Google Makes Full-Disk Encryption Mandatory For Some Android 6.0 Devices (itworld.com) 150
itwbennett writes: Google's plan to encrypt user data on Android devices by default will get a new push with Android 6.0, also known as Marshmallow. Devices with enough memory and decent cryptographic performance will need to have full-disk encryption enabled in order to be declared compatible with the latest version of the mobile OS. From the ITWorld article: "The move is likely to draw criticism from law enforcement officials in the U.S. who have argued over the past year that the increasing use of encryption on devices and online communications affects their ability to investigate crimes. In addition to encryption, Google also mandates verified boot for devices with AES performance over 50MB/s. This is a feature that verifies the integrity and authenticity of the software loaded at different stages during the device boot sequence and protects against boot-level attacks that could undermine the encryption."
Sigh (Score:4, Funny)
The terrorists and criminals have won :(
Re: (Score:2)
Apple has won, at least until the array of Andriod devices available catches up to all be resistant to government snooping.
*ducks*
Re: (Score:2)
Re:Sigh (Score:4, Interesting)
Re: (Score:2)
I don't trust companies that they don't have access to their on encrypted datas if they (creat/mad)e them. How did they develop and test them then?
Re: (Score:3)
Re: (Score:2)
I don't trust companies that they don't have access to their on encrypted datas if they (creat/mad)e them. How did they develop and test them then?
You are a well and proper idiot, idiot.
Re: (Score:2)
As per the post [slashdot.org] earlier today, Apple said it was "impossible" for them to access the files on a customer's iPhone if they had a newer phone. In essence, what Apple is saying is that if law enforcement brings them only the phone of a suspect, Apple cannot technically access the files on the phone without the help of the phone's owner. They did it using a number of processes including full data storage encryption. I suspect that it has been optional on Android since not all devices had the all the hardware pieces in place to secure the phone completely.
And since part of Apple's solution is hardware-based (and this is the reason that their "can't decrypt" statement does not apply to iPhones prior to either the 5 or 4s) or to phones running earlier to iOS 8 (I believe).
If Google's solution is not at least partially hardware-based, then it is only a partial solution, which is tantamount to Security Theatre.
Not that it matters, because most existing Android phones will never see Android 6.0, anyway.
Re: (Score:2)
If Google's solution is not at least partially hardware-based, then it is only a partial solution, which is tantamount to Security Theatre.
That's not my reading of the situation. The benefit of Android is that it will run on many different devices. The drawbacks of Android is that it has to run on many different devices. Some Android devices have all the hardware in place to implement full encryption. Some already have. But since Google cannot dictate what hardware runs on Android, it can only dictate minimums.
Re: (Score:2)
If Google's solution is not at least partially hardware-based, then it is only a partial solution, which is tantamount to Security Theatre.
That's not my reading of the situation. The benefit of Android is that it will run on many different devices. The drawbacks of Android is that it has to run on many different devices. Some Android devices have all the hardware in place to implement full encryption. Some already have. But since Google cannot dictate what hardware runs on Android, it can only dictate minimums.
Ok, then I will revise my comment to read "On Devices which do not provide for some hardware security component with keys that are unknown and unreadable except within said security component (e.g., Apple's Security Enclave [apple.com]), Google's approach is tantamount to Security Theatre; because said methods are at least potentially compromise-able through legal process or "rubber-hose" crypto-analysis techniques."
There, is that precise enough for ya?
Re: (Score:2)
Apple was required to make this statement after it was issued with a FISA warrant. In reality Apple can decrypt these devices but the government doesn't want users avoiding Apple devices or using there own encryption.
Prove it, or STFU.
Re: (Score:2)
You mean Blackberry.
Re: (Score:2)
You mean Blackberry.
He did say 'large scale'.
But, I must admit, I almost got a Blackberry when my old phone broke, because I don't trust Android 'security' at all. Unfortunately, the only reason to have a smartphone was for the one app I have to run for work, and I wasn't sure whether it would run on a Blackberry.
Re: (Score:2)
You mean Blackberry.
Are they still in business?
