Real security vs security theater

Off-topic discussion/chat/argue area with special rules of engagement.
Forum rules
The Off-Topic area is a general community discussion and chat area with special rules of engagement.

Enter, read and post at your own risk. You have been warned!
While our staff will try to guide the herd into sensible directions, this board is a mostly unrestricted zone where almost anything can be discussed, including matters not directly related to the project, technology or similar adjacent topics.

We do, however, require that you:
  • Do not post anything pornographic.
  • Do not post hate speech in the traditional sense of the term.
  • Do not post content that is illegal (including links to protected software, cracks, etc.)
  • Do not post commercial advertisements, SEO links or SPAM posts.
We also ask that you keep strongly polarizing topics like politics and religion to a minimum. This forum is not the right place to discuss such things.
Please do exercise some common sense. How you act here will inevitably influence how you are treated elsewhere.
User avatar
athenian200
Contributing developer
Contributing developer
Posts: 1612
Joined: 2018-10-28, 19:56
Location: Georgia

Re: Real security vs security theater

Unread post by athenian200 » 2022-07-30, 21:14

TheRealMaestro wrote:
2022-07-30, 17:36
Nevertheless, I deny that having it is essential; the difference between editing the code and hacking at the blob is, in my eyes, instrumental. As a non-programmer, both look like black magic to me, and they yield the same result: something that somehow works, if why is unclear.
Well, like you say, you're a non-programmer, so I will give you the benefit of the doubt here. I really believe that if you had more experience with the difference between reverse engineering binary code and modifying source code, you might not have this perspective so strongly. Maybe a lot of people on those very forums have made that same mistake and don't realize they're being led down the primrose path by some very persuasive individuals who know how to play around with Dependency Walker and pull off a few tricks that look impressive to those who don't know better. I must admit, I mostly have a very negative opinion of the people who make this kind of thing possible and then go out of their way to convince others who have no way of evaluating properly that it's fine.
I think I can understand their mentality. My body has known vulnerabilities. If I eat arsenic, I will die. I doubt patches for this will come this side of doomsday, so I compensate in other ways. They know about their computers’ weaknesses, and it would indeed be foolish to neglect them altogether. The juggling act is doubtless a lot to handle, but I believe it possible in principle.
Well, that makes sense if you believe all the risk factors are under your control, and that the risk you're taking doesn't affect other people potentially. That's only true if your computer is not connected to the Internet. Again, there's no issue with someone using an older version of Windows on an airgapped machine to use an older piece of hardware or play an older game. The Internet, on the other hand, is a situation where you don't necessarily know what the risks are. You know some of them, but there are new risks being discovered every day, and the hackers who want to exploit them are advancing in knowledge rapidly, much more so than the people who depend on such systems.

The other issue is this... cyberwarfare is happening right now. There are state-sponsored hackers trying to get into vulnerable computers so they can compromise them not just to do a ransomware attack or scam someone out of money, but to potentially turn their machine into part of a botnet without their knowledge and use it in some kind of attack that could harm infrastructure or cause massive economic damage. So you wouldn't necessarily know anything was wrong with your machine if it had been compromised. Malware doesn't have to slow down performance or cause you to lose data. It can simply replicate itself silently and lie dormant until the hacker is ready to use your machine for their own purposes without warning. Essentially, things are so interconnected that we've gotten past the point where the risk you are taking is only your own computer/network. I feel like this is a part of the puzzle a lot of people are missing.
You are right here. I must be careful to avoid falling into the same trap as the smoker thinking himself safe as he has not got lung cancer himself.
Yeah. Overall, I'm just glad that you personally chose to deal with your frustration with Microsoft by moving to Linux rather than staying on an older Windows indefinitely. Even if perhaps you don't see all the problems with it, you still decided against it for yourself, and I'm glad you did.
This gets it backwards, as I have tried to clarify later in the thread. For things to be alright, I must feel safe. Of course, feeling safe alone is no guarantee. Nevertheless, I own that, at least for me, as somebody who is frightened even by slight dangers, feeling secure, or rather, being in the place where I can feel secure, is most of the way towards being secure. This is no universal law, and for other personalities it can indeed be dangerous.
That makes sense. I think that's a fair point. You see yourself as someone who is alert to risk and takes reasonable measures to avoid it, and so you wouldn't feel safe if you didn't have at least some vague idea that you had reduced your levels of risk.
"The Athenians, however, represent the unity of these opposites; in them, mind or spirit has emerged from the Theban subjectivity without losing itself in the Spartan objectivity of ethical life. With the Athenians, the rights of the State and of the individual found as perfect a union as was possible at all at the level of the Greek spirit." -- Hegel's philosophy of Mind

tcaudilllg

Re: Real security vs security theater

Unread post by tcaudilllg » 2022-07-31, 12:51

I see "security theater" as the meme that for example, you should never use FOSS that has not been maintained. There is a very real stigma around this which contributes to a certain nastiness in the field, and is a problem. Also the tendency to patch every little security "hole" regardless of the likelihood of it actually being abused. For example two popular emulators over the last several years got patches for such, despite the vanishing chances of such exploits actually being leveraged.

It's because a minority of programmers have made a niche for themselves in exposing niche vulnerabilities. It's become a specialty in itself and they just dare you to deny their patches. If you do, they go on 4chan or some place and announce it to the world, get you doxed and try to ruin your career.

The lion's share of "security hotfixes" are for circumstances in which there are no proven capacities for actually mounting attacks in practical situations. Years ago enablePrivilege, a vehicle for obtaining direct access to the file system with user consent, was stripped from Mozilla not because it was a proven hazard, but because it was a theoretical one which the legal dept. didn't like. Google was the cheerleader in this effort to destroy the existing add-on/browser-as-server regime in the name of "security" which created an artificial problem that they exploited through leveraging WebKit as a server container (birthing NWJS and Electron to take over the niche that Mozilla was formerly suited to).

More recently Hyper-V had its 3-D capabilities significantly stripped because of a "vulnerability" that 99.999% of users would never open themselves to because they don't run arbitrary stuff on their GPU. (or in theory they wouldn't... arbitrary access to the GPU by way of canvas and webgl makes it more probable that some exploit will make its way over the net...) And there's the thing: the people screaming the loudest about security are the same people forcing these vulnerabilities on us in the first place so they can get more data on this to which they are not entitled and to use our hardware resources for god knows what that they contrived would make them richer. Security hypocrites.

User avatar
mr tribute
Lunatic
Lunatic
Posts: 355
Joined: 2016-03-19, 23:24

Re: Real security vs security theater

Unread post by mr tribute » 2022-08-01, 00:00

tcaudilllg wrote:
2022-07-31, 12:51
I see "security theater" as the meme that for example, you should never use FOSS that has not been maintained. There is a very real stigma around this which contributes to a certain nastiness in the field, and is a problem. Also the tendency to patch every little security "hole" regardless of the likelihood of it actually being abused. For example two popular emulators over the last several years got patches for such, despite the vanishing chances of such exploits actually being leveraged.

It's because a minority of programmers have made a niche for themselves in exposing niche vulnerabilities. It's become a specialty in itself and they just dare you to deny their patches. If you do, they go on 4chan or some place and announce it to the world, get you doxed and try to ruin your career.

The lion's share of "security hotfixes" are for circumstances in which there are no proven capacities for actually mounting attacks in practical situations. Years ago enablePrivilege, a vehicle for obtaining direct access to the file system with user consent, was stripped from Mozilla not because it was a proven hazard, but because it was a theoretical one which the legal dept. didn't like. Google was the cheerleader in this effort to destroy the existing add-on/browser-as-server regime in the name of "security" which created an artificial problem that they exploited through leveraging WebKit as a server container (birthing NWJS and Electron to take over the niche that Mozilla was formerly suited to).

