Comments

Clive Robinson March 21, 2025 10:48 AM

@ Bernie, ALL,

With regards,

“I see the potential for this to backfire as many folks roll their own cryptography.”

Yup and some people are waving red flags about as well as ringing the bell…

Have a read of,

Post-Quantum Cryptography Is About The Keys You Don’t Play

https://soatok.blog/2025/03/17/post-quantum-cryptography-is-about-the-keys-you-dont-play/

“Post-Quantum Cryptography is coming. But in their haste to make headway on algorithm adoption, standards organizations (NIST, IETF) are making a dumb mistake that will almost certainly bite implementations in the future.

Sophie Schmieg wrote about this topic at length and Filippo Valsorda suggested we should all agree to only use Seeds for post-quantum KEMs.”

Who? March 21, 2025 11:10 AM

@ Bernie, Clive Robinson, ALL

OpenSSH has been using for years a combination of classic and post-quantum cryptography for the KEX stage; this way, if our choice of post-quantum cryptography is demonstrated to be weak, we have at least the old classical algorithms backing our communications.

I would not “just move” to post-quantum cryptography; I would add a second encryption layer while using classical algorithms well tested on-field.

Hendrik Visage March 21, 2025 11:17 AM

May I ask the obvious question that nobody seems to ANSWER: What algorithms had been broken/cracked/etc. by “brute force”/etc. using quantum technology, and how long did it took? Had it been repeatedly done in reasonable times?

Just asking before the scare

Clive Robinson March 21, 2025 11:42 AM

@ Bruce, ALL,

Is “Quantum Computing”(QC) over rated?

The hype of “Quantum Computing” is fairly well known for various reasons. Not least because of the two issues of,

“Classical and quantum researchers compete using different strategies, with a healthy rivalry between the two. Quantum researchers report a fast way to solve a problem —often by scaling a peak that no one thought worth climbing— then classical teams race to see if they can find a better way.

This contest almost always ends as a virtual tie: When researchers think they’ve devised a quantum algorithm that works faster or better than anything else, classical researchers usually come up with one that equals it.

From : https://www.quantamagazine.org/quantum-speedup-found-for-huge-class-of-hard-problems-20250317/

It raises the,

“What practical mass market benefit will QC have?”

Which if the “little to none” view holds would in effect kill it off as a commercial activity.

But then there is the “metric shit-ton” of hardware issues that has kept us down to just a handful of Qbits barely enough to factor a two digit number. Where as best guess estimates say we will probably need as a minimum in the hundreds of thousands to millions of Qbits.

But a more abstract issue arises of,

“Do we know enough?”

There is something called “Quantum Cryptography” that has it’s roots in an idea from the 1960’s for “quantum money” that would be unforgable. In the late 1970’s it gave rise to an experiment that gave rise to what many call BB84 that proved that Quantum Cryptography was practical.

Since then the Chinese amoungst others have pushed it to the point it can provide secure key distribution without a second channel. Known as “Quantum Key Distribution”(QKD) it can provide what is considered absolute security spanning around one third of the way around the globe…

But we need more than “key distribution” and that is where other questions arise,

https://www.quantamagazine.org/cryptographers-discover-a-new-foundation-for-quantum-secrecy-20240603/

The thing about QKD is that not only is it inexpensive in comparison to “Quantum Computing”(QC), the rate it is progressing technically it will be globe spanning in a very practical way before QC is anything more than a very very expensive lab curiosity. Which due to QC’s exorbitantly expensive “consumables” cost will probably make it not commercially viable ever.

Clive Robinson March 21, 2025 11:55 AM

@ Who?,

I’m all in favour of “chained cryptography” as a sensible security measure.

But that apparently makes me an “odd duck”.

NIST amongst others apparently dislikes the idea of “hybrid cryptography” using both pre and post QC algorithms.

The obvious question of,

“Why?”

I’ve not really been able to get to the bottom of due to an excess of hand waving blocking the view…

Bernie March 21, 2025 8:14 PM

@ Clive ,

Welcome to Ducks Anonymous, Odd. Folks around here call me Old. I remember looking forward to when computer systems were finally powerful enough that UIs were always fully responsive. Since I am still waiting, I think that folks should start calling me Naive instead of Old.[1]

While chained cryptography is sensible, computers are never going to be powerful enough for the basics like strong encryption. At least my (unwanted) AI assistant will be able to tell me why my UI is frozen, probably blaming Grace Hopper’s bug.

