Hacker News new | past | comments | ask | show | jobs | submit login

There's a good chance that those guys didn't even have their phones on. If something is that urgent you don't text, you call, and if the call doesn't go through you find someone else that you can call who can go to the people involved and so on until you have guaranteed timely delivery and if you can't achieve that then you're going to have to live with the consequences.

Doing a 'fire-and-forget' text message and then attaching grave consequences to the timing is ridiculous.




>> There's a good chance that those guys didn't even have their phones on.

Nevermind the fact that it was defcon, I'm a regular presenter at conferences and meetups, and literally #1 on my last-minute checklist is to text my wife that I'm now unreachable and silence my phone.


Nevermind the fact that it was defcon. Having your phone on in a place where thousands of security experts are running amok is a surefire recipe for ensuing hilarity.


> Having your phone at all

FTFY.


I thought it was SOP to not bring your phones to DEFCON


Right - there's that, too.

Maybe next time, Salesforce should think twice about sending its executives to DEFCON. Without some basic introduction as to what it's actually about.


I used burners at DEFCON 2016. Eventually moved back to my actual phones. But, I talked with other people and according to them there were cell sites that were suspect. Never found out if it was true or not. But, as others have stated I turned off my WiFi.


Before DEF CON there are about 20 cell towers in the area, during DEF CON there were almost 130 (rumour I heard, while gooning in the contest area)...

Pretty sure some of those are FBI and other agencies ;-)


I was at this past DEFCON, we had cell sites named "Arnold's Biggest Scam" and "AT&T Totally 1337 Tower". There are others, but those two were prominent because I could access them in my room lol.


From what I’ve read, all you really need to do is turn off wi-fi, which is already fairly paranoid given that no one is realistically going to burn a serious chipset zero-day on random people at a conference. Fake cell towers do occasionally happen but rapidly lead to arrests.


Why wouldn’t they burn a chipset 0-day? It’s unlikely that only one exploit has been and will ever be uncovered. Imagine the shitstorm if you phoned all of DEFCON with a recording to attend your talk, on their radio “off” devices, because you powered them back on at the right time. Imagine the respect. That would be worth a 0-day.


"random people" who with high probability may have undisclosed 0day exploits stockpiled on other devices.... yeah if I'm an APT author DEFCON attendees are (the hardest to exploit and most paranoid [read: likely to get caught by]) the ideal target for any nation-state. not to mention that the conference is often attended by multiple state agencies which makes the target even juicer. yes it's an extremely hard and dangerous group of people to attempt to exploit, but that doesn't detract from the potential value and payoff of a successful APT exploit on said group of people


That's not how Nation State actors work. One of the things that makes Nation State actors dangerous is they have the patience and resources to attack a high value target at the most likely to succeed point. Backing that up, they generally have the intelligence to know when that best time is. And they for sure know that it's not at defcon when everyone is, as you say, paranoid and on the alert. They're going to get you at home, at happy hour with your non-security friends, in that bar with the great but insecure wifi and no 4g.


Or they'll get you while you're in the security line at the airport on your way home.


I guess it depends which State we're talking about, but yes.


You just made that up. There are fake cell stations every year, and there has never been an arrest.


I might be wrong, but I most certainly did not make it up. Will Strafach and Dan Tentler would at least appear to disagree with you: https://twitter.com/chronic/status/884434768380776448


There are no arrests listed for cellular activities at Wikipedia’s “Notable Incidents” list for DEFCON, so if you have direct confirmation of any such arrests, you should add them to the page at https://en.m.wikipedia.org/wiki/DEF_CON


You just pasted a conversation full of people saying that there are rogue base stations. And I don't see anyone reporting arrests!



> all you really need to do is turn off wi-fi, which is already fairly paranoid given that no one is realistically going to burn a serious chipset zero-day on random people at a conferenc

I know very little about security or defcon, but I was under the illusion that stuff like running Wifi Pineapple to trick people to connect to their hotspots was common and doesn't require any 0-days.


