Opinion: TrueCrypt, the NSA, and the Myth of Open-Source Security

Several years ago, in a nod to Linux creator Linus Torvalds, software developer Eric S. Raymond coined a phrase that he called Linus's Law:

"Given enough eyeballs, all bugs are shallow."

So goes the standard argument in favor of open source that more "eyeballs" make for better quality control and better security. It has become the rallying cry for open-source enthusiasts, particularly in the aftermath of Edward Snowden's revelations last year about NSA spying and government infiltration of technology. Reports surfaced that Microsoft, Google, Yahoo, and other tech heavies were compromised. According to the open-source narrative, the Snowden documents proved that commercial software couldn't be trusted.

"There have long been rumors in the networking community about possible backdoors in major networking vendors' firmware and network stacks," Nicholas Merrill, executive director of The Calyx Institute, told Enterprise Networking Planet in an interview last year. "I would suggestthat people strongly consider open-source solutions since their source code is open for peer review and auditing."

Government snoops, however, apparently have no qualms about attempting to hide vulnerabilities in plain sight. For instance, during a keynote panel discussion at this year's LinuxCon, Linus Torvalds was asked if the federal government had ever asked him to insert a backdoor into the Linux kernel. Torvalds verbally told the audience "No" while nodding his head yes.

Additionally, among the Snowden leaks was confirmation that the NSA had inserted a self-serving vulnerability into a pseudorandom number generator and then worked to get it adopted as an international standard.

Certainly, although it has been confirmed that the US government pressures and works with commercial vendors to insert backdoors into their software, so too apparently do they participate in open-source efforts. After all, if open-source development is "open" to everyone, it's just as open to the government and others who wish to weaken software security.

Other factors demonstrate that Linus's Law is just plain false. In his 2003 book Facts and Fallacies of Software Engineering, Robert L. Glass levies numerous criticisms against the "law," writing that, according to research, the law of diminishing returns is at work when it comes to code review. Specifically, that having more than two to four code reviewers is not particularly useful.

"[W]e shouldn't think that a Mongolian horde of debuggers, no matter how well motivated they are, will produce an error-free software product," writes Glass, "any more than any of our other error removal approaches will."

Glass goes on to point out that no scientific evidence exists to show that open source is safer, more reliable, or less buggy. He also observes that the bugs found by the many "eyeballs" may not be the most serious. Other commentators have explicitly posited that security bugs are among the least likely to be found in open-source software because security review is more boring and more difficult than tending to features.

See more here:
Opinion: TrueCrypt, the NSA, and the Myth of Open-Source Security

U.S. Rep. Holt discusses NSA spying, Ebola quarantine at ACLU forum in Princeton

PRINCETON With little more than two months before he closes the book on a 16-year Congressional career, U.S. Rep. Rush Holt (D-12th Dist.) discussed the challenges in store when it comes to preserving civil liberties in the 21st century.

Before a crowd of nearly 100 ACLU members, Holt and ACLU of New Jersey Executive Director Udi Ofer traced a history of the revocation of civil liberties throughout Holts time in the House.

Holt, who announced earlier this year that he wouldnt seek a ninth term in Congress, didnt pull any punches, openly criticizing his affirmative votes on the Patriot Act in 2001 -- hands down the worst vote Ive cast so far in Congress, he said -- and the Authorization for Use of Military Force in 2003 a close second.

We shouldnt sacrifice our liberties for the sake of security. Thats a false choice, Holt said. Its not the loss of privacy that is so upsetting. It is that the government would treat all of us as suspects first and citizens second.

Since those votes, Holt has remained critical of the use of surveillance at the federal level, frequently calling the situation a surveillance state during Mondays discussion.

He detailed his own experience with the NSA when, as chairman of the House Select Intelligence Oversight Panel, NSA leaders unquestionably and unequivocally lied to him when he asked about surveillance.

There is some reason for secrecy but theres no justification for systematically and deliberately lying to people charged with the oversight, said Holt, a Hopewell Township resident.

And while he acknowledged that Edward Snowden unquestionably broke a significant law by leaking evidence of the NSAs domestic surveillance, he said Snowden should have leniency in any prosecution and probably should be pardoned."

He has done a great service. The more I hear him interviewed, theres a little bit of self-righteousness there, but this was done for patriotic reasons, Holt said. He did not do this casually or stupidly. It was quite thoughtful."

Turning to current events, Holt criticized Gov. Chris Christie and New York Gov. Andrew Cuomos policy of mandatory quarantines for medical workers returning from trips to treat Ebola patients in West Africa.

View original post here:
U.S. Rep. Holt discusses NSA spying, Ebola quarantine at ACLU forum in Princeton

Google officially announces Android 5.0 ‘Lollipop’ with default encryption

Google officially announced the latest version of its popular Android mobile operating system (5.0, dubbed "Lollipop") in a blog post Tuesday, which includesa feature that will automatically encryptusers data by default. The updatewill begin rolling out in November.

The company has allowed users to encrypt information storedon some mobile devices running the Android operating system since 2011. But the feature was not widely adopted.

