Perhaps not every device, but maybe just one device you use for reading 
encrypted mail and the like. It could be a Raspberry Pi you carry in a 
knapsack, or something.

n

> On Oct 7, 2013, at 12:14, yersinia <yersinia.spi...@gmail.com> wrote:
> 
>> On Mon, Oct 7, 2013 at 5:16 PM, Eugen Leitl <eu...@leitl.org> wrote:
>> 
>> http://www.wired.com/opinion/2013/10/149481/
>> 
>> Want to Evade NSA Spying? Don’t Connect to the Internet
>> 
>> BY BRUCE SCHNEIER 10.07.13 6:30 AM
>> 
>> Photo: Ariel Zambelich / WIRED; Illustration: Ross Patton / WIRED
>> 
>> Since I started working with Snowden’s documents, I have been using a number
>> of tools to try to stay secure from the NSA. The advice I shared included
>> using Tor, preferring certain cryptography over others, and using
>> public-domain encryption wherever possible.
>> 
>> I also recommended using an air gap, which physically isolates a computer or
>> local network of computers from the internet. (The name comes from the
>> literal gap of air between the computer and the internet; the word predates
>> wireless networks.)
>> 
>> But this is more complicated than it sounds, and requires explanation.
>> 
>> Since we know that computers connected to the internet are vulnerable to
>> outside hacking, an air gap should protect against those attacks. There are a
>> lot of systems that use — or should use — air gaps: classified military
>> networks, nuclear power plant controls, medical equipment, avionics, and so
>> on.
>> 
>> Osama Bin Laden used one. I hope human rights organizations in repressive
>> countries are doing the same.
>> 
>> Air gaps might be conceptually simple, but they’re hard to maintain in
>> practice. The truth is that nobody wants a computer that never receives files
>> from the internet and never sends files out into the internet. What they want
>> is a computer that’s not directly connected to the internet, albeit with some
>> secure way of moving files on and off.
>> 
>> But every time a file moves back or forth, there’s the potential for attack.
>> 
>> And air gaps have been breached. Stuxnet was a U.S. and Israeli
>> military-grade piece of malware that attacked the Natanz nuclear plant in
>> Iran. It successfully jumped the air gap and penetrated the Natanz network.
>> Another piece of malware named agent.btz, probably Chinese in origin,
>> successfully jumped the air gap protecting U.S. military networks.
>> 
>> These attacks work by exploiting security vulnerabilities in the removable
>> media used to transfer files on and off the air gapped computers.
>> 
>> Bruce Schneier is a security technologist and author. His latest book is
>> Liars and Outliers: Enabling the Trust Society Needs to Survive.
>> 
>> Since working with Snowden’s NSA files, I have tried to maintain a single
>> air-gapped computer. It turned out to be harder than I expected, and I have
>> ten rules for anyone trying to do the same:
>> 
>> 1. When you set up your computer, connect it to the internet as little as
>> possible. It’s impossible to completely avoid connecting the computer to the
>> internet, but try to configure it all at once and as anonymously as possible.
>> I purchased my computer off-the-shelf in a big box store, then went to a
>> friend’s network and downloaded everything I needed in a single session. (The
>> ultra-paranoid way to do this is to buy two identical computers, configure
>> one using the above method, upload the results to a cloud-based anti-virus
>> checker, and transfer the results of that to the air gap machine using a
>> one-way process.)
>> 
>> 2. Install the minimum software set you need to do your job, and disable all
>> operating system services that you won’t need. The less software you install,
>> the less an attacker has available to exploit. I downloaded and installed
>> OpenOffice, a PDF reader, a text editor, TrueCrypt, and BleachBit. That’s
>> all. (No, I don’t have any inside knowledge about TrueCrypt, and there’s a
>> lot about it that makes me suspicious. But for Windows full-disk encryption
>> it’s that, Microsoft’s BitLocker, or Symantec’s PGPDisk — and I am more
>> worried about large U.S. corporations being pressured by the NSA than I am
>> about TrueCrypt.)
>> 
>> 3. Once you have your computer configured, never directly connect it to the
>> internet again. Consider physically disabling the wireless capability, so it
>> doesn’t get turned on by accident.
