SlideShare a Scribd company logo
Your Cell Phone is
Covered in Spiders
An overview of the cell phone
security landscape
Cooper Quintin
@cooperq
cooper@radicaldesigns.org
We are becoming increasingly dependent
on mobile devices
●
We are storing more and more data on them
●
Pictures
●
Videos
●
Contacts
●
Email
●
Social Graphs
●
Location History
●
Etc
●
As the amount of data increases
●
The complexity increases
●
The desirability increases
●
The number of vulnerabilities increases
And there are a lot of
vulnerabilities!
Things to Keep in Mind
If an attacker gains physical access phone can
and will be completely compromised.
Also, you should assume that your phone will
be compromised at some point.
Generally, you will be safest if you just take the
attitude that YOU SHOULD NOT TRUST YOUR
PHONE
Security is a Journey Not a Destination
The more hurdles that you put up, the harder you
make it for an attacker.
Time to compromise > Determination of attacker
Don't get demoralized! There are many things you
can do to improve your security.
Threat Model
●Random attacks
●
Malicious apps
●
Stolen / Lost phone
●Targeted attacker
●
Law Enforcement
●
Corporate Espionage
●
Personal Enemies
●Signal Interception
●Your Phone Company
Burner Phones
●
No encryption
●
Trivial for Forensic Investigators
●
Closed Source
●
Usually no Screen Lock
iPhone
The Bad
●
Closed source
●
Very little in the way of security apps
●
Default screen lock is a four digit number
●
Privacy tools that aren't free or open source
The Good
●
There is a stronger screen lock that can be enabled
●
A couple of decent privacy apps
●
Less Malware
BlackBerry
● BEST USED IN COMBINATION WITH BES
● Otherwise about as good as any other smartphone
● BBM and Pin to Pin messaging NOT SECURE
– Not encrypted, just 'scrambled'
– RIM can read all of your messages if a govt demands
● Your data is only as secure as the company is trustworthy
● RIM admitted to providing backdoors to govt. in India and
has helped UK and middle east govts.
● Less Malware
● Without BES, Security on Blackberry is not so good.
Android
●
IMO The best phone for security
●
Open source
●
Lots of security tools
●
Lots of encryption tools
●
Full Disk Encryption
●
Good security options
●
Guardian Project
●
Your data is in the hands of google
●
How much do you trust google?
Lets Talk About Threat Models
Again
Law Enforcement Investigators are Looking
for:
●
Subscriber & Equipment Identifiers
●
Contacts
●
Appointment Calendar
●
SMS, Text Messages, Instant Messages, Email
●
Call Logs
●
Photos, Audio and Video
●
Documents
●
Location Data
Forensic Methods
● Recovering screen lock
● Recovery Mode
● Cellbrite and UFED
● JTAG
Solutions
●
Have a strong screen lock and a short timeout
●
Don't tell them your password
●
Encryption (Text Secure, LUKS, Device encryption)
Signal Interception
Threats
●
Fake Cellular Towers / Drones
●
USRP/GNU Radio
●
Snooping as a Service
●
Cellular companies will provide wiretaps without even
a warrant
●
Insecure apps like BBM and whatsapp
Solutions
●
Encrypted Calls (PrivateGSM, Redphone,
SilentCircle )
●
Encrypted Text on Android (Textsecure)
●
Talk in Person (This is the Most Secure)
Lost and Stolen Phones
●
Phone Finding and Remote Wipe
●
Android: Lookout, Prey
●
BlackBerry Protect
●
Find My Iphone
●
Strong Screen lock
●
Will not stop a sophisticated attacker
●
Report to The Provider?
●
They probably don't give a damn.
Malware
Vendor and Espionage malware
●
This stuff is extremely sophisticated
●
FinFisher
●
CarrierIQ
●
Voodo carrierIQ
Standard, untargeted malware
●
Personal Data Theft
●
Premium SMS
●
The usual suspects (spyware, trojans, phishing)
●
Facebook, Angry Birds?
Malware Solutions
● Be careful what you install!
● Don't install apps from untrusted sources
● Don't run updates when on insecure networks
● Anti Virus won't save you!
● Don't assume that because you have an iPhone or
Blackberry that you are immune to malware
● Use the same precautions as you would on any
computer.
Other Attacks
● NFC
● QR Phishing
● Baseband Attacks
Disk Encryption
●
Exists on Android
●
Exists on Blackberry if you have BES
●
Does not exist on iPhone
●
Vulnerable to many different attacks
●
You should NOT rely solely on disk encryption.
Call Encryption
● SecureGSM
● Android: Redphone, OSTN
To Root or Not to Root
(AKA Jailbreaking)
Rooting your phone is the process of gaining super
administrator control over your phone.
This means you can do
ANYTHING YOU WANT
To your phone.
Including mess it up in fantastic ways!
To Root or Not to Root
The Good
● Custom Firmware
● Better Security Tools
● Remove Spyware
● More Cool Apps
● Performance
Improvements
● Tinkering is Fun!
The Bad
● Can significantly
decrease security
● You can permanently
break your phone
● Will Void Your
Warranty
In Conclusion...
●
It's healthy to be paranoid about your phone
●
Don't loose your phone!
●
Trust what you install (Open Source)
●
Root and install custom firmware
●
Use a stronger screen lock
●
Audit your phone
●
Encrypt Everything!
Thank You!
Cooper Quintin
cooper@radicaldesigns.org
Twitter: @cooperq
Jabber: cooperq@jabber.ccc.de
OTR: 9B3470B9 B1F10651 B5840FEB 026D6CF7 2D949F6F
PGP: 75FB9347 FA4B22A0 5068080B D0EA7B6F F0AFE2CA

