SlideShare a Scribd company logo
1 of 73
Taking your
ball and going
home; building
your own secure
storage space that
mirrors Dropbox's
functionality




      Phil Cryer (@fak3r)
      open source technologist
      DEFCON 19 - August 2011    v1.5
$ echo O’HAI! I am `whoami`
O’HAI! I am phil

$ echo AKA `alias | grep phil`
AKA phil='fak3r’
http://art.philcryer.com
computer |kәmˈpyo͞otәr|
noun
an electronic device for storing and processing data, typically in
binary form, according to instructions given to it in a variable
program.
• a person who makes calculations, esp. with a calculating machine.
http://afistfulofsoundtracks.blogspot.com
http://images.google.com
• Now working for non-profit
• Linux systems administrator
• Distributed storage, cloud computing
• Open source technologist
• Civil liberties activist
• Security researcher
• Now working for non-profit
• Linux systems administrator
• Distributed storage, cloud computing
• Open source technologist
• Civil liberties activist
• Security researcher
http://dropbox.com
Always have your stuff, wherever you are.




                                            http://dropbox.com
Brief history
2007 June - founded, receives series A funding
2007 September - receives $1.2M in seed funding (Y Combinator)
2007 October - receives $6M in Series A funding
2008 Fall - secures $7.2M Series A funding (Sequoia Capital, Accel Partners)


                                                     http://www.crunchbase.com/company/dropbox
Dropbox enables people to sync files and media across platforms and devices, in order to
have them available from any location.
The service also allows people to easily and quickly share files with others.
Dropbox provides users with 2 GB of space for free, and they can pay for more.



                                     http://techcrunch.com/2011/04/17/dropbox-hits-25-millions-users-200-million-files-per-day
People use Dropbox for personal storage, file syncing between machines, and group
collaboration on projects.
They have desktop software for the usual OSs (Mac OSX, Linux and Windows) and mobile
access, that makes things run smoothly.



                                   http://techcrunch.com/2011/04/17/dropbox-hits-25-millions-users-200-million-files-per-day
Current growth
2009 2 millions users
2010 4 million users
2011 April - Dropbox claims to have 25 million users of its free service


                        http://techcrunch.com/2011/04/17/dropbox-hits-25-millions-users-200-million-files-per-day
“Today, Dropbox has 25 million users and 200 million files are “saved” daily, and
more than 1 million every five minutes.”




                                 http://techcrunch.com/2011/04/17/dropbox-hits-25-millions-users-200-million-files-per-day
25 million users

  200 million files
 are “saved” daily
more than 1 million
every five minutes
       http://techcrunch.com/2011/04/17/dropbox-hits-25-millions-users-200-million-files-per-day
25 million users

  200 million files
 are “saved” daily
more than 1 million
every five minutes
       http://techcrunch.com/2011/04/17/dropbox-hits-25-millions-users-200-million-files-per-day
So, a for-profit company offers a free app, with free data
            storage... what’s to worry about?
We know Dropbox is secure because Dropbox says so:
■ “Your files are always available from the secure Dropbox website” (secure sounds good)
■ “All transmission of file data occurs over an encrypted channel (SSL)” (wow, that sounds good too!)
■ “All files stored on Dropbox are encrypted (AES-256)” (dude, that's “military grade” encryption! That's
  gotta be good!)
■ “...protects your files without you needing to think about it” (How can you argue with that?)
■ “Your stuff is safe” (O’RLY?)


                                                                                                 http://dropbox.com
We know Dropbox is secure because Dropbox says so:
■ “Your files are always available from the secure Dropbox website” (secure sounds good)
■ “All transmission of file data occurs over an encrypted channel (SSL)” (wow, that sounds good too!)
■ “All files stored on Dropbox are encrypted (AES-256)” (dude, that's “military grade” encryption! That's
  gotta be good!)
■ “...protects your files without you needing to think about it” (How can you argue with that?)
■ “Your stuff is safe” (...)


                                                                                                 http://dropbox.com
Meanwhile, security researchers have turned up evidence otherwise.
How Dropbox sacrifices user privacy for cost savings
“While the decision to deduplicate data has probably saved the company quite a bit of
storage space and bandwidth, it has significant flaws which are particularly troubling given
the statements made by the company on its security and privacy page.” Christopher Soghoian

(files hashes are checked before upload, bandwidth testing shows that files aren’t transferred if
they exist (elsewhere) on the servers)




                                              http://paranoia.dubfire.net/2011/04/how-dropbox-sacrifices-user-privacy-for.html
Dropbox Lied to Users About Data Security, Complaint to FTC Alleges
Christopher Soghoian published data last month showing that Dropbox could indeed see
the contents of files, putting users at risk of government searches, rogue Dropbox
employees, and even companies trying to bring mass copyright-infringement suits.

Soghoian, who spent a year working at the FTC, charges [... ] “(Dropbox) has and continues to
make deceptive statements to consumers regarding the extent to which it protects
and encrypts their data,” which amounts to a deceptive trade practice that can be investigated
by the FTC.




