Ben Nagy’s thoughts on “Cryptopocalypse”

Ben Nagy posted the following very sensible message on the DailyDave mailinglist:

[Dailydave] C…c…c..Cryptopocalypse!]

Recently, a lot of people have been talking and possibly even thinking about the “cryptopocalypse”, surveillance, and the ideal rate of exchange between liberty and safety. I have been vaguely seeking the ideal derisive verse for a while, but this morning I finally realised that it has already been sung.

“When you believe in things  that you don’t understand, then you suffer.”

     – Stevie Wonder [1]

Without quibbling over minor points, I think it’s reasonable to view the period since 2001 as one where privacy and fundamental individual liberties have been at a steady ebb. Some might characterise it as the ‘theft’ of those things by Governments, but really, it’s not. It has been driven by fear, and the belief that “The Government” can provide protection against Dark Forces. However, it’s not the steady advance of ridiculous legislation that I want to focus on. Those shavings of liberty can be counted where they fell, as a simple matter of public record.

What’s interesting is the use of the tools that these Governments already have. Nothing fundamental changed in the last few months. The NSA, GCHQ, MI5, DSD didn’t SUDDENLY ramp up any ops. They haven’t gone rogue. They’ve just been doing the same thing they’ve been doing for years, because people ASKED them for protection, but weren’t too bothered about asking for details. They may not have even had a concept of the missions of these organisations, except as a nebulous part of “Government”. They believed in things that they did not, fundamentally, understand, and now we all suffer.

So now we, the super smart computer crowd, get to be all smug and “I told you so!”, because we called it, just like that guy with no pants and a bird in his beard.

What I find hilarious, however, is the reaction. “Tor is the BEST tool that fails to fix a different but related problem!”, “You should all use CryptoCat because I say sorry every time I screw up!”, “Hemlis messenger is totes unbreakable, and has nice graphic design!”, “5 Weird Tips to NSA-proof YOUR life!”, “Try Silent Circle! We have Beards!”

All of this rubbish is just as much Security Theatre as the shoe removals, crotch-gropings and warrantless detention we’ve been enduring at airports. Statically, you’re just not a target, so it’s ALL going to be as “100% Effective” as Werewolf Repellent. So go nuts, I guess. Use CraptoCat inside TorBB to update your location on Facebook. Whatever.

If you happen to actually BE a person of interest, however, “better than nothing” is actually worse than nothing. If you had zero crypto, you might actually think about the content and traffic / timing patterns of your comms. If you had no ‘anonymisation’ then you might actually give a shit when and from where you connect. In either case you might give some measure of incredibly serious thought to:

– The known capabilities of your anticipated adversary
– Your operating risk
– Your worst case outcome

Because if you don’t have a strong mental picture of these things BEFORE you start deploying tools and being all crypto-ninja-slash-stealth-sexy-leopard, then you’re going to see exactly what that worst case outcome looks like from the inside.

I’m not saying it’s “impossible”. I’m just saying (to quote The Grugq) “Nobody’s going to go to jail for you”, and that includes the authors of these new (and old) “spook-proof” tools. The hard truth is that the only way to stay ‘safe’ from state-level actors is going to involve a consistently disciplined regimen of tools, techniques and procedures, and any software that claims to make it “easy” is flat-out lying.

Don’t outsource understanding.

“When you believe in things that you don’t understand, then you suffer. Superstition aint the way.”

( please now allow the best Clav riff EVER to stick in your head )

Baby Seals,

ben

[1] http://www.youtube.com/watch?v=wDZFf0pm0SE
    (and if you need this WHY ARE YOU SO YOUNG??)

EOF

Dutch govt response to revelations by Edward Snowden

UPDATE 2013-11-27: here (.pdf, Nov 27) is the EU Report on the Findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection — i.e., the EU-US expert group established in response to the revelations about NSA-related activities on European territory that is referred to in the post below.

UPDATE 2013-09-21: European Parliament also responds (.pdf; not dated): The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens’ fundamental rights.


 

On September 13th 2013, the Dutch government responded (.pdf, in Dutch) to the revelations by Edward Snowded. Unfortunately, that response is currently only available in Dutch. I decided to translate it to English myself: see below. Hyperlinks are mine.

WARNING: this is an unofficial translation.

Dutch government-wide response to revelations Snowden
Original Dutch: “Kabinetsbrede reactie onthullingen Snowden”

Motivation
On July 4th, the Dutch House of Representatives requested a government-wide response to the revelations by Mr. Snowden, and a joint European response to the United States (Besluitenlijst van de procedurevergadering van donderdag 4 juli 2013 (.pdf)).
Original Dutch: “Aanleiding
De Tweede Kamer heeft op 4 juli jl. verzocht om een kabinetsbrede reactie op de onthullingen van de heer Snowden en de gezamenlijke Europese reactie richting de Verenigde Staten (kenmerk 2013Z14045/2013D29496). In deze brief wordt de stand van zaken weergegeven.”

