<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Side Channel]]></title><description><![CDATA[A weekly newsletter with curated content on cybersecurity, hacking, and Internet. (News, opinions and analysis)]]></description><link>https://side-channel.com</link><image><url>https://substackcdn.com/image/fetch/$s_!p8DY!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F90e4fa71-9548-4d18-8178-b46c0edc6ce9_264x264.png</url><title>The Side Channel</title><link>https://side-channel.com</link></image><generator>Substack</generator><lastBuildDate>Sat, 11 Apr 2026 20:51:28 GMT</lastBuildDate><atom:link href="https://side-channel.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[José Carlos Andreu]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[joscandreu@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[joscandreu@substack.com]]></itunes:email><itunes:name><![CDATA[José Carlos Andreu]]></itunes:name></itunes:owner><itunes:author><![CDATA[José Carlos Andreu]]></itunes:author><googleplay:owner><![CDATA[joscandreu@substack.com]]></googleplay:owner><googleplay:email><![CDATA[joscandreu@substack.com]]></googleplay:email><googleplay:author><![CDATA[José Carlos Andreu]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[EU Cyber Resilience Act: The proposal is here]]></title><description><![CDATA[This regulation proposal is aimed at setting cybersecurity rules for hardware and software products in the European Union to increase their security.]]></description><link>https://side-channel.com/p/eu-cyber-resilience-act-the-proposal</link><guid isPermaLink="false">https://side-channel.com/p/eu-cyber-resilience-act-the-proposal</guid><dc:creator><![CDATA[José Carlos Andreu]]></dc:creator><pubDate>Mon, 26 Sep 2022 17:43:31 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1578852208109-9a43bbc4c609?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxldXJvcGVhbiUyMGZsYWd8ZW58MHx8fHwxNjY0MjEwMjg2&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1578852208109-9a43bbc4c609?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxldXJvcGVhbiUyMGZsYWd8ZW58MHx8fHwxNjY0MjEwMjg2&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1578852208109-9a43bbc4c609?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxldXJvcGVhbiUyMGZsYWd8ZW58MHx8fHwxNjY0MjEwMjg2&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1578852208109-9a43bbc4c609?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxldXJvcGVhbiUyMGZsYWd8ZW58MHx8fHwxNjY0MjEwMjg2&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1578852208109-9a43bbc4c609?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxldXJvcGVhbiUyMGZsYWd8ZW58MHx8fHwxNjY0MjEwMjg2&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1578852208109-9a43bbc4c609?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxldXJvcGVhbiUyMGZsYWd8ZW58MHx8fHwxNjY0MjEwMjg2&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1578852208109-9a43bbc4c609?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxldXJvcGVhbiUyMGZsYWd8ZW58MHx8fHwxNjY0MjEwMjg2&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" width="1080" height="810" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1578852208109-9a43bbc4c609?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxldXJvcGVhbiUyMGZsYWd8ZW58MHx8fHwxNjY0MjEwMjg2&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:810,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;blue and yellow stars forming circle flag&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="blue and yellow stars forming circle flag" title="blue and yellow stars forming circle flag" srcset="https://images.unsplash.com/photo-1578852208109-9a43bbc4c609?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxldXJvcGVhbiUyMGZsYWd8ZW58MHx8fHwxNjY0MjEwMjg2&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1578852208109-9a43bbc4c609?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxldXJvcGVhbiUyMGZsYWd8ZW58MHx8fHwxNjY0MjEwMjg2&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1578852208109-9a43bbc4c609?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxldXJvcGVhbiUyMGZsYWd8ZW58MHx8fHwxNjY0MjEwMjg2&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1578852208109-9a43bbc4c609?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxldXJvcGVhbiUyMGZsYWd8ZW58MHx8fHwxNjY0MjEwMjg2&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@okapi123">Lukas</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>The EU released its legislative proposal of the <a href="https://digital-strategy.ec.europa.eu/en/library/cyber-resilience-act">European Cyber Resilience Act</a>. Hardware and software products are increasingly subject to cyberattacks, leading to an estimated annual cost of &#8364;5.5 trillion by 2021.</p><p>This regulation proposal is aimed at setting cybersecurity rules for hardware and software products that are sold in the European Union to increase their security and lower the chances of being involved in cyber incidents. Until now, hardware and/or software products were not addressed by any directive in regards of their cybersecurity unless they were embedded devices/software. As you can imagine the scope of application of this law proposal is huge and will be impacting many products in the EU market.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://side-channel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Side Channel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The proposal is 87 pages long and it is not easy to summarize everything in it. However, I will try my best to provide the most important topics about it:</p><ul><li><p>The regulation sets rules for placing on the market the products with digital elements to ensure its cybersecurity.</p></li><li><p>Sets requirements for the design, development and production of products regarding their cybersecurity.</p></li><li><p>Sets essential requirements for the process of vulnerability handling put in place by manufacturers to ensure the security of products with digital elements during their whole life cycle.</p></li><li><p>Rules on market surveillance and enforcement of the previous mentioned rules and requirements.</p></li></ul><h3>What does all that mean and how consumers and producers may be affected?</h3><p><strong>Consumers</strong> will receive a product with the following information provided by the manufacturer:</p><ul><li><p>Where vulnerabilities can be disclosed to the manufacturer.</p></li><li><p>The intended use of the product and the security properties it provides.</p></li><li><p>Any foreseeable cybersecurity risk derived from a misuse.</p></li><li><p>A software bill of materials related to the product.</p></li><li><p>The type of technical support that can be expected from the manufacturer and until when the users can expect to receive security updates.</p></li><li><p>Relevant information on how the user can obtain information on how to:</p><ul><li><p>Commission the device</p></li><li><p>Install security updates</p></li><li><p>Secure decommissioning of the device</p></li></ul></li></ul><p><strong>Manufacturers</strong> will have to:</p><ul><li><p>Design products that are in line with cybersecurity requirements.</p></li><li><p>Perform a conformity assessment of their product regarding the requirements set out in this new rule. This assessment can be performed as a self-assessment or it can be provided by a notified body.</p><p>However, special conditions apply if the product falls into the class I or II type of products, which are considered the ones with the most risk. In these cases, the manufacturer will have to opt to provide the assessment through very specific means. More information on this topic can be found in article 24.</p></li><li><p>Provide documentation to the end user to ensure it can use the device in a secure manner.</p></li><li><p>Have a procedure to handle vulnerability disclosures, mitigation and release of security patches.</p></li></ul><p><strong>States</strong> will have to:</p><ul><li><p>Monitor the market to ensure the rules are being followed.