Also, thanks for that link. Nice read.

[1] If you say anything about it being 5-10 years away, your sentence better mention cold fusion and room temperature superconductors too.

Soatok March 21, 2025 11:36 PM

@ Who?

I would not “just move” to post-quantum cryptography; I would add a second encryption layer while using classical algorithms well tested on-field.

This is often called “hybrid” in the PQC discussions, and it’s a sensible thing to do.

Unfortunately, there are a lot of details with which we can hide devils. https://durumcrustulum.com/2024/02/24/how-to-hold-kems/

(Deirdre Connolly is the author of X-Wing, a hybrid KEM that uses ML-KEM-768 and X25519, which is what I plan to use in my projects.)`

Clive Robinson March 22, 2025 12:29 AM

@ Bernie,

With regards,

“Folks around here call me Old.”

Funny thing… Most every morning I look in the mirror… My brain looks out with the thoughts of a twenty something year old, and is shocked to see a grumpy old git looking back… And it’s all down hill from there for the rest of the day 🙁

Why I make the same mistake near every morning I don’t know, I guess it’s an “old habit that’s hard to break”.

With regards,

“I remember looking forward to when computer systems were finally powerful enough that UIs were always fully responsive.”

To which I say

“Young man the 8bit CLI is where you should look!”

I have a genuine Apple ][ I bought back in the late 1970’s and when in the editor I use on it, it’s still got a faster key-press to screen display time than any current commercial windows based OS on hardware that’s less than three years old…

There is a lesson in there… which is why I run a stripped down Linux on a laptop that shipped with MS Win 7 (according to the sticker underneath). Sadly getting 32bit Linux is no long,

“Go to the news agent and buy a magazine with CD/DVD on the front.”

Which was a “more secure” way than an Internet download.

I do run multiple X-terminals in a Windowing environment and take the speed hit for the convenience of having half a dozen files open to see and cut-n-paste from (yup a bad habit that is almost as old as my back teeth).

But consider your statement,

“… computers are never going to be powerful enough for the basics like strong encryption.”

Back in the 1970’s my Apple ][ was and still is more than powerful enough for “strong” encryption. In that it could happily use an XOR or Add-Mod256 “mix algorithm” of “plaintext” with OTP “ciphertext” from floppy disk file.

More modern encryption like AES uses a “highly complex” “mix function” in lots of rounds…

However run AES in “counter mode” to generate a psudo-OTP to write to file you in effect,

“Take the complexity out of synchronous On-Line encryption and run it asynchronously off-line.”

Or you can run the complexity across multiple parallel compute engines (which is what we did back when 8bit CPUs ran below 4Mhz clock rate).

Thus it can be seen that the issue is not actually “strong” encryption but “managing the complexity” of the
encryption algorithm when being used synchronously “On-Line”.

Thus the question of splitting up the “complexity” into a “chain” of “less complex” algorithmic parts which in effect is what 3DES was all about (only they kept the complexity “Synchronous and On-Line”).

Some years ago now (last century 😉 Prof Ross Anderson wrote a paper on doing something similar,

https://link.springer.com/content/pdf/10.1007/3-540-60865-6_48.pdf

Which led to another paper analysing the ciphers authored by Pat Morin,

https://cglab.ca/~morin/publications/crypto/aardvark-sac.pdf

(Pat also has work on “random algorithms, that is interesting in a similar but different respect. Cryptanalysis often relies on “a fixed structure” to do things like “message in depth” attacks. Randomising the order of the sub algorithms can be shown to keep the desired CS complexity but in effect give a new final algorithm each time thus limiting such attacks).

I hope you find the papers interesting.

Bernie March 22, 2025 11:12 AM

@ Clive ,

I’ll have to read those papers when I’ve got more time (and caffeine).

We must be old; we are talking about the good old days of 8-bit CLI’s. I think I have finally broke an obsolete typing habit I had from my CoCo 2 in the 80’s. But now I have the urge to find a hole punch and some single-sided floppies. Stop me before I annoy the neighbors with the sounds of dialing up AOL.