>> 
>> 4. If you need to install new software, download it anonymously from a random
>> network, put it on some removable media, and then manually transfer it to the
>> air gapped computer. This is by no means perfect, but it’s an attempt to make
>> it harder for the attacker to target your computer.
>> 
>> 5. Turn off all auto-run features. This should be standard practice for all
>> the computers you own, but it’s especially important for an air-gapped
>> computer. Agent.btz used autorun to infect U.S. military computers.
>> 
>> 6. Minimize the amount of executable code you move onto the air-gapped
>> computer. Text files are best. Microsoft Office files and PDFs are more
>> dangerous, since they might have embedded macros. Turn off all macro
>> capabilities you can on the air-gapped computer. Don’t worry too much about
>> patching your system; in general, the risk of the executable code is worse
>> than the risk of not having your patches up to date. You’re not on the
>> internet, after all.
>> 
>> 7. Only use trusted media to move files on and off air-gapped computers. A
>> USB stick you purchase from a store is safer than one given to you by someone
>> you don’t know — or one you find in a parking lot.
>> 
>> 8. For file transfer, a writable optical disk (CD or DVD) is safer than a USB
>> stick. Malware can silently write data to a USB stick, but it can’t spin the
>> CD-R up to 1000 rpm without your noticing. This means that the malware can
>> only write to the disk when you write to the disk. You can also verify how
>> much data has been written to the CD by physically checking the back of it.
>> If you’ve only written one file, but it looks like three-quarters of the CD
>> was burned, you have a problem. Note: the first company to market a USB stick
>> with a light that indicates a write operation — not read or write; I’ve got
>> one of those — wins a prize.
>> 
>> 9. When moving files on and off your air-gapped computer, use the absolute
>> smallest storage device you can. And fill up the entire device with random
>> files. If an air-gapped computer is compromised, the malware is going to try
>> to sneak data off it using that media. While malware can easily hide stolen
>> files from you, it can’t break the laws of physics. So if you use a tiny
>> transfer device, it can only steal a very small amount of data at a time. If
>> you use a large device, it can take that much more. Business-card-sized
>> mini-CDs can have capacity as low as 30 MB. I still see 1-GB USB sticks for
>> sale.
>> 
>> 10. Consider encrypting everything you move on and off the air-gapped
>> computer. Sometimes you’ll be moving public files and it won’t matter, but
>> sometimes you won’t be, and it will. And if you’re using optical media, those
>> disks will be impossible to erase. Strong encryption solves these problems.
>> And don’t forget to encrypt the computer as well; whole-disk encryption is
>> the best.
>> 
>> One thing I didn’t do, although it’s worth considering, is use a stateless
>> operating system like Tails. You can configure Tails with a persistent volume
>> to save your data, but no operating system changes are ever saved. Booting
>> Tails from a read-only DVD — you can keep your data on an encrypted USB stick
>> — is even more secure. Of course, this is not foolproof, but it greatly
>> reduces the potential avenues for attack.
>> 
>> Yes, all this is advice for the paranoid. And it’s probably impossible to
>> enforce for any network more complicated than a single computer with a single
>> user. But if you’re thinking about setting up an air-gapped computer, you
>> already believe that some very powerful attackers are after you personally.
>> If you’re going to use an air gap, use it properly.
>> 
>> Of course you can take things further. I have met people who have physically
>> removed the camera, microphone, and wireless capability altogether. But
>> that’s too much paranoia for me right now.
> 
> I like  Bruce much, i have read all of him, every book, mostly article, from 
> years. But no normal person would follow these advice, all smartphones should 
> be turned off, each tablet, and every pc should be turned in a anonyomous 
> client of an anonymous network. Sure, who believe in the paranoia model 
> definitely find comfort in these indications, for example i am one. But those 
> who follow this model, really, are following it also not in only the 
> cyberspace, but also in the real life, every day ? Really? Internet is 
> perhaps evil but perhaps also our world is not so a sane and secure place, 
> sometime (or every time, depend).
> 
> Best
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Reply via email to