                                                               http://www.wired.com/threatlevel/2011/05/dropbox-ftc
Dropbox authentication: insecure by design
“Here’s the problem: the config.db file is completely portable and is *not* tied to
the system in any way. This means that if you gain access to a person’s config.db file
(or just the host_id), you gain complete access to the person’s Dropbox until
such time that the person removes the host from the list of linked devices via the Dropbox web
interface.” Derek Newton




                                                  http://dereknewton.com/2011/04/dropbox-authentication-static-host-ids
Dropbox: A Privacy Black Box
”National Security Letter authority and the impoverished “third party doctrine” in
Fourth Amendment law puts cloud-user privacy on pretty weak footing.
Dropbox’s policies do nothing to shore that up. It’s not alone, of course. It’s just a
nice discrete example of how “the cloud” exposes your data to risks that local storage doesn’t.”
Jim Harper




                                                        http://techliberation.com/2009/12/12/dropbox-a-privacy-black-box
Ok, so Dropbox has *some* privacy considerations to
   address, at least it’s safe and secure now...right?
Dropbox Security Bug Made Passwords Optional For Four Hours
“This morning a post on Pastebin outlined a serious security issue that was spotted at
Dropbox: for a brief period of time, the service allowed users to log into
accounts using any password. In other words, you could log into someone’s account
simply by typing in their email address. Given that many people entrust Dropbox with secure
data (one of the service’s selling points is its security), that’s a big deal.




    http://www.washingtonpost.com/business/technology/dropbox-security-bug-made-passwords-optional-for-four-hours/2011/06/20/AGupXTdH_story.html
Dropbox confirms security glitch -- no password required
”Web-based storage firm Dropbox confirmed this afternoon that a programmer's error caused
a temporary security breach that allowed any password to be used to access any user account.
The San Francisco-based start-up attributed the security breach to a "code update"
that "introduced a bug affecting our authentication mechanism." Access without
passwords was possible between 1:54pm PT and 5:46pm PT yesterday, the company said.”
Declan McCullagh




                          http://news.cnet.com/8301-31921_3-20072755-281/dropbox-confirms-security-glitch-no-password-required
Ok, so maybe Dropbox knows what you have, and might not be more
secure than the next cloud service provider, at least it has security to
     protect information about your personal data usage...right?
Dropbox Reader™
Dropbox Reader is actually a series of six command line Python scripts which parse the
configuration and cache files of a Dropbox account, including the user's registered e-mail
address, dropbox identifier, software version info and list of recently changed files
stored in config.db, the information about shared directories and files marked for
sync stored in filecache.db. [the] Python scripts operate on SQLite3 Dropbox database files.




                                                        http://www.cybermarshal.com/index.php/cyber-marshal-utilities/dropbox-reader
                 http://www.betanews.com/article/Now-anyone-not-just-cops-with-a-warrant-can-peek-inside-your-Dropbox/1308256016?=
Errrggh...
April 13, 2011




Dropbox has changed their TOS...

                                   http://www.utternewsense.com
April 13, 2011




From
All files stored on Dropbox servers are encrypted (AES256)
and are inaccessible without your account password.
                                                 http://www.utternewsense.com
                                                  https://www.dropbox.com/terms
April 13, 2011




To
All files stored on Dropbox servers are encrypted (AES256)
and are inaccessible without your account password.
                                                 http://www.utternewsense.com
                                                  https://www.dropbox.com/terms
0_o
“So, Dropbox is, a free app with privacy and security concerns that you can use to
freely backup your stuff and share your files with others, huh? Great, that's just
what everybody needs, right?” Ceiling Cat




                                                    http://blog.milkandcookies.com/files/2010/08/ceiling_cat.jpg
http://en.wikipedia.org/wiki/File:We_Can_Do_It!.jpg
http://www.bootstrapme.com/50226711/bootstrap_building_blocks_from_parttime_startup_to_fulltime_business.php
http://rsync.samba.org
http://www.cis.upenn.edu/~bcpierce/unison
What can we use as a trigger to kick off a sync?
inotify
it watches for notices from the Linux kernel (since 2.6)
Jun 21 20:57:32 rogue Dropbox[1448]: Unable to monitor entire Dropbox
folder hierarchy. Please run "echo 100000 | sudo tee /proc/sys/fs/
inotify/max_user_watches" and restart Dropbox to correct the problem.
https://code.google.com/p/lsyncd/
And how to securely transfer data? (no-brainer)
http://fak3r.com/geek/howto-build-your-own-open-source-dropbox-clone/
http://www.reddit.com/r/linux/comments/9ol1j/howto_create_your_own_dropbox_clone/
http://www.lifehacker.com.au/2010/10/how-to-make-your-own-dropbox-like-sync-and-backup-service
http://hardware.slashdot.org/story/11/07/27/0547218/DIY-Dropbox-Alternatives
http://www.itworld.com/storage/186547/diy-dropbox-alternatives
"Building an Open Source
        Dropbox Clone"




                    Hacker Monthly
               December 2010:34-36

http://hackermonthly.com/issue-7.html
http://www.myfacewhen.net
https://github.com/philcryer/lipsync
✓ lipsync daemon in Linux runs watches for file changes via inotify
✓ kicks off rsync over ssh to securely sync the data
✓ growl-like desktop notifications
✓ great response from the community
✓ user’s forking the project, submitting pull requests
✓ contributing to an active mailing list
- a contributor has lipsync running on OSX (ready ‘soon’)
- make it more secure/private/cool/etc
  - encrypted filesystems, p2p, freenet, bittorrent?
- make it cross platform
  - Linux, Mac, Windows, Android, iOS, etc
  - preliminary ideas of how a win32 version 'could work'
     - installer running under Cgywin?
- more ideas from the community
https://github.com/philcryer/lipsync/raw/master/docs/diagram.png
✓ lipsync daemon in Linux runs watches for file changes via inotify
✓ kicks off rsync over ssh to securely sync the data
✓ growl-like desktop notifications
✓ great response from the community
✓ user’s forking the project, submitting pull requests
✓ contributing to an active mailing list
- a contributor has lipsync running on OSX (ready ‘soon’)
- make it more secure/private/cool/etc
  - encrypted filesystems, p2p, freenet, bittorrent, Tor?
- make it cross platform
  - Linux, Mac, Windows, Android, iOS, etc
  - preliminary ideas of how a win32 version 'could work'
     - installer running under Cgywin?
- more ideas from the community
http://lipsync.it/