Regarding your Apple ][, it can’t run the latest must-have features in MS Word 314.159 even when not doing any encryption. May I show you our newest 100% compatible PC? Don’t worry, the bridge it is sitting on hasn’t been sold yet.

But, seriously, why am I still dealing with… BRB. I’ve had a moment to ponder. A better question is to myself: Why am I still dealing with the hopes/dreams/assumptions of my 20-something self? Don’t I know better? I’ve tasted the real world far too much to not know better. Optimism is my old habit that is hard to break.

Back on topic of Bruce’s post, I just thought of something. “You need to move to post-quantum cryptography… but don’t forget the backdoors we need. After all, you need a lot of holes in your security for the Swiss cheese model to protect you.”

(Back off-topic, I’m now imagining the Dead Parrot sketch where it is a motherboard instead of a parrot.)

Clive Robinson March 22, 2025 11:36 AM

@ Bruce, ALL,

Is the time nigh for QC?

The fact QC has not in anyway delivered anything not just in years but at all… currently puts it in the “California Sail Boat”[1] category of hyped things.

It’s something that is increasingly being noted not just by those doing physics research but technologists and more recently even main stream media journalists.

And worse for some investors…

Jensen Huang CEO of Nvidia has twice caused QC stocks to “fall significantly” in just a few days…

Firstly when he expressed doubt that quantum computing would be even close to commercial and probably not even exist in the next 15 years or so. Then secondly two days ago on the 20th when giving a key note at Nvidia’s “Quantum Day” when he tried to smooth over his previous comments…

So it’s not just the future of QC but AI as well that’s making investors twitchy… Anyone want a black tulip bulb?

Which might be why more main stream media is putting out articles like this latest example asking the question in a gentler form,

“Are quantum computers coming to your cloud or phone in the future? What and who are they for?”

https://www.theverge.com/tech/633248/beyond-the-hype-of-quantum-computers

But making less than well veiled opinions of not just Microsoft’s latest “noise” but the whole QC domain with,

“On top of controversy, the industry suffers from hype. Quantum computer champions say that they will revolutionize materials science, encryption, and finance. Theoretical research indicates that they could one day beat regular computers in certain time-consuming tasks and open new realms of computing. But the timeline is uncertain.”

But as I’ve noted in another post above the “faster than” claim game usually ends up with proponents of QC proposing something tangential at best and usually conventional computing algorithm researchers then disposing it fairly rapidly…

However there is another side to this. The article author says,

“… experts predict that an early useful application of quantum computers could be performing accurate and fast chemistry simulations, for discovering new materials for better batteries, more climate-friendly fertilizers, and new medical drugs. Currently, to simulate these reactions, scientists rely on supercomputers, which are inexact and slow.”

But as we –should– know from AlphaFold this is actually something current AI LLM and ML systems can do and apparently well if the input corpus is well curated hence the Nobel prize,

https://www.chemistryworld.com/features/how-ai-protein-structure-prediction-and-design-won-the-nobel-prize/4020354.article

So my money if I was daft enough to risk any would be on what we’ve not heard very much about. Which is “Quantum AI”. Because whilst I reason it has a very outside chance of happening, it will happen if it can. However one of the first things that needs to happen is for all the hype and nonsense about current AI LLM and ML systems to be “disposed of”… And if some Silicon Valley types have their way that won’t happen for quite some time. In fact probably not in my life time so,

“No bet as I’ll not be able to collect.”

But the final sentence of the final paragraph of the article makes a point potential investors of money, time, resources or their own effort should note,

“Such are the growing pains involved in building a quantum computer. Its potential remains alluring, but the finish line is still far away. In the meantime, physicists will continue squabbling over incremental progress — as long as the cash keeps flowing.”

Remember “string theory” it was once even bigger than QC now is, can you remember anything about it or any of it’s proponents?

I suspect not because it was never ever got to the point it could be “tested” thus proved or falsified, it was a California Sail Boat at best with some even claiming it was actually a fraud…

Is that QCs potential or probable fate?

As always “Time will tell”.

[1] Saying something is a,

“California Sail Boat.”