Soon, devices with the latest version of the Android software will be encrypted by default during the activation process -- preventing Google from unlocking the device, even at the request of law enforcement. The new default encryption works by creating a unique key for decryptingthe device that is stored on the phone and not accessible to Google.

Only someone who knows the device's password would be able to see the pictures, messages and videos stores on the device, although law enforcement could still gainaccess to information backed up in the cloud, as well as metadata from wireless carriers throughcourt orders.

Not all Android users are likely to receive the latest versionat the same time. Android devices are made by various manufacturers and supported by various wireless carriers -- each of whom tailors Android updates to consumers. So it may be months before this update makes its way into the hands of most or even some consumers.

The move to default encryption wasrevealedlast month, shortly after Apple announced a similar shift in its latest mobile operating system. It comes as major tech companies have rushed to add layers of security to their products and services in the wake of former contractor Edward Snowden's revelations about the pervasiveness of data collection by the National Security Agency.

Law enforcement figures have sharply criticized the companies for theencryption,arguing that it will limit the ability of investigators to pursue legitimate warrants. Earlier this month, FBI Director James Comey said he was "deeply concerned" about the companies' actions in a remarksataBrookings Institution event -- suggesting they had to potential to create a "black hole" that law enforcement count not penetrate.

Others, including The Washington Post's editorial board,have argued that techcompanies should maintain a "golden key" to be used only in the event of a court-approved search warrant. But security experts widely mockedsuchsuggestions, saying thatsuch a universal key amounted to the creation of a backdoor that would fundamentally weaken the mobile device's security and create an avenue that could be exploited bycybercriminals.

"Software systems are incredibly complex, and it is a challenge to protect them from attack even in the most ideal circumstances," saidTom Cross, director of security research at network visibility vendor Lancope, who has written about problems in systems designed to help law enforcement access data. "Deliberately introducing additional vulnerabilities for law enforcement access just makes matters worse we don't know how to design those backdoors reliably."

Andrea Peterson covers technology policy for The Washington Post, with an emphasis on cybersecurity, consumer privacy, transparency, surveillance and open government.

Read more from the original source:
Google officially announces Android 5.0 ‘Lollipop’ with default encryption

Encryption in demand for backup and replication: Veeam

Patrick Budmar | Oct. 28, 2014

When it comes to backup and replication, Veeam has found encryption is one of the most requested feature by businesses.

When it comes to backup and replication, Veeam has found encryption is one of the most requested feature by businesses.

Product strategy specialist, Rick Vanover, said that functionality became a priority for CloudConnect in Availability Suite v8.

"A lot things had to happen to make CloudConnect work, and adding our own encryption helped with that," he said.

Vanover said it was not enough simply to add encryption as a checkbox on the product to say it also encrypts data.

"We did it to help protect people against losing their password," he said.

If the password to the encrypted data is lost, that typically means that the data is already lost.

What Veeam has done is add a mechanism to CloudConnect that can recover the encrypted data even if the password is lost.

"It does not necessarily mean people need to stop managing passwords correctly, but it something goes wrong we have a way," Vanover said.

Read this article:
Encryption in demand for backup and replication: Veeam

Assange court ruling expected on Monday

Wikileaks founder Julian Assange's appeal against the arrest warrant hanging over him is being considered by a court in Stockholm, with the chief prosecutor expected to report back before midnight.

Assange's lawyers have lodged an appeal against the European Arrest Warrant hanging over him for allegationsof rape and sexual molestation in Sweden.

The Svea Court of Appeal was expected to announce its decision as early as Friday, but The Local has learned that the chief prosecutor has until midnight on Monday October 27th to give her response.

If she accepts his appeal and lifts the arrest warrant, it could mean that Julian Assange is able to leave the Ecuadorian embassy where he has been holed up for the past two years since he was granted political asylum by Ecuador.

Last week, Assange commented on the upcoming development in his case.

"We will win because the law is very clear. My only hope is that the courtis following the law and is not pressured politically to do anything outsideof the law," he said via a video link screened at a human rights filmfestival in Barcelona on Wednesday.

Swedish prosecutors want to question the 43-year-old Australian over allegations made by two women in Sweden.

He couldalso face trial in the United States over WikiLeaks publishing a horde ofsensitive military and diplomatic communications.

"As time goes by, political pressure decreases and understanding increases.So I am very confident I will not remain in this situation. I'm completelyconfident," Assange said.

Assange fears the warrant against him is aimed at eventually extraditinghim from Sweden to the United States. Swedish prosecutors said last month thatidea was "far-fetched".

Read more:
Assange court ruling expected on Monday

Michele Marchesi: Using an Artificial Financial Market for studying a Cryptocurrency Market 1/2 – Video


Michele Marchesi: Using an Artificial Financial Market for studying a Cryptocurrency Market 1/2
http://bitcoinference.com/2014/Michele-Marchesi.html Bitcoin chat here: http://chat.bitcoinference.com/

By: Bitcoinference

Read this article:
Michele Marchesi: Using an Artificial Financial Market for studying a Cryptocurrency Market 1/2 - Video