</p></li></ul><p>I&#8217;ve summarized a huge law into few bullet points, so I am sure there are some inaccuracies, oversimplifications and some topics are not even reflected in the summary. However, I think this high level overview can provide some insight on what the EU is preparing for the near future regarding the cybersecurity of consumer and industrial products. Feel free to reach out to me to discuss any of the topics if I got them wrong!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://side-channel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Side Channel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Is iOS 16 the new digital fortress?]]></title><description><![CDATA[iOS 16 implements new security features: Passkeys and Lockdown mode. Read why they matter, and of course the weekly dose of tech, cybsersec news and resources]]></description><link>https://side-channel.com/p/is-ios-16-the-new-digital-fortress</link><guid isPermaLink="false">https://side-channel.com/p/is-ios-16-the-new-digital-fortress</guid><dc:creator><![CDATA[José Carlos Andreu]]></dc:creator><pubDate>Sun, 18 Sep 2022 17:50:09 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1634618776233-2e951832a5f7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8aW9zfGVufDB8fHx8MTY2MzUxOTY1Mw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1634618776233-2e951832a5f7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8aW9zfGVufDB8fHx8MTY2MzUxOTY1Mw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1634618776233-2e951832a5f7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8aW9zfGVufDB8fHx8MTY2MzUxOTY1Mw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1634618776233-2e951832a5f7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8aW9zfGVufDB8fHx8MTY2MzUxOTY1Mw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1634618776233-2e951832a5f7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8aW9zfGVufDB8fHx8MTY2MzUxOTY1Mw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1634618776233-2e951832a5f7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8aW9zfGVufDB8fHx8MTY2MzUxOTY1Mw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1634618776233-2e951832a5f7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8aW9zfGVufDB8fHx8MTY2MzUxOTY1Mw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1634618776233-2e951832a5f7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8aW9zfGVufDB8fHx8MTY2MzUxOTY1Mw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://images.unsplash.com/photo-1634618776233-2e951832a5f7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8aW9zfGVufDB8fHx8MTY2MzUxOTY1Mw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1634618776233-2e951832a5f7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8aW9zfGVufDB8fHx8MTY2MzUxOTY1Mw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1634618776233-2e951832a5f7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8aW9zfGVufDB8fHx8MTY2MzUxOTY1Mw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1634618776233-2e951832a5f7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8aW9zfGVufDB8fHx8MTY2MzUxOTY1Mw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@unarchive">Jeremy Bezanger</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>This week <a href="https://www.apple.com/newsroom/2022/09/ios-16-is-available-today/">iOS 16 has been released</a> to the public. I am not going to enumerate every new feature, you can already find lots of other sources that have done that. I just want to focus and got into detail on two new security features: <strong>Passkeys</strong> and <strong>Lockdown mode</strong>.</p><h3>Passkeys</h3><p>Apple <a href="https://developer.apple.com/passkeys/">Passkeys</a> are Apple&#8217;s implementation of <a href="https://www.w3.org/TR/webauthn-1/">WebAuthn</a> standard. WebAuthn is a web credential standard API initially proposed by the FIDO alliance and later standardized by the W3C.</p><p>This protocol is aimed at substituting password based authentication, and instead it proposes cryptographic based authentication mechanisms, a much more secure way of authenticating on the Internet. It uses Public key cryptographic mechanisms, where for each credential a couple of keys are created. The public key is shared with the web service and the private key is kept secret in the authenticator device.</p><p>At the moment of performing the authentication against the web service, a challenge is sent through the browser, which acts as a mediator between the web service and the authenticator device.</p><p>The authenticator is the device that holds the private key and is the one that resolves the authentication challenge at the moment of login. In the case of Apple, the keys are protected by either TouchID or FaceID, that is, by a biometric authentication. This means that only the intended user will be able to authenticate with the keys that are stored in the device. No secrets are shared between the web service and the authenticator. This makes this technology highly phishing resistant.</p><p>Apple offers the possibility of saving the private keys to iCloud Keychain, which is end-to-end encrypted, enabling the possibility of having the keys synchronized in all your Apple&#8217;s devices.</p><p>Apple is able to make its users adopt this new technology very fast in a very convenient way. I mean, who wouldn&#8217;t want to ditch passwords forever? I think that web developers that implement Passkeys into their services are about to boom.</p><p>Passkeys are a joint initiative from Apple, Google and Microsoft and I presume that soon we will be using Passkeys in all our devices, independently of the vendor and start thinking that passwords are just a thing from the past.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://side-channel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Side Channel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Lockdown mode</h3><p>Creating secure devices is a tough task. Apple has learnt that the hard way. Recent scandals such as the Pegasus infections have put Apple&#8217;s actual security of its devices and Operating Systems on doubt.</p><p>Lockdown mode is Apple&#8217;s response to the latest attacks with highly sophisticated malware to their iOS based devices, which by the way, is not the ideal solution, because it means that Apple is actually recognizing that its product are not safe enough for highly targeted individuals and they only way to protect them a bit more is just to disable certain features.</p><p>Lockdown mode is a new configuration of iOS in which certain features are restricted or even disabled. These restrictions are activated after the user selects to run in this mode after a restart of the device.</p><p>Using Lockdown mode reduces the attack surface of iOS by:</p><ul><li><p>Disabling Facetime incoming calls from unknown users.</p></li><li><p>Disabling most of the files that can be shared through Messages app and disabling link previews.</p></li><li><p>Features in the browser are disabled: Web fonts won&#8217;t load and the Javascript engine will not use JIT (just in time) compilation. So, web rendering will be affected and also loading times will increase.</p></li><li><p>Configuration profiles cannot be installed while the device is under the lockdown mode. To install new ones, the user should disable it, install the profile and re-enable it.</p></li><li><p>To use USB accessories or to connect your iPhone to a computer the device must be unlocked.</p></li></ul><p>A couple of notes regarding the measures taken in the browser:</p><ul><li><p>Apple forces every web browser (not only Safari) to use its WebKit based rendering engine. There is no way to work around that. Therefore, every web browser will be applying the same security measures as Safari.</p></li><li><p>I have personally tried Lockdown mode in the iPhone and the web browsing gets a little bit impacted. Specially on those sites who rely heavily on icon rendering through web fonts (which are most of the pages I visited). Other than that, I haven&#8217;t seen any other downsides to my normal activity on the phone.