Is a cutesy way of saying it’s,

“A hole in the water into which you pour money.”

ie it’s a very very expensive vanity object/entity that costs big and returns little or nothing except the ability to “ego polish”. In effect an “on steroids” version of “big car syndrome” (which at least returns viable transportation along with low cost underwear 😉

Clive Robinson March 22, 2025 2:23 PM

@ Bernie, ALL,

With regards my relative decrepitude, you can search the blog for two words in association “badger” and “beard” let’s just say “I think I’m doing better” than our host on that score 😉

But back to more important things, you say,

“Optimism is my old habit that is hard to break.”

You shoulden’t. Psychologist s and Psychiatrists dress it up in fancy words in long papers but the short and the long of it is,

“Optimism like fight or flight is a hormonal ‘self defence’ mechanism.”

Oddly perhaps so is actual “pessimism” rather than what people mistake depression for.

Years ago I coined an expression that others may also have done –I’ve never checked– because the “You’re a glass half full guy” comment really rankled. So I would say that,

“I’m an optimistic pessimist, I hope things will improve, but I know they won’t.”

So as others say “Onwards and upwards”[1], with regards,

“Regarding your Apple ][, it can’t run the latest must-have features in MS Word 314.159”

But look on the bright side neither can it run,

1, Malware or similar
2, “See What You See” “client/device side scanning”.

In part because it has no real “external communications” the OS is on real immutable mask programmed ROM and the only mutable memory that is not RAM is very old style floppy disks. So in effect it comes “pre-mitigated” by segregation”[2]. All reasons I love pre-1995 PC Hardware and a suitable cage.

All you are left to do is “Hard Control Human Access” in various ways which yes can be both hard and expensive. But at least we are much better equipped by history to know what actually works and what is faux security.

Speaking of faux-security you had to say it 😉

“You need to move to post-quantum cryptography… but don’t forget the backdoors we need. After all, you need a lot of holes in your security for the Swiss cheese model to protect you.”

The “Swiss cheese model” is another version of the idea behind the “Onion layer model” which the military version is “Defense in Depth”.

The original idea behind the Swiss Cheese model was to act as a visual aid in “accident prevention” and it actually encourages the wrong type of thinking. Which us as bad if not worse than Victorian Artisans and their boilers still exploding even when the “bolted a bit on”. Under the quaint illusion they could by adding another layer stop their socks being their only mortal remains they left behind…

Accidents happen for two reasons only,

1, Lack of knowledge/information.
2, Lack of time to respond.

The “holy cheese” model barely covers a small fraction of the first reason and totally fails with temporal issues.

Thus the argument is “if you have a thick enough skin, you can not be harmed”. Nature tried that with dinosaurs, and you don’t see them wandering around. Similarly pacaderms are now very much endangered due to the heavy caliber Nitro Express and later Magnum rifles, proving the point that practically “there ain’t no cheese thick enough”… And as drones are currently proving on the battlefield you are not even safe when you are in a hole in the ground or behind a hundred tons of armour.

The net result of “bolt another layer on” is that you fairly quickly make yourself way way more vulnerable because even with sufficient information you can not move out of the way…

Which brings us back to the notion of “crypto backdoors” have a search on this blog for my comments with regards the work of Claude Shannon and Gus Simmons. When you put their work together you have a mathematical proof that “backdoors do not work” when the “People of Interest” either know or assume there is a backdoor in place.

Which is why I suspect that finally certain types of people are moving to the

“See What You See”(SWYS) or “Client/Device side scanning” model.

By puting a “shim” in the UI or I/O drivers that “tees the plaintext off”.

It sounds like a great idea because it gets around all the communications crypto without having to break it etc etc etc.

The problem for them is it require a “Communications Back Channel” which if denied to them renders SWYS moot.

In the past I’ve pointed out the salient facts that as the first or second parties to get protection from both Crypto backdoors and SWYS you need to properly “segregate the plaintext”.

In WWII and earlier this was done by using OTP ciphers and pencil and paper (and a box of matches).

What you are doing is,

1, Taking the “security end point” off of the “communications end point” device.
2, Ensuring the communications device never has “plaintext” on it, or go through it, only “ciphertext”.

As long as the device you use for the “security end point” has no “covert or overt communications” side/second channel around the “security endpoint” then you are secure.

So reading the ciphertext on your mobile phone display, writing it down on a piece of paper and then taking it into a different location to the mobile phone to use the OTP kind of gives you no “side channel”.

