Cell phone security lite
Transcript of Cell phone security lite
Your Cell Phone is Covered in Spiders
An overview of the cell phone security landscape
Cooper Quintin@cooperq
We are becoming increasingly dependent on mobile devices
● We are storing more and more data on them● Pictures● Videos● Contacts● Email● Social Graphs● Location History● Etc
●As the amount of data increases● The complexity increases● The desirability increases● The number of vulnerabilities increases
And there are a lot of vulnerabilities!
Things to Keep in Mind
If an attacker gains physical access phone can and will be completely compromised.
Also, you should assume that your phone will be compromised at some point.
Generally, you will be safest if you just take the attitude that YOU SHOULD NOT TRUST YOUR
PHONE
Security is a Journey Not a Destination
The more hurdles that you put up, the harder you make it for an attacker.
Time to compromise > Determination of attacker
Don't get demoralized! There are many things you can do to improve your security.
Threat Model●Random attacks
● Malicious apps ● Stolen / Lost phone
●Targeted attacker ● Law Enforcement● Corporate Espionage● Personal Enemies
●Signal Interception●Your Phone Company
Burner Phones● No encryption● Trivial for Forensic Investigators● Closed Source● Usually no Screen Lock
iPhoneThe Bad
● Closed source● Very little in the way of security apps● Default screen lock is a four digit number ● Privacy tools that aren't free or open source
The Good● There is a stronger screen lock that can be enabled● A couple of decent privacy apps● Less Malware
BlackBerry● BEST USED IN COMBINATION WITH BES
● Otherwise about as good as any other smartphone
● BBM and Pin to Pin messaging NOT SECURE
– Not encrypted, just 'scrambled'
– RIM can read all of your messages if a govt demands● Your data is only as secure as the company is trustworthy
● RIM admitted to providing backdoors to govt. in India and has helped UK and middle east govts.
● Less Malware
● Without BES, Security on Blackberry is not so good.
Android● IMO The best phone for security● Open source● Lots of security tools● Lots of encryption tools● Full Disk Encryption● Good security options● Guardian Project● Your data is in the hands of google● How much do you trust google?
Lets Talk About Threat Models Again
Law Enforcement Investigators are Looking for:
● Subscriber & Equipment Identifiers ● Contacts ● Appointment Calendar ● SMS, Text Messages, Instant Messages, Email● Call Logs● Photos, Audio and Video● Documents● Location Data
Forensic Methods
● Recovering screen lock ● Recovery Mode● Cellbrite and UFED● JTAG
Solutions●Have a strong screen lock and a short timeout●Don't tell them your password●Encryption (Text Secure, LUKS, Device encryption)
Signal InterceptionThreats●Fake Cellular Towers / Drones●USRP/GNU Radio●Snooping as a Service●Cellular companies will provide wiretaps without even a warrant●Insecure apps like BBM and whatsapp
Solutions● Encrypted Calls (PrivateGSM, Redphone,
SilentCircle )● Encrypted Text on Android (Textsecure)● Talk in Person (This is the Most Secure)
Lost and Stolen Phones● Phone Finding and Remote Wipe
● Android: Lookout, Prey ● BlackBerry Protect● Find My Iphone
● Strong Screen lock● Will not stop a sophisticated attacker
● Report to The Provider?● They probably don't give a damn.
MalwareVendor and Espionage malware
● This stuff is extremely sophisticated● FinFisher● CarrierIQ
● Voodo carrierIQ
Standard, untargeted malware● Personal Data Theft● Premium SMS● The usual suspects (spyware, trojans, phishing)● Facebook, Angry Birds?
Malware Solutions● Be careful what you install!
● Don't install apps from untrusted sources
● Don't run updates when on insecure networks
● Anti Virus won't save you!
● Don't assume that because you have an iPhone or Blackberry that you are immune to malware
● Use the same precautions as you would on any computer.
Other Attacks● NFC● QR Phishing● Baseband Attacks
Disk Encryption●Exists on Android●Exists on Blackberry if you have BES●Does not exist on iPhone●Vulnerable to many different attacks●You should NOT rely solely on disk encryption.
Call Encryption
● SecureGSM ● Android: Redphone, OSTN
To Root or Not to Root(AKA Jailbreaking)
Rooting your phone is the process of gaining super administrator control over your phone.
This means you can doANYTHING YOU WANT
To your phone.
Including mess it up in fantastic ways!
To Root or Not to Root
The Good
● Custom Firmware
● Better Security Tools
● Remove Spyware
● More Cool Apps
● Performance Improvements
● Tinkering is Fun!
The Bad
● Can significantly decrease security
● You can permanently break your phone
● Will Void Your Warranty
In Conclusion...● It's healthy to be paranoid about your phone● Don't loose your phone!● Trust what you install (Open Source)● Root and install custom firmware● Use a stronger screen lock● Audit your phone● Encrypt Everything!
Thank You!
Cooper [email protected]: @cooperqJabber: [email protected]: 9B3470B9 B1F10651 B5840FEB 026D6CF7 2D949F6FPGP: 75FB9347 FA4B22A0 5068080B D0EA7B6F F0AFE2CA