</p></li></ul><h2>This week&#8217;s highlights in tech &amp; cybersecurity</h2><ul><li><p><a href="https://www.theverge.com/2022/9/12/23348765/tesla-model-y-unlock-drive-car-thief-nfc-relay-attack">Tesla&#8217;s model Y can be unlocked and started by performing an NFC relay attack</a>: The attack requires 2 attackers working in conjunction. Researchers say that the attack takes 2 seconds and lowering the timeout for the NFC authentication to about 0.5 seconds would increase the difficulty to perform this attack. The authors of the attack comment that this attack could be performed on other manufacturer&#8217;s vehicles that do not have mitigations like the use of a PIN to start the engine, like Tesla does.</p></li><li><p><a href="https://www.theregister.com/2022/09/16/uber_security_incident/?td=rt-9cp">Uber fail - &#8220;Security Response Break the glass account</a>&#8221;: Uber has been hacked allegedly by an 18 year attacker, who social engineered some workers. Leaked screenshots show how bad the breach is: the attacker accessed to the administrator dashboard of Uber&#8217;s infrastructure. The attack is still under investigation.</p><p>Bonus: Check the redacted screenshot for the account names&#8230;</p></li></ul><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/vxunderground/status/1570611979169202179&quot;,&quot;full_text&quot;:&quot;<span class=\&quot;tweet-fake-link\&quot;>@Uber</span> UPDATE: More Uber information data disclosed: vSphere, Google workplace data, and more AWS data. &quot;,&quot;username&quot;:&quot;vxunderground&quot;,&quot;name&quot;:&quot;vx-underground&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Fri Sep 16 03:14:11 +0000 2022&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FcvvOqdXgAUb7d1.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/aTSBBuyust&quot;,&quot;alt_text&quot;:null},{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FcvvPGBWAAIt73k.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/aTSBBuyust&quot;,&quot;alt_text&quot;:null},{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FcvvPn8WYAI9HHv.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/aTSBBuyust&quot;,&quot;alt_text&quot;:null},{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FcvvQI9XEAAuHjY.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/aTSBBuyust&quot;,&quot;alt_text&quot;:null}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:317,&quot;like_count&quot;:1138,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/_MG_/status/1570626240499032065&quot;,&quot;full_text&quot;:&quot;Lots of screenshots going around about Uber but this one shows how wide the hack is. \n\&quot;Security Response Break Glass Service Account\&quot; password &#128293; &quot;,&quot;username&quot;:&quot;_MG_&quot;,&quot;name&quot;:&quot;_MG_&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Fri Sep 16 04:10:51 +0000 2022&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/Fcv70sTacAA6weF.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/pvz12cJrBY&quot;,&quot;alt_text&quot;:null}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:209,&quot;like_count&quot;:720,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><ul><li><p><a href="https://ethereum.org/en/upgrades/merge/">Ethereum has finally merged</a>: Ethereum, from September 15th, is finally based on proof-of-stake instead of proof-of-work. The most evident benefit is that Ethereum reduced its global energy footprint by ~99.95%.</p></li><li><p><a href="https://haveibeentrained.com/">Have i been trained ?</a>: A website to find images that have been used to train AI models capable of generating images.</p></li><li><p><a href="https://ec.europa.eu/commission/presscorner/detail/en/IP_22_5374">EU Cyber Resilience Act</a>: New law project to enforce cyber security measures to the digital markets throughout the life-cycle of the products.</p></li></ul><h2>&#10084;&#65039; My favorite things</h2><ul><li><p><a href="https://xargs.org/">Michale Driscoll illustrated network protocol and cryptography collection</a>: The animated Elliptic Curve, the illustrated TLS 1.3 connection and QUIC connection are perfect learning materials for those of you who want to know more about them. These resources are visually appealing and make easier to understand what&#8217;s beneath the protocols, and the math behind Elliptic Curve.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://side-channel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Side Channel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Open Insulin: biohacking and Open-sourcing insulin manufacturing]]></title><description><![CDATA[The Open Insulin project, this week's cybersecurity highlights and a little review on the last book I read.]]></description><link>https://side-channel.com/p/open-insulin-biohacking-and-open</link><guid isPermaLink="false">https://side-channel.com/p/open-insulin-biohacking-and-open</guid><dc:creator><![CDATA[José Carlos Andreu]]></dc:creator><pubDate>Sun, 11 Sep 2022 19:30:39 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1612851300081-30cac0077b3b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxpbnN1bGlufGVufDB8fHx8MTY2MjkyMjc4MQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1612851300081-30cac0077b3b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxpbnN1bGlufGVufDB8fHx8MTY2MjkyMjc4MQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1612851300081-30cac0077b3b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxpbnN1bGlufGVufDB8fHx8MTY2MjkyMjc4MQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1612851300081-30cac0077b3b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxpbnN1bGlufGVufDB8fHx8MTY2MjkyMjc4MQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1612851300081-30cac0077b3b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxpbnN1bGlufGVufDB8fHx8MTY2MjkyMjc4MQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1612851300081-30cac0077b3b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxpbnN1bGlufGVufDB8fHx8MTY2MjkyMjc4MQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1612851300081-30cac0077b3b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxpbnN1bGlufGVufDB8fHx8MTY2MjkyMjc4MQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" width="1080" height="811" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1612851300081-30cac0077b3b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxpbnN1bGlufGVufDB8fHx8MTY2MjkyMjc4MQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:811,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;yellow and clear glass bottle&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="yellow and clear glass bottle" title="yellow and clear glass bottle" srcset="https://images.unsplash.com/photo-1612851300081-30cac0077b3b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxpbnN1bGlufGVufDB8fHx8MTY2MjkyMjc4MQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1612851300081-30cac0077b3b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxpbnN1bGlufGVufDB8fHx8MTY2MjkyMjc4MQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1612851300081-30cac0077b3b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxpbnN1bGlufGVufDB8fHx8MTY2MjkyMjc4MQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1612851300081-30cac0077b3b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxpbnN1bGlufGVufDB8fHx8MTY2MjkyMjc4MQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@thismyrealone">Dennis Klicker</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p><a href="https://openinsulin.org/">The Open Insulin project</a> is lead by a team of biohackers and open-source hardware makers who are trying to change a multi-billion dollar business by engineering microorganisms (bacteria and yeast) that are capable of producing insulin and all the related machinery to make all that possible.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://side-channel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Side Channel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Before talking about the details of the project and why what they do is important for many people, let&#8217;s have brief look into the history about insulin:</p><p>The first injection of insulin was given to a 14-year-old diabetic patient a 100 years ago at the Toronto General Hospital in Canada. A century has passed since then and one could think that access to this vital hormone would be affordable universally. Well, not really, specially in the US and other countries&#8230; Let&#8217;s dive into why.