                     Thanks to Anthony for the name
Conclusions




              http://afistfulofsoundtracks.blogspot.com
■ it is possible to create a secure, file distribution app that protects user’s privacy
  and security…
  ■ it won't be built by any for-profit, third party; it will be built by the community
  ■ we should look at all cloud or ‘app store’ offerings with this same skepticism
■ it is possible to create a secure, file distribution app that protects user’s privacy
  and security…
  ■ it won't be built by any for-profit, third party; it will be built by the community
  ■ we should look at all cloud or ‘app store’ offerings with this same skepticism
■ interested in lipsync? Get involved, try it out, join the mailing list, submit an
  issue, fork it!
■ discuss your ideas, implement them, make changes, think about what you
  want it to do, make it better
■ continue to ask questions, explore privacy and security in software
■ and always bring a towel!
■ interested in lipsync? Get involved, try it out, join the mailing list, submit an
  issue, fork it!
■ discuss your ideas, implement them, make changes, think about what you
  want it to do, make it better
■ continue to ask questions, explore privacy and security in software
■ and always bring a towel!
www lipsync.it

Thanks to SBS Creatix
   for sponsorship

   Thanks to DEF
 CON, EFF and Nikita




                                  www philcryer.com
                                   twitter @fak3r

   Special thanks to
  Mary, Kacy and Ben

    Keep circulating the tapes!

More Related Content

What's hot

(120513) #fitalk an introduction to linux memory forensics
(120513) #fitalk   an introduction to linux memory forensics(120513) #fitalk   an introduction to linux memory forensics
(120513) #fitalk an introduction to linux memory forensicsINSIGHT FORENSIC
 
AOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocksAOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocksZubair Nabi
 
Workshop - Linux Memory Analysis with Volatility
Workshop - Linux Memory Analysis with VolatilityWorkshop - Linux Memory Analysis with Volatility
Workshop - Linux Memory Analysis with VolatilityAndrew Case
 
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questionsKavya Sri
 
Memory forensics
Memory forensicsMemory forensics
Memory forensicsSunil Kumar
 
Red Hat System Administration
Red Hat System AdministrationRed Hat System Administration
Red Hat System AdministrationRafi Rahimov
 
AOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyondAOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyondZubair Nabi
 
AOS Lab 7: Page tables
AOS Lab 7: Page tablesAOS Lab 7: Page tables
AOS Lab 7: Page tablesZubair Nabi
 
Kernel Recipes 2016 - Would an ABI changes visualization tool be useful to Li...
Kernel Recipes 2016 - Would an ABI changes visualization tool be useful to Li...Kernel Recipes 2016 - Would an ABI changes visualization tool be useful to Li...
Kernel Recipes 2016 - Would an ABI changes visualization tool be useful to Li...Anne Nicolas
 
De-Anonymizing Live CDs through Physical Memory Analysis
De-Anonymizing Live CDs through Physical Memory AnalysisDe-Anonymizing Live CDs through Physical Memory Analysis
De-Anonymizing Live CDs through Physical Memory AnalysisAndrew Case
 
Next Generation Memory Forensics
Next Generation Memory ForensicsNext Generation Memory Forensics
Next Generation Memory ForensicsAndrew Case
 
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with VolatlityOMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with VolatlityAndrew Case
 
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...Andrew Case
 
Your Watch can watch you ! Gear up for broken privilege pitfalls in the samsu...
Your Watch can watch you ! Gear up for broken privilege pitfalls in the samsu...Your Watch can watch you ! Gear up for broken privilege pitfalls in the samsu...
Your Watch can watch you ! Gear up for broken privilege pitfalls in the samsu...Priyanka Aash
 

What's hot (19)

(120513) #fitalk an introduction to linux memory forensics
(120513) #fitalk   an introduction to linux memory forensics(120513) #fitalk   an introduction to linux memory forensics
(120513) #fitalk an introduction to linux memory forensics
 
AOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocksAOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocks
 
Workshop - Linux Memory Analysis with Volatility
Workshop - Linux Memory Analysis with VolatilityWorkshop - Linux Memory Analysis with Volatility
Workshop - Linux Memory Analysis with Volatility
 
4. linux file systems
4. linux file systems4. linux file systems
4. linux file systems
 
P2P Forensics
P2P ForensicsP2P Forensics
P2P Forensics
 
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questions
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
 
Robocopy
RobocopyRobocopy
Robocopy
 
Red Hat System Administration
Red Hat System AdministrationRed Hat System Administration
Red Hat System Administration
 
AOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyondAOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyond
 
AOS Lab 7: Page tables
AOS Lab 7: Page tablesAOS Lab 7: Page tables
AOS Lab 7: Page tables
 
Kernel Recipes 2016 - Would an ABI changes visualization tool be useful to Li...
Kernel Recipes 2016 - Would an ABI changes visualization tool be useful to Li...Kernel Recipes 2016 - Would an ABI changes visualization tool be useful to Li...
Kernel Recipes 2016 - Would an ABI changes visualization tool be useful to Li...
 