On June 21st, the Secretary of the Interior and Kingdom Relations, at request of the House of Representatives, submitted, also on behalf of the Secretary of Defense and the Secretary of Security and Justice, a letter about the powers and duties of the Dutch General Intelligence and Security Service (AIVD) and Military Intelligence and Security Service (MIVD) (Kamerstuk 30977 nr. 56 (.pdf)). The letter covers, among others, the frameworks for international cooperation of these services. On July 3rd, additional information was provided about the international cooperations of the AIVD and MIVD, and the alleged espionage of EU diplomats (Kamerstuk 30977 nr. 59 (.pdf)). On July 9th, the questions by Rep. Schouw (D66) and Rep. Sjoerdsma (D66) about wiretapped EU diplomats were answered (Kamerstuk 2791 (.pdf)).
Original Dutch: “Op 21 juni jl. heeft de minister van Binnenlandse Zaken en Koninkrijksrelaties op verzoek van de Kamer mede namens de minister van Defensie en de minister van Veiligheid en Justitie een brief gestuurd over de taken en bevoegdheden van de AIVD en de MIVD (Kamerstuk 30977 nr. 56). Daarbij is onder meer aandacht besteed aan de kaders voor de internationale samenwerking van de diensten. Op 3 juli jl. is nadere informatie verstrekt over de internationale samenwerking van de AIVD en de MIVD, en de vermeende spionage van EU-diplomaten (Kamerstuk 30977 nr. 59). Op 9 juli jl. zijn de vragen beantwoord van de leden Schouw en Sjoerdsma over afgeluisterde EU-diplomaten (Kamerstuk 2791).”

CTIVD
On July 16th, the House of Representatives requested the Dutch Review Committee on the Intelligence and Security Services (CTIVD) to initiate an investigation inquiring into the data processing by the AIVD and MIVD regarding telecommunication. The CTIVD has now started that investigation.
Original Dutch: “CTIVD
De Tweede Kamer heeft op 16 juli jl. de Commissie van Toezicht op de Inlichtingen- en Veiligheidsdiensten (CTIVD) verzocht een onderzoek te beginnen naar de gegevensverwerking van de AIVD en de MIVD op het gebied van telecommunicatie. De CTIVD is inmiddels gestart met het onderzoek.”

Response to Snowden’s revelations
The government is closely following the response of the United States to the revelations by Mr. Snowden. The government is committed, as previously stated, to highly meticulous and adequate protection of personal data. Hence, where national security and privacy protection meet, maximum transparency about procedures, powers, safeguards and oversight measures is a necessity. The government considers it encouraging that US Congress Members are specifically debating about those topics, and are submitting proposals for changing legislation, and that President Obama also declared, in his press conference of August 9th, that he is seeking more transparency and oversight. It is also gratifying that the US government has already acted by providing more insight into the powers and by publishing a legal substantiation for a few programs. The Netherlands is in conversation with the US about this.
Original Dutch: “Reactie op onthullingen Snowden
Het kabinet volgt met aandacht de reactie van de Verenigde Staten op de onthullingen van de heer Snowden. Het kabinet hecht, zoals eerder gemeld, zeer aan zorgvuldige en deugdelijke bescherming van persoonsgegevens. Het is daarom noodzaak om waar nationale veiligheid en privacybescherming elkaar raken, zo transparant mogelijk te zijn over procedures, bevoegdheden, waarborgen en toezichtmaatregelen. Het kabinet acht het in dat verband bemoedigend dat Amerikaanse Congresleden juist over die onderwerpen debatteren en voorstellen doen voor wijziging van de regelgeving en dat ook president Obama in zijn persconferentie van 9 augustus jl. heeft verklaard meer transparantie en toezicht na te streven. Het is tevens verheugend dat de Amerikaanse regering hiermee inmiddels een begin heeft gemaakt door meer inzicht te geven in de bevoegdheden en door publicatie van de juridische onderbouwing van enkele programma’s. Nederland is hierover in gesprek met de Verenigde Staten.”