</p><p>The original process to obtain insulin was based on extracting it and filtering it from cows and pigs pancreases. This process was granted a patent which was sold for $1 to the Toronto University with the aim that it anyone would be free to prepare the extract, but no one could secure a monopoly on it.</p><p>In 1978, scientists from Genentech figured how to create insulin in a lab without the need for pigs or cows. Recombinant DNA was the new technique used to make yeast produce insulin in a lab environment. This discovery makes possible to have virtually unlimited insulin with cost-effective ingredients. 4 years later the first r-DNA insulin was produced commercially by Eli Lilly. This new process granted patents to the laboratories.</p><p>Over the years, the pharmaceutical companies have been extending their different patents related with insulin production. Some of these companies are accused of evergreening their patents, that is, extending the grant of the patent by applying some minor changes to it but without providing any significant improvement on the hormone.</p><p>Sanofi, Eli Lilly and Novo Nordisk account for 96% of the world&#8217;s insulin supply and they all have been using patents to keep competitors out of the market. With few competitors in the market there is no incentive in keeping the prices low. The laboratories have been marketing in favor of the insulin based on r-DNA over the animal based one. Since 2006, all the commercially available insulin is based on r-DNA.</p><p>However, patents are not the only restriction that competition will encounter, but the FDA too. A competitor would have to undergo for a biosimilar approval process, which can be very costly (up to $250 million) and take huge time to be completed.</p><p>This project pretends to find the microorganisms, the protocols and the laboratory equipment needed for producing insulin at a small scale. This could change the current trend of centralized production by big pharma and allowing small laboratories at a city or state level to produce the insulin. The ultimate goal of the foundation is to be able to produce fast-acting (lispro) and long-acting insulin (glargine).</p><p>Vadim Kimlaychuk is an IT infrastucture manager who is volunteering in the project and he is working on the design of a key equipment for manufacturing insulin: the Fast Protein Liquid Chromatography machine (FPLC). This piece of hardware is needed to purify proteins. Vadim is working in creating a FPLC based on open source designs. One of the difficult tasks that they are facing is finding and obtaining the right components to build the hardware as they are often not specifically design for the purpose they intend, so they have to adapt them.</p><p>The Open Insulin project has a long road ahead before they will be able to release insulin usable by diabetics. Even though there are some major issues to overcome they continue ahead.</p><p>It&#8217;s encouraging and sad at the same time that projects like this exist. It&#8217;s nice to see that there are people who are willing to volunteer and try to find out a solution that relies on the same principles of the open-source software, from which a lot of people can benefit as everyone will be able to access the resources to replicate an insulin laboratory and can also contribute back with any improvements that can be applied to original process or design. However, it is also sad that this project is searching for a solution that already exists, but due to the exploitation of the patent system (and unlimited pricing in the US drug market) many people in the US and around the world don&#8217;t have proper access to the insulin they need.</p><p>Sources: <a href="https://news.un.org/en/story/2021/11/1105582">United Nations News</a>, <a href="https://thehill.com/policy/healthcare/600450-why-insulin-prices-are-troublingly-high/">The Hill</a>, <a href="https://wiredpen.com/2022/09/06/genentech-develops-synthetic-insulin/">WiredPen</a>, <a href="https://www.theverge.com/2019/11/19/20966695/insulin-industry-diabetic-type-1-drug-price-cost-manufacturing-access">The Verge</a></p><h2>This week&#8217;s highlights in tech &amp; cybersecurity</h2><ul><li><p><a href="https://www.reuters.com/world/albania-cuts-iran-ties-orders-diplomats-go-after-cyber-attack-pm-says-2022-09-07/">Albania cuts Iran ties over cyber attacks</a>: Albania has ordered Iranian diplomats to leave the country. These measures come after the US concluded that Iran was behind July 15th cyber attacks to government infrastructure. On September 10th, <a href="https://abcnews.go.com/International/wireStory/albania-reports-2nd-cyberattack-iran-border-systems-89641280">Albania reported a second cyber attack on its border systems</a>.</p></li><li><p><a href="https://www.universetoday.com/157474/iphone-14-will-have-satellite-connectivity-how-exactly-it-will-work/">iPhone 14 will have satellite connectivity</a> (only one-way communication for SOS): Globalstar is going to be the provider for the emergency communication.</p></li><li><p><a href="https://go.theregister.com/feed/www.theregister.com/2022/09/06/go_govulncheck_vulnerability_tool/">Go programming language has added a tool in its tool-chain to detect known vulnerabilities in your projects</a>.</p></li><li><p><a href="https://www.nytimes.com/2022/09/03/world/americas/ships-gps-international-law.html">Ships manipulate their location data to avoid international laws</a>: United Nations discovered that more than 500 ships tampered with their Global Navigation Satellite Systems (GNSS) to hide their real locations. The use of this fraudulent technique has been used to cover tankers stopping at Iran, Chinese fishing boats operating in protected waters in South America and container ships that hide journeys in the Middle East. International laws require that all big ships equip satellite transponders, known as AIS (Automated Identification Systems). AIS location manipulation shows how easy it is to tamper with these systems</p></li></ul><h2>&#10084;&#65039; My favorite things</h2><ul><li><p>I just finished reading <a href="https://www.elephantinthebrain.com/">The Elephant in the Brain</a>: This book goes into detail into our hidden motives for what we do as social and political creatures that we are. It&#8217;s interesting in how in takes another perspective in religion, politics, charity, art, among others. I must recognise that it was a bit hard to finish for me and I felt that some explanations were oversimplified, but overall I would recommend it.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://side-channel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Side Channel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Privacy cookie monster]]></title><description><![CDATA[The state of cookie banners, this week's cybersecurity highlights, infosec resources and open-source repositories]]></description><link>https://side-channel.com/p/privacy-cookie-monster</link><guid isPermaLink="false">https://side-channel.com/p/privacy-cookie-monster</guid><dc:creator><![CDATA[José Carlos Andreu]]></dc:creator><pubDate>Sun, 04 Sep 2022 11:04:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RRMj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef05edf-8568-490d-9abc-5ce7818bee5f_511x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RRMj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef05edf-8568-490d-9abc-5ce7818bee5f_511x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RRMj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef05edf-8568-490d-9abc-5ce7818bee5f_511x512.png 424w, https://substackcdn.com/image/fetch/$s_!RRMj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef05edf-8568-490d-9abc-5ce7818bee5f_511x512.png 848w, https://substackcdn.com/image/fetch/$s_!RRMj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef05edf-8568-490d-9abc-5ce7818bee5f_511x512.png 