Man in the Middle Attacks & Superfish - Computerphile

แชร์
ฝัง
  • เผยแพร่เมื่อ 15 พ.ค. 2024
  • Lenovo sold thousands of computers all carrying the Superfish software. Tom Scott explains what a security nightmare this became.
    More Tom Scott:
    / enyay
    / tomscott
    CORRECTION: At 2min 46secs Tom says "Private Key" when he means "Public Key" - The private key is not shared.
    Chip & PIN Fraud: • Chip & PIN Fraud Expla...
    Could We Ban Encryption?: • Could We Ban Encryptio...
    How Blurs & Filters work: • How Blurs & Filters Wo...
    Numberphile: Encryption & Huge Numbers : • Encryption and HUGE nu...
    Public Key Cryptography: • Public Key Cryptograph...
    / computerphile
    / computer_phile
    This video was filmed and edited by Sean Riley.
    Computer Science at the University of Nottingham: bit.ly/nottscomputer
    Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com

ความคิดเห็น • 800

  • @SkydreamerStudios
    @SkydreamerStudios 6 ปีที่แล้ว +2484

    After this video I can't help but imagine each of the computerfile guys are kept seated in a different corner of that room and the camera just swivels around when he needs to make a new video

    • @kroushwayfair7688
      @kroushwayfair7688 5 ปีที่แล้ว +56

      Sky C. That 70's Show style~

    • @IDoBeSmarter
      @IDoBeSmarter 4 ปีที่แล้ว +16

      Confirmed

    • @l.law-1611
      @l.law-1611 3 ปีที่แล้ว +10

      NOOOO YOOOOOO
      WHENE I READ THIS HE TURNED THE CAM TO MY OTHER PC GUYY

    • @sinpi314
      @sinpi314 3 ปีที่แล้ว +3

      “Computerfile”

    • @servvo
      @servvo 2 ปีที่แล้ว +2

      @@sinpi314 like a .wmv or a .wav

  • @metalicarus8372
    @metalicarus8372 4 ปีที่แล้ว +736

    You know something's bad when you hear Tom Scott say "never ever"

    • @GumSkyloard
      @GumSkyloard 4 ปีที่แล้ว +54

      "Which it should NEVER EVER EVER EVER EVER have been.."

  • @NoriMori1992
    @NoriMori1992 8 ปีที่แล้ว +1480

    2:21 - "And they can only be unlocked by that server, because maths."
    10/10 best explanation of public and private key crypto. XD

  • @thelolminecrafter7830
    @thelolminecrafter7830 5 ปีที่แล้ว +563

    There was so much potential at 4:46 to fix the drawing by attaching a circle to the end of the factory and making it look like a giant key.

  • @TheBedheadman
    @TheBedheadman 8 ปีที่แล้ว +376

    even if superfish had been secure its still a super sketchy thing that lenovo was shipping their computers with adware

    • @nullp0inter
      @nullp0inter ปีที่แล้ว +17

      It's fishy someone named their program superfish and no one in lenovo found it fishy

  •  8 ปีที่แล้ว +1121

    This seems so easy when Tom Scott explains it. Everything seems easy when Tom Scott explains it.
    Tom Scott, would you mind becomming a teacher at my school?

    • @dannygjk
      @dannygjk 8 ปีที่แล้ว +59

      +derLPMaxe Keep in mind he's skipping the details. In school you have to learn the details ;)

    •  8 ปีที่แล้ว +29

      Dan Kelly Actually not. On for example universities you go into detail - at least this is what our teachers tell us.

    • @dannygjk
      @dannygjk 8 ปีที่แล้ว +13

      +derLPMaxe I could be wrong. I have seen that today's high school students possess a diploma but little else that is going to help them in university.

    •  8 ปีที่แล้ว +8

      Dan Kelly In Germany you can basically start all over again when going from grammar school to university. Nearly everything you learn before university and after elementary school is for the final exams at grammar school or middle school. You need to pass your final exams at grammar school (it's called Abitur or Matura) for going to university.
      It's hard to compare the North American school systems with the European ones.

    • @dannygjk
      @dannygjk 8 ปีที่แล้ว +7

      +derLPMaxe True, in North America the so-called high school grads can barely add 2+2 let alone do much else.

  • @nrviognjiocfmbkirdom
    @nrviognjiocfmbkirdom 8 ปีที่แล้ว +436

    So good to see Tom Scott on Computerphile again.

    • @RealCadde
      @RealCadde 8 ปีที่แล้ว +27

      +nrviognjiocfmbkirdom I have yet to see a video with Tom in it anywhere that made me disappointed.

    • @MRJMXHD
      @MRJMXHD 3 ปีที่แล้ว

      @@RealCadde I saw one where people were disappointed.

    • @therisenphoenix6113
      @therisenphoenix6113 3 ปีที่แล้ว

      @@MRJMXHD wut?

    • @MRJMXHD
      @MRJMXHD 3 ปีที่แล้ว +4

      @@therisenphoenix6113 a video Tom made that had a huge dislike ratio and people were not very nice in the comments.

