


Making Carriers Shoulder Smartphone Security 57
alphadogg writes "Georgia Tech researchers have received a $450,000 NSF grant to boost security of iPhones, BlackBerries and other smartphones and the wireless networks on which they run. And it's those networks where the researchers are really zeroing in. The researchers are looking into ways wireless carriers such as AT&T and Verizon can detect malware on devices and clean up the devices before they do further damage. 'While a single user might realize that a phone is behaving differently, that person probably won't know why,' says Patrick Traynor, assistant professor at Georgia Tech’s School of Computer Science. 'But a cell phone provider may see a thousand devices behaving in the same way and have the ability to do something about it.' Georgia Tech is going to build out a cellular network test bed to try out its remote repair techniques."
Anyone else have a bad feeling about this? (Score:5, Insightful)
Last time a company had access to the contents of a device (Amazon -> Kindle), they caused a really big uproar.
Re: (Score:2, Informative)
Re:Anyone else have a bad feeling about this? (Score:5, Insightful)
Yeah, it seems like it has to be a fine line. Like what gets defined as "malware"? Anything that uses more bandwidth than the carrier likes?
It reminds me slightly of broadband providers blocking port 25 in order to prevent spam. I don't mind that as a concept, but if so they should be willing to open it on request without too much of a hassle. Charging an extra $15 a month to open it seems like they're not really trying to cut down on spam, but rather trying to milk their customers by charging for things that really should come free with access.
Re: (Score:2)
It's obvious: If it limits the money-making, it must go.
Programs, freedoms, family life.
All your friends and then your wife.
Leisure, pauses, sleep and fun.
And the redemptory gun.
Re: (Score:3, Insightful)
I am leery of giving unfettered regulatory power to a gatekeeper that has obvious financial interests to act in a manner that conflicts with my own:
No, I dont run spam botnets, nor do I write malware; however, what about people that write SSH proxies to bypass walled garden policies on their devices? If the verbiage of the "agreement" about malware is poorly written, this useful software could (and likely would) be classified as "Malware", and systematically removed from connected devices.
I would settle fo
Re: (Score:2)
Mind you, they don't necessarily need access to the device internals to detect that it's running malware. There are products for ISP's that detect traffic patterns that indicate an infected computer, and then isolate the computer in question in a sandbox network where all HTTP requests go to a support page with cleanup tools and links to anti-virus vendors. I guess you can employ a similar strategy for wireless networks.
(My employer used to have such a product, I think it's still in use in some Finnish broa
Re: (Score:1)
Contract addendums (Score:2, Insightful)
Next, they'll add into their contracts: 'Costumer does not own their phone. We reserve the right to make whatever changes to the device we deem acceptable. Any and all changes made that cause injury or loss of use of the device are not cause for release from this contract.'
Re:Contract addendums (Score:5, Funny)
you forgot all contacts entered into this phone are open to our marketing department. all photos taken can be used by the carrier for advertisements. all calls made will be recored to insure "quality" control
Re: (Score:2)
signs your smartphone's been p0wned (Score:5, Funny)
Upon turning on your phone, it demands a cookie.
Your phone tells you it needs antivirus installed.
Hold music is replaced by a twisted AI that sings about cake and says it's okay if you want to leave (a message). ...
Re: (Score:2)
Hold music is replaced by a twisted AI that sings about cake and says it's okay if you want to leave (a message). ...
But GLaDOS makes a great answering machine. She is a good way to filter out the messages I didn't need, but I haven't had any voicemails in a month so maybe I should make sure she's working.
Oh gawd, she's using my phone as a sonic weapon against me. HEEEEEEELLLLLLLL
LOST CARRIER
Re:signs your smartphone's been p0wned (Score:4, Funny)
Upon turning on your phone, it demands a cookie.
And if you give your phone a cookie, it's going to ask for a glass of milk. One thing will lead to another, and soon it will want your social security number.
Re: (Score:2)
And if you give your phone a cookie, it's going to ask for a glass of milk. One thing will lead to another, and soon it will want your social security number.
Then it will want your first born's social security number,
Oh great (Score:5, Interesting)
So they are going to deploy the ability to remotely update the users device. Because the bad guys will never figure out how the company does it. I can see it now. An entire carriers smart cell line bricked by a remote exploit that updates phones.
Re: (Score:2)
So they are going to deploy the ability to remotely update the users device. Because the bad guys will never figure out how the company does it. I can see it now. An entire carriers smart cell line bricked by a remote exploit that updates phones.
People often say things like this here on Slashdot, but automatic update tools like Debian's apt-get and Microsoft's Windows Update have never been hacked and used to distribute virus-ridden updates*. My Ubuntu netbook has never been "bricked by a remote exploit" even though it's open source, so be bad guys know exactly how the update mechanism works.