1272w, https://substackcdn.com/image/fetch/$s_!RRMj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef05edf-8568-490d-9abc-5ce7818bee5f_511x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RRMj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef05edf-8568-490d-9abc-5ce7818bee5f_511x512.png" width="511" height="512" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/def05edf-8568-490d-9abc-5ce7818bee5f_511x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:511,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:582112,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RRMj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef05edf-8568-490d-9abc-5ce7818bee5f_511x512.png 424w, https://substackcdn.com/image/fetch/$s_!RRMj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef05edf-8568-490d-9abc-5ce7818bee5f_511x512.png 848w, https://substackcdn.com/image/fetch/$s_!RRMj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef05edf-8568-490d-9abc-5ce7818bee5f_511x512.png 1272w, https://substackcdn.com/image/fetch/$s_!RRMj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdef05edf-8568-490d-9abc-5ce7818bee5f_511x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This week I stumbled upon with <a href="https://cacm.acm.org/magazines/2022/7/262074-cookie-monster/fulltext">Cookie Monster</a>, an article written by CS and security professor Lorrie Faith at Carnegie Mellon University where she exposes the pitiful state of the mandatory cookie banners in the Web.</p><p>The lab at the Carnegie Mellon University conducted a study where 1000 people from the U.S. where presented one of 12 cookie banners while they were shopping. After the task was completed they were interviewed about what they consented to and why.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://side-channel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Side Channel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The results are that if a user is presented with an easy selection of any of the options, they tend to accept fewer cookies. If they banner is unobtrusive, they are likely not to interact with it, and therefore default policy applies. However, if a permanent button is shown floating on the right bottom side of the page, nobody interacts with it.</p><p>The author also mentions the use of obscure patterns so that users are tricked into giving consent to all cookies. In other cases found in the study, the banners are completely useless as they do not even comply with the law and they just state that the website uses cookies and they do not give any option to the user.</p><p>The terms to use are not standardised and varies from region to region, which create confusion among users.</p><p>Automated solutions have been proposed to allow users to set their preferences in their web browser rather than a website by website basis. These include &#8220;Do Not Track&#8221; and a more recent solution called &#8220;Global Privacy Control&#8221; which allow users to automatically send requests to not to sell their personal information to all website they visit. GPC requests are considered valid under the the California Consumer Privacy Act (CCPA) and websites that ignore them may face enforcement actions in California. However, these mechanisms are usually ignored by most of the sties.</p><p>The author proposes in the short term to provide cleaner cookie banners so that users can access easily to their choices and remove banners where no relevant choices are given to users. On the long term, automated solutions are needed so that user&#8217;s choices are respected everywhere.</p><p>Still a long way to have a harmonised and automated way of keeping the privacy cookie monster away from our browsers.</p><h2>This week cybersecurity news</h2><ul><li><p><a href="https://www.spiceworks.com/it-security/data-breaches/news/lastpass-hacked-source-code-theft/">Lastpass internal source-code and some documentation was stolen by a cyber attacker.</a> The company assures that no user data or encrypted password vaults are at risk.</p></li><li><p>A security researcher has found a novel way to exfiltrate data from air-gapped machines by abusing the LED activity indicators that are usually present in NICs (network interface controllers). This new technique named <a href="https://arxiv.org/abs/2208.09975">ETHERLED</a> demonstrates that an attacker could use malware to exfiltrate data by encoding as Morse code, for instance. The receiver of the information could be placed tens to hundreds of meters away from the air-gapped machine.</p></li><li><p><a href="https://www.hackread.com/nato-hackers-selling-data-missile-firm-mbda/">A cybercrime organization is allegedly trying to sell NATO missile classified data from MBDA company.</a> The criminals are trying to sell around 70 GB of data for 1 BTC.</p></li><li><p><a href="https://crypt.ee/ios-lockdown-mode-test">iOS lockdown mode detection test</a>: The people from <a href="https://crypt.ee/">Cryptee</a> have created a proof-of-concept test that is able to assess by opening <a href="https://crypt.ee/ios-lockdown-mode-test">this website</a> if you are running lockdown mode on your iPhone. Remember that lockdown mode disables messaging and other engagements with people who are not on your contact list, link previews and on Safari it disables JIT compilation (Just In Time) and custom fonts.</p></li><li><p><a href="https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html">Google Chrome is releasing a security update to mitigate CVE-2022-3075</a>. Google states that is aware that exploits exist in the wild.</p></li><li><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-28799">Microsoft discovered a one-click exploit for TikTok on Android platform.</a> The vulnerability (CVE-2022-28799) can lead to account hijacking as stated in <a href="https://www.microsoft.com/security/blog/2022/08/31/vulnerability-in-tiktok-android-app-could-lead-to-one-click-account-hijacking/">Microsoft&#8217;s write-up</a></p></li><li><p><a href="https://support.apple.com/en-us/HT213428">Apple issued a security update for iOS 12 (12.5.6)</a> which addresses a major security vulnerability, recently patched for iOS 15. Apple states that is aware of a report that the vulnerability may have been actively exploited.</p></li></ul><h2>&#10084;&#65039;&nbsp;My favorite things</h2><ul><li><p><a href="https://www.youtube.com/watch?v=qUh507Na9nk">Liveoverflow&#8217;s great video on kernel root exploitation of a race condition</a>: This video is a wonderful learning resource of how race conditions can be exploited. It is explained in detail and with simple explanations that ease the difficulty of such kind of exploitation.</p></li></ul><h2>Infosec resources</h2><ul><li><p><a href="https://pwnedkeys.com/">pwnedkeys</a> offer an API to check if any private key that you may be using has been leaked or reused? You can check on this website if a key you are using is untrustworthy.</p></li><li><p><a href="https://defcon.org/html/links/dc-archives/dc-30-archive.html">DEFCON 30 repository</a> contains video, slides, audios, white-papers and other resources that were presented at DEFCON 30.</p></li></ul><h2>Open-source repositories</h2><ul><li><p><a href="https://github.com/GaloisInc/MATE">GaloisInc/MATE</a>: MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs. The documentation can be found on: <a href="https://galoisinc.github.io/MATE/">https://galoisinc.github.io/MATE/</a></p></li><li><p><a href="https://github.com/google/paranoid_crypto">Google/paranoid_crypto</a>: Paranoid project checks for well known weaknesses on cryptographic artifacts such as public keys, digital signatures and general pseudorandom numbers.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://side-channel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Side Channel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The times they are AI-changin’]]></title><description><![CDATA[The societal changes that will come with image generation Artificial Intelligence, highlights on this week's cybersecurity and a choice of infosec resources]]></description><link>https://side-channel.com/p/the-times-they-are-ai-changin</link><guid isPermaLink="false">https://side-channel.com/p/the-times-they-are-ai-changin</guid><dc:creator><![CDATA[José Carlos Andreu]]></dc:creator><pubDate>Sun, 28 Aug 2022 16:56:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XfEE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c1aa94-c28b-4dde-91a5-b313b9413fbb_512x512.