Top Banner
G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global digital business, Sony BMG © Jan Feyereisl
33

G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

Dec 15, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

124/04/08

Copyright and Privacy

“Most people don’t even know what a rootkit is so why should they care about it?”

Thomas Hesse, President, Global digital business, Sony BMG

© Jan Feyereisl

Page 2: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

224/04/08

Today’s Lecture:

• Introduction

• Copyright

- Software, Books, Audio, Video

- DVD

- Information Hiding

• Privacy Mechanisms

- Content Hiding, Deniability

- Association Hiding, Deniability

- Other Issues

© Jan Feyereisl

Page 3: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

324/04/08

Introduction:

• Control of Information - at forefront of government concerns for centuries

- Press censorship

- Information warfare

• Control of Copyright – Concern for authors of literary, film and music copyright owners (“Holywood”)

- An issue of wealth creation

© Jan Feyereisl

Page 4: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

424/04/08

Introduction:

• At system level

- Copyright

- Censorship

- Privacy

© Jan Feyereisl

Access Control Issues

Page 5: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

524/04/08

Introduction:

• How is Copyright and Privacy linked?

• Unprotected resources:

- freely distributable

- no payment to creators

- any action to stop dissemination futile

• Protected resources:

- encrypted content

- decrypted using a key obtained from license server

- key bought using private information© Jan Feyereisl

Page 6: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

624/04/08

Copyright:

• Obsession of the film, music and publishing industries

• It didn’t start with the internet

- Tax for blank tapes

- Royalties for books in libraries

- Introduction of photography

- fear of book publishers that their trade is doomed

© Jan Feyereisl

Page 7: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

724/04/08

Copyright:

• Past

- protected by cost of small scale duplication

- cheaper to buy than duplicate

- large scale duplication traceable

• Then

- cost barrier eroded by photocopiers, recorders

- basic economics not changed

© Jan Feyereisl

Page 8: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

824/04/08

Copyright:

• Now

- digital world is changing this

- copyright sometimes based on physical device

- most copyright control moving towards registration

- this however undermines privacy

© Jan Feyereisl

Page 9: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

924/04/08

Copyright - Software:

• Early software given away for free with hardware

• IBM setup sharing scheme (1960s)

• Software copyright not an issue

• Introduction of software packages

- Code either stolen or re-implemented

• Software birthmarks – features of how an implementation is done (e.g. Course-marker)

• Hardware identifiers – processor serial number

© Jan Feyereisl

Page 10: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

1024/04/08

Copyright - Software:

• Time bomb

• Introduction of microcomputers – start of piracy

• Technological techniques

- dongle – physical device attached to pc

- copying resistant software – e.g. bad sector

- pc identification by hardware (Windows XP)

• Psychological techniques

- embedded company/user name

- stories of failures due to missing patches

- early Microsoft scare example© Jan Feyereisl

Page 11: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

1124/04/08

Copyright - Software:

• Games market moved to physical protection

• Software protection became harder

• Protection a nuisance – dongle conflicts, etc..

• Viruses – need for software hygiene

• Certain level of piracy good

• Technical support increasingly important

© Jan Feyereisl

Page 12: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

1224/04/08

Copyright - Software:

• Industry moved to legal solutions

- to enforce

- to limit – time bombs illegal

• Industry now moving back to technical mechanisms

• e.g. License servers – like dongles

• Current model

- Combination of technical and legal measures

© Jan Feyereisl

Page 13: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

1324/04/08

Copyright - Software:

• Latest development

Online registration:

- Keeps logs of everyone using the software

- Privacy implications

• Increasingly changes of business model apparent

• Free limited version (shareware, demos)

• Free version to universities (Unix)

• Free version to individuals

• Free software, paid service (Linux)© Jan Feyereisl

Page 14: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

1424/04/08

Copyright - Books:

• In 1800 around 80,000 frequent readers in England

• Most books philosophical or theological

• After invention of the novel – mass market emerged

• Libraries sprung up to service this demand

• Educated classes appalled

• Printers frightened of libraries

• 1850 – number of readers 5,000,000

• Sales of books soared, partially due to libraries

© Jan Feyereisl

Page 15: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

1524/04/08

Copyright - Audio:

• Audio pirated much longer than software

• e.g. Paganini in 17th Century

• Cassettes

- tax, technical measures (spoiler tone)

- not a great problem due to loss of quality

• Digital Audio Tape

- Serial copy management system

- Recorders did not implement it

- Not widespread© Jan Feyereisl

Page 16: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

1624/04/08

Copyright - Audio:

• Recently a headline concern due to MP3

- previously digital audio too large

- MP3 compresses this into manageable size

- in 1998 40% of MIT traffic due to MP3 traffic

- no royalties paid to copyright owners

• Initially industry focused on technical fixes

- Alternative audio compression

- copyright protection mechanisms (DRM)

- but unsuccessfully© Jan Feyereisl

Page 17: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

1724/04/08

Copyright - Audio:

• Unsuccessful due to

- PC an open platform

- backward compatibility issues with hardware solutions

- Many CD’s already sold – effectively master disks

• Next step was to sue

- Web sites allowing MP3 sharing

- Sharing technologies attacked (Napster etc..)