After the initial consultation in Dublin on June 14th 2013, the EU Commissioners of Justice and Home Affairs, Reding and Malmström, the U.S. Minister of Justice Holder in a letter dated July 1st 2013 pledged that the United States will further inform the EU about PRISM and similar programs. Moreover, the United States also expect information from the EU (Member States) on the legal basis for intelligence gathering on foreign countries, and the oversight measures applicable to them.
Original Dutch: “Overleggen met de Verenigde Staten
Na het initieel overleg in Dublin op 14 juni 2013 met de Eurocommissarissen van Justitie en van Binnenlandse zaken, Reding en Malmström, heeft de Amerikaanse Minister van Justitie Holder in een brief van 1 juli 2013 toegezegd dat de Verenigde Staten de EU nader zullen informeren over PRISM en vergelijkbare programma’s. De Verenigde Staten verwachtten overigens ook informatie van de EU-(lidstaten) over de juridische basis voor inlichtingenvergaring over het buitenland en de toezichtmaatregelen die daarop van toepassing zijn.”

A joint EU/US expert group is currently examining the protection of privacy and electronic data of citizens, with the aim of mutual understanding of each other’s programs and how those are anchored in the rule of law (legislation and oversight of intelligence and security services). The EU Member States, including the Netherlands, the European External Action Service (EEAS) and the European Commission have recently been working in consultation with the U.S. at the start of this expert group, including at a meeting in Washington DC on July 8th, 2013. The current Lithuanian Presidency of the Council of the European Union, the European Commission, the EU coordinator for counterterrorism, the EEAS and the so-called `Article 29 Working Party‘ on EU data protection are represented in the expert group. In addition, the group has ten representatives of the Member States. The expert group had its first meeting on July 22/23 this year. A second meeting is planned for September 19th, 2013 in Washington DC.
Original Dutch: “Een EU-VS expertgroep buigt zich momenteel over de bescherming van de persoonlijke levenssfeer en van elektronische gegevens van burgers, met als doel wederzijds inzicht in elkaars programma’s en de wijze waarop deze zijn verankerd in de rechtstaat (wetgeving en toezicht op I&V-diensten). De lidstaten van de EU, waaronder dus ook Nederland, de Europese Dienst voor Extern Optreden (EDEO) en de Europese Commissie hebben de afgelopen periode in overleg met de VS gewerkt aan de start van deze expertgroep, onder andere tijdens een bijeenkomst in Washington DC op 8 juli 2013. Het huidig Litouwse voorzitterschap van de Raad, de Europese Commissie, de EU-coördinator voor contraterrorisme, de EDEO en de zogenaamde Artikel 29-werkgroep van de EU voor dataprotectie zijn in de expertgroep vertegenwoordigd. Daarnaast zijn er tien afgevaardigden van de lidstaten lid van de expertgroep. De expertgroep heeft op 22 en 23 juli jl. een eerste bijeenkomst gehad. Een tweede bijeenkomst is voorzien op 19 september 2013 in Washington.”

Considering that the collection of data for national security is an exclusive competence of the Member States, it was agreed that EU countries must themselves make agreements with the United States about this.
Original Dutch: “Aangezien het verzamelen van informatie ten behoeve van de nationale veiligheid een exclusieve competentie van de lidstaten is, is afgesproken dat EU-lidstaten zelf hierover afspraken met de Verenigde Staten maken.”

Results of the consultations
In a statement a few days before the first meeting of the expert group, the U.S. Office of the Director of National Intelligence (ODNI) discussed, in detail, the intelligence programs of the United States, and particularly their legal basis and oversight. “
Original Dutch: “Resultaten van de overleggen
In een verklaring enkele dagen voor de eerste vergadering van de expertgroep is het Office of the Director of National Intelligence (ODNI) uitgebreid ingegaan op de inlichtingenprogramma’s van de Verenigde Staten, in het bijzonder op de wettelijke basis en het toezicht.”

