37C3 - All cops are broadcasting

แชร์
ฝัง
  • เผยแพร่เมื่อ 15 ม.ค. 2025

ความคิดเห็น • 106

  • @markosluga5797
    @markosluga5797 ปีที่แล้ว +169

    For anyone interested in the Slovenian Tetra case look up the guy, his name is Dejan Ornig. He discovered tons of unencrypted comms between 2012 and 2014, disclosed it multiple times to the police and the intelligence agency and they both ignored him. He only went public in 2015 as he felt it was a matter of national security and then got charged and sent to 3 months in jail + 11 months suspended sentence for "unlawful intrusion into private communication between individuals" and "forging of official documents" because they apparently found a fake police badge when they searched his home - which was imho planted because Slovenian cops are generally accepted as not being trustworthy.

    • @tizwah
      @tizwah ปีที่แล้ว +5

      Wow that story sounds like something straight out of Hollywood...

    • @TheBrick2
      @TheBrick2 ปีที่แล้ว +16

      brilliant. Guy tries to help ends up in jail

    • @RT-qd8yl
      @RT-qd8yl ปีที่แล้ว +27

      @@tizwah Sounds like a typical government to me

    • @Jeremy-kq5bs
      @Jeremy-kq5bs ปีที่แล้ว +16

      He should have realized, these guys in the intelligence community already knew all about it, they created it. They really didn't want it exposed.

    • @LabiaLicker
      @LabiaLicker ปีที่แล้ว +5

      EU is getting increasingly more dystopian

  • @NicholasAndre1
    @NicholasAndre1 ปีที่แล้ว +252

    “Firmware updates are available…depending upon your vendor.” Security in a nutshell
    This is what happens when your spec was designed by a bunch of long departed contractors and everybody left in your company works in sales and marketing.

    • @zxcaaq
      @zxcaaq ปีที่แล้ว +6

      Have a friend working at the NSA the encryption used in these is can be easily cracked for the purpose of intelligence agencies to get into them.

    • @TheHilariousGoldenChariot
      @TheHilariousGoldenChariot ปีที่แล้ว +4

      @@namefull_slavefirmware would not likely be different per vendor at that point you are making completely different products.

    • @Kabodanki
      @Kabodanki ปีที่แล้ว +6

      I have a friend working at the NSA and he said your friend is wrong and that he must return these rj45 cables he's stealing

    • @genewitch
      @genewitch 11 หลายเดือนก่อน +2

      i wonder if it is a dig at motorola because they love EOL-ing radios

    • @kekistanimememan170
      @kekistanimememan170 11 หลายเดือนก่อน

      @@zxcaaqyour friend just disclosed a method. Str8 to jail.

  • @zapmouse5988
    @zapmouse5988 ปีที่แล้ว +54

    Ha! Good one on the title.

  • @TimNeumann
    @TimNeumann ปีที่แล้ว +87

    Amazing research on this very critical application!
    I wonder why no one has looked into this before, even though it is so commonly used?!

    • @lll-xo6nk
      @lll-xo6nk ปีที่แล้ว

      Es wird davon ausgegangen, dass klar ist, dass es strafbar ist und im Notfall muss alles zugänglich sein, sonst hilft niemand, weil es keiner mitbekommen kann...zudem sollte der einfache Zugang den damit Arbeitenden bekannt sein - es gibt ja auch oft Verfahren, in denen Verschlüsselungen oder Passwörter für Mailfächer herausgegeben werden sollen, weil eben Quellen zu schützen sind und Infos dann nur bestimmten Personen zur Verfügung stehen dürfen und Namen erstmal gar nicht.

    • @thewhitefalcon8539
      @thewhitefalcon8539 ปีที่แล้ว

      They keep it secret so you can't research it

    • @greekstraycats
      @greekstraycats ปีที่แล้ว +3

      @@lll-xo6nk Die Russen haben doch - ich glaube seit Jahren diverse Hacks. Erst funktionierten die nur offline also mit vorher aufgezeichnetem Material, der hat da dann irgend ne brute-force drauf los gelassen. Aber später ging das dann auch live. Halt plugins für diverse SDR-Software.
      Konnte das leider nie testen. Hab hier in der Südeuropäischen Einöde keinerlei TETRA

    • @mikkelens
      @mikkelens ปีที่แล้ว +15

      probably people have, but it is probably 1) very hard to get anywhere with, 2) counter to ideas of security through obstruction, and 3) counter to the interests of nation states
      edit: it is mentioned by the speaker that a researcher in Slovenia got jail-time for going to the media with this issue (34:19)

    • @hagen-p
      @hagen-p ปีที่แล้ว +3

      It's like with open source - theoretically some people can check all this. But this costs effort and money.