More Related Content

What's hot

u2f fido security key
u2f fido security keyu2f fido security key
u2f fido security key
GoTrust ID
 
Digital security for journalists laurent eschenauer
Digital security for journalists  laurent eschenauerDigital security for journalists  laurent eschenauer
Digital security for journalists laurent eschenauer
Nelly Luna
 
Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056mashiur
 
Mobile Exhibition
Mobile ExhibitionMobile Exhibition
Mobile ExhibitionAnnie Han
 
Infinum Android Talks #17 - Intro by Ivan Kocijan
Infinum Android Talks #17 - Intro by Ivan KocijanInfinum Android Talks #17 - Intro by Ivan Kocijan
Infinum Android Talks #17 - Intro by Ivan Kocijan
Infinum
 
Wannacry
WannacryWannacry
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or Loss
Wireless Solutions NY
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
Manesh T
 
Rules for success when developing for cameras.
Rules for success when developing for cameras.Rules for success when developing for cameras.
Rules for success when developing for cameras.
Evercam - Construction Time-lapse & Project Management Cameras
 
IT PRESENTATION FLYER
IT PRESENTATION FLYERIT PRESENTATION FLYER
IT PRESENTATION FLYERLaura Reddel
 
HOW TO SPY ON SOMEONE ELSE'S VIBER
HOW TO SPY ON SOMEONE ELSE'S VIBER HOW TO SPY ON SOMEONE ELSE'S VIBER
HOW TO SPY ON SOMEONE ELSE'S VIBER
Diana_Pandey
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpointTy122987
 
Deception technology for advanced detection
Deception technology for advanced detectionDeception technology for advanced detection
Deception technology for advanced detection
Jisc
 
Parents Guide to Smartphone Safety
Parents Guide to Smartphone SafetyParents Guide to Smartphone Safety
Parents Guide to Smartphone Safety
- Mark - Fullbright
 

What's hot (16)

u2f fido security key
u2f fido security keyu2f fido security key
u2f fido security key
 
Digital security for journalists laurent eschenauer
Digital security for journalists  laurent eschenauerDigital security for journalists  laurent eschenauer
Digital security for journalists laurent eschenauer
 
Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056
 
Mobile Exhibition
Mobile ExhibitionMobile Exhibition
Mobile Exhibition
 
Infinum Android Talks #17 - Intro by Ivan Kocijan
Infinum Android Talks #17 - Intro by Ivan KocijanInfinum Android Talks #17 - Intro by Ivan Kocijan
Infinum Android Talks #17 - Intro by Ivan Kocijan
 
Wannacry
WannacryWannacry
Wannacry
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or Loss
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
Rules for success when developing for cameras.
Rules for success when developing for cameras.Rules for success when developing for cameras.
Rules for success when developing for cameras.
 