In the meeting of the EU/US expert group, the United States provided information about PRISM (targeted investigations on non U.S. citizens), based on the Foreign Intelligence Surveillance Act (FISA). This Act regulates the oversight by, in total, eleven judges, who always assess requests with a total of three judges. Explanations were given about the possibilities that the FISA provides for collecting telecom metadata within the United States, and about the oversight to which it is subjected. In the next phase, the use of the XKeystore [sic] program by the  U.S. National Security Agency (NSA) in the processing of large databases will be discussed. Attention will also be given to the measures announced by President Obama regarding data protection and intelligence gathering, including the evaluation and expected changes in the FISA and the Patriot Act (Article 215). In addition, answers will be given to questions from the U.S., focused on legislation regarding the possibilities for intelligence gathering and oversight of intelligence and security services of the EU Member States. The meetings of the expert group are reported in private (`restreint’) meetings of the EU Committee of Permanent Representatives (COREPER). During these meetings EU Member States also can report on talks with the United States in the bilateral track.
Original Dutch: “In de bijeenkomst van de EU-VS expertgroep gaven de Verenigde Staten informatie over PRISM (gericht onderzoek op niet Amerikaanse burgers), gebaseerd op de Foreign Intelligence Surveillance Act (FISA). In deze wet is het toezicht geregeld door in totaal elf rechters, die verzoeken steeds met drie rechters beoordelen. Tevens is uitleg gegeven over de mogelijkheden die de FISA biedt om metagegevens van telecomverkeer in de Verenigde Staten te verzamelen en over het toezicht dat daarop wordt uitgeoefend.
In het vervolgtraject zal onder meer worden gesproken over het gebruik van het programma XKeystore [sic] door de Amerikaanse National Security Agency (NSA) bij de verwerking van grote databestanden. Tevens zal worden stilgestaan bij de maatregelen die president Obama heeft aangekondigd op het gebied van dataprotectie en inlichtingenvergaring, waaronder de evaluatie en beoogde aanpassingen van de FISA en de Patriot Act (artikel 215). Daarnaast zal antwoord worden gegeven op vragen van Amerikaanse zijde vooral gericht op wetgeving inzake de mogelijkheden van inlichtingenvergaring van en het toezicht op inlichtingen- en veiligheidsdiensten van de EU-lidstaten.
Over de bijeenkomsten van de expertgroep wordt verslag gedaan in besloten (restreint) zittingen van het COREPER. Tevens kunnen EU-lidstaten in deze zittingen melding maken van gesprekken met de Verenigde Staten in het bilaterale traject.”

In addition, the Chairman of the Article 29 Working Party, Mr. Kohnstamm, stated in a letter to Commissioner Reding that the Article 29 Working Party will not only focus on intelligence programs used by the United States, but also is committed to investigating, within its mandate, the impact of PRISM, including the use of information derived from PRISM on European soil. Moreover, the Article 29 Working Party will examine the extent to which the programs of the intelligence and security services of Member States comply with the data protection principles and legislation of the EU. The Article 29 Working Party takes these initiatives in response to the conversations in the EU/US expert group, in which the Article 29 Working Party participates.
Original Dutch: “Daarnaast heeft de voorzitter van de Artikel 29-werkgroep, de heer Kohnstamm, in een brief aan Eurocommissaris Reding te kennen gegeven dat de Artikel 29- werkgroep zich niet alleen zal richten op de inlichtingenprogramma’s die door de Verenigde Staten worden gebruikt, maar zich ook zal inzetten om binnen zijn mandaat de impact van PRISM te onderzoeken, inclusief het gebruik van de van PRISM afgeleide informatie op Europees grondgebied. Bovendien zal de werkgroep onderzoeken in hoeverre de programma’s van de inlichtingen- en veiligheidsdiensten van de lidstaten stroken met de dataprotectieprincipes en de wetgeving van de EU. De Artikel 29-werkgroep neemt deze initiatieven naar aanleiding van de gesprekken in de EU-VS expertgroep, waar de Artikel 29- werkgroep in deelneemt.”

Finally, the European Parliament has taken the initiative to further investigate the U.S. operations for collecting foreign intelligence. From September 2013, the EP anticipates twelve meetings on this subject.
Original Dutch: “Ten slotte heeft het Europees Parlement (EP) het initiatief genomen om de Amerikaanse activiteiten voor het verzamelen van buitenlandse inlichtingen nader te onderzoeken. Vanaf september 2013 voorziet het EP twaalf bijeenkomsten over dit onderwerp.”

Next
The House of Representatives will be informed about new developments.
Original Dutch: “Vervolg
De Kamer zal worden geïnformeerd over nieuwe ontwikkelingen.”

Related links:

EOF

Dutch press unites in “Publeaks Foundation”, opens new whistleblower website: www.publeaks.nl

Today, September 9th 2013, an impressive collaboration was announced in Dutch media – many of the most influential Dutch media outlets have united in the “Publeaks Foundation” and started a whistleblower website:

The actual leaking can be done via https://secure.publeaks.nl, which uses the Tor anonymity network as part of protecting those involved. That URL should be visited via the Tor Browser Bundle. Unfortunately, JavaScript must be enabled in order to use the leaking interface:

Error! 🙁  Your browser is not running Javascript, and It’s required to use GlobaLeaks anonymous submission client, because is entirely Javascript based.

It’s common believe that Javascript and security don’t sound well together, for this reason we suggest to use GlobaLeaks, with Tor Browser Bundle, an extremely tuned FireFox browser with Tor integrated. Here you can found and download the latest release of: Tor Browser Bundle.