In other words, we have the technology to make secure remote update software. Technology like public/private key cryptography to digitally sign updates, and on
Re: (Score:1)
I personally can't wait for everyone smartphone in North America to just one damn stop working lol.
I think it would be fucking hilarious.
Rather not... (Score:1, Interesting)
I'd really rather not allow a company access to "clean up" my devices. While this might be good in certain corporate or university based environments where all the equipment is owned by a central group, is isn't a good idea for public cellular networks where individuals own the phones. That is, unless we go to a phone lease system instead of purchase. I should really shutup before I give the networks more ideas on how to screw us over...
Bitpipe (Score:5, Insightful)
In the corporate space however there are device management solutions available for Windows Mobile, Blackberry and Symbian that have seldom been rolled out at carrier level. These can lock down devices so that malware cannot be installed, and unauthorized applications removed. I cannot see that working as a consumer proposition, it really doesn't work well at the corporate level either. importantly these solutions are all at the IP layer (dumb bitpipe) and don't care how the device connects to the management server. ActiveSync, WiFi, cellular connection (and yes, via SMS too) will all trigger a wiped device or an app uninstall.
Nothing to do with telcos. Move along.
Re: (Score:2)
Agreed. And the headline that slashdot tacked on to this article: "Making Carriers Shoulder Smartphone Security"... "MAKING" them "SHOULDER" it like it's some kind of burden?? wow, you'd think the editors of /. were in bed with the cell industry, doing their NewSpeak PR for them. A more accurate headline would be "Cell carriers delighted to portray naked power grab as good for users".
Re: (Score:2)
Wireless Internet Providers are just that, ISP's. They should have the same level of monitoring and control of the sites I surf and the applications I run as a terrestrial ISP, ie NONE.
The difference between wired and wireless is that one is a shared & finite resource.
Your suggestion, that they both get treated the same way, ignores reality.
The worst thing a wired internet connection can do is max its own bandwidth.
One mobile device behaving badly can bring an area's network to a standstill.
Re: (Score:2)
only way i can see that happen is if the attack can reach the rafio firmware...
Why is the NSF? (Score:5, Insightful)
Spending money to facilitate better service for these private businesses who have not only made billions from customers, but took billions of tax dollars and screwed us as citizens.
NSF should not be paying a cent for this. The issues need to become prominent enough for the customers to demand better products from the oligopoly of telcos.
Re: (Score:3, Insightful)
Spending money to facilitate better service for these private businesses who have not only made billions from customers, but took billions of tax dollars and screwed us as citizens.
NSF should not be paying a cent for this. The issues need to become prominent enough for the customers to demand better products from the oligopoly of telcos.
I'm usually quite on board with the government not paying money to help businesses further their own causes, but there are exceptions to every rule.
This should be seen as acceptable, just like it's seen as acceptable for the government to pay for the NHSTA to crash cars to test them. Those tests are given back to the manufacturers to make... wait for it... better cars. Sure it helps the manufacturers, but more importantly it helps the consumer, or more important to the governments cause, the citizenry.
No go
Re: (Score:1)
There's a huge difference here though. Nobody is going to die if a cellphone performs horribly in a security test (ruling out side effects such as not being able to call 911). Also, testing the phones does not require them to be destroyed, unlike testing a car. Understandably, auto manufacturers are not interested in crashing thousands of cars, and those tests have to be standardized to have an fair comparison between the different brands.
There's also a line between what they're attempting to do. With a
Re: (Score:2)
I can agree with that.
Akin to what Paco103 said, though, these phones aren't a necessity to human life, and the backdoors they're looking at are also inherently a security issue.
Personally, I don't agree with the money, but you've reasoned me enough to not disagree with the notion of others thinking it is being appropriated well enough. They can think that and I can agree that they are being reasonable enough.
Re: (Score:2)
But there has to be exceptions, and this one, I think falls under such exceptions.
If your fancy-pants smartphone gets p0wned nobody gets killed. If you want a reliable emergency phone there are cheaper basic alternatives. Think about this whenever you think about the government spending money: if the government is going to spend money it first must take it from somebody else by force (taxes aren't optional...and yes inflation is a tax too). That is an extremely disagreeable process which should be reserved only for the greatest collective needs of society. This should include the branc
Re: (Score:2)
NSF should not be paying a cent for this.