Introduction to UNIX
Introduction to UNIXIntroduction to UNIX
Introduction to UNIX
 
De-Anonymizing Live CDs through Physical Memory Analysis
De-Anonymizing Live CDs through Physical Memory AnalysisDe-Anonymizing Live CDs through Physical Memory Analysis
De-Anonymizing Live CDs through Physical Memory Analysis
 
Next Generation Memory Forensics
Next Generation Memory ForensicsNext Generation Memory Forensics
Next Generation Memory Forensics
 
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with VolatlityOMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
 
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
 
Linux in Urdu
 Linux in Urdu  Linux in Urdu
Linux in Urdu
 
Your Watch can watch you ! Gear up for broken privilege pitfalls in the samsu...
Your Watch can watch you ! Gear up for broken privilege pitfalls in the samsu...Your Watch can watch you ! Gear up for broken privilege pitfalls in the samsu...
Your Watch can watch you ! Gear up for broken privilege pitfalls in the samsu...
 

Viewers also liked

Data hosting infrastructure for primary biodiversity data
Data hosting infrastructure for primary biodiversity dataData hosting infrastructure for primary biodiversity data
Data hosting infrastructure for primary biodiversity dataPhil Cryer
 
Collaboratively creating a network of ideas, data and software
Collaboratively creating a network of ideas, data and softwareCollaboratively creating a network of ideas, data and software
Collaboratively creating a network of ideas, data and softwareAnita de Waard
 
GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...
GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...
GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...Phil Cryer
 
Getting started with Mantl
Getting started with MantlGetting started with Mantl
Getting started with MantlPhil Cryer
 
Pets versus Cattle: servers evolved
Pets versus Cattle: servers evolvedPets versus Cattle: servers evolved
Pets versus Cattle: servers evolvedPhil Cryer
 
What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?Phil Cryer
 
Moving towards unified logging
Moving towards unified loggingMoving towards unified logging
Moving towards unified loggingPhil Cryer
 

Viewers also liked (7)

Data hosting infrastructure for primary biodiversity data
Data hosting infrastructure for primary biodiversity dataData hosting infrastructure for primary biodiversity data
Data hosting infrastructure for primary biodiversity data
 
Collaboratively creating a network of ideas, data and software
Collaboratively creating a network of ideas, data and softwareCollaboratively creating a network of ideas, data and software
Collaboratively creating a network of ideas, data and software
 
GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...
GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...
GBIF (Global Biodiversity Information Facility) Position Paper: Data Hosting ...
 
Getting started with Mantl
Getting started with MantlGetting started with Mantl
Getting started with Mantl
 
Pets versus Cattle: servers evolved
Pets versus Cattle: servers evolvedPets versus Cattle: servers evolved
Pets versus Cattle: servers evolved
 
What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?What if Petraeus Was a Hacker?
What if Petraeus Was a Hacker?
 
Moving towards unified logging
Moving towards unified loggingMoving towards unified logging
Moving towards unified logging
 

Similar to Taking your ball and going home

dropbox by ramanjeet lamba
dropbox by ramanjeet lambadropbox by ramanjeet lamba
dropbox by ramanjeet lamba100580308717
 
Dropbox - stratigies and business policies
Dropbox - stratigies and business policiesDropbox - stratigies and business policies
Dropbox - stratigies and business policiessooraj yadav
 
Quickly sync and upload files with Dropbox
Quickly sync and upload files with DropboxQuickly sync and upload files with Dropbox
Quickly sync and upload files with DropboxPrincipled Technologies
 
Final copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-...
Final copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-...Final copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-...
Final copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-...alysonkaye
 
Copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-10-12
Copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-10-12Copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-10-12
Copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-10-12alysonkaye
 
12058 woot13-kholia
12058 woot13-kholia12058 woot13-kholia
12058 woot13-kholiageeksec80
 
Nationalism Power
Nationalism Power Nationalism Power
Nationalism Power wswarb
 
Getting started
Getting startedGetting started
Getting startedpaperface
 
Facebook
FacebookFacebook
Facebookglebc
 

Similar to Taking your ball and going home (20)

Dropbox assgnment
Dropbox assgnmentDropbox assgnment
Dropbox assgnment
 
dropbox by ramanjeet lamba
dropbox by ramanjeet lambadropbox by ramanjeet lamba
dropbox by ramanjeet lamba
 
Dropbox
DropboxDropbox
Dropbox
 
Dropbox - stratigies and business policies
Dropbox - stratigies and business policiesDropbox - stratigies and business policies
Dropbox - stratigies and business policies
 
Drop box review
Drop box review Drop box review
Drop box review
 
Quickly sync and upload files with Dropbox
Quickly sync and upload files with DropboxQuickly sync and upload files with Dropbox
Quickly sync and upload files with Dropbox
 
ICT01_DROPBOX_DOMINGO
ICT01_DROPBOX_DOMINGOICT01_DROPBOX_DOMINGO
ICT01_DROPBOX_DOMINGO
 
Final copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-...
Final copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-...Final copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-...
Final copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-...
 
Copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-10-12
Copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-10-12Copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-10-12
Copyofopensourcesites softwareandpresentationoutlineforslideshowfinal5-10-12
 
12058 woot13-kholia
12058 woot13-kholia12058 woot13-kholia
12058 woot13-kholia
 
Dropbox
DropboxDropbox
Dropbox
 
Cloud for everyone
Cloud for everyoneCloud for everyone
Cloud for everyone
 
Getting started
Getting startedGetting started
Getting started
 
Nationalism Power
Nationalism Power Nationalism Power
Nationalism Power
 
Teste123
Teste123Teste123
Teste123
 
Getting started
Getting startedGetting started
Getting started
 
Getting started
Getting startedGetting started
Getting started
 
Getting started
Getting startedGetting started
Getting started
 
Facebook
FacebookFacebook
Facebook
 
Getting started
Getting startedGetting started
Getting started
 

More from Phil Cryer

What if Petraeus was a hacker? Email privacy for the rest of us
What if Petraeus was a hacker? Email privacy for the rest of usWhat if Petraeus was a hacker? Email privacy for the rest of us
What if Petraeus was a hacker? Email privacy for the rest of usPhil Cryer
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Phil Cryer
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social webPhil Cryer
 