  • @hagen-p
    @hagen-p ปีที่แล้ว +54

    Please be very careful, guys. Usually the messenger is punished. It's so much easier and more convenient than to punish the people who really neglect their duties. It's nice to see someone sticking to their integrity and uphold their values. Hope for mankind. Many thanks for your good work!

    • @RT-qd8yl
      @RT-qd8yl ปีที่แล้ว

      Yeah these guys will probably get Euro-Clinton'd soon 🙁

  • @gandalf1783
    @gandalf1783 ปีที่แล้ว +21

    I just watched the TETRA video yesterday and now I even get a continuation, how great is that!

  • @rikvermeer1325
    @rikvermeer1325 ปีที่แล้ว +25

    Wow, super interesting!!
    The demos looked amazing and it makes me curious to see the de-anonymisation of public services.

  • @GabrielPettier
    @GabrielPettier ปีที่แล้ว +46

    pause at 54:00 «BM: we were just given those algorithms. And the algorithms were designed with some assistance from some government authorities, let me put it that way.»
    Well, that's reassuring, no government authority ever had the incentive to weaken security for encryption algorithms, some of them specifically designed for exports 😌.
    Incredible work!

    • @luxincognita
      @luxincognita ปีที่แล้ว +7

      Whats more, I bet no one (either inside or outside ETSI) knows which level of "assistance", actors involved etc...

  • @Mtaalas
    @Mtaalas ปีที่แล้ว +44

    We know exactly how many open source standard encryption methods work (NO obfuscation) and they still cannot be readily hacked... and if there's bug in implementation, it's FIXES very fast exactly because it's open source.
    Obfuscation is not in any way helping security, ever!
    And once it's cracked, there's difficulty of getting any firmware updates and one might have to completely change out their hardware for another vendor if vendor doesn't react within days or preemptively by continuously trying to crack their own firmware and then improve it before vulnerabilities come known...
    And no business wants to do that. They're in it for the money so they put as little resources into that as possible and instead market an sell their product as much as possible.

  • @SonofHardrada
    @SonofHardrada ปีที่แล้ว +3

    Excellent work!

  • @davidbwa
    @davidbwa ปีที่แล้ว +8

    Interesting. I didn't plan to watch the whole video because this isn't my field in any sense but I found it very interesting so ended up watching all.

  • @dinoscheidt
    @dinoscheidt ปีที่แล้ว +17

    31:53 nostalgia kicking in 🎶😻

  • @myname-mz3lo
    @myname-mz3lo ปีที่แล้ว +7

    the security guard at this cinference must have been sweating haha /looking at his radio constantly

  • @LiEnby
    @LiEnby ปีที่แล้ว +20

    Oh no its security through obscurity

  • @albaragone2632
    @albaragone2632 11 หลายเดือนก่อน +5

    Thank you very much for your research!... I waited 10 years for this report!...
    Thank you, thank you!
    Kind regards.
    Mrs. Ragone ❤

  • @cdrbvgewvplxsghjuytunurqwfgxvc
    @cdrbvgewvplxsghjuytunurqwfgxvc 11 หลายเดือนก่อน +5

    Good old security by obscurity. It’s mindboggling how countries can buy ”trust us” security equipment.

    • @JamilaJibril-e8h
      @JamilaJibril-e8h 11 หลายเดือนก่อน

      Open source 🐱😁....

  • @ah-64apache84
    @ah-64apache84 ปีที่แล้ว +21

    nice power move, using a 1998 laptop for your exploit :D

  • @TheBrick2
    @TheBrick2 ปีที่แล้ว +4

    Its useful for state actors to know about a weakness, make you think if this is why it is not being closed.

  • @tillorrly1128
    @tillorrly1128 ปีที่แล้ว +16

    You know you're in trouble when hackers go to a Vintage Computer Festival to prove their point.

  • @szpl
    @szpl ปีที่แล้ว +8

    Nice talk!
    57:00 afaik GDPR explicitly requires you to patch your systems, do active measures for protecting personal data, and it is clear that you have to do extra effort to protect sensitive personal data (eg data about medical condition, sexual orientation, ...)

  • @rhinoskin7550
    @rhinoskin7550 ปีที่แล้ว +4

    I'm ignorant to this subject, HS drop out.. Idk why YT suggested this but it's cool.. Where do you start with this stuff?