    • @therisenphoenix6113
      @therisenphoenix6113 3 ปีที่แล้ว +2

      @@MRJMXHD just gimme the link

  • @NotNite
    @NotNite 8 ปีที่แล้ว +715

    *sees intro*
    *NOTICES I'M ON A LENOVO LAPTOP*

    • @beaniepollard8290
      @beaniepollard8290 7 ปีที่แล้ว +22

      hope you uninstalled superfish

    • @epender
      @epender 7 ปีที่แล้ว +6

      I don't have it luckily, I think it was a business laptop I got it second hand and upgraded to Windows 10.

    • @MoKor
      @MoKor 7 ปีที่แล้ว +26

      I was terrified when he said lenovo

    • @nmotschidontwannagivemyrea8932
      @nmotschidontwannagivemyrea8932 6 ปีที่แล้ว +20

      Depending on when you got your laptop you may be safe. They stopped doing it after they were caught, and I imagine that if they ever do it again they'd go out of business.

    • @sethadkins546
      @sethadkins546 4 ปีที่แล้ว +3

      @@nmotschidontwannagivemyrea8932 Didn't they publicly come out and apologize and promise to never do it again? Definitely would go out of business if they tried something.

  • @Azivegu
    @Azivegu 8 ปีที่แล้ว +417

    That golden moment of pure sadness and dissappointment of Tom at 6:35

    • @noahhounshel104
      @noahhounshel104 8 ปีที่แล้ว +28

      +Azivegu And they do try and make people understand that that thing is bad. But people have trained themselves to ignore it.

    • @OmegaPaladin144
      @OmegaPaladin144 8 ปีที่แล้ว +30

      +Azivegu My company told me to disregard that screen on their Wi-Fi. Cheap bastards probably wouldn't pay the certifying authority...

    • @LordZarano
      @LordZarano 8 ปีที่แล้ว +50

      +OmegaPaladin No, it means that they are performing a man-in-the-middle attack on all your traffic going over their wifi.

    • @mariusa5754
      @mariusa5754 8 ปีที่แล้ว +45

      +OmegaPaladin Companies or schools often do this so they can monitor what you do on the Internet and block you from accessing things. Yes it is a man in the middle attack

    • @kazuchadsatou4299
      @kazuchadsatou4299 6 ปีที่แล้ว +1

      Azivegu I

  • @crablessinbaltimore
    @crablessinbaltimore 2 ปีที่แล้ว +11

    "lenovo promised not to do it again" *the fact that they did it in the first place is mind-boggling*

    • @JamesSmith-ix5jd
      @JamesSmith-ix5jd 11 หลายเดือนก่อน +1

      they did it many times after that

  • @mrdaxtercrane
    @mrdaxtercrane 7 ปีที่แล้ว +57

    "Extremely illegal, so DON'T do that!"
    You'd think that the people doing that honestly don't care about that.

    • @Guztav1337
      @Guztav1337 4 ปีที่แล้ว +4

      He is of the hook if the police comes

  • @xilent3828
    @xilent3828 8 ปีที่แล้ว +213

    2:46 he meant "Here's my Public Key". I'd advise that you add an annotation just so no one gets confused.

    • @MalekiRe
      @MalekiRe 4 ปีที่แล้ว +26

      No more annotations anymore

    • @mid-
      @mid- 4 ปีที่แล้ว +5

      Pieces'O'Cake Malek begone annotations

    • @user-ql9cc9hg4e
      @user-ql9cc9hg4e 4 ปีที่แล้ว +1

      @@mid- ur mom

    • @dexdevlon8941
      @dexdevlon8941 4 ปีที่แล้ว

      @@user-ql9cc9hg4e ur dad

  • @stensoft
    @stensoft 8 ปีที่แล้ว +252

    The private key is not shared with the certificate authority either. Simply because they don't need it.
    Regarding the possibility that NSA have keys to do MITM attacks: it's basically the same problem Turing faced when he broke Enigma. If they can do that, they can use it only as a very last resort and only when the message is extremely important because as soon as someone will find out which authority they use (and when you use it, it's only a matter of time), everyone will dump the authority and they would need to start from scratch again.

    • @gnutrino
      @gnutrino 8 ปีที่แล้ว +19

      +Jan Sten Adámek While that's true I think there is definitely scope for the NSA (and co.) to make limited use of MITM attacks without being found out - the example given was detected because they used a different CA and it was country wide, if you pick your targets and only MITM sites whose keys would normally be signed by the CA you've compromised (and if you compromise one of the big ones that gives you a lot of site you can attack) it would be a lot more difficult to detect (you'd have to notice the change in the certificate fingerprint and how many people keep track of that?) and potentially worth the risk for high value targets even without it being a "last resort".

    • @stensoft
      @stensoft 8 ปีที่แล้ว +9

      gnutrino The thing is, it needs only one guy having an extension in his browser checking certificate fingerprints to reveal this. And then you are without this tool even when it would be really the very last resort.

    • @jeremylakeman
      @jeremylakeman 8 ปีที่แล้ว +8

      +Jan Sten Adámek There's a reasonable amount of evidence that the NSA can decrypt most "secure" connections by breaking the Diffie-Hellman exchange, without needing a fake key, and without running a MITM attack. Which is great for the NSA, they don't want their methods exposed.

