Feb 15, 2022
Alyssa Milller (@AlyssaM_InfoSec)
April Wright (@Aprilwright)
Log4j and OSS software management and profitability
Free as in beer, but you pay for the cup… (license costs $$, not the software).
“If you make money using our software, you must buy a license” - not an end-user license
Open source conference at Whitehouse:
“For too long, the software community has taken comfort in the assumption that open source software is generally secure due to its transparency and the assumption that many eyes were watching to detect and resolve problems,” said Kent Walker, chief legal officer at Google in a blog post published after the meeting. “But in fact, while some projects do have many eyes on them, others have few or none at all.”
Show was inspired by this
Open source IoT platforms: https://www.record-evolution.de/en/open-source-iot-platforms-making-innovation-count/
Cloud services - processing messages, register/de-register devices, pass messages to other devices/gateways
Mobile apps -
Cloud services DO go offline,
point of failure:
Connectivity and sharing mesh networks assumes you like your neighbors.
network vulnerabilities: https://fractionalciso.com/why-you-should-not-be-using-xfinitywifi-hotspots/
Fine GPS locations
Nearby devices triangulate (via BLE, wifi, or 900mhz)
We want to find our lost devices, but devices can be used for stalking
Just have an iPhone and you’ll be able to find a stalking device, just install a 100MB app (Ring, Alexa, etc) to detect all devices in the area, or use the right ecosystem to find these items (or know every possible device that could be used to track someone)
What do companies want with that information?
What is a ‘happy medium’ to allow you to find your dog, but not to track people?
Device controls? Buzzers? (how loud can you make a noise in a small device?) Size issues, battery life, beaconing, self-identification (“Hi, I am a lost device…”)
Is what Airtags doing enough to reduce the fear?
Are we designing to edge cases? There are cheaper/easier ways to track someone (phones have a longer standby time than fetch/airtag/tile)
How often do you lose your keys? Why is your dog not on a leash or properly trained?
What will it take to make these kinds of devices more secure?
Will it take privacy protections to motivate IoT devices to design a better IoT device? Or force standards to be followed, like https://www.ioxtalliance.org/get-ioxt-certified?
https://csrc.nist.gov/publications/detail/sp/800-213a/final - detailed specs
Does your Iot Platform give out SDKs for integrations or allowing 3rd party products or apps? https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain/
Old and outdated libraries, like TCP vulnerabilities (RIPPLE20)
https://arxiv.org/ftp/arxiv/papers/1302/1302.0939.pdf - Security and Privacy Issues in Wireless Mesh
Networks: A Survey
Opt-out of Amazon sidewalk
As one example, this week we announced Fetch, a compact, lightweight device that will clip to your pet’s collar and help ensure they’re safe. If your dog wanders outside a perimeter you’ve set using the Ring app, Fetch will let you know. In the future, expanding the Amazon Sidewalk network will provide customers with even more capabilities like real-time location information, helping you quickly reunite with your lost pet. For device makers, Fetch also serves as a reference design to demonstrate the potential that devices connected to a broad, reliable network can provide to their customers.