Except if they know where you use the OTP and put a hidden camera or more modern type of surveillance on that location…

But for that to happen then they would have to consider you a “significant person of interest” or have Orwellian style surveillance on the whole population.

The latter scarily being more likely these days with “Smart TV’s” and other microchipped consumer home goods that all have WiFi and BLE and surprisingly many have both microphones and video cameras of the MEMS Device variety.

This is quite out of date technology wise, but it could give you nightmarish thoughts on what is possible,

https://engineeringproductdesign.com/mems-micro-electro-mechanical-system/

Oh and most MEMS are way less expensive than the traditional transducers they are rapidly replacing.

[1] Logically this is a daft expression, because as the more appropriate phrases have it “what goes up, must come down” and that implies especially with heavenly bodies “crash and burn” unless you just want to “lack the necessities of life” and “go around and around” after “getting out the well”.

[2] OK I admit it’s still connected to mains power and the old CRT monitors can be “remotely viewed” due to the levels of EM radiation they can pump out. See Wim “van Eck Phreaking”,

https://en.m.wikipedia.org/wiki/Van_Eck_phreaking

And similar TEMPEST and EmSec attacks both passive and active I’ve detailed on this blog before, and why I talk of “Energy Gaps” not in effective “Air Gaps”.

lurker March 22, 2025 4:08 PM

@Clive Robinson

re: Verge, beyond the hype …
“Researchers make physical qubits from different materials […] it’s not clear what material is best.”

I’ll put money on sophons.

Clive Robinson March 22, 2025 6:49 PM

@ lurker,

Re : sophons

I was thinking they would make a good replacement for AI Spectacles.

But the ideal material for Qbits has got to be weapons grade “unobtainium”, 1g of that could produce enough hot air to run a hype bubble or all the worlds data centers for a century 😉

Bernie March 23, 2025 12:58 PM

@ Clive ,

You are not decrepit; you are finely honed and well aged, just like Swiss cheese, which provides perfect security, because it comes from the Swiss, who have perfect neutrality, which means no corruption, in the Swiss people or in the Swiss cheese, whose holes are not vulnerabilities but actually strategically designed honeypots, filled by Bob — because (animal) bee and (letter) B are the same thing — who was divorced by Alice because she caught Bob “in bed with” Eve. [1]

“If your device is not vulnerable to malware, it is time to upgrade, ” said the interim acting head of TLA, the country’s premier agency. “Malware vulnerability is the bread and butter in security. We cannot protect you if you are competent enough to protect yourself.” He concluded his speech with a promise: “We can provide better cookies than you can get anywhere on the Internet.” This reporter was unable to find any cookies at the press conference, though I did find some milk that had been sitting out without refrigeration.

The Apple ][ and the CoCo 2 had a lot of similarities — at least seen through today’s eyes. Did you ever use cassette tape storage? (I haven’t bought software on a cassette tape in a very long time.)

The only genuine “use” I’ve found for thick skin is delaying pulling the thorn out until after it is infected/embedded/etc. because I didn’t notice the SOB earlier.

My favorite SWYS device is the so-called Sneakers made by Setec Astronomy. However, you need highly qualified personnel lest you end up with results that — let’s say — leave you in stitches.

Your Smart TV needs to know if you are watching the ads that are now even more ubiquitous. What better way than MEMS devices? I’m expecting laws that require such devices to be tiny and hidden so as not to “ruin the customer’s viewing experience”. (I’m also expecting laws that require light blubs to flicker when you turn them on so that customers know that “the future has arrived”.) I hope these laws don’t come, but I expect they will. Optimistic pessimism FTW! [2]

Speaking of logically daft expressions, I can no longer tell if “downhill” is a good thing or a bad thing. Such are the dangers of spending too much time speaking human languages instead of computer languages.

One thing I miss about CRTs is the ability to know if I accidentally left a TV/monitor on.

NB: Even though I have a tendency to flow between serious, funny, sarcasm, etc., it doesn’t matter to me if you misunderstood anything I wrote. You always have wise words to share with both me and whomever else might be reading. As a bonus, if I re-read my words in the future and confuse myself, your words are there too. Thank you for saving me from myself. lol

[1] I almost gave myself a headache trying to think up all that crap.