Re: (Score:2)
Re: (Score:2)
Yes. They even still make phones. They released a couple of new BlackBerry models (the Passport and the Classic) last year, though those phones may be the last classic BlackBerry phones. They recently announced a new phone, Priv, which is based on Android with added BlackBerry services and security software. (According to Engadget it will start shipping on November 16 - http://www.engadget.com/2015/1... [engadget.com] )
The comment was actually intended as a joke; however, if their new phones are based on Android, then they are a Joke. See this, and other similar articles regarding Android's "Security".
Re: (Score:2)
Re: Sigh (Score:4, Informative)
And now (finally) in 6.0 it'll be hardware-accelerated. So it'll be usable and not panned like the Nexus 6.
Re: (Score:2)
Re: (Score:2)
Link doesn't mention encryption at all (Score:2, Informative)
Re: (Score:3)
Ummm ... what? If you mean the first link, "crypto" appears like 25 times.
So what, precisely, are you trying to say? Because the ENTIRE TFA is about encryption.
Re: (Score:2)
Verified boot by who? (Score:5, Insightful)
Google also mandates verified boot for devices with AES performance over 50MB/s.
Who verifies it?
Google verifies it (with NSA consent)?
Or is it completely, 100% open source such that I can compile my own boot loader and sign it with my own key and install it myself?
Anything else really just means that the NSA have a backdoor to your device that you cannot remove because your boot loader is locked against you.
Re: (Score:2)
Re: (Score:2)
Except that the verification keys used are not public, and in general, no option to install additional trusted keys is made available. It basically kills the ability to have custom boot loaders for backup/restore or for any other reason and makes it rather easy to hard-brick the device as no utility to undo an unverifiable bootloader is made availble to the public. The age of mods is coming to an end unless consumer demand for devices that they can add keys to rises to unlikely levels.
(Often the keys are
Re:Verified boot by who? (Score:5, Informative)
Re:Verified boot by who? (Score:5, Informative)
10 to 1 it'll boot and work just fine. If you weren't an AC I'd put money on it.
Re: (Score:2)
This is the GUI used by the connectbot ssh client:
https://techronilces.files.wor... [wordpress.com]
source:
https://techronilces.wordpress... [wordpress.com]
Re: (Score:2)
Or is it completely, 100% open source such that I can compile my own boot loader and sign it with my own key and install it myself?
Yes.
The Android verified boot specification requires that unlockable devices allow you to install your own verification key, to verify your own system images. Boot loaders mostly aren't open source, unfortunately, so it'll be an OEM-provided bootloader that's using your key. Google is working on that. The starting point is the new Pixel C tablet, which uses ChromiumOS's open source boot loader, so the full stack is open (though there are still bits of closed firmware, sigh).
Oh, and note that I said *un
Re: (Score:2)
Who verifies it?
http://source.android.com/devi... [android.com]
http://source.android.com/devi... [android.com]
It's a hardware key. The good news is that you can unlock it if you want.
When you transition from a locked state to an unlocked state, the device is wiped. If the device is unlocked, there is a warning on the boot screen.
So, if an evil organization tries to backdoor your phone (or you just want to flash another OS on it), the data is lost and a warning comes on. You are free to do as you want with the device. Should you wish to re-sell
Re: Verified boot by who? (Score:5, Interesting)
Android's full disk encryption is just an adaptation of dm-crypt. All the source code is in AOSP and the Linux kernel.
Yes, the radio firmware has privileged access and is closed. But that is true for ANY cell phone. If you're concerned about that, then don't use a cell phone, because malicious firmware can potentially pull anything else out of memory if it wanted.
To call this anything but an improvement is extremely short sighted. Take off your tinfoil hat, please.
Is there any way to audit whether the dm-crypt installed on your device matches the source code? Few people compile their own kernel, so it seems that it would be easy for Google or cellular carrier to slip a back door into the module.
Likewise, I wonder how secure Apple's encryption is -- their very public fight against the DoJ could just be a smokescreen to hide the fact that the government can trivially crack the phones, they just don't want anyone to know. Their fight against the DoJ brings this quote to mind: "The lady doth protest too much, methinks."