Adoption of Persistent Identifiers for Biodiversity Informatics
Adoption of Persistent Identifiers for Biodiversity InformaticsAdoption of Persistent Identifiers for Biodiversity Informatics
Adoption of Persistent Identifiers for Biodiversity InformaticsPhil Cryer
 
Biodiversity Heritiage Library: progress and process
Biodiversity Heritiage Library: progress and processBiodiversity Heritiage Library: progress and process
Biodiversity Heritiage Library: progress and processPhil Cryer
 
Storing and distributing data
Storing and distributing dataStoring and distributing data
Storing and distributing dataPhil Cryer
 
BHL hardware architecture - storage and clusters
BHL hardware architecture - storage and clustersBHL hardware architecture - storage and clusters
BHL hardware architecture - storage and clustersPhil Cryer
 
Building A Scalable Open Source Storage Solution
Building A Scalable Open Source Storage SolutionBuilding A Scalable Open Source Storage Solution
Building A Scalable Open Source Storage SolutionPhil Cryer
 
Biodiversity Heritage Library Articles Demo
Biodiversity Heritage Library Articles DemoBiodiversity Heritage Library Articles Demo
Biodiversity Heritage Library Articles DemoPhil Cryer
 
Using Fedora Commons To Create A Persistent Archive
Using Fedora Commons To Create A Persistent ArchiveUsing Fedora Commons To Create A Persistent Archive
Using Fedora Commons To Create A Persistent ArchivePhil Cryer
 

More from Phil Cryer (11)

What if Petraeus was a hacker? Email privacy for the rest of us
What if Petraeus was a hacker? Email privacy for the rest of usWhat if Petraeus was a hacker? Email privacy for the rest of us
What if Petraeus was a hacker? Email privacy for the rest of us
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Adoption of Persistent Identifiers for Biodiversity Informatics
Adoption of Persistent Identifiers for Biodiversity InformaticsAdoption of Persistent Identifiers for Biodiversity Informatics
Adoption of Persistent Identifiers for Biodiversity Informatics
 
Biodiversity Heritiage Library: progress and process
Biodiversity Heritiage Library: progress and processBiodiversity Heritiage Library: progress and process
Biodiversity Heritiage Library: progress and process
 
Storing and distributing data
Storing and distributing dataStoring and distributing data
Storing and distributing data
 
BHL hardware architecture - storage and clusters
BHL hardware architecture - storage and clustersBHL hardware architecture - storage and clusters
BHL hardware architecture - storage and clusters
 
Building A Scalable Open Source Storage Solution
Building A Scalable Open Source Storage SolutionBuilding A Scalable Open Source Storage Solution
Building A Scalable Open Source Storage Solution
 
Biodiversity Heritage Library Articles Demo
Biodiversity Heritage Library Articles DemoBiodiversity Heritage Library Articles Demo
Biodiversity Heritage Library Articles Demo
 
Using Fedora Commons To Create A Persistent Archive
Using Fedora Commons To Create A Persistent ArchiveUsing Fedora Commons To Create A Persistent Archive
Using Fedora Commons To Create A Persistent Archive
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Taking your ball and going home