IT PRESENTATION FLYER
IT PRESENTATION FLYERIT PRESENTATION FLYER
IT PRESENTATION FLYER
 
HOW TO SPY ON SOMEONE ELSE'S VIBER
HOW TO SPY ON SOMEONE ELSE'S VIBER HOW TO SPY ON SOMEONE ELSE'S VIBER
HOW TO SPY ON SOMEONE ELSE'S VIBER
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
 
Katie Is
Katie IsKatie Is
Katie Is
 
Deception technology for advanced detection
Deception technology for advanced detectionDeception technology for advanced detection
Deception technology for advanced detection
 
Smartphone safety
Smartphone safetySmartphone safety
Smartphone safety
 
Parents Guide to Smartphone Safety
Parents Guide to Smartphone SafetyParents Guide to Smartphone Safety
Parents Guide to Smartphone Safety
 

Similar to Cell phone security lite

Guard your Android
Guard your AndroidGuard your Android
Guard your Android
Harsh Dattani
 
Spy Software
Spy SoftwareSpy Software
Spy Software
spyindia01
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
Kit O'Connell
 
The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of Security
Randy Earl
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
Geoffrey Vaughan
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
Security Innovation
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
Securing your digital life - Jason Addie
Securing your digital life -  Jason AddieSecuring your digital life -  Jason Addie
Securing your digital life - Jason Addie
DataFest Tbilisi
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
Ujjwal Acharya
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
connectsafe
 
Earthmouse: Mobile Guardian
Earthmouse: Mobile GuardianEarthmouse: Mobile Guardian
Earthmouse: Mobile Guardian
earthmouse
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
Commonwealth Telecommunications Organisation
 
Android forensics
Android forensicsAndroid forensics
Android forensics
Infosys
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
Girindro Pringgo Digdo
 
infosec_for_journalists_2016
infosec_for_journalists_2016infosec_for_journalists_2016
infosec_for_journalists_2016Justin Giles
 
Mobile security
Mobile securityMobile security
Mobile security
dilipdubey5
 
Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
Bradley W. Deacon
 
Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
Amritansh Barnwal
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
Naval OPSEC
 

Similar to Cell phone security lite (20)

Guard your Android
Guard your AndroidGuard your Android
Guard your Android
 
Spy Software
Spy SoftwareSpy Software
Spy Software
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
 
The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of Security
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Securing your digital life - Jason Addie
Securing your digital life -  Jason AddieSecuring your digital life -  Jason Addie
Securing your digital life - Jason Addie
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
 
Earthmouse: Mobile Guardian
Earthmouse: Mobile GuardianEarthmouse: Mobile Guardian
Earthmouse: Mobile Guardian
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Android forensics
Android forensicsAndroid forensics
Android forensics
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
infosec_for_journalists_2016
infosec_for_journalists_2016infosec_for_journalists_2016
infosec_for_journalists_2016
 
Mobile security
Mobile securityMobile security
Mobile security
 
Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
 
Smartphones' Security
Smartphones' SecuritySmartphones' Security
Smartphones' Security
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 

