zlacker

[parent] [thread] 18 comments
1. tptace+(OP)[view] [source] 2021-07-20 20:37:08
Nobody has any credible story for how regulations would prevent stuff like this from happening. The problem is simple economics: with the current state of the art in software engineering, there is no way to push the cost of exploits (let alone supporting implant tech) high enough to exceed the petty cash budget of state-level actors.

I think we all understand that the medium-term answer to this is replacing C with memory-safe languages; it turns out, this was the real Y2K problem. But there's no clear way for regulations to address that effectively; assure yourself, the major vendors are all pushing forward with memory safe software.

replies(5): >>contra+13 >>jrm4+g4 >>gnfarg+p8 >>mrtest+ih >>maqp+rl
2. contra+13[view] [source] 2021-07-20 20:51:18
>>tptace+(OP)
Well, first of all the NGO group in its current form wouldn't exist if Israel regulated them, at the very least it wouldn't exist as a state-level equivalent actor.

Second of all if you can't push the costs high enough then it becomes time to limit the cash budget of state level actors. Which is hardly without precedent.

For some reason you seem to only be looking at this as a technology problem, while at the core it is far more political. Sure technology might help, but that's the raison d'etre of technology.

replies(2): >>tptace+f5 >>dogma1+Kr
3. jrm4+g4[view] [source] 2021-07-20 20:58:05
>>tptace+(OP)
Nor does anyone need one, yet. Again, the point of government -- force the dang discussion; that's what investigations, committees, et al are for.

It's fun to make fun of old people in ties asking (to us) stupid questions about technology in front of cameras, but at the end of the day, it's a crucial step in actually getting something done about all this.

◧◩
4. tptace+f5[view] [source] [discussion] 2021-07-20 21:02:41
>>contra+13
Sure, you can outlaw NSO itself. I won't complain! But all you're doing is smearing the problem over the globe. You can push this kind of work all the way to "universally acknowledged as organized crime", and it'll still happen, exactly the same way, with basically the same actors. You might even increase the incentives by doing it. Policy is complicated.
replies(3): >>mjreac+za >>contra+vt >>chacha+Xg4
5. gnfarg+p8[view] [source] 2021-07-20 21:18:23
>>tptace+(OP)
You're extremely correct, of course, but what I'm really proposing here is something much more boring than actually solving the technical problem(s). How about a dose of good old-fashioned bureaucracy? If you want to sell exploits, in a Western country, then yeah sure you can, but first you should have to go through an approval process and fill in a form for every customer and have them vetted, yada yada.

This wouldn't do anything to stop companies who base themselves in places like Russia. It wouldn't even really do anything to stop those who base themselves in the Seychelles. But, you want to base yourself in a real bona-fide country, like the USA or France or Israel or Singapore? Then you should have to play by some rules.