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XfEE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c1aa94-c28b-4dde-91a5-b313b9413fbb_512x512.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XfEE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c1aa94-c28b-4dde-91a5-b313b9413fbb_512x512.png 424w, https://substackcdn.com/image/fetch/$s_!XfEE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c1aa94-c28b-4dde-91a5-b313b9413fbb_512x512.png 848w, https://substackcdn.com/image/fetch/$s_!XfEE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c1aa94-c28b-4dde-91a5-b313b9413fbb_512x512.png 1272w, https://substackcdn.com/image/fetch/$s_!XfEE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c1aa94-c28b-4dde-91a5-b313b9413fbb_512x512.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XfEE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c1aa94-c28b-4dde-91a5-b313b9413fbb_512x512.png" width="512" height="512" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/a9c1aa94-c28b-4dde-91a5-b313b9413fbb_512x512.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:512,&quot;width&quot;:512,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:617404,&quot;alt&quot;:&quot;Painting of Bob Dylan playing the guitar in the style of a Van Gogh painting&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Painting of Bob Dylan playing the guitar in the style of a Van Gogh painting" title="Painting of Bob Dylan playing the guitar in the style of a Van Gogh painting" srcset="https://substackcdn.com/image/fetch/$s_!XfEE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c1aa94-c28b-4dde-91a5-b313b9413fbb_512x512.png 424w, https://substackcdn.com/image/fetch/$s_!XfEE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c1aa94-c28b-4dde-91a5-b313b9413fbb_512x512.png 848w, https://substackcdn.com/image/fetch/$s_!XfEE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c1aa94-c28b-4dde-91a5-b313b9413fbb_512x512.png 1272w, https://substackcdn.com/image/fetch/$s_!XfEE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9c1aa94-c28b-4dde-91a5-b313b9413fbb_512x512.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image generated by me with Stable Diffusion AI with prompt: a&nbsp;photograph&nbsp;of&nbsp;Bob&nbsp;Dylan&nbsp;singing&nbsp;and&nbsp;playing&nbsp;the&nbsp;guitar&nbsp;in&nbsp;the&nbsp;style&nbsp;of&nbsp;Van&nbsp;Gogh</figcaption></figure></div><p>The Open Source release of <a href="https://stability.ai/blog/stable-diffusion-announcement">Stable Diffussion</a> got me thinking about the big breakthrough it will be for the Internet and for our society as well. For those of you who are not familiar with the current trend of text-to-image Artificial Inteligence, Stable Diffusion is an open-sourced AI model that can turn whatever we describe with words into an image. It is not the only AI capable of doing so, but it is the first one to be open-sourced. 2022 has been a crazy year for this kind of technology: <a href="https://openai.com/dall-e-2/">OpenAI&#8217;s Dall-e 2</a>, <a href="https://imagen.research.google/">Google Imagen</a>, <a href="https://www.craiyon.com/">Dall-e mini</a>, <a href="https://parti.research.google/">Google Parti</a>, <a href="https://ai.facebook.com/blog/greater-creative-control-for-ai-image-generation/?utm_source=twitter&amp;utm_medium=organic_social&amp;utm_campaign=make-a-scene&amp;utm_content=announcement">Meta&#8217;s make-a-scene</a>, <a href="https://nuwa-infinity.microsoft.com/#/">Microsoft&#8217;s NUWA</a>, <a href="https://www.midjourney.com/home/">Midjourney</a>,&#8230;</p><p>Until now, all of the available AIs have been under the full control of their developers, who could impose any restrictions on the images generated with their technology. For instance, Dall-e 2 cannot create any images depicting famous people, nudity, or violence. However, Stable Diffussion does not have any of these constraints, opening the possibility of easing the process of creating deep-fakes, violent images, or even adult content.</p><p>Anyhow, not having restrictions on the images generated by the AI is not what is shocking to me, but the deep changes that are about to start in society. What about the work of artists, designers, and illustrators? Will these AIs become tools that will help them in their creative process or will they become a substitute for their work?</p><p>I always thought that creative tasks would be the last ones to be automated by AIs. I have been used to the automation of repetitive tasks, for example, the ones at a factory, and I think I am not the only one thinking this way. The automation of repetitive tasks is viewed positively by humans because those tasks typically have less value than more creative ones. However, this new trend is breaking the paradigm that we were used to.</p><p>Not only is image creation a task being performed by AIs, but other <em>creative</em> tasks are also performed nowadays incredibly well by AIs, such as code completion with <a href="https://github.com/features/copilot">Github Copilot</a> or music track separation with <a href="https://www.lalal.ai/">LALAL.AI</a>. Let&#8217;s not forget automated driving, which in its current state is able to <a href="https://www.youtube.com/watch?v=yjztvddhZmI">drive safer than humans</a> (under favorable conditions).</p><p>So, there is a clear question to ask ourselves: Are we going to go jobless? Well, I am pretty sure there will be employment destruction derived from the massive adoption of these technologies, as there always has been when society adopts any revolutionary technology. However, new jobs will be created, jobs we were not able to imagine years ago. Take the example of any image generation AI; right now, these AIs respond to a textual input but the results need to be checked by a human to make sure that they look realistic and that they fit with the description that we wanted to be represented in the form of an image. Imagine now that these AIs could have fine tweaks in their input such as more complicated parameters, not only words. Most likely this task would be carried out by someone who understands the underlying technology. This task will be performed by what is known as a prompt engineer. I never imagined that such a job could ever exist.</p><p>Let&#8217;s go one step further and imagine the next AI capable of not only creating images but creating movies by being fed just a text script. Even more, let&#8217;s add an AI that would create the soundtrack of the movie that created the AI on its own. Isn&#8217;t it surprising and scary at the same time?</p><p>We are about to live a moment of breakthrough change, just like when social networks started becoming popular or the popularization of the Internet and the Web.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://side-channel.com/subscribe?&quot;,&quot;text&quot;:&quot;Suscr&#237;bete&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Side Channel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Suscr&#237;bete"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>&#128274; Highlights on cybersecurity this week</h2><ul><li><p><a href="https://inappbrowser.com/">Inappbrowser.com</a> is a tool that let&#8217;s you check what JavaScript commands get injected through an in-app browser. <a href="https://twitter.com/KrauseFx">Felix Krause</a>, the creator of the <a href="https://github.com/KrauseFx/inAppBrowser.com">tool</a>, has performed some testing on the in-app browser of various iOS applications with worrying results.</p><p>Apps like Instagram, Facebook or FB Messenger have the ability to modify the page that is being shown in the in-app browser. However, the most intrusive one is TikTok: when opening a website from within the TikTok iOS app, they inject code that can observe every keyboard input. Therefore, they could be collecting critically sensitive information such as passwords, credit card information, etc.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!X-VS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F296de508-a72c-4dea-99cf-c0f3fcc59ce9_1142x578.