Re: (Score:2)
You can get the source code and compile it once and match it against all phones. It's pretty easy to verify you can just dd if=/dev/mmcblk0p## | sha1sum -
This [debian.org] is a good example of how linux distributions are trying to achieve this.
Re: (Score:2)
yes, there are compiler flags to help you ensure that.
What are those compiler flags?
How do I know what flags and which version of which compiler Google used to compile the binaries on my phone? Does Verizon use the same flags and compiler as everyone else?
You can get the source code and compile it once and match it against all phones. It's pretty easy to verify you can just dd if=/dev/mmcblk0p## | sha1sum -
So if I run that on a Verizon phone and an AT&T phone is the difference due to different packages put there by the carriers, different compiler flags and/or compiler version, or because someone put a backdoor in some module?
This [debian.org] is a good example of how linux distributions are trying to achieve this.
Is Google going to include this in their Android bulids?
Re: (Score:2)
You clearly should not use a cell phone. Your plans to ... well, whatever ... are clearly too sensitive to risk it.
Call the Mossad.
Re: (Score:2)
You clearly should not use a cell phone. Your plans to ... well, whatever ... are clearly too sensitive to risk it.
Call the Mossad.
I questioned whether or not Google (or Apple's) assurance that cell phone encryption is secure, and that means I shouldn't use a cell phone?
I also questioned whether or not the tree in my front yard is going to grow roots through the sewer line (it did), should I stop using the toilet as well?
Re: (Score:2)
And when told "yes" and given evidence to this fact you still persist with your "what if" game. Clearly you are not interested in the answer unless it is "no" and will be unlikely to believe anything else. Your cognitive bias is getting in your way here.
Referencing some unnamed compiler flags, comparing block devices across "all phones" even when those block devices differ among carriers and phones, and pointing to an experimental Debian project is not really a "yes", it's a "well, it could be".
This is Slashdot, not a consumer news site, no need to use vague handwaving to explain why something is or is not possible. If you know it's possible, then just say why.
Re: (Score:2)
And when told "yes" and given evidence to this fact you still persist with your "what if" game. Clearly you are not interested in the answer unless it is "no" and will be unlikely to believe anything else. Your cognitive bias is getting in your way here.
Personally, I think it has more to do with his IQ score, and less to do with Cognitive Bias.
Re: (Score:2)
verizon is legally required to provide the flags they used as per GPL license for the GPL licensed part of code.
I guess the only way is to check each one on its own.
G
Re: (Score:2)
Likewise, I wonder how secure Apple's encryption is -- their very public fight against the DoJ could just be a smokescreen to hide the fact that the government can trivially crack the phones, they just don't want anyone to know. Their fight against the DoJ brings this quote to mind: "The lady doth protest too much, methinks."
I'm sure the Government is going to get two branches to collude, plus Apple's counsel, all to bolster Apple's iOS sales, when everyone on Slashdot keeps saying that Android is the dominant platform, and that Apple isn't used by anyone but clueless morons with too much spendable cash and teenage girls wanting an iFashion Accessory.
Afterall, if you're a Terrist, why get an iPhone that all-but-requires an Apple ID, when you can get a "burner" Android phone for free, or nearly free, at every Mom and Pop "Cell
Re: (Score:2)
Likewise, I wonder how secure Apple's encryption is -- their very public fight against the DoJ could just be a smokescreen to hide the fact that the government can trivially crack the phones, they just don't want anyone to know. Their fight against the DoJ brings this quote to mind: "The lady doth protest too much, methinks."
I'm sure the Government is going to get two branches to collude, plus Apple's counsel, all to bolster Apple's iOS sales, when everyone on Slashdot keeps saying that Android is the dominant platform, and that Apple isn't used by anyone but clueless morons with too much spendable cash and teenage girls wanting an iFashion Accessory.