  • 1. Taking your ball and going home; building your own secure storage space that mirrors Dropbox's functionality Phil Cryer (@fak3r) open source technologist DEFCON 19 - August 2011 v1.5
  • 2. $ echo O’HAI! I am `whoami` O’HAI! I am phil $ echo AKA `alias | grep phil` AKA phil='fak3r’
  • 3.
  • 4.
  • 6. computer |kәmˈpyo͞otәr| noun an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program. • a person who makes calculations, esp. with a calculating machine.
  • 7.
  • 8.
  • 11.
  • 12. • Now working for non-profit • Linux systems administrator • Distributed storage, cloud computing • Open source technologist • Civil liberties activist • Security researcher
  • 13. • Now working for non-profit • Linux systems administrator • Distributed storage, cloud computing • Open source technologist • Civil liberties activist • Security researcher
  • 14.
  • 16. Always have your stuff, wherever you are. http://dropbox.com
  • 17. Brief history 2007 June - founded, receives series A funding 2007 September - receives $1.2M in seed funding (Y Combinator) 2007 October - receives $6M in Series A funding 2008 Fall - secures $7.2M Series A funding (Sequoia Capital, Accel Partners) http://www.crunchbase.com/company/dropbox
  • 18. Dropbox enables people to sync files and media across platforms and devices, in order to have them available from any location. The service also allows people to easily and quickly share files with others. Dropbox provides users with 2 GB of space for free, and they can pay for more. http://techcrunch.com/2011/04/17/dropbox-hits-25-millions-users-200-million-files-per-day
  • 19. People use Dropbox for personal storage, file syncing between machines, and group collaboration on projects. They have desktop software for the usual OSs (Mac OSX, Linux and Windows) and mobile access, that makes things run smoothly. http://techcrunch.com/2011/04/17/dropbox-hits-25-millions-users-200-million-files-per-day
  • 20. Current growth 2009 2 millions users 2010 4 million users 2011 April - Dropbox claims to have 25 million users of its free service http://techcrunch.com/2011/04/17/dropbox-hits-25-millions-users-200-million-files-per-day
  • 21. “Today, Dropbox has 25 million users and 200 million files are “saved” daily, and more than 1 million every five minutes.” http://techcrunch.com/2011/04/17/dropbox-hits-25-millions-users-200-million-files-per-day
  • 22. 25 million users 200 million files are “saved” daily more than 1 million every five minutes http://techcrunch.com/2011/04/17/dropbox-hits-25-millions-users-200-million-files-per-day
  • 23. 25 million users 200 million files are “saved” daily more than 1 million every five minutes http://techcrunch.com/2011/04/17/dropbox-hits-25-millions-users-200-million-files-per-day
  • 24. So, a for-profit company offers a free app, with free data storage... what’s to worry about?
  • 25. We know Dropbox is secure because Dropbox says so: ■ “Your files are always available from the secure Dropbox website” (secure sounds good) ■ “All transmission of file data occurs over an encrypted channel (SSL)” (wow, that sounds good too!) ■ “All files stored on Dropbox are encrypted (AES-256)” (dude, that's “military grade” encryption! That's gotta be good!) ■ “...protects your files without you needing to think about it” (How can you argue with that?) ■ “Your stuff is safe” (O’RLY?) http://dropbox.com
  • 26. We know Dropbox is secure because Dropbox says so: ■ “Your files are always available from the secure Dropbox website” (secure sounds good) ■ “All transmission of file data occurs over an encrypted channel (SSL)” (wow, that sounds good too!) ■ “All files stored on Dropbox are encrypted (AES-256)” (dude, that's “military grade” encryption! That's gotta be good!) ■ “...protects your files without you needing to think about it” (How can you argue with that?) ■ “Your stuff is safe” (...) http://dropbox.com
  • 27.
  • 28. Meanwhile, security researchers have turned up evidence otherwise.
  • 29. How Dropbox sacrifices user privacy for cost savings “While the decision to deduplicate data has probably saved the company quite a bit of storage space and bandwidth, it has significant flaws which are particularly troubling given the statements made by the company on its security and privacy page.” Christopher Soghoian (files hashes are checked before upload, bandwidth testing shows that files aren’t transferred if they exist (elsewhere) on the servers) http://paranoia.dubfire.net/2011/04/how-dropbox-sacrifices-user-privacy-for.html
  • 30. Dropbox Lied to Users About Data Security, Complaint to FTC Alleges Christopher Soghoian published data last month showing that Dropbox could indeed see the contents of files, putting users at risk of government searches, rogue Dropbox employees, and even companies trying to bring mass copyright-infringement suits. Soghoian, who spent a year working at the FTC, charges [... ] “(Dropbox) has and continues to make deceptive statements to consumers regarding the extent to which it protects and encrypts their data,” which amounts to a deceptive trade practice that can be investigated by the FTC. http://www.wired.com/threatlevel/2011/05/dropbox-ftc
  • 31. Dropbox authentication: insecure by design “Here’s the problem: the config.db file is completely portable and is *not* tied to the system in any way. This means that if you gain access to a person’s config.db file (or just the host_id), you gain complete access to the person’s Dropbox until such time that the person removes the host from the list of linked devices via the Dropbox web interface.” Derek Newton http://dereknewton.com/2011/04/dropbox-authentication-static-host-ids
  • 32. Dropbox: A Privacy Black Box ”National Security Letter authority and the impoverished “third party doctrine” in Fourth Amendment law puts cloud-user privacy on pretty weak footing. Dropbox’s policies do nothing to shore that up. It’s not alone, of course. It’s just a nice discrete example of how “the cloud” exposes your data to risks that local storage doesn’t.” Jim Harper http://techliberation.com/2009/12/12/dropbox-a-privacy-black-box
  • 33. Ok, so Dropbox has *some* privacy considerations to address, at least it’s safe and secure now...right?