    • @stensoft
      @stensoft 8 ปีที่แล้ว +5

      Jeremy Lakeman That's a possibility. On the other hand, if NSA can, others can as well, and because even the US military uses DH exchange, it's not really probable they can break it.

    • @sundhaug92
      @sundhaug92 8 ปีที่แล้ว +5

      +Jan Sten Adámek You don't always need to MITM, you could steal a cert from some company and make a Windows driver.

  • @Nixitur
    @Nixitur 8 ปีที่แล้ว +20

    I just looked up some other famous hacks of the year and I found out that just about _a month_ after this video was uploaded, it was revealed that Dell _basically did the same damn thing_! It was the _exact_ same principle and even after the Superfish debacle, Dell _still_ didn't react and kept quiet until the vulnerability was made public.

  • @mekb1
    @mekb1 4 ปีที่แล้ว +63

    Ahh, so that's why the red _"Insecure connection"_ screen pops up when I'm running a local server and I goto a domain which points to localhost.

    • @Operational117
      @Operational117 4 ปีที่แล้ว +41

      So your computer doesn’t trust itself?
      ... kinda reminds me of myself.

    • @revenevan11
      @revenevan11 3 ปีที่แล้ว +5

      *Trust no one not even yourself*

    • @MagicByIzzy
      @MagicByIzzy 3 ปีที่แล้ว

      @@Operational117 😂😂

    • @VivekYadav-ds8oz
      @VivekYadav-ds8oz 3 ปีที่แล้ว +3

      Yeah because that's usually a sign that a malware is attempting to sniff your traffic, because an average Joe never hosts a server, let alone on his machine.

  • @veggiet2009
    @veggiet2009 8 ปีที่แล้ว +483

    8:58 - Anyone else go up and click the green padlock in the URL at this point in the video?

    • @JimPlaysGames
      @JimPlaysGames 8 ปีที่แล้ว +7

      +veggiet2009 I did actually. I think it's okay...

    • @AustinPinheiro_uniquetexthere
      @AustinPinheiro_uniquetexthere 8 ปีที่แล้ว

      +veggiet2009 i never saw google there so id be suspicous if i saw a google

    • @TheCicciello
      @TheCicciello 8 ปีที่แล้ว +35

      +veggiet2009 yes, and now i know that Google released Google's certificate

    • @khajiit92
      @khajiit92 8 ปีที่แล้ว

      +veggiet2009 should it be by google inc or not? that's what mine says...

    • @TheAkashicTraveller
      @TheAkashicTraveller 8 ปีที่แล้ว +6

      +TheCicciello If you go to details:
      CN = Google Internet Authority G2
      O = Google Inc
      C = US

  • @therealquade
    @therealquade 8 ปีที่แล้ว +34

    Just a heads up, the NSA is cracking encryption based on 1024 bit primes, at a rate of roughly 1 per year including RSA and subsequent iterations. sooo we should have switched to 2048 bit by now, but at this point 4096 should be being prepped.

    • @firstnamelastname-oy7es
      @firstnamelastname-oy7es 8 ปีที่แล้ว +3

      +therealquade That is what they tell you. They might have cracked 4096 by now. But this is made out to be a much bigger problem than it actually is. There are far greater issues facing the first world today, including our whacked out economies where were either spending not enough, or way too much, and out unsustainable growth in population. What we really need is to drop our reliance on planet Earth, and leave the solar system.

    • @therealquade
      @therealquade 8 ปีที่แล้ว +10

      Gellis12 no such thing as overkill? all encrypted data converted to print media and purged from drives, stored under lock and key, scanned on demand to decrypt when needed. maintained by robots with no wireless connection. with guns. and a self destruct in case of un-authorized access. Pretty sure that'd be overkill.
      Honestly though, server rooms with plug and play drives sitting on shelves and robots that load the drives on demand, to prevent un-authorized access to the data. that's pretty tight security, and with the exception of maybe CERN, or nuclear launch codes. maybe global banking, that's pretty much overkill.

    • @therealquade
      @therealquade 8 ปีที่แล้ว +6

      Bungis Albondigas the thing about earth, every planet has a sell-by-date, it's going to be millions of years before the earth gets torched by the sun I believe, unless we get a freak solar flare. but that's true of literally 100% of planets. Order of operations. fix the earth, then go to mars, then go to other star systems, once we're living on multiple planets and multiple star systems, I'm pretty sure by that time, the sun won't have killed the earth yet.
      As for the NSA and CIA and their trustworthyness Check out
      the school of the americas
      MK Ultra
      MK NAOMI
      CIA Involvement in the drug cartels
      GLADIO
      There's also a fair amount of speculation that his intent to Defund the CIA is why JFK was assassinated.
      Just some food for thought. read some stuff, and come to your conclusions about them as you will.

    • @yvrelna
      @yvrelna 8 ปีที่แล้ว +2

      +Andreas Björkman only a couple hundred hours on a couple hundred CPUs?
      A typical data center have computing capability way bigger than that. And nowadays you can easily build a CPU cluster with a hundred CPUs fairly cheaply by renting computing clusters on public cloud providers like Amazon EC2 or Google Compute Engine.