Sure, I mean, what are the chances that the DoJ would collude with the NSA to keep secret surveillance secret? The DoJ is there to protect us from the excesses of the NSA, right?
http://yro.slashdot.org/story/... [slashdot.org]
Re: (Score:2)
Sure, I mean, what are the chances that the DoJ would collude with the NSA to keep secret surveillance secret? The DoJ is there to protect us from the excesses of the NSA, right?
...and what about the rest of my argument, that you so disingenuously ignored?
Re: (Score:2)
Sure, I mean, what are the chances that the DoJ would collude with the NSA to keep secret surveillance secret? The DoJ is there to protect us from the excesses of the NSA, right?
...and what about the rest of my argument, that you so disingenuously ignored?
Well, I didn't think it was a serious argument:
Afterall, if you're a Terrist, why get an iPhone that all-but-requires an Apple ID, when you can get a "burner" Android phone for free, or nearly free, at every Mom and Pop "Cellular Phone Shack" in the world?
I have no answer for that since I don't know what phone a "Terrist" would use, nor do I think that Android is any more secure than Apple from NSA surveillance. And of course, the real problem of invasive government surveillance is that it doesn't just target terrorists, since anyone can be branded as terrorist with no evidence of wrongdoing at all, the problem is that it targets *everyone*.
Re: (Score:2)
Is there any way to audit whether the dm-crypt installed on your device matches the source code? Few people compile their own kernel, so it seems that it would be easy for Google or cellular carrier to slip a back door into the module.
It's intended to have a chain of trust. The hardware verifies the boot partition, and the boot partition verifies the other partitions. If the signature on the system partition matches, then dm-crypt was not tampered with.
Re: (Score:2)
Is there any way to audit whether the dm-crypt installed on your device matches the source code? Few people compile their own kernel, so it seems that it would be easy for Google or cellular carrier to slip a back door into the module.
It's intended to have a chain of trust. The hardware verifies the boot partition, and the boot partition verifies the other partitions. If the signature on the system partition matches, then dm-crypt was not tampered with.
But that only verifies that dm-crypt was the one that Google (or verizon, or whoever) put there, I'm more interested in validating that the dm-crypt that's there matches the source code that everyone has looked at and trusts. It doesn't even have to be malicious, how do you know that a carrier doesn't say "Hey, if we comment out the slow parts of the encryption library, it's 90% faster and it sure looks like the data is still encrypted, so it should be safe".
Re: (Score:2)
That one does not mean what you think it does. "Protest" meant promise, specifically the protestations of eternal love and faithfulness of the queen to her husband. I know the bar for literacy isn't very high around here, but still.
I don't see how I used it incorrectly:
https://en.wikipedia.org/wiki/... [wikipedia.org]
"The lady doth protest too much, methinks" is a quotation from the 1599/ 1600 play Hamlet by William Shakespeare. It has been used as a figure of speech, in various phrasings, to indicate that a person's overly frequent or vehement attempts to convince others of something have ironically helped to convince others that the opposite is true, by making the person look insincere and defensive.
In rhetorical terms, the phrase can be thought of as indicating an unintentional apophasis—where the speaker who "protests too much" in favor of some assertion puts into others' minds the idea that the assertion is false, something that they may not have considered before.
Regardless of whether the original Old English meaning of 'protest' is used or its more modern meaning, its still applies to a situation where someone is so effusive with their actions that it makes the actions seem insincere.
Literacy is more than looking at the literal definition of each word.
Re: (Score:2)
In this case the encryption has more to do with marketing than anything else. With M$ going in the opposite direction probing every millimetre of your technological life they can and basically claiming ownership of your hard disk and network connection and saying it's OK because Android does something sort of in some ways somewhat similar. Google is looking to distance Android from that so a surge in security measure as being the opposite of M$'s windows 10 every computer orifice probe. Apple is also start
Re: Verified boot by who? (Score:4, Insightful)
This is Slashdot. They issue you a tinfoil hat when you log in.
If you're not wearing a tinfoil hat, you haven't been reading the news for the last few years.