  • 34. Dropbox Security Bug Made Passwords Optional For Four Hours “This morning a post on Pastebin outlined a serious security issue that was spotted at Dropbox: for a brief period of time, the service allowed users to log into accounts using any password. In other words, you could log into someone’s account simply by typing in their email address. Given that many people entrust Dropbox with secure data (one of the service’s selling points is its security), that’s a big deal. http://www.washingtonpost.com/business/technology/dropbox-security-bug-made-passwords-optional-for-four-hours/2011/06/20/AGupXTdH_story.html
  • 35.
  • 36. Dropbox confirms security glitch -- no password required ”Web-based storage firm Dropbox confirmed this afternoon that a programmer's error caused a temporary security breach that allowed any password to be used to access any user account. The San Francisco-based start-up attributed the security breach to a "code update" that "introduced a bug affecting our authentication mechanism." Access without passwords was possible between 1:54pm PT and 5:46pm PT yesterday, the company said.” Declan McCullagh http://news.cnet.com/8301-31921_3-20072755-281/dropbox-confirms-security-glitch-no-password-required
  • 37. Ok, so maybe Dropbox knows what you have, and might not be more secure than the next cloud service provider, at least it has security to protect information about your personal data usage...right?
  • 38. Dropbox Reader™ Dropbox Reader is actually a series of six command line Python scripts which parse the configuration and cache files of a Dropbox account, including the user's registered e-mail address, dropbox identifier, software version info and list of recently changed files stored in config.db, the information about shared directories and files marked for sync stored in filecache.db. [the] Python scripts operate on SQLite3 Dropbox database files. http://www.cybermarshal.com/index.php/cyber-marshal-utilities/dropbox-reader http://www.betanews.com/article/Now-anyone-not-just-cops-with-a-warrant-can-peek-inside-your-Dropbox/1308256016?=
  • 40. April 13, 2011 Dropbox has changed their TOS... http://www.utternewsense.com
  • 41. April 13, 2011 From All files stored on Dropbox servers are encrypted (AES256) and are inaccessible without your account password. http://www.utternewsense.com https://www.dropbox.com/terms
  • 42. April 13, 2011 To All files stored on Dropbox servers are encrypted (AES256) and are inaccessible without your account password. http://www.utternewsense.com https://www.dropbox.com/terms
  • 43. 0_o
  • 44. “So, Dropbox is, a free app with privacy and security concerns that you can use to freely backup your stuff and share your files with others, huh? Great, that's just what everybody needs, right?” Ceiling Cat http://blog.milkandcookies.com/files/2010/08/ceiling_cat.jpg
  • 48. What can we use as a trigger to kick off a sync?
  • 49. inotify it watches for notices from the Linux kernel (since 2.6)
  • 50. Jun 21 20:57:32 rogue Dropbox[1448]: Unable to monitor entire Dropbox folder hierarchy. Please run "echo 100000 | sudo tee /proc/sys/fs/ inotify/max_user_watches" and restart Dropbox to correct the problem.
  • 52. And how to securely transfer data? (no-brainer)
  • 53.
  • 54.
  • 60. "Building an Open Source Dropbox Clone" Hacker Monthly December 2010:34-36 http://hackermonthly.com/issue-7.html
  • 61.
  • 64. ✓ lipsync daemon in Linux runs watches for file changes via inotify ✓ kicks off rsync over ssh to securely sync the data ✓ growl-like desktop notifications ✓ great response from the community ✓ user’s forking the project, submitting pull requests ✓ contributing to an active mailing list - a contributor has lipsync running on OSX (ready ‘soon’) - make it more secure/private/cool/etc - encrypted filesystems, p2p, freenet, bittorrent? - make it cross platform - Linux, Mac, Windows, Android, iOS, etc - preliminary ideas of how a win32 version 'could work' - installer running under Cgywin? - more ideas from the community
  • 66. ✓ lipsync daemon in Linux runs watches for file changes via inotify ✓ kicks off rsync over ssh to securely sync the data ✓ growl-like desktop notifications ✓ great response from the community ✓ user’s forking the project, submitting pull requests ✓ contributing to an active mailing list - a contributor has lipsync running on OSX (ready ‘soon’) - make it more secure/private/cool/etc - encrypted filesystems, p2p, freenet, bittorrent, Tor? - make it cross platform - Linux, Mac, Windows, Android, iOS, etc - preliminary ideas of how a win32 version 'could work' - installer running under Cgywin? - more ideas from the community
  • 67. http://lipsync.it/ Thanks to Anthony for the name
  • 68. Conclusions http://afistfulofsoundtracks.blogspot.com
  • 69. ■ it is possible to create a secure, file distribution app that protects user’s privacy and security… ■ it won't be built by any for-profit, third party; it will be built by the community ■ we should look at all cloud or ‘app store’ offerings with this same skepticism
  • 70. ■ it is possible to create a secure, file distribution app that protects user’s privacy and security… ■ it won't be built by any for-profit, third party; it will be built by the community ■ we should look at all cloud or ‘app store’ offerings with this same skepticism
  • 71. ■ interested in lipsync? Get involved, try it out, join the mailing list, submit an issue, fork it! ■ discuss your ideas, implement them, make changes, think about what you want it to do, make it better ■ continue to ask questions, explore privacy and security in software ■ and always bring a towel!
  • 72. ■ interested in lipsync? Get involved, try it out, join the mailing list, submit an issue, fork it! ■ discuss your ideas, implement them, make changes, think about what you want it to do, make it better ■ continue to ask questions, explore privacy and security in software ■ and always bring a towel!
  • 73. www lipsync.it Thanks to SBS Creatix for sponsorship Thanks to DEF CON, EFF and Nikita www philcryer.com twitter @fak3r Special thanks to Mary, Kacy and Ben Keep circulating the tapes!