  • @rchandraonline
    @rchandraonline 8 ปีที่แล้ว +101

    Unfortunately, this is one of the misplaced trust aspects of networking which is carried forward into IPv6. Router advertisements carry no validation; anything attached to the network can claim to be a router and set a prefix for the network. It's the same sad story for NDP. Yes, there is SEND, but it's an addon afterthought which is by no means mandatory to implement.
    wow...not just echo, but ringing echo as well. There has to be a happy medium between this and dragging everyone into a studio.

    • @Computerphile
      @Computerphile  8 ปีที่แล้ว +28

      +rchandraonline Yes, sadly when I visit Tom in London I have to hire a room - acoustically we get what we get... >Sean

    • @Muzer0
      @Muzer0 8 ปีที่แล้ว +6

      +rchandraonline The thing is, how COULD a random user connecting to a network tell which box is supposed to be the router? Short of some expensive situation where organisations are given certificates once it's proved they own a /64 (which, I suspect, is probably harder to automate than proving you own a domain), I'm not sure how the validation could be done. And, besides, that's not an issue with v6 then, since that setup will still work on v6.
      IMHO the much better solution is to just encrypt all traffic over a network so this sort of attack, while possible, is pointless beyond being a DoS.

    • @Muzer0
      @Muzer0 8 ปีที่แล้ว +13

      +Simon WoodburyForget ...what? How is a random client connecting to a network and using DHCP supposed to know who is supposed to be the router? It's completely non-obvious *from a computer's perspective*. If you see a computer advertising a network prefix and gateway then you'd assume it's a router. But it might not be. It's the same type of identity validation problem as in most other security problems (like the one mentioned in the video).

    • @MalamIbnMalam
      @MalamIbnMalam 8 ปีที่แล้ว +7

      +Redmond Quigley MAC Filtering doesn't work, Mac addresses can be spoofed unfortunately. We really need to do something about this lack of security.

    • @Muzer0
      @Muzer0 8 ปีที่แล้ว +3

      +Monsieur Africain But IMHO the solution is to use SSL everywhere. Then the network inherently *doesn't need* to be secure.
      The main issue is who to trust. I know that there have been a lot of advancements in the SSL trust situation recently, with (for example) browsers being less likely than in the past to trust an out-of-the-blue change of CA.

  • @martijnbastiaan8143
    @martijnbastiaan8143 8 ปีที่แล้ว +75

    4:26: I'm quite sure you mean to say public key. Do not ever send your private key to your CA people :-).

    • @suola-sirotin
      @suola-sirotin 3 ปีที่แล้ว +3

      In the subtitles he has corrected it

  • @gurseerit5905
    @gurseerit5905 2 ปีที่แล้ว +2

    the computerphile thumbnails look like those old goosebump book covers that were around ages ago

  • @Epicmylikes
    @Epicmylikes 8 ปีที่แล้ว +3

    Computerphile videos involving Mr. Scott are by far my favorite. Theyre all great, but I really enjoy how he talks about things.

  • @KasranFox
    @KasranFox 7 ปีที่แล้ว +130

    Internet Factory would make a great album name.

    • @gwenynorisu6883
      @gwenynorisu6883 5 ปีที่แล้ว +7

      ...I actually have an EP called "Internet Theatre" that was released within the last year. I wonder if this was the inspiration?

    • @kwibloupthesomething
      @kwibloupthesomething 3 ปีที่แล้ว +1

      Is there a link to this EP?

  • @NoriMori1992
    @NoriMori1992 8 ปีที่แล้ว +76

    1:58 - Why is Robert Miles just randomly sitting in the room with them? XD Just to have a listen?

    • @RobertMilesAI
      @RobertMilesAI 7 ปีที่แล้ว +66

      I was there to record another AI video after Tom recorded his, but we ended up not using that footage.

    • @NoriMori1992
      @NoriMori1992 7 ปีที่แล้ว +16

      Robert Miles Oooh. So you were just sitting in since you'd need to be in that room soon, anyway? :)

    • @VivekYadav-ds8oz
      @VivekYadav-ds8oz 3 ปีที่แล้ว +5

      @@RobertMilesAI so it's confirmed that computerphile just swivels to the next professor and starts recording another video.

  • @thisisnootnoots
    @thisisnootnoots 5 ปีที่แล้ว +25

    Tom's face when he asks 'how do I draw a certificate authority?'

  • @mistermuffin710
    @mistermuffin710 8 ปีที่แล้ว +4

    Tom Scott's videos on Computerphile are my favorite videos!

  • @briqhausltd.4797
    @briqhausltd.4797 6 ปีที่แล้ว +5

    Great work, you guys go into more depth than the average tutorials and the information is strong.

  • @yuridecastro9496
    @yuridecastro9496 8 ปีที่แล้ว +29

    "All servers look like computers of 99s"
    -Tom Scott

    • @flowerman581
      @flowerman581 6 ปีที่แล้ว +3

      Yuri de Castro was this comment written by a bot

    • @mohit_panjwani
      @mohit_panjwani 3 ปีที่แล้ว

      @@flowerman581 why?

    • @ping3791
      @ping3791 3 ปีที่แล้ว

      What does that mean?

