SlideShare a Scribd company logo
1 of 15
Security                                    eBooks




      Client
   Anatomy and
   Identification
    Security Inside the Client –
               Part 1



Steven Davis
                                   steve@free2secure.com
Games, iGaming, and Gambling             +1.650.278.7416
Security                                  eBooks



                               Most Useless
                                 Security
                                 Axiom:



                               You Can’t Secure
                                  the Client


                                 steve@free2secure.com
Games, iGaming, and Gambling           +1.650.278.7416
Security                                eBooks



  … but you need the
Client to be part of your
        security…



                                   so, how do
                                   you build a
                                       secure
                                  system with
                                    unsecure
                                components?

                               steve@free2secure.com
Games, iGaming, and Gambling         +1.650.278.7416
Security                                 eBooks

                               • Security
                                 decisions are
                                 built on different
                                 forms of identity
                                  –   Service account
                                  –   Person
                                  –   Platform
                                  –   Payment account
                                  –   Email




   Uniqueness and Identity

                                steve@free2secure.com
Games, iGaming, and Gambling          +1.650.278.7416
Security                                eBooks


  REMEMBER: People are not Accounts




                Neither are
                Computers

                               steve@free2secure.com
Games, iGaming, and Gambling         +1.650.278.7416
Security                                                           eBooks


                       Identity and Uniqueness are
                              Tenuous Online




       •     Online Identity is simply pieces of data presented over a
             network
       •     The connection between the data and the underlying entity is
             weak
       •     Bits are bits

                                                          steve@free2secure.com
Games, iGaming, and Gambling                                    +1.650.278.7416
Security                                        eBooks

                   Client Components
  • Computer (tablet, cell
    phone)
     – Hardware Components
  • (Game) Application
     – Program
     – Persistent Data
     – State & Session Information
  • Operating System
  • Other Programs
  • Other Data


                                       steve@free2secure.com
Games, iGaming, and Gambling                 +1.650.278.7416
Security                                                            eBooks

                                Device Fingerprinting

                                                                              ord
                                                                        g   aw
                                                                   tr on
                                                                 os
                                                         a   r to
                                                g is f
                                         n   tin
                                    r pri
                                  ge
                               Fin
   • Collection of a large number of hardware and software
     identities to create a “fingerprint”
   • getXXXXID() is just a program that can be spoofed
   • Better as a “white list” than a “black list”… maybe
   • Questionable in a world of active adversaries
                                                     steve@free2secure.com
Games, iGaming, and Gambling                               +1.650.278.7416
Security                                                   eBooks

                       Basic Identity Toolkit

   Multiple platform identity sources
       Hardware                                 Extracted
       Platform Serial Number
       Other Applications


   Player Identity Information                  Input


   Stored Application Data                      Stored


   Registration Keys                            Input Once


   Hashes & Splits & Passwords                  Tools


                                                steve@free2secure.com
Games, iGaming, and Gambling                          +1.650.278.7416
Security                                                        eBooks


        Registering a Platform
   1.   Collect Platform ID
        information                                            License Key
                               Local IDs         Local Data
   2.   Server Seed or Local
        Seed (optional)
   3.   Hash (optional)                                       Seed (optional)
   4.   Split (optional)
   5.   Build Platform ID
   6.   Build Platform             Platform ID
        Authentication Data
   7.   Store Locally
                               Platform Authentication Data
   8.   Exchange with Server
                                                                    Local
                                                                    Split



                                                      steve@free2secure.com
Games, iGaming, and Gambling                                +1.650.278.7416
Security                                               eBooks

     Essential Platform Identification & Authentication



   • Retrieve Platform ID
   • Reconstruct or Retrieve Platform Authentication Data
   • Verify (Locally or Remotely)


               Verification can be bypassed,
             spoofed, etc., of course, as can IDs
                  and authentication data
                                              steve@free2secure.com
Games, iGaming, and Gambling                        +1.650.278.7416
Security                                          eBooks

