detects a near by GSM signal like your phones TX.

If you have a hunt on the Internet you will find that Ed Snowden and Bunny Huang worked together on what they called their “Introspection Engine”,

https://boingboing.net/2017/09/08/impaired-judgment-phones.html

The problem was four fold,

1, It only worked on Apple 6 phones 2, By warranty voiding direct electrical connection.
3, That could be found by the likes of airport scanners.
4, Which would be a very big red flag to trained security personnel.

It’s why I prefer a cheap AM/SW radio as many travelers take such items with them on holiday. Thus they are of lower security risk.

Winter December 9, 2023 7:27 AM

@Clive

“Trust ye not, lest ye are betrayed”

If you trust no one, you will die soon. Paranoid people end up in a cabin in the woods dying from starvation, exposure, or other preventable afflictions.

Clive Robinson December 9, 2023 8:01 AM

@ Winter,

“If you trust no one, you will die soon.”

Two things,

First as I said it came via the King James Bible (take from that what you will 😉 and I did say spies, conspiritors and villany of which I hope you think none apply to me 0:)

Second is the library index logic problem of “Does the master index refrence it’s self?”.

Because if it does, then “If you trust no one” that logically includes oneself…

Now all we need is a “Taleb” to hove over the horizon.

Winter December 9, 2023 8:21 AM

@Clive

First as I said it came via the King James Bible

I agree, the bible is not good for life advice. And a politically motivated translation is not commendable at all.

Because if it does, then “If you trust no one” that logically includes oneself…

That is indeed what scientists are taught: Do not trust yourself. Be like the goddess of Justice and do your experiments (double) blind.

I would say, Trust but Check.

Jelo 117 December 9, 2023 1:02 PM

@ Winter

I would say, Trust but Check.

Seymour Papert would probably agree.

Was this a subliminal channel message ?

Winter December 9, 2023 1:22 PM

@Jelo

Was this a subliminal channel message ?

I don’t believe subliminal channels are that effective.

Clive Robinson December 9, 2023 4:38 PM

@ Winter,

“I don’t believe subliminal channels are that effective.”

They work for two basic reasons,

1, Information requires redundancy to be sent.
2, Any redundancy can be treated as a set of subsets.

Claude Shannon showed both of these properties, a decade or more before “information theory” became a named domain of study in the 1960’s.

He also more famously showed what was required for encryption that had certain important properties. Often called the “One Time Pad” people make claims of it being “unbreakable” which is not actually true. You can break the OTP by a simple exhaustive “Brut Force” search, but you can not tell which of all the messages you get is the correct one, that is they are all “equiprobable”.

Unfortunately many do not understand this, and make one of several basic mistakes, the most oft given is “key re-use”. What is less well known or talked about is that the plaintext messages themselves may not be equiprobable. For instance if we know that the plaintext is actuall “English Clear Text” then most messages can be removed leaving only a small subset that are still at that level equiprobable.

Then we “might” have further semantic distinquishers that we’ve been given as part of a second party beyrayal “might” reduce the subset further[1]. Further a second party betrayal of the key whilst it can not be trusted ordinarily can sometimes be pre-correlated with the later actions of the first party.

If you look at Gus Simmons’ “Prisoner Problem” you will see how the first two points can be used to create a secondary or side channel with “perfect secrecy”.

I’ve previously described how you can use semantic redundancy in the likes of salutations to send just a few bits protected by perfect secrecy in a open English clear text message, and even with the alledged key from a second party betrayal you can not prove the channel exists.

[1] Note the use of “might”, most OTP systems are “bit by bit” stream ciphers. As such they are subject to “bit flipping attacks”. If you have English Clear Text with a numerical or xor based checksum appended then it actually serves no purpose. Because you will always find a pattern of bit flips that will change the message to what ever you wish, and likewise change the checksum to match correctly. So why “might” well sometimes message content correlates with other information outside of the communications channel.

Winter December 10, 2023 2:29 AM

@Clive

You can break the OTP by a simple exhaustive “Brut Force” search, but you can not tell which of all the messages you get is the correct one, that is they are all “equiprobable”.

You can easily use OTP to send send a subliminal message. Encrypt your message any way you want. Then use the resulting random looking crypttext bits as the OTP key for some shared bogus plaintext message.

On receipt, the plaintext bogus “secret” is used to extract the real crypttext. If challenged to decrypt the original subliminal channel, you present the real crypttext as OTP key. The challenger then discovers the bogus message. There is no way to see that there is another message in the OTP key itself. And this scheme can be bested as deep as you want.

But is this effective?

Clive Robinson December 10, 2023 3:47 AM

@ Winter,

Re : Subliminal channels

“But is this effective?”

You need to Define “effective” otherwise the answer is going to be yes for some and no for others.

For instance the redundancy in a PQ PubKey is very high. This enables you by a search process to generate a PQ result where the most significant bits are set to some value you’ve chosen.

It’s not difficult to see how you could use this to covertly reveal the start point for a search for one of the primes.

Thus with a litle over fourty bits selected a billion year or more search becomes an hour or so…

Put that in an obfuscated way into closed source software and you’ve got yourself a “Golden Key Backdoor”.

We know from the debacle that started back in 2004 over the Dual EC_DRBG that “the NSA effectively backdoored” that such things are highly desirable to some.

https://blog.cryptographyengineering.com/2015/01/14/hopefully-last-post-ill-ever-write-on/

Winter December 10, 2023 4:28 AM

@Clive

You need to Define “effective” otherwise the answer is going to be yes for some and no for others.

The poster child is steganography. So some bandwidth would be nice. 40 bits per message is good for specific tasks but requires you to design and test a completely new system for every application, or even message.

But using encryption is already very complex and brittle. Any small error in design or implementation and the whole system breaks down and messages are not secure or unreadable (as you are tirelessly explaining time and again).

Adding a second layer of subliminal channels just compounds this complexity and brittleness.

There are many ways to intentionally or unintentionally mess up key selection and initiation vectors as we have seen before (and you also have pointed out often). Subliminal channels do not seem to particularly special in this respect.

Therefore, I am still unconvinced that subliminal channels are really effective and worth the effort outside niche applications.

Put that in an obfuscated way into closed source software and you’ve got yourself a “Golden Key Backdoor”.

When you use closed source software for your cryptography, you are beyond help anyway.

Matt December 12, 2023 6:02 PM

So when you get a text message on your phone and that triggers a notification on your lock screen. Does that notification about the SMS flow through the surveillance servers?

Leave a comment

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.