  • @djh1455
    @djh1455 5 ปีที่แล้ว +10

    Great video, not only the step by step explanation but really appreciate how "little" emphasis you showed to the particular incident. This a HUGE issue overall and applies far more than just Superfish installed on a single machine, not just because xyz company wants to see what you are doing. But because someone ELSE can use it for FAR more malicious purposes.

  • @Daniel-gd9hu
    @Daniel-gd9hu 8 ปีที่แล้ว

    I love seeing +Tom Scott on this channel but every time I do he reminds how much of my internet life is built on ignoring the security holes everywhere in it.

  • @StewartStewart
    @StewartStewart 4 ปีที่แล้ว +1

    This was such a great thorough explanation and build-up. I would probably send this video to people just to teach them about SSL.

  • @rchandraonline
    @rchandraonline 8 ปีที่แล้ว +19

    4:25 No, Mr. Scott, the reason it's called a PRIVATE key is that it's private; you don't send it anywhere but your own server. The CA only needs your public key to apply its signature.

    • @FelkCraft
      @FelkCraft 8 ปีที่แล้ว +4

      +rchandraonline Yes, thats what Certificate Signing Requests (CSRs) are for. To not have to send your private key out EVER. You generate one on your machine and it stays there forever.

  • @philipjohansson3949
    @philipjohansson3949 8 ปีที่แล้ว +67

    Wooo! Tom Scott!

    • @22Titus22
      @22Titus22 8 ปีที่แล้ว +33

      Tom is the whole reason why I subscribed to this channel

    • @jole0
      @jole0 7 ปีที่แล้ว +1

      22Titus22 You know, he has his own channel?

  • @antivanti
    @antivanti 8 ปีที่แล้ว +13

    This is a good case for Microsoft demanding that OEM manufacturers providing untouched installation media for Windows and clean installations without any 3rd party software for new OEM machines. Having worked for Microsoft Support I can tell you that most problems people have with Windows, especially when new versions are launched (Vista is a good example), are caused by OEMs that don't know what they are doing. Pre-installing lots of craplets, incompatible drivers, bungling up the installation of language packs or straight up changing/removing parts of Windows.
    I'm not sure if that is still the case but the only major OEM manufacturer that provided clean Windows installation media was Dell. All the others only had "recovery discs" which contained all the crap pre-installed software.

    • @antivanti
      @antivanti 8 ปีที่แล้ว +1

      Ant OfThy Oh yeah they totally ship their computers full of pre-installed craplets and they have recovery media that includes all that pre-installed garbage just like all the other OEMs. But they also provide an untouched Windows installation media that is identical to what you would get if you go to a store and buy a copy of Windows so that you have the option to re-install a clean installation of Windows.

  • @TheRussianhippie
    @TheRussianhippie 8 ปีที่แล้ว +1

    Please Tom Scott on more often, He's amazing at explaining concepts and is just generally entertaining.

  • @shelvacu
    @shelvacu 8 ปีที่แล้ว +11

    Tom! You do NOT send the private key over for signing by the CA, only the public key.

  • @MathAndComputers
    @MathAndComputers 8 ปีที่แล้ว +15

    It'd be great if you'd make a video on the rootkit they installed on all of their laptops too: Lenovo Service Engine (LSE). Apparently, even if you wiped the harddrive and installed Windows from a disk they didn't provide, it'd still install their crapware, because it's hidden in the BIOS. I've heard it was even updating itself over an unsecured connection, so anyone could man-in-the-middle it to install their own rootkit without users knowing.

  • @Liggliluff
    @Liggliluff 4 ปีที่แล้ว +2

    (3:45) This video was published on October 2015.
    Last time I checked, you still have to pay for this security.

  • @Tokkemon
    @Tokkemon 8 ปีที่แล้ว +50

    I love Tom Scott and his massive simplifications. Keep on doing what you're doing Tom!

  • @matthewbanes603
    @matthewbanes603 8 ปีที่แล้ว +1

    I love that the advert that was shown before this video started, at least for me, was for Lenovo.

  • @giga-chicken
    @giga-chicken 3 ปีที่แล้ว +2

    Bloatware like superfish is the reason that whenever I get a new laptop the first thing I do is format the disk and install windows directly from Microsoft. Most stuff business pre-load on your computer is totally useless, but at least once it has been legitimately dangerous.

  • @unvergebeneid
    @unvergebeneid 8 ปีที่แล้ว +11

    Wwhhhhhhhhhhat?! They did _what_?!
    I knew preinstalled OSes were unusable but that's playing in a totally different league there.

  • @writerinrwanda
    @writerinrwanda ปีที่แล้ว +1

    We had fun in Rwanda a couple of years back. The tax department forced everyone who runs a business to install electronic billing machine (EBM) software onto their computer in order to issue electronic receipts for every sale, no matter what size business you had. Many foreigners sensibly bought second laptops to install it, because they didnt' trust installing government software onto their personal computers. I kind of assumed that I was probably already monitored, and didn't have the money for a new laptop just for taxes, so I installed it on my personal laptop which was already pretty old. In fact, it was so old that it promptly crashed about a month later. It was illegal to remove the software from your computer without government permission, but it was late on a Friday night. My options were to go without a computer all weekend until the offices opened on Monday and I could tell them what happened, or go ahead and reinstall Windows. I opted for the latter and sent an e-mail explainig what I was doing and why. I was promptly issued with a $200 fine! I kicked up a storm on Twitter, shouting about how unethical it was to be forced to install government software in the first place, and they backed down, but wow was I angry about it. They've since relented and now offer people the ability to create EBMs online, but it did very little for the country's image or trust among business owners. I don't think there's any method on earth that can protect you when the government says you have to install their software by law. 😏

    • @ajs41
      @ajs41 ปีที่แล้ว

      Interesting, thanks.

