Camel Milk

The Daily Record reports that the FDA is considering camel milk. Camel dairies already exist in America and promote camel milk benefits

To milk a camel, you need warm hands, a gentle touch and quick timing — camels give milk only in 90-second bursts.

Gil and Nancy Riegler, owners of the nation’s largest camel dairy near San Diego, said the extra work pays off with milk that is therapeutic, nutritious and delicious.

It’s also illegal to sell in the United States.

Illegal to sell milk?

Millions of tons are produced in desert regions around the world but Europe and the US do not yet allow it to be sold. There is no doubt the hundreds of thousands of Somalis, Mongolians, Ethiopians in America alone would purchase the milk if available. The problem will be how to try and fit camels into the industrialized cattle model, or how to learn to let go of the cattle model and start over. A new approach to dairy sounds interesting — it might even improve milk quality enough to make quantity a non-issue.

The Camelicious dairy, opened in 2006, uses mechanized milking technology and trains camels to walk into the milking parlor. When the dairy first started, “the Bedouins said, ‘No way will the animals enter that milking parlor,'” said Peter Nagy, the Hungarian farm manager there.

He and his wife, both veterinarians, solved the problem, he said, but “I cannot explain exactly how this was done.” Mr. Nagy credits training by his wife: “A woman has a sixth sense” that allows her to “know how the animals feel.”

I would wager his wife also is good at information security and risk management. Reuters in Australia suggests Europe also is looking at legalizing camel milk.

“People with lactose intolerance can drink it with no problem, unlike cow’s milk, it doesn’t cause protein allergies, and it’s high in insulin,” said Ulrich Wernery, the scientific director of Dubai’s Centre for Veterinary Research Laboratory.

Similar in taste and appearance to cow’s milk, he said camel milk is closer in composition to human milk, making it a healthier option than cow milk.

Camel milk also is high in vitamin C, which Wernery said explains its importance to Bedouins, Arab desert nomads, who historically lacked fruits or vegetables in their diet and have been drinking camel milk for generations.

Many health benefits compared to cow milk, a history of safe consumption…the FDA would be wise to legalize.

Malware Found on Dell MBoards

A PowerEdge R410 replacement motherboard was shipped to a customer with malware already on it. The PowerEdge General HW Forum now informs him that it is nothing to worry about for seven reasons, which include the following:

The maximum potential exposure is less than 1% of these server models. […] Dell has removed all impacted motherboards from the service supply. New shipping replacement stock does not contain the malware. […] The W32.Spybot worm was discovered in flash storage on the motherboard during Dell testing. The malware does not reside in the firmware.

I like the “nothing to see, move along” tone but here is my personal favorite:

Systems running non-Microsoft Windows operating systems cannot be affected

Cannot be affected? That sounds very promising.

Dell says the customers that received infected motherboards are being contacted by phone. That must make them sleep better at night, given that it was phone calls from Dell that started this whole worry thread:

I just got a telephone call from a service scheduler informing me that the replacement R410 motherboard I received several weeks ago contains spyware in its embedded systems management firmware, and wanting to schedule an additional service call for a tech to come clean it off.

Unfortunately since the person calling was non-technical, she was unable to provide a lot of details. But I do believe the call to be legitimate as she had the service tag of one of my systems which did indeed receive a motherboard replacement recently.

Does Dell have an official article documenting this issue and laying out further details and the potential risks? Obviously it causes me grave concern be informed of a vulnerability but not have all of the technical details, especially when they asked to be able to schedule the service call to resolve the issue at least ten business days in the future.

Compass Rose

Impressive guitar picking and lyrics by Chris Pureka

 

Well, I’m lost today
I’m almost wandering back to the door
That slammed in my face
Oh, but here I am
Here I am
Here I’ll stay
But when will the street signs stop pointing west
When will my thoughts stop drifting like smoke
Over the ridge to the trail we used to walk?

Oh, does it sound familiar?
The whole thing fades to black
And then you’re waiting
Waiting for it to burn again

Well, I’m lost today
I won’t deny it
I’m going to lay down
And wait for the compass rose
Under my skin to start to glow
But look how the sun has painted the trees
All these colors never known to them
Colors never known to their leaves
I’d like to sing like that

Oh, does it sound familiar?
The whole thing fades to black
And then you’re waiting
Waiting for it to burn again

But I know that someday, someday
I’ll offer up a song I was made to play
Until even the mocking birds
Don’t know what to say
And the mornings just make sense, sense, oh yeah
And where the dawn went I don’t know
Just hang a white flag out the window
Until the sunlight shines through it
Well is it morning yet?