 Security Tokens




• Can be effective
• Identify themselves, not
  people                       • Need to be linked with
                                 platform identity
• Only as strong as
  registration process         • PART of a security
                                 solution – a Node of trust,
                                 not a trusted system

                                         steve@free2secure.com
Games, iGaming, and Gambling                   +1.650.278.7416
Security                                                          eBooks

   Platform Identity is “Polite” Identity
                               •   Useful, if you understand its
                                   limitations
                               •   Can be used for basic fraud detection
                                   and white listing
                               •   Black listing limited by virtualization
                                   and effort of foes
                               •   Challenge – Design Your System
                                   using weak identity
                               •   Do you need identity at all?
                                    – Gratuitous Strong Passwords
                               •   Use external channels for positive
                                   identification



                                                         steve@free2secure.com
Games, iGaming, and Gambling                                   +1.650.278.7416
Security                                                             eBooks




   What next?
   • Don’t give up!

   • More security presentations at:
     http://free2secure.com/

   • Check out my book “Protecting Games”
       – Additional information at http://playnoevil.com/


   • You can “win” the security game
                                                            steve@free2secure.com
Games, iGaming, and Gambling                                      +1.650.278.7416
Security                                                                  eBooks

      About Me
  •   Steven Davis
       – 25+ Years of Security Expertise
       – I have worked on everything from
         online games and satellite TV to
         Nuclear Command and Control and
         military communications
           • http://www.linkedin.com/in/playnoevil
       – Author, “Protecting Games”

  •   Why Free2Secure?
       – Security is too expensive and isn’t working. There has to be a better way.
         I’m exploring these issues for IT security, ebooks, games, and whatever
         else strikes my fancy at http://free2secure.com/
       – Join me there, ask questions, challenge assumptions, let’s make things
         better

                                                               steve@free2secure.com
Games, iGaming, and Gambling                                         +1.650.278.7416

More Related Content

Similar to Protect Your Client Software and Identification Security

Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introductionAvirot Mitamura
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lectureynamoto
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentationguestf018d88
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities
 
Startup Spotlight: OneID
Startup Spotlight: OneIDStartup Spotlight: OneID
Startup Spotlight: OneIDpii2011
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authenticationZTech Proje
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Creus Moreira Carlos
 
PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)Siddick Elaheebocus
 
Fight Game Cheating the Easy Way
Fight Game Cheating the Easy WayFight Game Cheating the Easy Way
Fight Game Cheating the Easy WaySteven Davis
 
SmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationSmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationOKsystem
 
Why do THEY want your digital devices?
Why do THEY want your digital devices?Why do THEY want your digital devices?
Why do THEY want your digital devices?ESET
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseTechSoup
 
SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationSMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationVCW Security Ltd
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 

Similar to Protect Your Client Software and Identification Security (20)

Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
Identity Assertions Draftv5
Identity Assertions Draftv5Identity Assertions Draftv5
Identity Assertions Draftv5
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
Startup Spotlight: OneID
Startup Spotlight: OneIDStartup Spotlight: OneID
Startup Spotlight: OneID
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012Wk online trust solutions overview january 2012
Wk online trust solutions overview january 2012
 
PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)PKI in today's landscape (Mauritius - Siddick)
PKI in today's landscape (Mauritius - Siddick)
 
Fight Game Cheating the Easy Way
Fight Game Cheating the Easy WayFight Game Cheating the Easy Way
Fight Game Cheating the Easy Way
 
ekey+ Presentation
ekey+ Presentationekey+ Presentation
ekey+ Presentation
 
SmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationSmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authentication
 
Why do THEY want your digital devices?
Why do THEY want your digital devices?Why do THEY want your digital devices?
Why do THEY want your digital devices?
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
 
SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationSMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales Presentation
 
IriScript biocryptoverifier
IriScript biocryptoverifierIriScript biocryptoverifier
IriScript biocryptoverifier
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 