Re: (Score:2)
Honestly, this is good (Score:5, Interesting)
Re:Honestly, this is good (Score:5, Insightful)
Make no mistake, they don't do this out of some love of privacy or benevolence toward their customers. Outside the US, the phrase "Made in America" has become synonymous with "pre-cracked by the NSA". Companies have no more noble goal with efforts like whole-device encryption than not watching their global sales drop to zero over the next few years.
Re:Honestly, this is good (Score:5, Insightful)
Re: (Score:2)
I suspect also that Apple and Google don't want to be responsible any more for law enforcement duties. I can only imagine how many requests they get every week to break into someone's phone. Now they can legitimately say that they can't do it.
Exactly.
Re: (Score:2)
They love what their customers love. The system works.
DRM (Score:4, Interesting)
Re:DRM (Score:5, Insightful)
Possibly, but you can be cynical and not think this is altruistic ... they get the PR of saying "we're on your side" to consumers, as well as eventually saying "now piss off, we can't help you" to law enforcement.
It can benefit consumers AND be self-serving.
Re: (Score:2)
It [mandatory full-disk encryption] can benefit consumers AND be self-serving.
Not according to the standard definitions of self-serving which includes:
1. Serving one's own interests, especially without concern for the needs or interests of others.
2. Exhibiting concern solely for one's own interests: serving one's own interests often in disregard of the truth or the interests of others.
It would be more accurate to say that this may be a case where benefiting consumers also benefits the corporate interest. It is curious that you have managed to twist around something good Google has done and spin it as something negative (self-serving). I'm not claiming it was intentional on your part or that it is part of a vast conspiracy but it is part of a larger pattern. Most news stories I've seen about Google doing somethi
Re: (Score:2)
It's called enlightened self interest. Interesting concept.
Re: (Score:2)
Re: (Score:2)
Then perhaps you should read the damned comment I replied to instead of pulling this gibberish out of your backside.
Google is a corporation. By definition, they are self-serving. It just so happens that in order to be self serving, they need to periodically align with consumer interests. But they sure don't do it all the time.
The GP said they couldn't accept it as altruistic. I agree, ther
Re: (Score:2)
Most news stories I've seen about Google doing something good have been spun into stories about Google being evil.
Welcome to the world of Apple News on Slashdot; where this exact form of yellow journalism has been practiced for over a Decade.
Slashdot's just now applying the same form of Editorialism with Google.
Re: (Score:2)
I'm gone a bit too cynical to think this is an altruistic effort by Google to protect De People from the government spying on them. Could it just be an attempt to make their DRM more robust?
No, this doesn't do anything to improve the DRM, which is already done in a separate secure OS that has always been cryptographically verified by the bootloader.
Re: (Score:2)
That's odd, because LG has their DRM stuff right where anyone can find it using something like Total Commander. It isn't hidden in some secret OS, it is right in the root directory of Android. Ditto on Samsung devices. It's probably not wise to muck with said files, but there they sit.
No, they don't. Those are only the Android components that communicate with the trusted OS to do the actual decryption, using keys that are not available to the Android OS. If you remove or muck with the Android components, you'll make DRM-protected video undecryptable, but that doesn't mean they're what is actually doing the decryption.
Priorities (Score:4, Interesting)
Though this is a welcome move, Google has its priorities totally wrong.
As it stands right now, a large percentage of the Android population is running insecure software which, in some cases, is remotely exploitable without user intervention, with no way to mitigate the risk.
This is utterly embarrassing for Android if you think about it. Here we have a (mostly) open source stack that is MUCH LESS secure than its most significant opposition - Apple, which is closed source and absolutely restricted - but we can't do anything about the vulnerabilities because someone in the supply chain decided that it isn't cost-effective to provide something as simple as root access to the OS.
This is partly the manufacturer's and carrier's fault, but it is very much also Google's fault.
If I understand correctly, Google has a set of conditions that manufacturers must meet to be able to ship Google apps with their phone. One of the conditions that Google should be forcing RIGHT NOW is that manufacturers (and carriers) must provide a mechanism to allow updating the operating system (or to replace it entirely).