Requiring JavaScript increases technical attack surface, as demonstrated in April by the FBI, who exploited a 0-day in Tor Browser Bundle using this JavaScript code. However, as stated by @fpietrosanti, JavaScript is necessary for certain aspects of whistleblower security awareness, and the current set-up may be a good balance: “Without using JavaScript it would not be possible to provide the usability required for whistleblower security awareness. It’s a good balance between privacy awareness vs. usability vs. security focusing on whistleblower side.”

The Publeaks website contains information on social and technical risks and how to mitigate those (in Dutch). It is possible to donate to Publeaks (in Dutch, scroll down).

The Publeaks Foundation selects participating media outlets based on two principles: 1) the outlet must have statutory objectives, and 2) the outlet must act in accordance with the IFJ Declaration of Principles on the Conduct of Journalists.

Here is Publeak’s official English press release (source):

Publeaks press release September 9th

The Publeaks Foundation and a large number of Dutch media outlets are today launching Publeaks.nl , a website for people to leak documents to the media securely and anonymously. The initiative is designed to protect whistleblowers, shed light on wrongdoings and encourage and support investigative journalism.

Publeaks is a secure channel. It facilitates safe leaking to the press: the sender remains completely anonymous and he or she can choose which of the participating media outlets receive documents, sound fragments or photographic material. Recipient media outlets can process these files in a protected environment.

Publeaks is based on the GlobaLeaks software package developed by the Hermes Center for Transparency and Digital Human Rights. The Publeaks organization has no access to the leaked files, does not publish anything itself and has no means of identifying the informant. Participating media outlets have committed themselves to verifying the leaked materials, finding sources to support the content and hearing all sides before publishing anything. Journalists can put questions to the anonymous informant on a secure part of the site.. The informant decides whether or not to answer them. Journalists who receive material through Publeaks will know which other media outlets have received the same material and can decide whether or not to undertake a collaborative investigation.
Publeaks is an initiative of the Publeaks Foundation. The foundation takes measures to support press scrutiny and is financed by the participating news media: AD, De Correspondent, De Groene Amsterdammer, De Volkskrant, Het Financieele Dagblad, het Parool, NOS Nieuws, NRC Handelsblad, Nieuwsuur, Nu.nl, Pownews, RTL-Nieuws, Trouw and Vrij Nederland. This collaboration of almost all leading Dutch news organisations is a unique initiative without global precedent, in a time that safety, privacy and protection of whistleblowers is more relevant than ever.

EOF

Criminal offering: “We glad to represent service on sale Bank logins, ***s, PayPal, Ebay, dumps, poker rooms accts, search SSN, DOB etc”

In 2012 I posted a promotion for botnet services found on the web. The below promotion of illegal virtual goods/services was posted today (2013-08-15) somewhere else on the web. Quite comprehensive and detailed; professional, one might say. (Or a good fake.)

hello all,

We glad to represent service on sale Bank logins, ***s, PayPal, Ebay, dumps, poker rooms accts, search SSN, DOB etc

contacts   [REDACTED]
Support icq : [REDACTED]
mail :[REDACTED]
more information contact HOME - WELCOME TO THE BEST TEACHER PRICE LIST... AND ROOMS FOR STUDENT WHO WANT TO LEARN HOW HACK STUFF..
Always in stock fresh stuff, often updates.
Instant delivery.
What bank logins we have in stock:
-Usa (usually have BOA, Chase and more)
-UK (Abbey, Hsbc and Halifax and more)
-AU (ask support)
-Ca (ask support)
Dumps and ***s worldwide!
Our Price:
Dumps:
USA
MC Standart, Visa Classic - 40$ ,
MC, VisaGOLD,PLATINUM/BUSINESS/CORP/SIGNATURE - 50$
AMEX - 50$
DISCOVER - 50$
Canada
MC,visa classic - 40$
MC,Visa Gold/Platinum/Corporate/Signature/Business - 55$
EU and World: (101)
MC Standart, Visa Classic - 100$
MC,Visa Gold/Platinum/Corporate/Signature/Business - 120$
EU and World: (201)
MC Standart, Visa Classic - 70$
MC,Visa Gold/Platinum/Corporate/Signature/Business - 90$
Bank logins:
Usually 6% from balance
If big balance price cheapest
All info for deal transfer!!!
***s:
Usa - 5 usd per 1
EU - 10-15 usd per 1
Ask support for more information!
Also i can search SSN, DOB, DL, MMN for u! Welcome!
EXCHANGE WU>WMZ! WU>LR! FEE 15%!
I sell poker accts in any poker room! Deposite from cc or mb! Nice prices, nice balances!
(my poker acct=(dedicated server with software poker room with ur acct)
Also i need guy who can help me cashout in poker! Welcome!
Terms of work:
- I sell dumps (track2+track1) without pin (attention rippers!!!), Bank logins, ***s, PayPal, Ebay.
- Sending stuff withing 24 hours after full payment received.
- Dumps before sale can be checked up. They are not subject to replacement, or, Unchecked dumps I replace in a current of 24 hours after you have received them and only pick up/hold-call.
- The minimum order:
- WMZ - no min, WU/MG - 400 usd + 8% drop fee.
- I do not give stuff for test. All real clients have some $ for test service, only nigerian kids asked free! I hope u not nigerian kid?Smile
more information HOME - WELCOME TO THE BEST TEACHER PRICE LIST... AND ROOMS FOR STUDENT WHO WANT TO LEARN HOW HACK STUFF..
Rules
We don't make sometimes SUPPORT IN ICQ . You will get full ignore if u will ask too many questions every time . When checker is working u will receive your card just if it is valid if not you are auto-refunded.
1. We work only with our good buyers . If u dont like our shop u will be lock and willnot support any more in future
2. We Make refund to balance withing 24h period . Dont claim us to make it instant or in 2 min . We a not robots .
3. We sell for you only stuffs which u can see inside our shop .
4. We always very honest and wanna help u in all problems.
5. If you found bug and didnot report to us about it - u will be lock forever. Ppls who help us with bugs will be make bonuses and discounts.
6. Shop make auto discount after 500$ , 2000$ , 5000$ and etc. total orders .
7. We dont make money back for your purses . Only for account balance.
Replacement CC Rules
1. We replace cards which willnot approved in our private checker but in case that checker working we don`t offer replace.
2. If cc approved in our checker - we will inform u with admin message in replacement claim and willnot refund u balance.
3. If cc willnot have balance for u order - we willnot refund or replace u claim.
4. If cc have verified by visa or security 3d mc protect - we willnot replace or refund u claim .
5. For correct work with our cc pls use private checker merchants . About it read Articles in our shop .
6. We make refund or replace ur claim within 24h period.
7. DE cc dont have any refund . UK+DOB dont have any refund if dob bad or info bad . Validate rate 85% .
Replacement Bank Logins Rules * Updated
1. We refund full balance for u if bank logins have incorrect info and canot login .
2. We refund only some part of balance if bank logins have different balance . Like u bought 2k bal and get 1k - we will refund about 50% of price.
3. We dont make transfer from bank logins and etc . We a only sell . All articles will be posted very soon to make u work better .
4. If account have Card Reader Security - we dont make any refund . (natwest-barclays-rbs).
5. If u claim *Its bad* , *Acc Bad* , *This bad* , *Not Open* - u claims will be delete without refund . We need full reason of claims . Pls Copy Error Reason From Bank website after bad try to login .
6. We will lock users who will claim for valid logins - doesnot matter if its have -10$ balance or something else , if u claim it like a dead login but access will be valid - u account will be locked . Unlock will cost 200$ for this mistake . Be Carefully with work together.
7. Halifax - you must known this bank one of the strong of security detect online banking . Halifax can easy lock access if u pc isnot perfect or u ip different of holder ip . if u get message that acc temporary lock we willnot refund any amount for this .
8. If u locked access for logins - we willnot refund u any money .
NEW SECURITY RULES
1. If u willnot buy any stuff with 1 month period - we will lock u access.
2. If u will claims in icq and will teach us how to work - we will lock u access.
Dumps Rules
1. U can buy it searching for Bin .
2. Our checker check dumps with CCCHECKER - u must known it . Its dont guanraty 100% clear check without any flag and etc
3. Minimum order 1 dump
4. If u got 201 dumps and u canot use it - we dont make any refund.
Dumps Replacements
>12 hours for only Decline[05]:
05 | Decline | Do Not Honor
>24 hours for Hold-Call / Pick Up Card:
04 | Hold-Call Or Pick Up Card
07 | Hold-Call Or Pick up Card | Pick Up Card - Special Condition
41 | Hold-Call Or Pick up Card | Pick Up Card - Lost
43 | Hold-Call Or Pick up Card | Pick Up Card Stolen
The rest of responses will not be replaced, especialy:
01 | Call | Refer To Issuer
02 | Call | Refer To Issuer - Special Condition
13 | Decline | Amount Error | Invalid amount
51 | Decline | Insufficient Funds
N4 | Decline | Exceeds Issuer Withdrawal Limit
61 | Decline | Exceeds Withdrawal Limit
62 | Decline | Invalid Service Code, Restricted
65 | Decline | Activity Limit Exceeded
93 | Decline | Violation, Cannot Complete
Paypal Rules
1. If Paypal Email password dont work - we refund only 50% of price.
2. If Paypal Account have Security Meansure - We dont make refund - Use clear socks for it . All anyproxy - 5socks services - blacklisted socks . Be ware and dont use bad socks
3. For correct work use only our socks . Soon socks will be work and we will have only clear and private socks list until then u can enjoy of 1 free time to time socks.
4. Replacement time 24h . You canot claim after 24h period .
Please take care and buy only what u need dont tell us that u have bought it and you don`t need it after.

EOF

By default, Kaspersky [and other] anti-virus collects LOTS of data about your system

UPDATE 2017-04-07: updates moved to bottom.


Obviously, installing software that runs with high privileges always comes at some risk. But Kaspersky Anti-Virus, the option “I agree to participate in Kaspersky Security Network” (KSN) is enabled by default, meaning that there can be no misunderstanding that quite a lot of information is collected by Kaspersky. The KSN Data Collection Statement states:

B. RECEIVED INFORMATION 

* Information about your computer hardware and software, including operating system and service packs installed, kernel objects, drivers, services, Internet Explorer extensions, printing extensions, Windows Explorer extensions, downloaded program files, active setup elements, control panel applets, host and registry records, browser types and e-mail clients that are generally not personally identifiable;

[…]

* Information about applications downloaded by the user (URL, attributes, file size, information about process that initiated download);

* Information about applications and their modules run by the user (size, attributes, date created, information about PE headers, region, name, location, and compression utilities used);

[…]

* The Kaspersky Security Network service may process and submit whole files, which might be used by criminals to harm your computer and/or their parts, to Kaspersky Lab for additional examination.

I’m aware that the digital threat landscape in 2013 is different from that in 1993, but this default behavior grinds my gears. Information about software that is running on a system is conducive to cyber attacks and should be considered sensitive. Even if Kaspersky does not voluntarily and proactively share this information with, say, the FSB, it is unwise to assume that governments and security industry would not cooperate at that level or that legal requirements. Distribution of spyware via a software update by original vendors, even if carried out with due care and targeting only a few, specific systems, can be detected and may result in users abandoning that software. The sharing of legitimately (?) collected data, however, will remain undetected, and can be expected to take place.

Collecting information beyond what can be reasonably expected requires explicit, informed consent. If you use Kaspersky Anti-Virus, disable this feature. I don’t know whether other AV-software (McAfee etc.) has similar behavioral defaults.

UPDATES

UPDATE 2022-03-15: amid the Ukraine-Russia conflict, the German Bundesamt für Sicherheit in der Informationstechnik warns over the use of software – especially if it requires high system privileges – from Russia:

“A Russian IT manufacturer can conduct offensive operations itself, be forced to attack target systems against its own will, or be spied on without its knowledge as a victim of a cyber operation, or be used as a tool for attacks against its own customers.”

Obviously this argument works both ways, i.e., Russian organizations might be advised to not run software manufactured in countries that have offensive programs against Russia. (And so on.) The thought of digital balkanization is not appealing, so let’s hope things can be sorted out w/o destroying all that nice developers/builders/etc. have created over decades.

UPDATE 2019-08-15: Kaspersky and Trend Micro get patch bonanza after ID flaw and password manager holes spotted (El Reg)

UPDATE 2017-12-21: Lithuania bans Kaspersky Lab software on sensitive computers (Reuters)

UPDATE 2017-11-10: WikiLeaks drama alert: CIA forged digital certs imitating Kaspersky Lab (El Reg)

UPDATE 2017-10-05: Russian gov’t hackers exploited Kaspersky to steal highly-classified info from an NSA contractor (Shane Harris linking to WSJ piece). Of course a government may seek to leverage all means it has: recall the leaked NSA slide that states “Sniff It All, Collect It All, Know It All, Process It All, Exploit It All”. If not through voluntary or coerced cooperation, then by exercising legal powers against local persons and organizations — including those who deliver digital goods or services to domestic and foreign persons.

UPDATE 2017-09-13: U.S. DHS Statement on the Issuance of Binding Operational Directive (BOD) 17-01. From the text:

“[…] The BOD calls on departments and agencies to identify any use or presence of Kaspersky products on their information systems in the next 30 days, to develop detailed plans to remove and discontinue present and future use of the products in the next 60 days, and at 90 days from the date of this directive, unless directed otherwise by DHS based on new information, to begin to implement the agency plans to discontinue use and remove the products from information systems.