More recently Hyper-V had its 3-D capabilities significantly stripped because of a "vulnerability" that 99.999% of users would never open themselves to because they don't run arbitrary stuff on their GPU. (or in theory they wouldn't... arbitrary access to the GPU by way of canvas and webgl makes it more probable that some exploit will make its way over the net...) And there's the thing: the people screaming the loudest about security are the same people forcing these vulnerabilities on us in the first place so they can get more data on this to which they are not entitled and to use our hardware resources for god knows what that they contrived would make them richer. Security hypocrites.
I quoted your whole post. Not because I know what to reply, but because you hit the nail on the head. Today "security" is used as a hammer to destroy projects, functionality and basically anything the big players don't like.
Despite not being a dev I have thought about the scenario where your "reputation" is destroyed because you don't patch niche/made up "vulnerabilities".

A good example is X.org display server. According to Wikipedia the size of X.org is 3.7 MiB. I have checked my own system and I would say that the installed size of X.org is around 15 MiB. So this is a display server that has been maintained since the 1980s* and works well for common tasks like a desktop system. They say it is bloated and contains spaghetti code that no one understands. "The last people that understand X.org are basically dying." Something must be done!!!!!!!

So Red Hat/IBM has decided X.org must die. It isn't secure... The main problem is that is runs as root apparently. To me it seems logical that a display server runs with high privilege. Anyway, it is possible to run X.org as user as long as your display manager (login window) supports it. This should be a relatively trivial fix for maintainers. Maybe it's a week of work, but not 14 years like developing Wayland.

So you read Linux blogs and people being terrified of X.org bugs that have yet to be found (since the 80s). They cheer the coming age of Wayland which doesn't allow compositors to run as root. There are a lot of things Wayland doesn't allow so there are an equal number of workarounds to allow copy/paste between apps, screenshots, screen recording etc.

Wayland has a more limited scope since it's just a protocol and the bulk of the work has to be done by individual Wayland compositors. This means each Wayland compositor will have unique spaghetti code to replace the functionality that was earlier handled by X.org for all X.org compositors.

So some people (certainly the influential ones) want to move desktop Linux to a model more suited to smartphones, infotainment centers etc. They say it's because of security. Now comes the bizarre. The same people who seem concerned about security are silent about proprietary software. Proprietary software? - surely there can be no security flaws in proprietary software - after all it is made by powerful corporations with plenty of resources.

So the same people who scream about 15 MiB of installed X.org server will gladly download a 250 MiB blob from Nvidia and install it. What's the installed size? I haven't installed it, but let's say at least 750 MiB installed size. This code runs with full root privilege of course. It doesn't matter if it runs on X.org or Wayland - it has root access no matter what. How many people look at this code? Not many - because it's proprietary. And still, Wayland supporters are silent. Not running as root is super important, but gaming is more important. So let's give Nvidia root access 24/7. Proprietary wifi is also necessary - as root. And the kernel and proprietary firmware modules that are loaded with the kernel. But not X.org, because running X.org as root is super dangerous and everyone knows that. Even running X.org as non-root is super dangerous, because it's technology from the 70s and all that.

Nvidia is a good shepherd, so is Red Hat. Point finger at something you don't want to maintain anymore. It's OK, the message has been received. I just wish there was more honesty about true motivation/intent behind Wayland. Basically I think "the industry" wanted Wayland for Digital Signage displays (ads), infotainment systems in cars, kiosk systems like ticket systems and different embedded use cases. Wayland might be pretty good for smartphones and is already in use by most Linux based smartphone OSes (but not Android). Let's use it for the desktop too!!! OK, I actually understand that part. Red Hat doesn't want to maintain two different display systems for Linux. The moneymaker for Red Hat is servers and Wayland is more than enough for that use case.

I don't understand everything, not much one could say. However, I do have the ability to compare: 15 MiB vs 750 MiB. FOSS vs proprietary code. Shared functionality in X.org vs custom solutions in Wayland compositors.