This shouldn't be a hard thing for Google to do. Heck, for all the evil they do, Microsoft gives you unrestricted access to the Operating System (recent host file shenanigans notwithstanding), and I've never seen a x86 PC that doesn't allow you to wipe Windows and install something else, despite the whole "secure boot" scare.
So, Google, good move, but get your priorities straightened out.
Good point... (Score:3)
Full encryption does nobody any good if the OS, as deployed, is so full of holes that the encryption isn't much of an impediment to gaining full access to everything on the device.
I'm pretty sure that neither Android nor iOS is a true bar to getting at what's on your phone (iOS almost certainly has plenty of exploitable bugs your tax dollars have discovered or paid for information on), though it might not be information that's going to be admissible in a trial.
Re: (Score:2)
Disclaimer: While educated speculation, the following is still speculation and therefore this is not libel.
Do you know why the new Windows phones won't work on Verizon despite having all the necessary hardware? It's because Verizon has decided to not authenticate those phones, in essence blocking a completely capable phone from their network. They get away with it because nobody cares about Windows phones. I mention that to highlight the power the carriers have over the manufacturers and OS companies.
You wo
Re: (Score:2)
Carriers should support Phones for 2 years after the last day it was available for sale. I mean, they could simply hand over the blobs needed to get CyanogenMod running on said phone, and unlock the bootloader and pay CM to actually fulfill the need, rather than crying "Proprietary" (no, it isn't).
Re: (Score:2)
One of the conditions that Google should be forcing RIGHT NOW is that manufacturers (and carriers) must provide a mechanism to allow updating the operating system (or to replace it entirely).
That mechanism exists, and has existed, and has been mandated, for years.
The challenge is getting manufacturers and carriers to use it.
Re: (Score:2)
Heck, for all the evil they do, Microsoft gives you[1] unrestricted access to the Operating System
[1]: And everybody else
I kid, of course. But not by much.
Re: (Score:2)
As it stands right now, a large percentage of the Android population is running insecure software which, in some cases, is remotely exploitable without user intervention, with no way to mitigate the risk.
I'd like you to cite which of the vulnerabilities actually have a real world value in being exploited. I mean there's been plenty that have come out in the past few years but they all fall into the category of:
1. So old that they don't affect common versions of Android in use.
2. Work on some very device specific edge case only that is completely mitigated by other security features of the devices (stagefright)
3. Require physical access to the device.
4. Require the user's consent. (the single most common for
Re: (Score:2)
So old that they don't affect common versions of Android in use.
You'd be surprised how many 2.2 and 2.3 devices are still in use because Google refused to make Android updates that fit in older devices' smaller RAM.
Re: (Score:2)
I don't need to be surprised. It's 4%. These figures are published by Google. Also I'm not surprised. If this were a virus we're talking about we could claim herd immunity. If it were a targeted attack it would fail unless you're really REALLY good at picking a target demographic where you're likely to hit one of those phones, and if you look hard enough you may find these are not the kind of high-tech people who link their personal lives with their devices or have loads of international premium SMS time on
Xbox One (Score:2)
for all the evil they do, Microsoft gives you unrestricted access to the Operating System (recent host file shenanigans notwithstanding)
As of Windows 10, you need to buy and renew an EV code signing certificate in order to run any drivers that you have built. This is cost prohibitive for many individual hardware hackers.
I've never seen a x86 PC that doesn't allow you to wipe Windows and install something else
Xbox was this way, at least until mods were figured out. So is Xbox One. So is PlayStation 4, though it comes with a FreeBSD-based operating system called Orbis OS instead of Windows.
Another issue is drivers. A PC maker can ship Windows on its PCs and refuse to ship drivers for other operating systems, as ASUS does with its
Re: (Score:2)
If I understand correctly, Google has a set of conditions that manufacturers must meet to be able to ship Google apps with their phone. One of the conditions that Google should be forcing RIGHT NOW is that manufacturers (and carriers) must provide a mechanism to allow updating the operating system (or to replace it entirely).
This.
I have been saying this same thing for years now, everytime some Fandroid makes an excuse that it isn't Google's fault that Android phones never (for nearly all values of "never") get Security Updates.
Google certainly has enough clout with the OEMs and Carriers to enforce more reasonable Update policies; but they just. Don't.
Why?
Because ultimately, they simply don't give a shit.
Re: (Score:2)
firstly, it's debateable whether android is less secure than ios. ios has had many many times as many CVEs over the years than Android has had.
Your criticism of Android and Google has little to do with Android and Google. Phones where the carriers let you flash the OS are the exceptions, not the rule.
And yet, curiously, none have them have actually been exploited as far as I know.
Yes, I am sure the NSA watches the CVE postings very carefully (most of them are probably old news to them anyway), but the NSA isn't every stupid local LE. Their methods are simply nothing compared with what the NSA can do.
OTOH, most of us are like the buzzing of flies to the NSA. Not saying what they do is right (because it isn't); but generally, they really do have bigger fish to fry.
Who holds the keys (Score:3)
Encryption is great! It keeps data private. However only private to those who hold the keys to the encryption. What is preventing Google from creating a master key that would allow them or a government to decrypt the data. Without such a backdoor mechanism are there some countries where Google would not be allowed to deploy the newest OS? I will be curious about the legal ramifications and privacy notice connected to this next update. What legal recourse would consumers have if it were found out later that Google did in fact create a backdoor. In the US, for instance, would the patriot act absolve Google of any class action even if they did not disclose facts to the consumer?
this is possible if Apple and Google are lying (Score:3)
This is technically possible IF Apple and Google are lying about how the symmetric key itself is generated and stored.
The passcode is used to secure the "real" key, which is used for data encryption. This symmetric key is supposedly not predictable or retrievable. However, it could in fact be the output of crypt('$1$hfgfydhjd$', imei + masterkey)
That would allow anyone who knows the imei and master key to derive the symmetric key.
Re: (Score:2)
This is technically possible IF Apple and Google are lying about how the symmetric key itself is generated and stored.
The passcode is used to secure the "real" key, which is used for data encryption. This symmetric key is supposedly not predictable or retrievable. However, it could in fact be the output of crypt('$1$hfgfydhjd$', imei + masterkey)
That would allow anyone who knows the imei and master key to derive the symmetric key.
For Android, the code you're wondering about is all open source. Go take a look: https://android.googlesource.c... [googlesource.com]
Read the subject, or what you quoted (Score:2)
They have published some code which they say is used to generate the initial master key. They are probably telling the truth, but there's no way to know - they master key looks like random bits.
Re: (Score:2)
They have published some code which they say is used to generate the initial master key. They are probably telling the truth, but there's no way to know - they master key looks like random bits.
Actually, I wrote chunks of that code, and work with the guys who wrote the rest, so I know *exactly* how the key is generated. The master key is generated on line 1497, by reading 32 bytes from /dev/urandom. If you'd like, you can also go verify that the Android random number generator is the standard Linux RNG, unmodified (I have, but don't trust me). Then you can verify that the RNG is fed the normal stuff... network packets, user input data, etc. On devices that have one (most, these days), it's also fe
In that case perhaps you can clarify. Keyed once (Score:2)
Thanks for taking the time to reply with such a reply response.
> Actually, I wrote chunks of that code, and work with the guys who wrote the rest, so I know *exactly* how the key is generated.
In that case perhaps you can clarify whether I'm misunderstanding or just didn't communicate clearly. My understanding is:
The symmetric AES key is generated ~once, then that key is encrypted based on the password or pattern.
By the time an end-user is using the device, the key has -already- been generated (or may hav
Re: (Score:2)
Thanks for taking the time to reply with such a reply response.
> Actually, I wrote chunks of that code, and work with the guys who wrote the rest, so I know *exactly* how the key is generated.
In that case perhaps you can clarify whether I'm misunderstanding or just didn't communicate clearly. My understanding is:
The symmetric AES key is generated ~once, then that key is encrypted based on the password or pattern.
It's generated once when the file system is first encrypted, yes.
By the time an end-user is using the device, the key has -already- been generated (or may have been).