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!X-VS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F296de508-a72c-4dea-99cf-c0f3fcc59ce9_1142x578.png 424w, https://substackcdn.com/image/fetch/$s_!X-VS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F296de508-a72c-4dea-99cf-c0f3fcc59ce9_1142x578.png 848w, https://substackcdn.com/image/fetch/$s_!X-VS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F296de508-a72c-4dea-99cf-c0f3fcc59ce9_1142x578.png 1272w, https://substackcdn.com/image/fetch/$s_!X-VS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F296de508-a72c-4dea-99cf-c0f3fcc59ce9_1142x578.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!X-VS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F296de508-a72c-4dea-99cf-c0f3fcc59ce9_1142x578.png" width="625" height="316.3309982486865" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/296de508-a72c-4dea-99cf-c0f3fcc59ce9_1142x578.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:578,&quot;width&quot;:1142,&quot;resizeWidth&quot;:625,&quot;bytes&quot;:106432,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!X-VS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F296de508-a72c-4dea-99cf-c0f3fcc59ce9_1142x578.png 424w, https://substackcdn.com/image/fetch/$s_!X-VS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F296de508-a72c-4dea-99cf-c0f3fcc59ce9_1142x578.png 848w, https://substackcdn.com/image/fetch/$s_!X-VS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F296de508-a72c-4dea-99cf-c0f3fcc59ce9_1142x578.png 1272w, https://substackcdn.com/image/fetch/$s_!X-VS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F296de508-a72c-4dea-99cf-c0f3fcc59ce9_1142x578.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This Twitter thread from the creator gives more insight on his findings:</p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/KrauseFx/status/1560370732705742848&quot;,&quot;full_text&quot;:&quot;&#128293; New Post: Announcing InAppBrowser - see what JavaScript commands get injected through an in-app browser\n\n&#128064; TikTok, when opening any website in their app, injects tracking code that can monitor all keystrokes, including passwords, and all taps.\n\n<a class=\&quot;tweet-url\&quot; href=\&quot;https://krausefx.com/blog/announcing-inappbrowsercom-see-what-javascript-commands-get-executed-in-an-in-app-browser\&quot;>krausefx.com/blog/announcin&#8230;</a> &quot;,&quot;username&quot;:&quot;KrauseFx&quot;,&quot;name&quot;:&quot;Felix Krause&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Thu Aug 18 20:59:07 +0000 2022&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FaeM575XoAEbO11.png&quot;,&quot;link_url&quot;:&quot;https://t.co/pQcX5vrEXc&quot;,&quot;alt_text&quot;:null}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:15209,&quot;like_count&quot;:31976,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div></li></ul><ul><li><p>A whistleblower on Twitter: Peiter Zatko a.k.a <a href="https://twitter.com/dotmudge">Mudge</a>, former head of security at Twitter was fired on January 21 by Parag Agrawal in one of his first official acts as Twitter CEO. Recently, Mudge has filed an <a href="https://s3.documentcloud.org/documents/22186782/whistleblower_disclosure.pdf?utm_source=substack&amp;utm_medium=email">84-page complaint</a> to the Securities and Exchange Commission, the Deparment of Justice and the Federal Trade Commission.</p><p>Some people see this complaint as a huge advantge for Elon Musk in his trial against Twitter for having cancelled its acquisition.</p><p>Mudge states in the complaint that security practice at Twitter was a disaster. I am sure we are going to have some really juicy headlines when the Musk vs. Twitter trial starts in a couple of months.</p></li><li><p><a href="https://www.openssl.org/blog/blog/2022/08/24/FIPS-validation-certificate-issued/">The OpenSSL 3.0 FIPS Provider</a> has had its FIPS 140-2 validation&nbsp;<a href="https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4282">certificate</a> issued by NIST &amp; CSE.</p></li><li><p><a href="https://zplin.me/papers/DirtyCred-Zhenpeng.pdf">Dirtycred</a> (CVE-2022-0847) is a newly discovered privilege escalation method that can overwrite any files with read permission on Linux. It was presented at <a href="https://www.blackhat.com/us-22/">Blackhat USA 2022</a>. This new technique is data-only with currently no mitigations on upstream kernel. Exploits based on Dirtycred could work across different kernels without the need of re-writing their code, making the exploits universal. According to the researchers who discovered it, this method could take advantage of existing vulnerabilities that have double-free ability to perform privilege escalation and even container escaping.</p><p>There is a public GitHub repository <a href="https://github.com/Markakd/DirtyCred">https://github.com/Markakd/DirtyCred</a> in which they have published a Proof-of-concept of the technique taking advantage of an already existing vulnerability CVE-2021-4154 and CVE-2022-2588. The repository also contains the code of a potential fix to the Linux Kernel to prevent exploiting with this technique.</p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/an-encrypted-zip-file-can-have-two-correct-passwords-heres-why/">An encrypted zip file can have two valid passwords</a> TL;DR: Zip files with password protection use PBKDF2 to generate they encryption key for ciphering the contents. However, if the password is longer than 64 bytes it uses the SHA-1 of such password as the input for the PBKDF2 function. Therefore, for a file that used a sufficiently long password, we could use the original long password or the SHA-1 string representation of that password as valid passwords for that file.</p></li></ul><h2>&#9829; My favourite things</h2><ul><li><p><strong><a href="https://www.youtube.com/watch?v=VheNpiSZxf0">Dungeon Master - Clever Floppy Disk Anti-Piracy</a></strong> A video from <a href="https://twitter.com/ModernVintageG">Modern Vintage Gamer</a> in which he explains with astonishing detail how a clever anti-copy mechanism was implemented on floppy disks.</p></li></ul><h2>Infosec online resources</h2><ul><li><p><a href="https://www.thelatticeclub.com/">What is Lattice-based cryptography?</a> Is a nice website that has compilation of different resources to learn more about this quantum resistant algorithm. Most of the resources, however, require some degree of math knowledge. If you are interested in lattice-based cryptography and, like me, find this materials hard to understand, you can start with <a href="https://www.youtube.com/watch?v=37Ri1jpl5p8">Introduction to Lattice Based Cryptography</a></p></li><li><p>Twitter thread about penetration testing labs:</p></li></ul><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/hetmehtaa/status/1561681412515803137&quot;,&quot;full_text&quot;:&quot;Massive List of Penetration Testing Training Labs.\n\n// Thread &#129525;\n\n<span class=\&quot;tweet-fake-link\&quot;>#infosec</span> <span class=\&quot;tweet-fake-link\&quot;>#thesecureedge</span> <span class=\&quot;tweet-fake-link\&quot;>#bugbounty</span> <span class=\&quot;tweet-fake-link\&quot;>#pentesting</span>&quot;,&quot;username&quot;:&quot;hetmehtaa&quot;,&quot;name&quot;:&quot;Het Mehta&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Mon Aug 22 11:47:18 +0000 2022&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:464,&quot;like_count&quot;:1296,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><ul><li><p><a href="https://hijacklibs.net/">Hijack Libs</a> is a project that provides a curated list of DLL Hijacking candidates. A mapping between DLLs and vulnerable executables is kept and can be searched via its website.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://side-channel.com/subscribe?&quot;,&quot;text&quot;:&quot;Suscr&#237;bete&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Side Channel! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Suscr&#237;bete"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Right to repair]]></title><description><![CDATA[John Deere tractors got jailbroken with root access and other cyber news of the week]]></description><link>https://side-channel.com/p/right-to-repair</link><guid isPermaLink="false">https://side-channel.com/p/right-to-repair</guid><dc:creator><![CDATA[José Carlos Andreu]]></dc:creator><pubDate>Sun, 21 Aug 2022 18:22:39 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1600828577513-16b0e00ce445?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwzMXx8amhvbiUyMGRlZXJlfGVufDB8fHx8MTY2MDk5ODM0OA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>First of all, thank you for reading this. It&#8217;s been a while since I haven&#8217;t written publicly. Hope you enjoy it!</p><p>As this is my first note to all of you, I will try a format and if you like it I&#8217;ll keep it, if you hate it tell me what you&#8217;d change. I&#8217;m here for you, so just let me know!</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1600828577513-16b0e00ce445?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwzMXx8amhvbiUyMGRlZXJlfGVufDB8fHx8MTY2MDk5ODM0OA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1600828577513-16b0e00ce445?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwzMXx8amhvbiUyMGRlZXJlfGVufDB8fHx8MTY2MDk5ODM0OA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1600828577513-16b0e00ce445?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwzMXx8amhvbiUyMGRlZXJlfGVufDB8fHx8MTY2MDk5ODM0OA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1600828577513-16b0e00ce445?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwzMXx8amhvbiUyMGRlZXJlfGVufDB8fHx8MTY2MDk5ODM0OA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1600828577513-16b0e00ce445?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwzMXx8amhvbiUyMGRlZXJlfGVufDB8fHx8MTY2MDk5ODM0OA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1600828577513-16b0e00ce445?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwzMXx8amhvbiUyMGRlZXJlfGVufDB8fHx8MTY2MDk5ODM0OA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1600828577513-16b0e00ce445?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwzMXx8amhvbiUyMGRlZXJlfGVufDB8fHx8MTY2MDk5ODM0OA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;green and silver analog gauge&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="green and silver analog gauge" title="green and silver analog gauge" srcset="https://images.unsplash.com/photo-1600828577513-16b0e00ce445?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwzMXx8amhvbiUyMGRlZXJlfGVufDB8fHx8MTY2MDk5ODM0OA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1600828577513-16b0e00ce445?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwzMXx8amhvbiUyMGRlZXJlfGVufDB8fHx8MTY2MDk5ODM0OA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1600828577513-16b0e00ce445?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwzMXx8amhvbiUyMGRlZXJlfGVufDB8fHx8MTY2MDk5ODM0OA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1600828577513-16b0e00ce445?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwzMXx8amhvbiUyMGRlZXJlfGVufDB8fHx8MTY2MDk5ODM0OA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@blunkorama">Daniel Lloyd Blunk-Fern&#225;ndez</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>This week I read about the <a href="https://www.wired.com/story/john-deere-tractor-jailbreak-defcon-2022/">John Deere jailbreak</a>, and I thought once again about the right to repair. Being the son of an electronic repairman, who made a living repairing all sorts of electronic equipment, the current situation of the reparability of electronics ashames me. I was used to the possibility of being able to repair everything, no matter what the issue was with the device, but that&#8217;s not the case anymore. Not to mention the <a href="https://en.wikipedia.org/wiki/Planned_obsolescence">planned obsolescence</a> practices that some manufacturers apply to their products, where even when the device is perfectly fine, it just stops working. <a href="https://www.vice.com/en/article/pamkqn/watch-tractor-hacking-john-deere-right-to-repair-documentary">Farmers have been fighting for a long time against John Deere's restrictions on tractor repair.</a> Similarly, as with cars, which are nowadays computers with wheels, the possibility to roll your own repairs can be jeopardised at the manufacturer&#8217;s will. </p><p>However, there is some light on the horizon as some countries like <a href="https://www.insidehook.com/daily_brief/tech/france-repair-law-tech">France</a> and the <a href="https://www.reuters.com/world/us/us-lawmakers-introduce-right-repair-bills-spur-competition-2022-02-03/">USA</a> are passing laws to enforce the creation of long-lasting products and to protect the right to repair.</p><p>By the way, if you want to know more about how farming has become highly technified and the vision of John Deere&#8217;s CTO on it, check out this <a href="https://podcasts.apple.com/us/podcast/john-deere-cto-jahmy-hindman-on-farming-data-and/id1011668648?i=1000525581675">Decoder podcast</a>.</p><div><hr></div><h3>My highlights on cybersecurity this week</h3><ul><li><p>&#128187;&nbsp;<strong>CPU vulns</strong>: Vulnerabilities have been discovered for Intel (<a href="https://aepicleak.com/">&#198;PIC</a>) and AMD (<a href="https://stefangast.eu/papers/squip.pdf">SQUIP</a>) CPUs.</p><p><strong>&#198;PIC</strong> is a micro-architectural vulnerability that affects SGX enclaves (Intel&#8217;s Trusted Execution Environment solution) and can lead to leaks of AES and RSA keys with 94% and 74% success rate respectively.</p><p><strong>SQUIP</strong> (Scheduler Queue Usage via Interference Probing) is a side-channel vulnerability in the scheduler queues, which are are critical for deciding the schedule of instructions to be executed in <a href="https://en.wikipedia.org/wiki/Superscalar_processor">superscalar CPUs</a>. The researchers have been able to fully recover a 4096-bit RSA key with 50500 traces from a co-located process in a co-located virtual machine.</p></li><li><p>&#128275;&nbsp;<strong>Broken crypto</strong>: <a href="https://sike.org/">SIKE</a>, a post-quantum cryptographic algorithm that made it to round 4 of the NIST standardisation process has been broken with very basic hardware. In their <a href="https://eprint.iacr.org/2022/975.pdf">preliminary paper</a> they state that the attack only needs 1 hour of processing on a single core of an Intel Xeon E5. Quite surprising as this algorithm already underwent brutal cryptanalysis (as the other candidates) as part of the NIST standardisation process.</p></li><li><p>&#127822;&nbsp;<strong>Apple Patch updates</strong>: Apple issued patches for <a href="https://support.apple.com/en-us/HT213413">MacOS</a>, <a href="https://support.apple.com/en-us/HT213412">iPadOS and iOS</a> to mitigate a couple of 0-day vulnerabilities (CVE-2022-32893 and CVE-2022-32894) that affect WebKit component and the kernel.</p><p>The count of the 0-day vulnerabilities patched by Apple from the start of this year sums to a total of 6.</p></li><li><p>&#128663;&nbsp;<strong>Car Hacking</strong>: This story is a complete &#129318;&#8205;&#9792;&#65039;: <a href="https://programmingwithstyle.com/posts/howihackedmycar/">A developer explains</a> why it was possible to run their own software on the a Hyundai Ioniq SEL infotainment hardware after discovering the vehicle's manufacturer had secured its system using cryptographic keys that were not only publicly known but had been lifted from programming examples.</p><p>Developer tip: Remember to always create your own keys and never copy them from public sources.</p></li></ul><div><hr></div><h3>&#9829;&nbsp;My favourite things</h3><ul><li><p>&#127897;<strong>Podcast</strong>: <a href="https://99percentinvisible.org/">99% invisible</a> is an amazing podcast hosted by Roman Mars about all the thought and design that goes into everything that we do not think about, the unnoticed design and architecture that shapes our surroundings. Definitely one of the podcasts that I enjoy the most.</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://side-channel.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Side Channel! Subscribe for free to receive new posts.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>