So, the problem with USB tokens that we basically have two choices: - Unauditable black boxes built on *supposedly* more secure ICs that require NDAs to develop for - Open and auditable, but definitely pwnable off the shelf microcontrollers. Which poison do you prefer?
-
Show this thread
-
Replying to @marcan42 @pavolrusnak
On one side, chips have been audited by highly skilled 3rd party lab and are designed for security On the other side, chips are pwned by design... Auditability is great if it improves the security, if no skilled people audit them and they are already pwned, what's the point?
1 reply 0 retweets 0 likes -
Replying to @P3b7_ @pavolrusnak
On one side, firmware has not been audited by anyone competent (evidence: ROCA; it's clear that FIPS certification and such is useless) On the other, you can audit it yourself, and people will for a popular product.
1 reply 1 retweet 4 likes -
Replying to @marcan42 @pavolrusnak
FIPS is not very relevant... Common Criteria certification is. (and ROCA chip was CC certified). CC are not perfect (hence ROCA), but it doesn't mean they are useless... It remains far away more difficult to break a CC chip, than a STM32
3 replies 0 retweets 3 likes -
Replying to @P3b7_ @pavolrusnak
The chip yes (probably), the firmware not so much. For the most part all those certification processes just slow things down and make it harder for people to actually implement modern best practices (instead of outdated ones). Silicon moves a lot slower than software.
1 reply 0 retweets 0 likes -
Replying to @marcan42 @pavolrusnak
It's not (probably). There are multiple articles showing that it costs a few dollars and require a few minutes to dump a general purpose MCU. The solution is more to try to open Secure chips, rather than using broken ones...
1 reply 0 retweets 0 likes
You have also historically been able to dump some secure MCUs with the same equipment. The problem is that NDAs stop those chips from being more widely audited, so we don't *know* if they really are more secure. In theory they are, but we don't have enough evidence.
-
-
This Tweet is unavailable.
-
And yet nobody found ROCA. Even though that code stank. Audits are largely useless, because they often just verify that you do what you say you do, not that you're actually secure. "Yes, we have these mitigations (which stop one variant of an attack but not another)".
0 replies 0 retweets 1 like - Show replies
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.