  • @luan6862
    @luan6862 8 ปีที่แล้ว

    Love the videos with Tom,just hopes he does more stuff similar to this in his channel.

  • @Maxime-bz2oe
    @Maxime-bz2oe 2 ปีที่แล้ว +10

    First part : This is so sketchy even the NSA would probably only ever use it scarcely
    Second part : An advertising company and manufacturer used this on loads of computers to try to make some extra cash

  • @saprogeist31
    @saprogeist31 3 ปีที่แล้ว +13

    "Yeah, this is the bit of software that was installed on rpetty much every consumer Lenovo laptop." Yeah, so I was gripped by fear for a minute, there, because I had definitely been using a ThinkPad for over a year when this video came out. Luckily, I looked up Superfish, and apparently Lenovo began to bundle Superfish adware with their computers in September of 2014, which was a few months after I got mine.
    Thinking back, I'm pretty sure that I still ended up dealing with Superfish at some point, but it wasn't because Lenovo put it there, it was because I was eighteen and consequently a huge dumbass.

  • @andljoy
    @andljoy 8 ปีที่แล้ว +14

    And this is why you NEVER EVER EVER EVER EVER EVER, use the factory image for ANYTHING!
    And Certificate authorities need to be above governments not tied down to one country , a bit like that building in France where the keep the kilo.

    • @mspeir
      @mspeir 8 ปีที่แล้ว +2

      +Andrew Joy The problem is that most computer manufacturers no longer include the Windows install disk with the computer. You either have to pay for a new disk from Microsoft or you use the factory image. Even those manufacturers that do include the install disk are including a altered copy that will install Windows AND their software.
      Basically, you build the computer yourself or live with the bloatware the manufacturer installs. :/

    • @livedandletdie
      @livedandletdie 8 ปีที่แล้ว +2

      +Mark Speir That's why illegal copies of Windows is good. 1. microsoft survives without me buying their crap, I get to use an OS that works, and as it's almost impossible to get your hands on an install disk...

    • @andrewjoy8471
      @andrewjoy8471 8 ปีที่แล้ว +1

      Microsoft provide iso's now

    • @icedragon769
      @icedragon769 8 ปีที่แล้ว +1

      +The Major Install disk? What is this, 2005? Nobody uses install disks anymore, you can make an installation USB for free

    • @mspeir
      @mspeir 8 ปีที่แล้ว

      icedragon769 I'm talking about legally obtained copies of Windows. Prior to Windows 10 you had to buy it on CD/DVD.
      Truthfully, you'll need more than a downloaded OS update to wipe the crap off of a hard drive. The manufacturers partion the drives and install their crap on the smaller partion. In some cases, this partion is unreachable. You have to use special software to get rid of this crap and reclaim the drive.

  • @BeHappyTo
    @BeHappyTo 8 ปีที่แล้ว

    Tom Scott on Computerphile, what a day to be alive!

  • @888SpinR
    @888SpinR 8 ปีที่แล้ว +75

    *listens to the start*
    *looks at computer*
    well crap...

  • @Kah0ona
    @Kah0ona 8 ปีที่แล้ว +2

    Got my Master's in CS 5 years ago, but I wish that back then I had some lectures that were explained this well, as for most of your video's Tom. You are such a clear speaker, (as goes for the speakers in most computerphile video's).
    I mean, even though I know about most topics; refreshing my knowledge via these video's doesn't hurt a bit, it feels great!
    Keep'em coming.

  • @bullsh1terry
    @bullsh1terry 7 ปีที่แล้ว

    you really know how to simplify complex subjects, why I love computer/numberphile.

  • @cacheman
    @cacheman 8 ปีที่แล้ว

    You should consider doing a segment on the thrust of the paper "Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice".

  • @avichalchadha4319
    @avichalchadha4319 6 ปีที่แล้ว

    Tom Scott is an amazing teacher , perhaps the best teacher in computerphile

  • @Josbird
    @Josbird 8 ปีที่แล้ว

    Yes! Finally another Tom Scott Computerphile episode!

  • @giga-chicken
    @giga-chicken 4 ปีที่แล้ว +2

    I would think that both of the two vulnerabilities (the CA and device) could potentially be resolved by a sort of an 'odd man out' protocol that would periodically ask all of your CAs for a list of the CAs that they trust, and if only very few or none of them trust a CA you have, that CA is removed.

  • @erikhicks07
    @erikhicks07 8 ปีที่แล้ว

    amazing video that touches upon one of the biggest security concerns with Internet usage

  • @samuraijack5919
    @samuraijack5919 4 ปีที่แล้ว

    This channel is a godsend for anyone studying for Security +

  • @Sp33d0n
    @Sp33d0n 8 ปีที่แล้ว

    Tom needs to be on this channel more often. Get right on that, Computerphile.