Recently uploaded

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 

Recently uploaded (20)

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 

Protect Your Client Software and Identification Security

  • 1. Security eBooks Client Anatomy and Identification Security Inside the Client – Part 1 Steven Davis steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 2. Security eBooks Most Useless Security Axiom: You Can’t Secure the Client steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 3. Security eBooks … but you need the Client to be part of your security… so, how do you build a secure system with unsecure components? steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 4. Security eBooks • Security decisions are built on different forms of identity – Service account – Person – Platform – Payment account – Email Uniqueness and Identity steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 5. Security eBooks REMEMBER: People are not Accounts Neither are Computers steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 6. Security eBooks Identity and Uniqueness are Tenuous Online • Online Identity is simply pieces of data presented over a network • The connection between the data and the underlying entity is weak • Bits are bits steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 7. Security eBooks Client Components • Computer (tablet, cell phone) – Hardware Components • (Game) Application – Program – Persistent Data – State & Session Information • Operating System • Other Programs • Other Data steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 8. Security eBooks Device Fingerprinting ord g aw tr on os a r to g is f n tin r pri ge Fin • Collection of a large number of hardware and software identities to create a “fingerprint” • getXXXXID() is just a program that can be spoofed • Better as a “white list” than a “black list”… maybe • Questionable in a world of active adversaries steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 9. Security eBooks Basic Identity Toolkit Multiple platform identity sources Hardware Extracted Platform Serial Number Other Applications Player Identity Information Input Stored Application Data Stored Registration Keys Input Once Hashes & Splits & Passwords Tools steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 10. Security eBooks Registering a Platform 1. Collect Platform ID information License Key Local IDs Local Data 2. Server Seed or Local Seed (optional) 3. Hash (optional) Seed (optional) 4. Split (optional) 5. Build Platform ID 6. Build Platform Platform ID Authentication Data 7. Store Locally Platform Authentication Data 8. Exchange with Server Local Split steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 11. Security eBooks Essential Platform Identification & Authentication • Retrieve Platform ID • Reconstruct or Retrieve Platform Authentication Data • Verify (Locally or Remotely) Verification can be bypassed, spoofed, etc., of course, as can IDs and authentication data steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 12. Security eBooks Security Tokens • Can be effective • Identify themselves, not people • Need to be linked with platform identity • Only as strong as registration process • PART of a security solution – a Node of trust, not a trusted system steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 13. Security eBooks Platform Identity is “Polite” Identity • Useful, if you understand its limitations • Can be used for basic fraud detection and white listing • Black listing limited by virtualization and effort of foes • Challenge – Design Your System using weak identity • Do you need identity at all? – Gratuitous Strong Passwords • Use external channels for positive identification steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 14. Security eBooks What next? • Don’t give up! • More security presentations at: http://free2secure.com/ • Check out my book “Protecting Games” – Additional information at http://playnoevil.com/ • You can “win” the security game steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 15. Security eBooks About Me • Steven Davis – 25+ Years of Security Expertise – I have worked on everything from online games and satellite TV to Nuclear Command and Control and military communications • http://www.linkedin.com/in/playnoevil – Author, “Protecting Games” • Why Free2Secure? – Security is too expensive and isn’t working. There has to be a better way. I’m exploring these issues for IT security, ebooks, games, and whatever else strikes my fancy at http://free2secure.com/ – Join me there, ask questions, challenge assumptions, let’s make things better steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416

Editor's Notes

  1. http://www.mdgadvertising.com/blog/wp-content/uploads/2011/03/blog-device_fingerprinting.jpg http://docs.oracle.com/cd/E12057_01/doc.1014/e12054/img/fngrprt.gif
  2. http://upload.wikimedia.org/wikipedia/commons/thumb/d/db/SecurityTokens.CryptoCard.agr.jpg/800px-SecurityTokens.CryptoCard.agr.jpg