There are more advanved tricks which are less overt, but you are correct, none require zero days.


> chipset zero-day

The concern is man-in-the-middle attacks. Easy, no user interaction required, and works very well. No chipset zero days involved.


Not really. Folks usually switch between LTE-only and airplane mode if they're trying to be cautious.


It's defcon. There's a fair chance those guys locked their phones in the hotel safe.


Here's what I do with my phone before heading to DEF CON (yes, I don't bother with burners anymore):

1) Make sure it has an Apple logo on the back and is up to date. I'm serious on this one. Too many Android phones don't get updated by the carrier and that's why I'm not a fan. Yes, if you have the latest phone from Google, you are fine. From another manufacturer, very questionable. The sheer number of Android phones which have connected to my open research WiFi networks over the years and exposed some secret is just tragic, from user PINs thanks to a carrier installed warranty app to e-mail passwords thanks to broken Samsung KNOX TLS middling implementations.

2) Shut off all background activity from apps when not on and in front of me: settings -> general -> background app refresh. Slide that one to off for everything.

3) Turn off WiFi and Bluetooth.

4) For added paranoia, put it in airplane mode when not being used.

5) Make sure it doesn't have any information or accounts on it which I'd not like to be made public.

6) Back it up.

7) A quick audit of apps I'll be using at the con to ensure they are reasonably secure on the wire by using working TLS exclusively. Yeah, very few people will ever do this but thankfully 1-6 should be sufficient.


> Make sure it has an Apple logo

From what I hear all those Chinese dissidents that are tragically no longer with us were all using Apple products...


[citation needed]



There was also this one for which I had involvement: http://www.falseconnect.com/ which while impacting nearly every major technology vendor was particularly bad for Apple. Pretty much anyone who'd been using a proxy service (which includes some VPN providers like TorGuard) for privacy with iOS or macOS opened themselves up to full compromise of the cryptographic channel. The thing is, Apple recognized it was a big problem and got it patched and that patch distributed to all impacted devices in under 45 days from the first report. A similar flaw I reported to Samsung a few years earlier is still not patched on every Android phone impacted because some carriers didn't push the patch.


What good is the magically secure Apple logo on top, when you actually have a Broadcom doing the work down in the metal? I doubt this was the only existing hole: http://thehackernews.com/2017/07/android-ios-broadcom-hackin... (but Apple updated fastest, I do concede that)


Indeed, the same Broadcom chip used in a bunch of Android phones and to my original point, yes Apple was not only the quickest to patch, but there's a good chance a large number of Android phones will never get a patch.


Thanks for the rundown. What's your opinion on LineageOS, security-wise?


LineageOS is pretty good on security and privacy. But IIRC you may NOT have the latest patches even if you have the latest version.

There is a XDA post somewhere explaining this.


Haven't looked at it.


Any DEFCON attendee knows the hotel safe is a laughably insecure place to keep valuables.


So they would never expect it!


Oh god...

Reminds me of a friend who said his MySpace password was just "password123" because "It's such a stupid password that nobody would ever use it, so hackers don't even bother trying it!"

I wish I had multiple faces so I could palm more than one.


Yes! A million times, yes! Defcon is the only Vegas conference I ever bring a burner too.


Man, I missed so many good party invitations at Defcon this year just by not checking Facebook until Sunday night!!!


"Come to Dark Alley 2b, totally great party!!!"


No, these were invitations from people I knew.


From accounts you believed belonged to people you knew, you mean ;o) DEFCON, after all.


I bumped into several of them in person who went "too bad you missed my party"


> If something is that urgent you don't text, you call

SMS is UDP, and voice is TCP?


p good analogy, people will generally ACK a phone call since it implies a higher level of importance and could be about anything under the sun, but right before giving a talk at a conference i think most people would drop that text message UDP packet.


They usually ACK...on the happy path. They might RST, for one, or even timeout.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: