Goupization Humor

SensoryMetrics has posted a hilarious view of how privacy changes the game for search engines. Treating social network friends as a group apparently helps the efficiency of their searches. In theory…

the intrepid MS researchers have discovered that search results are improved when the searcher’s contacts are taken into consideration. Basically, all of your LinkedIn friends are likely searching for something similar when Googling “what channel is the superbowl on this year” (Google Trend’s top 17 search term today.)

Microsoft’s Newtonian insight is based on a study using 100 Microsoft staffers. Apparently they were all Googling similar things.

Top 5 Microsoft searches:
1. Fixing vista
2. how to fix Vista
3. what do we do with Vista
4. windows 7 deadly sins
5. can I bring my iPod back to work

Too funny. This breaks down when you get groups of diversity rather than conformity, and perhaps even further once you realize your privacy can be tracked through association and so you start to leave search chaff (TM) intentionally.

Unmanned Military WaterDrone

You have undoubtedly heard about the unmanned air drones used by the military and intelligence organizations. Enter the unmanned water drone, introduced by Morrelli & Melvin Design & Engineering. They are perhaps most famous for multihull racing designs such as PlayStation and Stars and Stripes, but they also make industrial multis for everything from tourism to maintenance of sea windmills (the mast parks nicely between the hulls). The concept of a water drone incorporates the ability for automated missions over long periods of time. This makes sense, given the limited communications capability at sea.

The HarborWing X1 is a special purpose security and military vehicle used to patrol harbors, inland waterways and open ocean using only wind power. The batteries and computers on board can operate for up to 3 months at a time without human intervention.

I do not see any missile tubes or gun turrets but surely this is in the works, given the record set by other drones in service. The rigid sails might make it an easy target. Do they fold or drop for stealth? Can it deploy mines or detect them?

This also makes me wonder about sea rescue missions. Could a drone be developed for search and rescue in extreme conditions? Given the ultra-high resolution and infrared imaging technology, coupled with satellite communication, is a submersible drone that could locate and carry a small crew to safety the best answer for emergency response at sea?

Useless USB Owl

I realize there is supposed to be some kind of entertainment value to a plastic owl that blinks and rotates its head, but that seems like such a waste of computing potential.

ThinkGeek says this thing has just three modes: active, mellow and sleeping.

Sleeping? Is that robot slang for off?

Instead of blinking and rotating randomly, what if this little guy responded to CPU load or memory. Even better would be a monitor for network traffic and…firewall or IDS settings.

So here’s a truly killer application: security center metrics tied to animal robots like this owl. Malware detected on sensitive systems? A rooster starts to crow. Spam reaching critical levels? A pig grunts and squeals. Talk about clear indicators and fun for the whole operations team.

On the other hand, that could be far too sophisticated so I would also consider buying this thing if it were just a webcam in the form of an owl. Its eyes are certainly big enough to be a lens or two, and you would know it’s off when they are closed. This would be handy, given increasing privacy concerns around cams that have no reliable physical indicators.

Google POP3 Brute Force Attack

The ISecAuditors say you may find it worthwhile to setup hundreds of Google accounts if you want to run a brute force attack on an account sometime in the future. They posted an explanation on Full Disclosure

To bypass the limitation of 1.200 requests per day it is only necessary to have different Gmail accounts. Each new account means 100 new possible requests. If the attacker wants to do a request each second, means 7.200 attempts each two hours, the only need is to have 72 accounts. This would mean 86.400 request/day. More requests only need more accounts.

As the Gmail account creation is a manual process as it needs to pass the captcha. Another limitation is that Google only permits the creation of 10 new accounts creation per day from the same IP address, but using proxies or Tor network would bypass this limitation. Anyway, although the creation of N accounts, those could be used anytime for password cracking accounts.

Google should enforce stronger password standards for certain (the advisory suggests there are none at all). However, companies with large numbers of accounts have to also consider the overall cost of such a move relative to any gains.

In short, for every active user with a locked account there is an unlock/helpdesk fee associated. This will be at least $15 so a thousand locked accounts per day will be more than $15K in overhead. Thus a decision to enable account locking, or strong passwords more likely to lead to mistakes and then account locking, is really going to be based on the economics of risk.

The advisory suggests four control mistakes have been made by Google.

Anyway, is it possible to abuse the “Check for mail using POP3” capability to do attacks to the passwords of the users in an automated way, evading all referred security restrictions and controls and doing a transparent and not noticeable attack to the user that its account is being password cracked as:
– There’s no need for required action from the victim.
– There’s no modification in the password of the victim.
– There’s no locking in the victim account.
– There’s no security notification to the victim.

This seems like very tortured English to me, speaking of making mistakes. Not sure what they mean by required action from the victim. That also seems like a repeat of their last bullet point, which is notification to the victim. Action could only be required after or with notification.

A warning sent to the victim saying “your account has had X unsuccessful logins” is more likely to lead to a helpdesk call ($$) than anything. Imagine if the message said “you have had 1,200 failed logins today, please change your password to something stronger”. That would not only lead to a helpdesk call but probably a very confused/angry call or maybe one full of fear and demanding action.

Locking the account is unlikely to happen, as I suggested above.

Finally, brute forcing a password never leads to modification. Modification would happen entirely outside of a brute force event.

With this in mind, the advisory boils down to nothing more than a public service announcement to users that they should use strong passwords. Although I would say such a notice is commendable, they fail to suggest what/how to make a password strong enough to their liking thus leaving everyone in the same exact spot they were before reading the advisory. This provides Google, and its users, little incentive or explanation why they should alter the current risk profile.