This action is based on the information security risks presented by the use of Kaspersky products on federal information systems. Kaspersky   anti-virus products and solutions provide broad access to files and elevated privileges on the computers on which the software is installed, which can be exploited by malicious cyber actors to compromise those information systems. The Department is concerned about the ties between certain Kaspersky officials and Russian intelligence and other government agencies, and requirements under Russian law that allow Russian intelligence agencies to request or compel assistance from Kaspersky and to intercept communications transiting Russian networks. The risk that the Russian government, whether acting on its own or in collaboration with Kaspersky, could capitalize on access provided by Kaspersky products to compromise federal information and information systems directly implicates U.S. national security. […]”

UPDATE 2017-05-11: Eugene Kaspersky Reddit AMA — good move following a report from ABC News regarding a “secret memorandum sent last month to Director of National Intelligence Dan Coats and Attorney General Jeff Sessions [in which] the Senate Intelligence Committee raised possible red flags about Kaspersky Lab”.

UPDATE 2017-04-06: different problem, same domain (virus scanning): users who wittingly — and possibly as per company policy — upload files, that may contains sensitive business information, to virus scanning services, making those scanning services interesting to attackers.

UPDATE 2017-03-15: Benoit Goas posted the following on [RISKS]: “I just downloaded a set of (obviously personal) medical images from an imaging lab, which allows downloads only as executable zip file (their website runs only with silverlight, but that’s not the main issue).  As indicated on https://blog.avast.com/cybercapture-protection-against-zero-second-attacks , since around mid 2016 Avast antivirus has a new function to protect our computers against “zero second attacks”.  So it saw my download of an executable file, and sent it to their cloud as it was a “very rare program file” that they “needed to study”.  Indeed, my personal medical images are quite unique! But I didn’t expect them to be sent anywhere, especially without asking me.  So I now disabled that option, but some problems were:

  • letting my computer auto update without knowing what it’s adding (lots of
    auto updates are running…)
  • automatically sending personal files outside of private computers without asking first
  • hence “forcing” me to disable that feature that could protect me another day
  • making us download executable files to begin with, to just send us a compressed folder
  • not giving any option to contact the software provider, as it appears that part of the company no longer exists (and I’m sure the imaging place wouldn’t care, as it’s a nice service they provide, and can’t change the tools) –
    […] Best regards, B. GOAS”

UPDATE 2015-09-19: different story on AV: ‘AVG Proudly Announces It Will Sell Your Browsing History to Online Advertisers‘.

UPDATE 2014-08-29: different story on AV: Kaspersky backpedals on “done nothing wrong, nothing to fear” company article.

UPDATE 2013-12-29: different story on collection of information about software configurations: according to this article in Der Spiegel, the NSA intercepts Microsoft error-reporting messages, using XKeyscore to fish them out of internet traffic:

“When TAO selects a computer somewhere in the world as a target and enters its unique identifiers (an IP address, for example) into the corresponding database, intelligence agents are then automatically notified any time the operating system of that computer crashes and its user receives the prompt to report the problem to Microsoft. An internal presentation suggests it is NSA’s powerful XKeyscore spying tool that is used to fish these crash reports out of the massive sea of Internet traffic.

The automated crash reports are a “neat way” to gain “passive access” to a machine, the presentation continues. Passive access means that, initially, only data the computer sends out into the Internet is captured and saved, but the computer itself is not yet manipulated. Still, even this passive access to error messages provides valuable insights into problems with a targeted person’s computer and, thus, information on security holes that might be exploitable for planting malware or spyware on the unwitting victim’s computer.
Although the method appears to have little importance in practical terms, (…)”

UPDATE 2013-11-24: Microsoft Security Essentials entry on Wikipedia: “(…) by default, MSE reports all suspicious behaviors of monitored programs to Microsoft Active Protection Service (MAPS), a web-based service.” Opt-in to “Basic Membership” is default setting in the installer. MSE is included in Windows 8; I don’t know the default setting there. (source) 

UPDATE 2013-08-01: I looked at EULA’s of other vendors. Their relevant paragraphs are too long to include in this post, but the key conclusion is that real-time information networks collecting detailing system configuration information are commonplace in today’s anti-malware habitat; as stated by Kaspersky Lab and in other comments. My concern about information collection remains, but a few important points / nuances were made by commenters:
1) Kosay Hatem states that the benefit of these networks is likely greater than the danger of the information collected. I agree that that will be probably true for most users.
2) An anonymous commenter states that for a system that does “security legal oriented work” (forensics?), one can opt-out. I agree. The comment also states that at the end of the day, you either trust your the AV vendor who’s software you install or totally or not; there is no middle ground. I agree, at least when “trust” is defined as the trustee’s acceptance of possible intentional or non-intentional failure of the trusted party.

 
UPDATE 2013-07-18: Kaspersky Labs responded in a comment below this post. The take-away: “So in short: This is an industry practice and done in the similar way by all anti-malware vendors. It can be easily checked the same way in their product EULAs.” I will read the EULA’s of other vendors and update this post to reflect my findings.

EOF