Hi all,

i think that would be very important to organize a project to Audit the
functionalities of Auto-Update of software commonly used by human rights
defenders.

Most of Governmental's managed client-side attacks are done trough
proper MITM to tweak the target into downloading and/or executing something.

It's plenty of major and minor software that have security
vulnerabilities that could be exploited in the following processes and
procedures:
- Auto-Update of software
- Version Checking (to notify a new existing version)
- Web Page providing Download/Update information

If only one of the previously defined functionalities can be exploited
by a clever MITM (because not properly secure), the target (a normal
target, not a paranoid one) is likely compromised.

In past the IT Security and Hacking environment looked at this problems,
but then no big progress has been done, everything has been abbandoned
and auto-update/version-checking/software-download-methods has been of
the pure interests of governmental agencies.

Organizations that now take care of the security of software being used
by human rights defenders should look at this kind of problem a bit
deeper, by organizing such a projet and/or providing proper funding for
such purpose.

-- 
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org - http://tor2web.org

-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Reply via email to