© Jan Feyereisl

Page 18: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

1824/04/08

Copyright - Video:

• Similar situation to audio

- Industry’s fear of home viewing

- Technical solutions created (e.g. Macrovision)

- Easily defeated

- Fear of video rental stores

- Rental stores increased VCR sales

- Business model changed so that Theatre releases only an advertising campaign for later video releases

- Eventually problem reduced to industrial counterfeiting

© Jan Feyereisl

Page 19: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

1924/04/08

Copyright - DVD:

• Again Hollywood worried

• DVD must have a suitable copyright protection

• Content Scrambling System (CSS) introduced

• Regions introduced – broken first

• CSS known to be vulnerable at time of release

• Key too short (possibly due to U.S. export restrictions)

• Story - developers had 2 weeks for CSS

• CSS still in court© Jan Feyereisl

Page 20: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

2024/04/08

Copyright - DVD:

• CSS depended on algorithm kept secret

• Impossible due to

- CSS design

- Player manufacturing

- PC an open platform (e.g. Linux)

• DeCSS – program to unprotect any DVD

• Law again used to fight this

• But – issues with Fair Use

© Jan Feyereisl

Page 21: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

2124/04/08

Copyright – Information Hiding:

• New DVD protection techniques developed

- copyright marking

• Based on information hiding

- a technique that enables data to be hidden in other data

• Copyright marks – marks hidden unobtrusively in digital video, audio and artwork

- Watermarks

- Steganography – message existence undetectable© Jan Feyereisl

Page 22: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

2224/04/08

Copyright – Information Hiding:

• Roots in Camouflage

• Greek Persian war - Tattoos on slave’s heads

• Francis Bacon (15th Century)

- binary message in books by alternating font

• Many consider information hiding more important than enciphering it – e.g. military, criminals

© Jan Feyereisl

Page 23: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

2324/04/08

Copyright – Information Hiding:

• Embedding schemes

- Hiding message in the least significant bit

- Hide message at locations determined by key

- Modern version – hides message in .gif files

- Using characteristics of a media (e.g. echoes)

- Spread spectrum encoding

• Introduction of noise or distortion causes problems

- e.g. with lossy compression

© Jan Feyereisl

Page 24: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

2424/04/08

Copyright – Information Hiding:

• Attacks on marking schemes:

- Many marks additive

- If all video frames carry same mark, averaging them yields the mark

- Steganalysis techniques exist

- Attacks exploit particular media (e.g. browser)

- Suitably chosen distortions

© Jan Feyereisl

Page 25: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

2524/04/08

Privacy Mechanisms:

• Not a major issue in non-digital world

• Some communications were deniable

• Very difficult in digital world

• Anonymity in a similar situation

- e.g. Online payments

© Jan Feyereisl

Page 26: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

2624/04/08

Privacy:

• Confidentiality

- Keeping information secret due to obligation to a third party

• Privacy

- Ability to control the dissemination of information about oneself

© Jan Feyereisl

Page 27: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

2724/04/08

Privacy – Content Hiding:

• Hiding the content of messages

• example – Pretty Good Privacy (PGP)

• encryption only part of the solution

• Governments can request keys

• Rubber Hose Cryptanalysis – police simply beats the key out of you

• Encryption use may mark your message for traffic analysis

© Jan Feyereisl

Page 28: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

2824/04/08

Privacy – Content Deniability:

• Destroying keys is not enough

• Existence of protected material sufficiently suspicious

• If message well hidden (steganography), no one knows of its existence

• Steganographic file systems exist

© Jan Feyereisl

Page 29: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

2924/04/08

Privacy – Association Hiding:

• The fact that communication between two parties exists is enough to raise suspicion

• Criminals – emphasis on anonymous communication rather than encryption

• Legitimate uses - Anonymous helplines

- abuse victims

- whistleblowers

- police informants

© Jan Feyereisl

Page 30: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

3024/04/08

Privacy – Association Hiding:

• Existing technologies

• Anonymous remailers

• Crowds – users group together and do web page forwarding for each other

• Anonymizing proxies – caches keep logs though

• Internet Café’s

• Web based e-mails

• Implementing high-quality anonymity is hard

• Also due to market demands for data

© Jan Feyereisl

Page 31: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

3124/04/08

Privacy – Association Deniability:

• Merchants build marketing profiles

• Transactions that you make will be linked to your profile

• Solution:

Electronic equivalent of cash?

- A payment medium that is anonymous, untraceable, and unlinkable

• Digital Cash – customer’s relationship with a merchant only revealed by customers

• Not in the interest of retailers!

© Jan Feyereisl

Page 32: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

3224/04/08

Privacy – Other Issues:

• The right to remain ignorant

- the right not to know something

• Location Security

- GSM services

• Peer-to-Peer

- Illegal material distribution

• Subversive Group Computing

• Abuse – Spam, Identity theft, etc…

© Jan Feyereisl

Page 33: G53SEC 1 24/04/08 Copyright and Privacy “Most people don’t even know what a rootkit is so why should they care about it?” Thomas Hesse, President, Global.

G53SEC

3324/04/08

Summary:

• Copyright

• Privacy

© Jan Feyereisl