May have been, but generally isn't. Usually the first time a device is booted is when the customer turns it on. Key generation and encryption happens at that point in time. This used to be a usability problem because dm-crypt didn't distinguish between in-use and unused blocks, which meant that when the user first turned on a device with on-by-default encryption, they immediately had to wait several minutes for the device to encrypt a whole bu
Re: (Score:2)
https://www.apple.com/business... [apple.com]
According to Apple, one of the many keys in the chain is unique to each device, imprinted into the silicon when the chip is fabricated, and not exposed on any pins of the chip. This doc is a great read, and even goes into how each file is encrypted with a different key.
Makes no sense (Score:2)
I know this is an unpopular opinion but most people don't need to encrypt their phone because they have no sensitive data on it. There is always a trade-off between encryption and data integrity, and the latter is way more important for most ordinary use cases. Good voluntary encryption is nice and important for business, but mandatory encryption ... why?
Re: (Score:2)
I know this is an unpopular opinion but most people don't need to encrypt their phone because they have no sensitive data on it.
Ha-ha-ha. Ha-ha-ha-ha-ha. Ha-ha-ha-ha-ha-ha-ha-ha-ha.
You don't think that your bank app on your phone, and your email app for the email address the bank account is registered to, might be considered 'sensitive'?
(And, no, I don't do that, because I'm not dumb enough to let anyone who steals my phone take over my bank account)
Re: (Score:2)
Apart from the fact that the author of an app can choose to encrypt data as he wishes, anyone who uses his phone for banking is just plain stupid and no amount of encryption will help that person.
Re: (Score:2)
Full disk encryption does ABSOLUTELY NOTHING to protect that data.
OK, you steal my phone. It's encrypted, and has a secure password.
How are you planning to get my data?
Remember, the encryption does ABSOLUTELY NOTHING to protect the data, so you won't have any trouble, right?
Re: (Score:2, Flamebait)
Cut off one of your child's fingers every hour until you unlock it.
How hard was that?
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
What would really be protecting the phone would be the secure password. Most people who found/stole a phone would not have a single clue about how to go about getting the data off a phone if it presented them with a password screen. Even some moderately technically people wouldn't really know where to start.
Re: (Score:3)
Re:Makes no sense (Score:4, Insightful)
Virtually all android phones have a Google account password that should be protected. Many (probably most) phones have other passwords, personal data, financial data, credit cards, and other information that needs to be protected. Really, the idea that all phones need to be encrypted to prevent loss of data in case of phone theft or similar event makes sense as a default assumption. It may not protect you against the various governments, but it will help protect you against common criminals.
Re: (Score:2)
It goes without saying that apps that deal with sensitive data must encrypt it before writing it to disk. The authors of such apps should even be legally required to do so. But that has nothing to do with full disk encryption, which in most use cases is simply not needed and counter-productive (higher resource usage, lower data integrity).
Re: (Score:2)
I know this is an unpopular opinion but most people don't need to encrypt their phone because they have no sensitive data on it. There is always a trade-off between encryption and data integrity, and the latter is way more important for most ordinary use cases. Good voluntary encryption is nice and important for business, but mandatory encryption ... why?
From section 9.9
https://static.googleuserconte... [googleusercontent.com]
It appears to be required to be enabled by default yet nothing seems to prevent users from disabling it.
About that boot encryption... (Score:5, Interesting)
Re: (Score:2)
Mod parent up! That is exactly what I fear. The motive is not to protect the user from some government which couldn't care less about what's on my phone, but to prevent me from rooting my own device and get rid of all the crap I don't want on my phone.
Tsk tsk tsk (Score:2)
"The move is likely to draw criticism from law enforcement officials in the U.S. who have argued over the past year that the increasing use of encryption on devices and online communications affects their ability to investigate crimes."
...the move is also more likely to hinder U.S. law enforcement from ABUSING their power... so you'll forgive me if I'm a little salty in saying...
" You kinda brought this on yourselves. "
Re: (Score:2)
FUCK YOU
Sincerely,
Liberty
Re: (Score:2)