ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

GCHQ has legal immunity to reverse-engineer Kaspersky antivirus, crypto | Cyberespionage

GCHQ has legal immunity to reverse-engineer Kaspersky antivirus, crypto | Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it
Newly-published documents from the Snowden trove show GCHQ asking for and obtaining special permission to infringe on the copyright of software programs that it wished to reverse-engineer for the purpose of compromising them. GCHQ wanted a warrant that would give it indemnity against legal action from the companies owning the software in the unlikely event that they ever found out.

The legal justification for this permission is dubious. As the new report in The Intercept explains: "GCHQ obtained its warrant under section 5 of the 1994 Intelligence Services Act [ISA], which covers interference with property and 'wireless telegraphy' by the Security Service (MI5), Secret Intelligence Service (MI6) and GCHQ." Significantly, Section 5 of the ISA does not mention interference in abstractions like copyright, but in 2005 the intelligence services commissioner approved the activity anyway.

The Intercept story provides details of the software that GCHQ wanted to compromise: online bulletin board systems, commercial encryption software, and anti-virus programs. It needed to prevent the last of these from revealing the presence of other GCHQ malware that was used for spying: "Personal security products such as the Russian anti-virus software Kaspersky continue to pose a challenge to GCHQ’s CNE [computer network exploitation] capability and SRE [software reverse engineering] is essential in order to be able to exploit such software and to prevent detection of our activities."


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage


Gust MEES's insight:
Newly-published documents from the Snowden trove show GCHQ asking for and obtaining special permission to infringe on the copyright of software programs that it wished to reverse-engineer for the purpose of compromising them. GCHQ wanted a warrant that would give it indemnity against legal action from the companies owning the software in the unlikely event that they ever found out.

The legal justification for this permission is dubious. As the new report in The Intercept explains: "GCHQ obtained its warrant under section 5 of the 1994 Intelligence Services Act [ISA], which covers interference with property and 'wireless telegraphy' by the Security Service (MI5), Secret Intelligence Service (MI6) and GCHQ." Significantly, Section 5 of the ISA does not mention interference in abstractions like copyright, but in 2005 the intelligence services commissioner approved the activity anyway.

The Intercept story provides details of the software that GCHQ wanted to compromise: online bulletin board systems, commercial encryption software, and anti-virus programs. It needed to prevent the last of these from revealing the presence of other GCHQ malware that was used for spying: "Personal security products such as the Russian anti-virus software Kaspersky continue to pose a challenge to GCHQ’s CNE [computer network exploitation] capability and SRE [software reverse engineering] is essential in order to be able to exploit such software and to prevent detection of our activities."


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage


No comment yet.
Scooped by Gust MEES
Scoop.it!

HARES Tool Hampers the Reverse-Engineering of Code | CyberSecurity

HARES Tool Hampers the Reverse-Engineering of Code | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
In what could prove to be a revolutionary development in information security, researcher Jacob Torrey will be unveiling the Hardened Anti-Reverse Engineering System (HARES) at several upcoming security conferences, a crypto breakthrough will make reverse engineering code an almost impossible feat.

HARES is a tool that focuses on encrypting code to protect it from being reverse engineered, as the code remains obscured until it is decrypted by the system’s processor at the moment of execution.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=HARES


Gust MEES's insight:

In what could prove to be a revolutionary development in information security, researcher Jacob Torrey will be unveiling the Hardened Anti-Reverse Engineering System (HARES) at several upcoming security conferences, a crypto breakthrough will make reverse engineering code an almost impossible feat.

HARES is a tool that focuses on encrypting code to protect it from being reverse engineered, as the code remains obscured until it is decrypted by the system’s processor at the moment of execution.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=HARES




No comment yet.
Scooped by Gust MEES
Scoop.it!

A Crypto Trick That Makes Software Nearly Impossible to Reverse-Engineer | CyberSecurity

A Crypto Trick That Makes Software Nearly Impossible to Reverse-Engineer | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Software reverse engineering, the art of pulling programs apart to figure out how they work, is what makes it possible for sophisticated hackers to scour code for exploitable bugs. It’s also what allows those same hackers’ dangerous malware to be deconstructed and neutered. Now a new encryption trick could make both those tasks much, much harder. At…


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=HARES


Gust MEES's insight:

Software reverse engineering, the art of pulling programs apart to figure out how they work, is what makes it possible for sophisticated hackers to scour code for exploitable bugs. It’s also what allows those same hackers’ dangerous malware to be deconstructed and neutered. Now a new encryption trick could make both those tasks much, much harder. At…


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=HARES



No comment yet.