Editor's Notes

  1. Taking your ball and going home; building your own secure storage space that mirrors Dropbox’s functionality\n
  2. Hello DEF CON, I’m Phil Cryer, also known as fak3r on Twitter and my Blog, fak3r.com\n
  3. Some quick background on me, and why I may, or may not be, qualified to speak at DEF CON\n
  4. when I was a kid I started learning different programming languages * I loved learning the ins and outs of building things with code..solving puzzles * BASIC, LOGOS, Pascal and Assembly\n
  5. High school brought a change of focus (being in The Computer Club wasn’t as cool as it is today :)) * Fast forward a few years, and I ultimately graduated college with a fine arts degree\n
  6. After working a number of different jobs I found myself getting into technical roles * I enjoyed it * found that even thought I was ‘self taught’ I enjoyed it and was decent at it\n
  7. So I started doing desktop support, as an IT technician * fixing printers, running servers and networking for a company * it was during that time that I came across...\n
  8. Linux... and everything changed * I had the same feeling of freedom and adventure that I had in the days of banging out BASIC on the Apple //e * at work we could solve problems w/o having to buy solutions * I could run a Unix like operating system at home and really explore/grow\n
  9. being an IT contractor allowed me, like most in the industry, to work in a variety of companies * startups, large corporate clients, as well as non-profits * it was a good time to learn on the job, ‘play with Linux’ at home and just see what I could do\n
  10. Partially because of events of the day, I came more aware and interested in civil liberties * while their survival was important for the present, they were more important for the future\n
  11. ...so I started working with a variety of groups * learning more about them and how I could contribute to their success\n
  12. Currently I am working for a non-profit * using Linux and open source apps to distribute biodiversity data to global partners * working with virtual machines, cloud and distributed computing \n
  13. Outside of work I continuously explore open source, and try to find ways to increase online privacy and security\n
  14. But enough about me, now on to the talk\n
  15. How many people here use Dropbox?\nHow many trust it with their most private data?\n
  16. And it does, it’s a great little app that ‘just works’ with minimal demand on the user * I can’t fault the overall function or idea of the product * for a time it seemed to be the ‘killer app’\n
  17. Quickly some background on Dropbox, they’re a very well funded startup company * with many rounds of funding\n
  18. They offer anyone 2 Gigs of free storage * with and annual membership for more space * users can sync data across multiple devices * allowing open sharing of data \n
  19. People use it for file syncing, add-hoc backups, group collaboration and social sharing * it is cross platform with support for Mac, Linux and Windows * plus mobile devices to make things happen seamlessly \n
  20. They’ve seen quick growth over the past two years...\n
  21. Techcrunch: “Today, Dropbox has 25 million users and 200 million files are “saved” daily ... more than 1 million every five minutes.”\n
  22. just to emphasize the numbers we’re talking about\n
  23. ...and to point out that, on average, about 4 million files will be saved during this talk\n
  24. So a for-profit company offers a free app, with free data storage... what’s to worry about? * What do we know about Dropbox’s service?\n
  25. but the last two were a little less convincing....\n
  26. ...and that last one made me say...\n
  27. \n
  28. \n
  29. Christopher Soghoian (SEG-goy-in) posted in his blog, slight paranoia * data reduplication...not the best thing for privacy or security * files are hashed first, and only uploaded if the file wasn’t already on Dropbox * by watching net traffic and seeing how much data is uploaded, you can determine if a user already has a file or not\n
  30. Christopher’s work led to this FTC allegation that Dropbox was using deceptive statements to consumers regarding the extent to which it protects and encrypts their data * they said that this was a case of deceptive trade practice\n
  31. Looked at how Dropbox does authentication * approve devices to access your account * info is stored in a Sqlite file on the client machines, but that file is not tied to that host * if you can get ahold of a Dropbox user’s config.db file (or just the host_id) you can impersonate that user * until revoked\n
  32. Jim Harper called Dropbox, A Privacy Black Box * the idea of the 3rd party doctrine in the 4th amendment puts cloud-user privacy in general on weak footing * Dropbox’s policies don’t do anything to make this safer for their users. * cloud exposes your data to risk that local storage doesn’t\n
  33. \n
  34. For four hours you could access any Dropbox user’s account, using *ANY* password * while this was an accident, it highlights how insecure things can be ‘in the cloud’, and is clearly a EPIC....\n
  35. \n
  36. Dropbox confirms the glitch, but the point that things can be that insecure is made * and relying on cloud infrastructure that a user has no control over is a loss of control you can’t regain\n
  37. \n
  38. Dropbox reader is a set of python scripts that can read even more details about files a user has stored on Dropbox * including share directories * syncing activity all from the config.db file we covered earlier...remember, it’s not tied to the host\n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. Knowing what I know about open source, I know we can do better, and it won't cost us our privacy or security\n
  46. as with any project I wanted to start simple: what can sync files to remote systems?\n\n
  47. That’s easy, we have the long proven stalwart, rsync, and an interesting alternative specializing in 2 way synchronization, Unison\n
  48. \n
  49. inotify has been part of the Linux kernel since 2.6, it watches for notices from the Linux kernel about changes to the filesystem. We know this is up to the task of monitoring tons of files because...\n
  50. ..it’s what Dropbox uses to watch the file system * detailed error that Dropbox will kick to syslog if you’re running it in Linux with the default max_user_watches settings\n
  51. to watch the system * lsycnd is a C program that uses inotify to watch for file system changes * issues commands (rsync by default) when a change is noticed \n
  52. \n
  53. OpenSSH, it’s easy to tunnel rsync over ssh, and would work with Unison too, or other syncing apps we could try * Lsyncd uses SSH by default * when running it this way there’s no need for the ‘server’ to actually run rsyncd. (lowering the barrier for entry) * clients have the keys (not the server, like Dropbox)\n
  54. start simple * use lsyncd to monitor a directory, when it senses a change (read, write, delete) have it kick off rsync to sync with a remote server over SSH * add more features later once this was a working proof of concept and vetted by the community as being 'a good idea'\n
  55. September 2009, I wrote an article about how I put these various apps together to crate an ‘open source Dropbox clone’ * comments and feedback was tremendous * to this day I still get far more traffic to this post than any other post I have made * New people find the post all the time and chime in\n
  56. The article was picked up, and reposted to sites like Reddit...\n
  57. ...Lifehacker...\n
  58. ...Slashdot...\n
  59. ...itworld...\n
  60. ...And in late 2010, even a print magazine, Hacker Monthly\n
  61. So now I’ve announced my idea and got feedback * it was compared to other methods, started conversation, lots of positive feedback * other options out there * continuous interest in this idea * something that users could control and fill the roll that a proprietary ‘black box’ app had\n
  62. ...it was time to build a project around my idea\n
  63. So I created lipsync on github * includes a BASH installer that builds a working implementation of my idea in Linux * BSD licensed * project is setup to be fully transparent and encourage community involvement\n
  64. I got kinda bullet crazy here (I always try to resist that, but...) \n
  65. Here’s a generalized diagram of how things currently work * Cron job is kind of a hack-y way to cover things, but it works for now (Unison may solve this)\n
  66. Future thoughts...\n
  67. We now have a user-friendly URL for the base of the project, thanks to Anthony\n
  68. \n
  69. \n
  70. \n
  71. So what can we do in this case? \n
  72. So what can we do in this case? \n
  73. \n