[2] I first read “WiFi and BLE” as “WiFi and BLEVE”. Let’s hope the latter never makes it into consumer electronics.

Clive Robinson March 23, 2025 2:25 PM

@ Bernie,

With regards,

“I first read “WiFi and BLE” as “WiFi and BLEVE”. Let’s hope the latter never makes it into consumer electronics.”

It actually happened lots of time oh about 20years ago.

The story is “industrial espionage” to obtain the chemical formula for the electrolyte in electrolytic capacitors was imperfect. Thus several hundred “metric shit-tons” of defective capacitors got shipped…

The result lots of Dell PC motherboards and Microsoft games consoles had defective capacitors installed (cause they bought on the cheap and did not QC properly to further save money[1]…)

Some of the caps just oozed dangerous chemicals, others just split the can on the cross, others popped the can off of the base. But a few really broiled and blew… They actually had a “Boiling Liquid Expanding Vapour Explosion”(BLEVE) in the case and due to fans quickly filled a room with acrid if not “choking agent” “magic smoke” and in some cases burning metal vapour.

Which trust me you don’t want in your lungs, throat, eyes etc as it’s just all round nasty including carcinogenic…

[1] There is an expression in “Fast Moving Consumer Electronics”(FMCE) production about not trusting your suppliers which is a little like the faux-CIA one… But it gives rise to another which is,

“Keeping the pencil sharp”

Basically if you keep using the same supplier the price goes up… To keep the supplier “on the line” you go somewhere else and say to the original supplier “Bottom line they were less expensive than you” even if they were not. Thus the theory is the “pencil will be sharper” for the next quote… (There is so much wrong with this I urge people not to do it, because you rarely win out in the end).

Bernie March 23, 2025 6:40 PM

@ Clive ,

Were those defective caps in the (tech) news just recently? YouTube recommended a video and Ars Technica had an article. I was skimming and meant to come back. I vaguely remember something from the past and figured that enough time had passed that the stories are more accurate now.

I tend to think of BLEVE in the bigger boom sense where you have to worry about shrapnel, not vapors. But, yep, small booms with vapors can be a lot more dangerous. Heck, even burnt microwave popcorn can be very disruptive. (Regarding fire alarms, remember to grab your essentials on your way out because you might not make it back into the building same day.)

If only people grokked that the sharper pencil is also better at causing puncture wounds. I’m reminded of the old saying, “If you think safety is expensive, try an accident.”

Clive Robinson March 24, 2025 1:59 AM

@ Bernie,

Re : Capacitor Plague

“Were those defective caps in the (tech) news just recently?”

According to Wikipedia the “capacitor plague” as it was called back then was between 1999 and 2007.

So yeh someone might have been doing date based article of “two decades ago” a “21st coming of age” or even a “quarter century ago” article.

What I do know is it was mentioned in depth on the EEVblog website because “Dave” had mentioned them on one of his “Dumpster Dives” which caused one of his “readers” to post he’d had some go pop and asking for advice about alternatives as replacements,

https://www.eevblog.com/forum/repair/dell-gx280-motherboard-capacitor-replacement-(rubycon-mcz-alternative)/

The thing with “smoothing” and energy storage components like inductors and capacitors is the circuits have to be thought of in “four quadrants” not the usual “two quadrants”. That is they both source to and sink from an active / energy storage / generative load (think “Back EMF” found on DC motors for electric drills etc).

With high efficiency “Switch Mode PSU”(SMP SMPSU) for high power low voltage fast digital circuits you need to consider “nanosecond switch times” and both series resonance and ringing otherwise all sorts of nasties including “metastability soft latch up” can happen.

One such “I didn’t think of that” traps people drop into is that PCB tracks are transmission lines and can store considerable amounts of energy as well as appear as short circuits when they are open circuits –half wave– and open circuits when they are short circuits –quarter wave– and what appears as magic make capacitors look like inductors and vice versa. If you want to see how you can use this advantageously look up “Class F” RF amplifiers. A friend of mine Roger Howe –who sadly is nolonger with us having died by accident during lockdown– developed a unique output stage for FM Broadcast transmitters that put them up in the 90% efficiency bracket but all importantly unlike Class F was “broadband” (75-110MHz). For my sins using Class D Bridge driven by Class H I developed a “switch mode” AM Broadcast transmitter using “Walsh functions” and current transformers as “power adder circuits” that was up in the same efficiency range but covered 0.5-2.0MHz (think of it as a 10kW D to A converter). And for both low ESR PSU caps are kind of essential so it “sticks in my mind”.