I’m lost today
Here I am wandering
It’s late and I’m sure noticing
The crook of my arm is lonely
But look how the snow has painted the town
So that all of the street light is dancing, dancing around
I’d like to love like that

Does it sound familiar?
But I know that someday, someday
I’ll offer up all my Sunday afternoons
Until the rocking chairs have gone and worn
Right through the paint on the porch floor
And we’re gray and gray and gone, gone, gone

Google and (Ir)Responsible Disclosure

Research on the VPN flaw at Google has led me to believe they do not want anyone to talk about it. This brought me to an odd conclusion. Only a few months after the giant company said the Chinese are behind an attack on their infrastructure (that arguably came through a simple backdoor/VPN) they were found suggesting almost the same strategy to Chinese citizens — that they use VPNs to evade security perimeters.

Hypocritical? I do not have the liberty to disclose all the details I have found, but hopefully someday things will become more clear. Meanwhile a story about Google’s security vulnerability disclosure propaganda from 2008 has actually become a bit more clear. Surveillance State wrote back then:

Question: You’re a multibillion dollar tech giant, and you’ve launched a new phone platform after much media fanfare. Then a security researcher finds a flaw in your product within days of its release. Worse, the vulnerability is due to the fact that you shipped old (and known to be flawed) software on the phones. What should you do? Issue an emergency update, warn users, or perhaps even issue a recall? If you’re Google, the answer is simple. Attack the researcher.

The punchline is here:

Miller, the unnamed Googlers argued, acted irresponsibly by going to The New York Times to announce his vulnerability instead of giving the Big G a few weeks or months to fix the flaw:

Google executives said they believed that Mr. Miller had violated an unwritten code between companies and researchers that is intended to give companies time to fix problems before they are publicized.

Compare that with how Google acted in 2010 when their own security researcher released a vulnerability notice to the public just five days after he reported it to the vendor, a competitor of Google. He did not go to the New York Times and post a general warning or notice. He posted extensive details to a list monitored by the people who know how to write exploits.

What did the Google executives say about this disclosure? Violation of unwritten code? Irresponsible? Apparently no.

The Google researcher defended his actions by saying time was up — attackers already knew of the exploit. However, you do not need a PhD in ethics to know that he could have given Microsoft the opportunity to respond themselves. Why did he decide it was his responsibility to disclose the vulnerability before a patch is ready? Why did he feel he would be spared from the Google reaction to security disclosure outside their walls?

Microsoft has been known to announce vulnerabilities before patches and it could be argued they have set a reasonable model for vulnerability management and disclosure in the past five years. Google, not so much.

All that being said the official Google position on this disclosure now seems to come from the Google blog about security. There you can find Google security staff who call responsible disclosure a form of “irresponsible” permission.

We’ve seen an increase in vendors invoking the principles of “responsible” disclosure to delay fixing vulnerabilities indefinitely, sometimes for years; in that timeframe, these flaws are often rediscovered and used by rogue parties using the same tools and methodologies used by ethical researchers. It can be irresponsible to permit a flaw to remain live for such an extended period of time.

This makes Google either look like they are rudderless in terms of security or they are proponents of hypocrisy.


“Innovation Fail” Photo by MadMothist

How do we reconcile their attacks on security researchers by executives and then their attacks on executives by security researchers? They have changed their position? I hope Tom Toles is watching this.

The good news is that Google is so big and so influential that this kind of floundering and headless approach to the social, economic and political aspects of security is forcing important questions for everyone. Microsoft has put forward a reasonable response already (they might have had it ready) by suggesting “Coordinated Vulnerability Disclosure”. This sounds not unlike what Google executives were opining in 2008:

Newly discovered vulnerabilities in hardware, software, and services are disclosed directly to the vendors of the affected product, to a CERT-CC or other coordinator who will report to the vendor privately, or to a private service that will likewise report to the vendor privately. The finder allows the vendor an opportunity to diagnose and offer fully tested updates, workarounds, or other corrective measures before detailed vulnerability or exploit information is shared publicly. If attacks are underway in the wild, earlier public vulnerability details disclosure can occur with both the finder and vendor working together as closely as possible to provide consistent messaging and guidance to customers to protect themselves.

Perhaps Google is not hypocritical. Perhaps they are not putting a low value on security management. They might just not be sure which foot is left and which is right and are still working out the kinks before they start walking. That is possible. My prediction is that by 2011 a Google executive memo will finally reach their security researchers, assuming systems are available, and they will co-announce with Apple a new and innovative program called coordinated disclosure of vulnerabilities. They also might extend the bounty program to UI and functionality flaws in their products (Google maps send you to the wrong place? Report and get a $1000!) and start giving responsible information in their own disclosures.