  • @santiagoacosta777
    @santiagoacosta777 8 ปีที่แล้ว

    It's always good when its Tom :)

  • @jasonl3796
    @jasonl3796 8 ปีที่แล้ว

    computerphile needs more tom scott

  • @GegoXaren
    @GegoXaren 8 ปีที่แล้ว +1

    +Art of the Problem has a great series on the language of coins and public key encryption.

  • @ChrisMcFlyDude
    @ChrisMcFlyDude 5 ปีที่แล้ว

    Great explanation to a complex topic. Thanks.

  • @baabaa9000
    @baabaa9000 3 ปีที่แล้ว

    quick clarification: superfish was the company that made the adware, the program was called visualdiscovery.

  • @MarkusBlechschmidt
    @MarkusBlechschmidt 8 ปีที่แล้ว

    Thank you for making these videos

  • @jasonwalker2655
    @jasonwalker2655 7 ปีที่แล้ว +8

    Which each episode of computerphile I watch I get more and more paranoid about my online safety, eh I won't change anything though.

  • @andi
    @andi 8 ปีที่แล้ว +31

    I love Tom's videos. :D

  • @goeiecool9999
    @goeiecool9999 8 ปีที่แล้ว

    Great video as always computerphile/scott!

  • @StarLink149
    @StarLink149 8 ปีที่แล้ว

    Exactly what I was looking for, thank you. :)

  • @LazerLord10
    @LazerLord10 8 ปีที่แล้ว +20

    Good thing I bought a Lenovo in 2012. It shouldn't have anything on it, and I haven't noticed anything wrong.

  • @TimVels
    @TimVels 8 ปีที่แล้ว

    Really informative stuff! Thanks!

  • @Palundrium
    @Palundrium 5 ปีที่แล้ว

    It's cool looking back at this video and seeing him comment on a free certificate authority being in the works and today... We have that with Let's Encrypt!

  • @DlBuli
    @DlBuli 6 ปีที่แล้ว

    That sound the marker makes on that sheet of paper gets my hairs on end !!!! Darn !!!

  • @blenderpanzi
    @blenderpanzi 8 ปีที่แล้ว +2

    Also the way superfish was written you never got the red warning, even if a website had a wrong certificate. The superfish in the middle always inserted its "valid" certificate.

  • @OwenPrescott
    @OwenPrescott 8 ปีที่แล้ว +6

    There should be zero debate over whether the NSA should or not.

    • @klutterkicker
      @klutterkicker 8 ปีที่แล้ว +7

      +Owen Prescott I think some people just don't want to get involved, which is understandable.

  • @Snoopod
    @Snoopod 8 ปีที่แล้ว

    Lovely explained. Way to go Tom Scott

  • @castiell87
    @castiell87 8 ปีที่แล้ว +1

    i would have never thought of doing this, but i actually have to defend the fax machine: i work in a small company where we mill and turn metal parts, and we work with a lot of small companies that install handrails ond so on. for us its a lot easier to just get the technical drawing per fax, than having them send it per email, downloading it and then printing it, especially since we are ol three people, so we only occasionally can check our mails, and then only have a little ut of time. but i9f we get the drawing per fax, we once in a while take a look into the office, see the new fax and take it to our workstaton to programm the maschine

  • @adriaansmit81
    @adriaansmit81 8 ปีที่แล้ว

    8:01 hahah their headquarter was in my home town - i bike past their former building every day still, it always looked fishy lol

  • @pcallender
    @pcallender 8 ปีที่แล้ว +1

    9:37 - RIP Tom Scott, died of NSA...

  • @lineikatabs
    @lineikatabs 8 ปีที่แล้ว +37

    Lenovo promised to not do it again... but they did. :(

    • @DanDart
      @DanDart 7 ปีที่แล้ว +16

      Wow. When/where?

    • @slickm7
      @slickm7 7 ปีที่แล้ว

      Ivo Temelkov yeah

    • @Abdega
      @Abdega 4 ปีที่แล้ว

      They did?

    • @sethadkins546
      @sethadkins546 4 ปีที่แล้ว

      They did? How do you know?

  • @aprilmeowmeow
    @aprilmeowmeow 8 หลายเดือนก่อน

    i don't work in the tech field and never will, but i still love to learn about this stuff!

  • @chipmo
    @chipmo 6 ปีที่แล้ว

    Funilly enough Superfish is also the name of a javascript library we use at my current work as well as the chippy down the road.

  • @scikick
    @scikick 8 ปีที่แล้ว

    Tom is an excellent story teller. probably the best in the planet .. :D

  • @Daniel15au
    @Daniel15au 8 ปีที่แล้ว

    You should have mentioned HSTS and key pinning as mechanisms for making HTTPS more secure. :)

  • @ShazyShaze
    @ShazyShaze 8 ปีที่แล้ว +1

    I dropped my Lenovo by accident a couple years ago, which broke the hard drive and rendered that version of Windows unrecoverable. It's so strange, but I guess that was a really good thing; I switched out the hard drive and just installed linux, since I didn't know about the OEM key under the battery and didn't feel like torrenting, and haven't gone back since.

  • @ahmadatlam
    @ahmadatlam 5 ปีที่แล้ว +1

    You know whats also rather strange ? Google not noticing a massive amount of multi-user traffic coming from a single attacker ip ... usually there is fair usage policy where this kind of activity (an entire DNS provider had to fall as well I presume) from a single/small amount of ip address should definitely raise a flag

  • @MrArizto
    @MrArizto 5 ปีที่แล้ว

    This man talking to the points, Thanks a lot man .

  • @TheAseemvyas
    @TheAseemvyas 7 ปีที่แล้ว

    That pen scratching on paper gave me goose bumps

  • @binaryglitch64
    @binaryglitch64 4 ปีที่แล้ว +1

    Tom Scott, how is it that I've been watching you on TH-cam for over a decade and you didn't look a day over 20 when I first saw you. You still look the same 10 years later. It's uncanny mate, the way you hold your age. How ' you do it?

  • @calvinsylveste8474
    @calvinsylveste8474 8 ปีที่แล้ว +4

    One thing to keep in mind, the 'Trusted' Certifying authorities are subject to the will of the domain in which they reside. What happens if an official of the regime comes to them and put a bag of cash and a gun on the table and tells them to choose? The man in the middle gets an official stamp of approval.

  • @Rostgnom
    @Rostgnom 4 ปีที่แล้ว +4

    "Hello I would like to talk securely" - "Hey ok, here's my private key!"
    😏🤪

    • @ragnkja
      @ragnkja 3 ปีที่แล้ว

      He just misspoke. It’s corrected in the captions, and the next sentence says “public” like it should.

  • @zzunic
    @zzunic 6 ปีที่แล้ว

    padlock should be in opened position when you drew it if we use that analogy:))

  • @ping3791
    @ping3791 3 ปีที่แล้ว

    Tom can you do a video about set the routing table correct in networksetup?
    Thanks in advance.

  • @cyberbetica
    @cyberbetica 7 ปีที่แล้ว

    I heard it was a wifi adapter that was placed in the Root CA system/network, which isn't supposed to be connected to any other networks, like internet, at all..

  • @victorvarsanyi6702
    @victorvarsanyi6702 5 ปีที่แล้ว

    I've noticed some ISPs add adverts to traffic also, is that different than the Lenovo superfish malware nightmare? How secure are firewall caches?

  • @PrinceKoopa
    @PrinceKoopa ปีที่แล้ว

    You’re awesome! Thanks for the information

  • @TheMartijnTim
    @TheMartijnTim 8 ปีที่แล้ว +28

    6:13 well at least he's using the best search engine.

    • @DanDan0101
      @DanDan0101 7 ปีที่แล้ว

      well someone noticed :D

    • @Minecraftdemon99
      @Minecraftdemon99 7 ปีที่แล้ว +2

      But start page is the best duck duck go is run from America so it is not as secure

    • @fanstar141
      @fanstar141 6 ปีที่แล้ว +4

      I use bing

    • @user-oj6fy8ox4k
      @user-oj6fy8ox4k 6 ปีที่แล้ว

      Fanstar1 Gaming I have to *Google* it to see what that is

  • @Gilgwathir
    @Gilgwathir 8 ปีที่แล้ว

    The factory is absolutely hilarious. :D greate vid :D Oh and thats why you _!ALLWAYS!_ either buy your computer without OS preinstalled or run a clean install as soon as you get your hands on it. Of course dumping the disk to some other storage, to restore the factory default in case you have to send it in for any reason

  • @lancetheradioactive9034
    @lancetheradioactive9034 7 ปีที่แล้ว

    Question.
    Tom said over there that the attacker, after reading the encrypted transmission/key, could change it to his own to do MITM attacks. Why would they though? Is it not easier and safer for them to keep it the same?

  • @NNOTM
    @NNOTM 8 ปีที่แล้ว

    For downloading a browser, you can also check the hashsum of the downloaded file and compare it to what it should be - although of course you again only push the problem one step further because you must get the information what it should be over a secure connection.

    • @JuddMan03
      @JuddMan03 8 ปีที่แล้ว +2

      +John Mertz because of course whatever you used to download the source wasn't compromised right?

    • @Vulcapyro
      @Vulcapyro 8 ปีที่แล้ว

      +JuddMan03 Plus there's the ever-present problem of "to install my program run this script" where even though you could theoretically check everything yourself, most people apparently concerned about security are totally fine with this because hey nobody could possibly exploit this right?

    • @Vulcapyro
      @Vulcapyro 8 ปีที่แล้ว

      ***** yes because everyone actually checks the source code and install scripts for everything to see if there was something altered
      do you even checksum

  • @JustPingo
    @JustPingo 8 ปีที่แล้ว

    Tom Scott we love you!

  • @jackdavenport5011
    @jackdavenport5011 11 หลายเดือนก่อน

    I can't get over Superfish not even having the foresight to generate a new private/public keypair for each installation. They just hardcoded the same private key in every single installation. I can't believe nobody working on Superfish at the time saw this coming.