ResearcherZero March 24, 2025 7:33 PM

What exactly is the point if they also want to insert ‘backdoors’ into software?

There was an old story about a company called Boyusec which was a front for APT3.

Reportedly someone left packaged Windows exploits and a framework called FUZZBUNCH laying about, perhaps on some server. There was a bunch of post-exploitation modules also called DANDERSPRITZ, with other tools like ‘EventLogEdit’, which is pretty self-explanatory. Maybe they were discovered, maybe they were leaked, maybe they were used one too many times, such as the with the AD Group Policy vulnerabilities and the mass exploitation tool EternalBlue.

‘https://arstechnica.com/information-technology/2015/02/15-year-old-bug-allows-malicious-code-execution-in-all-versions-of-windows/

“Microsoft has advised … there is no backdoor within the Microsoft suite of products”
https://www.zdnet.com/article/no-nsa-backdoor-into-australian-parliament-microsoft/

July 11, 2013Microsoft Helps NSA Crack Encryption

Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple and Dropbox.
https://www.nbcnews.com/id/wbna52454247

(Microsoft did eventually patch the vulnerabilities some months after it became public)
https://www.rapid7.com/blog/post/2017/04/18/the-shadow-brokers-leaked-exploits-faq/

Clive Robinson March 25, 2025 6:09 AM

@ ResearcherZero, Bruce, ALL,

Re : The computing stack implication on privacy and why we can not have nice things.

You ask the question,

“What exactly is the point if they also want to insert ‘backdoors’ into software?”

The first thing to realise is,

“Not all software is equal.”

And secondly all software like mathematics,

“Boils down to logic and arrays”

Which makes software hierarchical and thus can be seen as a “stack”.

But the “logic and arrays” is true of all Turing engines and thus all computers hence the “Computing Stack” view.

Further that,

“All logic can be replaced by an array, and all arrays can be replaced by physical objects.”

It’s why any Q-bit type can give you a Turing Engine, or any other system defined by logic[1].

Thus you can define the values in the array in a way that represents any kind of information, be it software, functions, or values.

The old “Programmes = Instruction + Information” view is actually “Everything is values in a lookup table”.

The problem is building it into something useful which is why CPU chips have thousands of transistor equivalents at the least and millions of times that at even moderate level CPUs currently.

To most people “software” is something very abstract and high level and they never actually build function out of it directly, the nearest they sometimes get is “lookup table” arrays within a high level language to hold values to do speedup.

Hardware engineers back in the 1980’s and earlier were only too aware of these issues because,

“CPU chips were hardly a thing and inordinately expensive.”

So most “programming” was done with “analogue circuits” or “ladder logic” and still transitioning into basic logic devices such as “Norbits” and TTL or ECL semiconductor chips. However by the early 1990’s the “Home computer revolution” had happened and ARPANET was transitioning into the Internet.

The majority of programmers by then had stopped using or never used assembler language and had oft as not snoozed through basic logic and computer fundamentals in school or collage.

Thus two gaping chasms had opened,

1, High level to lower level language gap.
2, Low level language to functional logic gap.

The second is sometimes called, “The CPU ISA Barrier” and it can be pointed at with a cocktail stick or other pointing device as existing at the pins on the CPU data, address, and control busses.

It’s said in mythology that,

“Few ever go over the river to the underworld (Hades) and come back, sane or whole.”

Well for most engineers and programmers these days “Hades is in a chip”. Importantly their reach does not or mostly can not cross “over the river”.

Which means their control on Privacy, Security, and Secrecy stops at that point, high up in the computing stack. Importantly nor can they see across the river they can only hear what’s shouted across. Which means effectively all three as a consequence get “owned by those that can “cross over” and they can do what ever they want including “falsely report” to the user.

In the past I’ve explained that a CPU can not view it’s function or report on it, it’s the consequence of work that slightly precedes what Turing did in the late 1920’s and early 30’s.

But if you want to think about it in his terms, consider two Turing engines with full access to “the tape” you as the user are only aware of the engine you use and think you control. An attacker invisibly to you controls the other.