That is absolutely correct. Why should public money go to yet another private company? Is Apple going to give the US Treasury a cut of the profits from future iPhone sales (not likely)? The whole bailout mentality is such bullshit; what ever happened to taking responsibility for one's own successes and failures? Another 200,000 ordinary Americans lost their jobs last month, joining millions already on the unemployment rolls. The taxpayer is drowning in red ink, our kids will curse us when they are old enoug
Re: (Score:2)
Why should public money go to yet another private company?...bailout mentality is such bullshit... These damn NSF bureaucrats should spend a month or two working a real job for ordinary working class wages; maybe then they would better appreciate the real value of the money they so frivolously spend.
I could not agree more, with your quotes and especially the last couple of lines. The fact that the Republicans dug Americans a very DEEP financial hole is enough of a reason never to see them ever elected to office again as they put party politics ahead of the citizens they take an oath to serve and protect. Hypocrisy. And do not get me started on lying to start unnecessary wars killing Americans, makes me sick. Profanes the sacrifice that many in my family have made serving in our US military. As far
Froth much? (Score:2)
NSF should not be paying a cent for this.
That is absolutely correct. Why should public money go to yet another private company?
Where did you read that the NSF was giving money to a private company? This is a research grant that is being paid to faculty at a university to fund research on how to make smartphones more secure. This is spelled out in the first sentence of the summary.
Seriously, sometimes the game of rabid-emotional-frenzy telephone that goes on here is a little much.
Re: (Score:2)
Non-sufficient funds (Score:1, Funny)
Re: (Score:2)
I thought it was Not Safe For
Not a big issue... (Score:2)
Re: (Score:1, Troll)
...There is hardly any malware for mobile platforms....
That is because there is a huge variety of mutually incompatible devices. Manufacturers of phones also tend to design security in, rather than an afterthought, such as happened with Windows. When a device is hacked, such as jail broken iPhone's, the built in security from the manufacturer is nullified. Even though millions of iPhones have been sold, none of them, except for the jail broken ones have any problems with rogue software. Because Apple checks
Re:Not a big issue... (Score:4, Insightful)
Because Apple checks all programs for the iPhone, no bad programming can ever get through.
You in the market for a bridge in the Brooklyn area?
Re: (Score:2)
Re: (Score:3, Informative)
no bad programming can ever get through
You realize that Apple doesn't vet the programming and there have been approved apps that later got revoked or the ire of the community for being shady?
Re: (Score:2)
Re: (Score:2)
Most mobile platforms adopted a common standard - there are something like 2 billion Java smartphones out there. I can download an app from anywhere, and run it on my Motorola with no hassles.
Unfortunately Apple have decided to go with an incompatible phone, but that's only about 1% of the market anyway, so hopefully we won't return to the bad old days of the 80s where there were millions of platforms all incompatible with each other.
Re: (Score:1)
....but that's only about 1% of the market....
Last time I looked, there were about 18 million happy owners of the iPhone, about 17% of the total smartphone market. Most users don't care if there's a mouse running around inside the phone making it do its thing, but what matters is that it is easy to use and works reasonably well. They could care less about Java or any other technical details. That's just for us Slashdot users to talk about. There is nothing standard about phones from other manufacturers tha
how about stop useing network locks & custom s (Score:1)
how about stop useing network locks & custom software this more like the same carp that you get on new pc's.
My Phone, No Touch! (Score:1, Insightful)
I hate to be an obnoxious twit, but I REALLY don't like the idea of a carrier messing with my phone, even for the sake of carrier network stability. I would rather have the phone's carrier network access locked down so all IP traffic is stopped and all non-emergency voice calls get redirected to a call center who can inform me that my phone behaves like a virus laden whore. When and if I want to modify my phone OS and applications is my call. At least for GSM, the SIM card is by design an easily transferabl
Uuum what?? (Score:2, Funny)
Are we cattle or what?
"Ohh, I don't know what's... happening to me."
"Ohh, it all happens... automatically."
"Ohh, you keep me well and safe."
"Ohh, you rule all of my life."
"You are just... too kind my masters."
Mobile devices are the same as your computer! (Score:2, Insightful)
Seriously, how many people think it's a good idea to let your ISP into your computer. Controlling it, installing/removing software, etc. Nobody would stand for that.
Mobile devices are not that different. They are still your personal computer and nobody should be screwing with it unless you explicitly allow it.
Now the phone company is certainly within their rights to degrade or isolate malfunctioning devices on their network but they better be doing that at the network level and not actually touch your de
Re: (Score:2)
Do govs really want Smartphone security? (Score:2)
Part of the charm is tracking, easy to tap, seeing who you phone and getting a voice print.
Some computer company could upset this balance of total information awareness that is the phone.
Costas Tsalikidis, the Greek telco whistleblower who was found hanged.
Adamo Bove head of security at Telecom Italia who exposed the CIA renditions via cell phones ‘fell’ to his death.
Or http://w [wired.com]