    • @ChiGirl43
      @ChiGirl43 11 หลายเดือนก่อน +1

      Hey don’t sell yourself short! A high school graduate has no more true knowledge than YOU, they don’t teach true knowledge in school, that comes from going within, and of course from not being too afraid of the real truth, or scared of the consequences for finding it, ,and not being too lazy to put it all together 💯

  • @hhhsp951
    @hhhsp951 11 หลายเดือนก่อน +2

    These dudes are gonna be rockstars.

    • @MobileToA
      @MobileToA 11 หลายเดือนก่อน

      Wym

  • @1h1oh34
    @1h1oh34 11 หลายเดือนก่อน +1

    Little late to the party here…been trying to follow for some time, it’s hard some times…..but thanx so much for this information

  • @derohneusername
    @derohneusername ปีที่แล้ว +2

    Let the games begin

  • @timnewsham1
    @timnewsham1 ปีที่แล้ว +1

    "more details in our CCCamp talk" @12:38.
    Is this talk available anywhere? Are there any other details available on the technical details of the arm -> dsp -> extract secrets work?

  • @SvenTeresniak
    @SvenTeresniak ปีที่แล้ว

    this is some serious hacking. good talk! thanks!

  • @renakunisaki
    @renakunisaki ปีที่แล้ว +11

    So when they say backdoor, they mean the security is weak on purpose? Or just "so weak it functions as a backdoor"?

    • @neur303
      @neur303 ปีที่แล้ว +13

      Yes, they mean the system was purposefully broken by design

    • @SeanPoulter
      @SeanPoulter ปีที่แล้ว +1

      Like DES

    • @RT-qd8yl
      @RT-qd8yl ปีที่แล้ว +8

      Yes, it's on purpose. Many times it's done so a country's intelligence services can access data on their citizens

  • @robmorgan1214
    @robmorgan1214 ปีที่แล้ว +6

    Well at least "normal" ppl finally know how the taliban rolled up the ANA so easily.

    • @JamilaJibril-e8h
      @JamilaJibril-e8h 11 หลายเดือนก่อน

      Hahaha 😂😂😂😂

  • @TinkerTech
    @TinkerTech 11 หลายเดือนก่อน +4

    l need to read about the research as repeatedly hearing "uh" and "umm" during a talk drives me insane.
    Very interested in your findings though.

  • @igorgiuseppe1862
    @igorgiuseppe1862 ปีที่แล้ว +11

    "we now have ipv4" he is not wrong lol

  • @steffenlindemann1227
    @steffenlindemann1227 ปีที่แล้ว +4

    I doubt that TETRA is actually used for time critical applications like breaking a train. But I understand that a train can be stopped if a certain message is dispatch, like "person on the rail" etc.

  • @adamkwalczyk
    @adamkwalczyk ปีที่แล้ว +2

    TETRA should utilize bilateral handshake of the device and a silicon-dipped authentication cartridge replaced give or take quarterly. A foreign institution would take care the old ones return intact which would result in continuing the cooperation with the client. Systems of trust are stronger than cryptography.

  • @danirizary6926
    @danirizary6926 ปีที่แล้ว +4

    2 minutes in... I'm pretty sure this isn't about the Tetragonopterus fish

  • @georgesos
    @georgesos ปีที่แล้ว +2

    I am not even going to ask about Greece ,after the surveillance scandal where the prime minister was listening in on his ministers,head of army,political opponents and businessmen....

    • @shelltoe_soul
      @shelltoe_soul ปีที่แล้ว

      Seems more like “due diligence" rather than a scandal. If you have a security apparatus that can gain this sorta info, who can really blame politicians for using all the toys in their paramility toolbox?

    • @tissuepaper9962
      @tissuepaper9962 ปีที่แล้ว

      @@shelltoe_soul Literally everyone can blame them. If you need to spy on your subordinates and citizens to maintain your power, you are unequivocally a tyrant.

  • @-abigail
    @-abigail ปีที่แล้ว +3

    i think i'm in love

  • @erinsquirkychannel501
    @erinsquirkychannel501 11 หลายเดือนก่อน +1

    Is this for police scanner radios or something else?

  • @auzzierocks
    @auzzierocks ปีที่แล้ว +2

    I'm from Australia, we use P25 for emergency services and public services, I don't know where tetra is utilised. Only police are encrypted though

  • @_zproxy
    @_zproxy ปีที่แล้ว +7

    so basically rot13

  • @edwardmorris8141
    @edwardmorris8141 11 หลายเดือนก่อน

    Thank you for posting this!

  • @anthonythompkins9467
    @anthonythompkins9467 11 หลายเดือนก่อน +1

    This video has definitely grabbed my attention i dont knowany thing about this sector but want to learn any freelance work i could do to help develope the skills .this is so dope😮😮😮😮

  • @suki4410
    @suki4410 ปีที่แล้ว +2

    12345 ist mein Passwort. Pssst, nicht weitersagen.

  • @userPrehistoricman
    @userPrehistoricman ปีที่แล้ว +1

    Looks like TEA1 and TEA (tiny encryption algorithm) have something in common!

  • @kirakirsch8991
    @kirakirsch8991 ปีที่แล้ว +3

    why don't they just use a standard algorithm like aes-gcm or chacha20-poly1305

    • @Kyuubi840
      @Kyuubi840 ปีที่แล้ว +12

      1:02:05 answers that. Because they don't want to export algorithms that are too good. They want to have backdoors/vulnerabilities that they can exploit if needed.

    • @almc8445
      @almc8445 ปีที่แล้ว +4

      Besides what @Kyuubi said:
      - A lot of run of the mill algorithms are quite compute intensive, which means more expensive components, and higher power draw (Lower battery life, bigger heatsinks, more weight, etc.) - So developing their algorithm might allow them to make more competitive products
      - Some customers might have restrictions on the encryption methods they can use, whether self imposed or by a higher authority, and might not be allowed to use public algorithms - So if they want to sell to these markets, they need a system with a proprietary algorithm
      - Most customers don't care about whether the algorithm is proprietary or open, they want to throw money at a problem and get something that meets their needs. As security professionals/enthusiasts we know an open solution is more secure, but their customers are not security experts - So they blindly trust what they're told by vendors
      Remember, the priority for a business is more profit, not more security. Whether that's the customer, or vendor, or the engineers, security is a means to an end, and it will always be treated that way.

    • @enginerdy
      @enginerdy ปีที่แล้ว

      AES wasn’t proposed until 1999 or so, it wasn’t available in 1995, and cheap silicon to run it was several more years away.

    • @Sixta16
      @Sixta16 ปีที่แล้ว

      @@almc8445 Any decent modern microcontroller nowadays can be equipped with a fast HW based crypto core with almost none power consumption impact. It may have been different in the past (20 years ago), but it cannot be taken as an excuse today.

  • @Nono-hk3is
    @Nono-hk3is ปีที่แล้ว +1

    Do P25 next

  • @lll-xo6nk
    @lll-xo6nk ปีที่แล้ว +1

    Ist mit dem Begriff "Radio" Funk-Netz gemeint, oder welcher Standart oder welche Bandbreite?

    • @th3r4bbi7
      @th3r4bbi7 ปีที่แล้ว +1

      Es geht um den den TETRA Funkstandard

    • @christianh2581
      @christianh2581 ปีที่แล้ว +1

      Das Wort "Radio" kann in Englisch auch die Bedeutung "Funkgerät" haben. Also z.b. bei 10:32 steht auf der Präsentation 'Pick the right radio', damit ist gemeint das sie erstmal einfach überlegt haben welches Funkgerät sie kaufen, um dann die Algorithmen darin zu studieren

  • @attribute-4677
    @attribute-4677 2 หลายเดือนก่อน

    This is being beaten to death. We get it; 20+ year old radios are insecure.
    This just in! Common house locks can be bypassed with a brick through a window.

  • @harrythompson6977
    @harrythompson6977 ปีที่แล้ว +1

    software is only ever as good as the limiting hardware you run it on.

  • @nimpsta
    @nimpsta ปีที่แล้ว +1

    a repost ?

  • @ShannonCarpenter-dr1tt
    @ShannonCarpenter-dr1tt ปีที่แล้ว +1

    Greetings. I am Victoria . Aka Source Creator. You are severely outdated technology

  • @jahleajahlou8588
    @jahleajahlou8588 11 หลายเดือนก่อน +1

    Is this how Pegasus works too ? Is this how the data is haystacked by the spooks ?

  • @Stikku
    @Stikku ปีที่แล้ว +1

    i don't think this guy understands how radio works.

  • @michac3796
    @michac3796 ปีที่แล้ว

    Ääääh
    Äääähhhmmmm.....
    Dude...

  • @fabiusIII
    @fabiusIII ปีที่แล้ว +4

    Bona fide is latin, please don't bastardize Latin with English pronunciation