replies(1): >>tptace+F9
◧◩
6. tptace+F9[view] [source] [discussion] 2021-07-20 21:24:05
>>gnfarg+p8
If you make people fill out paperwork to sell exploits in Israel, Germany, and the United States, they will sell exploits in Kuala Lumpur, Manila, and Kigali. I'm not saying you're expressing it at all, but there is a lot of chauvinism built into the most popular ideas for regulating exploits.
replies(2): >>gnfarg+Ia >>roywig+Mu
◧◩◪
7. mjreac+za[view] [source] [discussion] 2021-07-20 21:28:58
>>tptace+f5
I really don't get this line of argument that regulation is useless. For example if you made it illegal for ex US gov workers to work at companies like these I would expect the vast majority to comply with this, so at the very minimum you would be limiting the available talent pool. The post several parents up talked about regulation for biological, nuclear, etc industries being effective, and although 'cyber' would never be treated in the same way, they're right, after all you don't see organized criminals running around with biological or radiological weapons now do you?
replies(2): >>tptace+pc >>Peteri+Hm1
◧◩◪
8. gnfarg+Ia[view] [source] [discussion] 2021-07-20 21:29:49
>>tptace+F9
Yes, they certainly will. I'm not naive, or colonial, about that. But what more can we do than live out the standards that we want to see upheld in the world?
◧◩◪◨
9. tptace+pc[view] [source] [discussion] 2021-07-20 21:40:07
>>mjreac+za
I don't know if it's useless. I just know it isn't going to stop NSO-type attacks by state-level actors. People on message boards have very strange ideas about what the available talent pool is; for starters, they seem strangely convinced that it's all people who are choosing between writing exploits and working at a Google office.
replies(1): >>mjreac+6f
◧◩◪◨⬒
10. mjreac+6f[view] [source] [discussion] 2021-07-20 21:56:56
>>tptace+pc
Of course you will never stop all attacks, however you can try limit them in amount by making them more expensive to do, whether this be by limiting where they can hire from, the kind of political consequences they will incur, etc.
replies(1): >>tptace+3h
◧◩◪◨⬒⬓
11. tptace+3h[view] [source] [discussion] 2021-07-20 22:12:27
>>mjreac+6f
On this thread, we're talking about state-level attackers targeting iMessage.
12. mrtest+ih[view] [source] 2021-07-20 22:14:12
>>tptace+(OP)
>Nobody has any credible story for how regulations would prevent stuff like this from happening.

We do have some of those already.

https://www.faa.gov/space/streamlined_licensing_process/medi...

13. maqp+rl[view] [source] 2021-07-20 22:50:47
>>tptace+(OP)
If the governments can't ban exploits, perhaps they can ban writing commercial programs in memory unsafe languages? Countries could agree on setting a goal, e.g. that by 2040 all OSs etc. need to use a memory safe language.
◧◩
14. dogma1+Kr[view] [source] [discussion] 2021-07-20 23:51:23
>>contra+13
Israel does regulate them, you may think not well enough but likely there isn’t a single sale that wasn’t approved at a pretty high level based on their export license every sale requires an authorization.

I doubt they made a deal that didn’t directly served either Israeli or US foreign policy and security interest.

I don’t know about the NSO but another player in mobile tracking (Verint) tho very much more LEO oriented (SS7 tracking) had about a million failsafes that ensure that their software cannot be used to track or intercept US or Israeli numbers.

◧◩◪
15. contra+vt[view] [source] [discussion] 2021-07-21 00:10:35
>>tptace+f5
Well you can hardly complain it's impossible to make the cost of exploits high enough if you do nothing to restrict their funding. If a country lets them openly conduct business then it's no surprise they're well funded, which wouldn't be a problem if that country kept an eye on them to ensure they're not doing anything harmful, but predictably that didn't work out.
replies(1): >>tptace+VK
◧◩◪
16. roywig+Mu[view] [source] [discussion] 2021-07-21 00:21:50
>>tptace+F9
I'd be surprised if Israel didn't already regulate who NSO does business with.
◧◩◪◨
17. tptace+VK[view] [source] [discussion] 2021-07-21 02:58:24
>>contra+vt
NSO is just the exploit vendor you hear about. There are lots more.
◧◩◪◨
18. Peteri+Hm1[view] [source] [discussion] 2021-07-21 09:50:52
>>mjreac+za
Removing NSO won't limit access to the talent pool in practice because the key assets of NSO - the vulnerabilities - does not rely on people they employ directly but rather on the global market for exploits.

Currently, some blackhat somewhere finds a vulnerability and sells it to NSO and then NSO sells it to various countries. If Israel forbids such deals, then the same "someone's" (without regard of where they're located - those deals are essentially unregulatable, you might anonymously trade knowledge/PoC for crypto) will sell the vulnerability to NSOv2 headquartered in Panama or Mozambique, and NSOv2 will sell it to the same customers.

◧◩◪
19. chacha+Xg4[view] [source] [discussion] 2021-07-22 04:34:43
>>tptace+f5
Isn’t this the security nihilism the article is addressing?
[go to top]