Ask two basic questions,

1, What can the attacker do with the second engine?
2, Can you even show the second engine exists?

To which the answers are,

“If the attacker is careful, Anything and No.”

To serve as a “backdoor” the attacker needs one more thing “external communications”.

Unfortunately for the user “external communications” may only need to send back a single bit of information over a covert channel with “See What You See”(SWYS) type “on device” attacks.

To see why with what Apple put in their OS to supposedly catch CSAM users.

To you the Apple OS is a “black box” that is equivalent to Hades of myth. You can not cross the river and nor can you see over it.

However it stands like a gateman between you and your data and “sees all as it passes”. You have no idea of what the gateman has been told to look for, or how…

All the gateman has to do is signal by raising just one flag or speak one word or less that can be seen/heard in your realm by guards etc. But you won’t see or hear it as the gateman’s presence is invisible to you. The alerted guards however can then act, and you will not just see them but feel their presence as they drag you away for an uncertain future.

The lower down the computing stack the gateman is the less opportunity you have to be aware of it, and in some ways it also makes the covert signal near impossible for you to detect as well.

The only solution to this is to “mitigate the covert channel” by “segregation” of user plaintext from communications and any ciphertext etc. Unfortunately these days segregation needs to also be by “energy gapping”.

[1] All the physical object actually has to do is behave like a “comparator” or “threshold switch”. They are from a physical object perspective actually interchangable with each other.

ResearcherZero March 29, 2025 4:24 AM

@Clive Robinson

Flip a bit and perform a downgrade attack leaving a vast majority of users unaware that such an attack took place against their communications. Many are already unaware when they are communicating over encrypted communications or the various attacks on UIs. There are a bunch of exploits which also allow remote attackers to get hands on sensitive information.

Fourth zero day found affecting Windows allows hash disclosure via simple interaction.

‘https://blog.0patch.com/2025/03/scf-file-ntlm-hash-disclosure.html

ResearcherZero March 29, 2025 4:34 AM

#Clive

NIST amongst others apparently dislikes the idea of “hybrid cryptography” using both pre and post QC algorithms.

The obvious question of,

“Why?”

It would make it awfully expensive for the folks at the NSA to decrypt, assuming a well designed implementation and usage case, leading to the need for greater storage capacity.

Clive Robinson March 29, 2025 11:02 AM

@ ResearcherZero, ALL,

There is a key indicator in the 0patch article,

“(reported to Microsoft in January 2024 by security researcher Florian), is still waiting for an official patch so our patches for it are the only ones available.”

Why after a year of a serious vulnerability being publicly known would Microsoft not patch it?

Secondly why are Microsoft forcing everyone onto Win 11 where it’s now become clear,

1, You must have a Microsoft Cloud account that fully identifies you and you?
2, You must be “On-Line” so Microsoft can forcefully transfer all of your usage information into their cloud as “third party business records”.

As the other major consumer/commercial OS organisations are doing the same…

The time is overdue that people switch out from these “You will do as you are told and like it” organisations for something a little more free.

As I’ve mentioned I still run OS’s from these major organisations that predate the Internet and their “turning to the dark side”.

I also run Micro Controller and similar based systems that are more powerful than *nix servers upto Sys5v4 and are 32bit based.

Yes I’ve had to write BIOS and similar to get C etc up and running on them (or the hardware manufacturers have modded GNU GCC etc tool chain). I really don’t use anything other than the command line and to show my age I’m still happy with a Teletype single line editor for quite a bit of what I need to do.

That’s because of the old maxim about,

“Tools learned before you are forty”

Heck I still use WordStar 4 (DOS) and the likes of Mirror and Borland IDE’s and even the JStar of “Joes Own Editor”(JOE),

https://linux.die.net/man/1/jstar

I’m not saying that a *nix style OS is the way to go, but MS-Dos and MS-Windows via NT “ripped BSD Unix off” so many may have familiarity.

But “walking back out the trap” before they spring the trap-door to “hold you till the slaughter” might be a sensible thing to do whilst you still can.

All I can do is make people aware of their potential impeding doom it’s upto them to act in their own best interests rather than sleep walk into the trap.

Leave a comment

Blog moderation policy

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.