What disturbs me is that the same people who scream about X.org vulnerabilities ultimately don't believe in the FOSS model. They think Android and iOS are safe because there are permission toggles for apps. I don't deny that the current Linux desktop is wide open. If you install something bad it might eat your system. I don't agree with the solution to that problem.

I think the solution is that the "sysadmin" decides what a user can do, not the OS/distro builder. Despite Windows being everywhere and in the hands of people better suited to smartphones, we haven't seen widespread malware attacks in a long time. Ransomware might be the most talked about and I think there was a hospital in the UK that had to shut down for a while a few years ago.

Microsoft did try to turn Windows into a smartphone - Windows 10S - but failed. So instead, they polish security a little bit here and a little bit there. That's a much better approach than the "everything must be a smartphone" approach.

Maybe I understand Wayland a little bit better after writing this. The "industry" creates things that it needs and spin doctors proclaim that a wonderful new world awaits. There are plenty of sheeple - they don't need to be stupid, but they rather move with the herd. I don't have a problem with the Wayland FOSS evangelist. But when the Wayland supporter installs proprietary drivers (with root access) I think we are looking at a contradiction. Then there are a number of Wayland supporters that simply think that "it's modern" and in some cases "it works better for me". As far as I know the Wayland protocol has no connection to fractional scaling, but it's popular to claim there is a connection. Qt can do fractional scaling anywhere, it's just gtk that decided to only implement it for Wayland. Since Red Hat employs the gtk devs this decision comes as no surprise.

*The history of X Server and the specific implementation known as X.org is a bit unclear to me at this point. I believe the 80s could be seen as the first decade for X Server technology. The first release named X.org actually happened in 2004 according to Wikipedia.

User avatar
mr tribute
Lunatic
Lunatic
Posts: 355
Joined: 2016-03-19, 23:24

Re: Real security vs security theater

Unread post by mr tribute » 2022-08-04, 13:01

Another component of security theater is remote controlled software/settings. Chromium and Firefox settings can be remote controlled by Google and Mozilla. Last time I looked, Mozilla had a fairly straight forward description of this technology on their site. In Firefox this technology is called "normandy" and if you open about:config in Firefox and search for normandy you should get several hits.

The benefit is that Mozilla can turn on/off functionality in Firefox without delivering an update. If Mozilla discovers a critical vulnerability in a component they can then shut off that component before a security patch is ready.

I believe remote control tech came from Android/iOS, then to Chrome(ium) and Firefox and was fully embraced by Windows 10. I believe it's a toolkit feature. So in Windows 10 the settings in the Settings app can be remote controlled, but the settings in the old Control Panel can't be remote controlled. Let's say Microsoft wants to switch all Internet connected Windows 10 machines in Germany to Dark theming - I believe Microsoft would be able to do that based on IP address.

This remote control functionality is probably the reason that the taskbar in Windows 11 was rewritten from scratch as some reviewers suggest. There is no reason to remove important functionality from the taskbar unless a major rewrite is "necessary".

What it boils down to is that the Personal Computer isn't so personal anymore. If you are connected to the Internet, then someone else can control your preferences in popular software. While this can be used for good, the risks for abuse are apparent.

Remote control interacts with computers based on certain criteria specified by the software owner for each interaction. The targets for remote instructions can be selected via parameters such as software version, location (via IP), hardware configuration or any other parameter that the software in question broadcasts through "normal" telemetry interaction. Remote control is basically a backdoor. There is no user-facing GUI for this functionality (which would be meaningless since it could be remote controlled). To close this backdoor extensive modifications must be made such as the work turning Firefox into LibreWolf.

I think remote control functionality will result in confusion for anyone using software with that capability, including the software maker itself. Complexity is seldom the answer in a world where everything naturally decays over time:

Preventing the Collapse of Civilization / Jonathan Blow
https://www.youtube.com/watch?v=ZSRHeXYDLko&t=3176s