Cell phone security lite

  • 1. Your Cell Phone is Covered in Spiders An overview of the cell phone security landscape Cooper Quintin @cooperq cooper@radicaldesigns.org
  • 2. We are becoming increasingly dependent on mobile devices ● We are storing more and more data on them ● Pictures ● Videos ● Contacts ● Email ● Social Graphs ● Location History ● Etc
  • 3. ● As the amount of data increases ● The complexity increases ● The desirability increases ● The number of vulnerabilities increases
  • 4. And there are a lot of vulnerabilities!
  • 5. Things to Keep in Mind If an attacker gains physical access phone can and will be completely compromised. Also, you should assume that your phone will be compromised at some point. Generally, you will be safest if you just take the attitude that YOU SHOULD NOT TRUST YOUR PHONE
  • 6. Security is a Journey Not a Destination The more hurdles that you put up, the harder you make it for an attacker. Time to compromise > Determination of attacker Don't get demoralized! There are many things you can do to improve your security.
  • 7. Threat Model ●Random attacks ● Malicious apps ● Stolen / Lost phone ●Targeted attacker ● Law Enforcement ● Corporate Espionage ● Personal Enemies ●Signal Interception ●Your Phone Company
  • 8. Burner Phones ● No encryption ● Trivial for Forensic Investigators ● Closed Source ● Usually no Screen Lock
  • 9. iPhone The Bad ● Closed source ● Very little in the way of security apps ● Default screen lock is a four digit number ● Privacy tools that aren't free or open source The Good ● There is a stronger screen lock that can be enabled ● A couple of decent privacy apps ● Less Malware
  • 10. BlackBerry ● BEST USED IN COMBINATION WITH BES ● Otherwise about as good as any other smartphone ● BBM and Pin to Pin messaging NOT SECURE – Not encrypted, just 'scrambled' – RIM can read all of your messages if a govt demands ● Your data is only as secure as the company is trustworthy ● RIM admitted to providing backdoors to govt. in India and has helped UK and middle east govts. ● Less Malware ● Without BES, Security on Blackberry is not so good.
  • 11. Android ● IMO The best phone for security ● Open source ● Lots of security tools ● Lots of encryption tools ● Full Disk Encryption ● Good security options ● Guardian Project ● Your data is in the hands of google ● How much do you trust google?
  • 12. Lets Talk About Threat Models Again
  • 13. Law Enforcement Investigators are Looking for: ● Subscriber & Equipment Identifiers ● Contacts ● Appointment Calendar ● SMS, Text Messages, Instant Messages, Email ● Call Logs ● Photos, Audio and Video ● Documents ● Location Data
  • 14. Forensic Methods ● Recovering screen lock ● Recovery Mode ● Cellbrite and UFED ● JTAG
  • 15. Solutions ● Have a strong screen lock and a short timeout ● Don't tell them your password ● Encryption (Text Secure, LUKS, Device encryption)
  • 16. Signal Interception Threats ● Fake Cellular Towers / Drones ● USRP/GNU Radio ● Snooping as a Service ● Cellular companies will provide wiretaps without even a warrant ● Insecure apps like BBM and whatsapp Solutions ● Encrypted Calls (PrivateGSM, Redphone, SilentCircle ) ● Encrypted Text on Android (Textsecure) ● Talk in Person (This is the Most Secure)
  • 17. Lost and Stolen Phones ● Phone Finding and Remote Wipe ● Android: Lookout, Prey ● BlackBerry Protect ● Find My Iphone ● Strong Screen lock ● Will not stop a sophisticated attacker ● Report to The Provider? ● They probably don't give a damn.
  • 18. Malware Vendor and Espionage malware ● This stuff is extremely sophisticated ● FinFisher ● CarrierIQ ● Voodo carrierIQ Standard, untargeted malware ● Personal Data Theft ● Premium SMS ● The usual suspects (spyware, trojans, phishing) ● Facebook, Angry Birds?
  • 19. Malware Solutions ● Be careful what you install! ● Don't install apps from untrusted sources ● Don't run updates when on insecure networks ● Anti Virus won't save you! ● Don't assume that because you have an iPhone or Blackberry that you are immune to malware ● Use the same precautions as you would on any computer.
  • 20. Other Attacks ● NFC ● QR Phishing ● Baseband Attacks
  • 21. Disk Encryption ● Exists on Android ● Exists on Blackberry if you have BES ● Does not exist on iPhone ● Vulnerable to many different attacks ● You should NOT rely solely on disk encryption.
  • 22. Call Encryption ● SecureGSM ● Android: Redphone, OSTN
  • 23. To Root or Not to Root (AKA Jailbreaking) Rooting your phone is the process of gaining super administrator control over your phone. This means you can do ANYTHING YOU WANT To your phone. Including mess it up in fantastic ways!
  • 24. To Root or Not to Root The Good ● Custom Firmware ● Better Security Tools ● Remove Spyware ● More Cool Apps ● Performance Improvements ● Tinkering is Fun! The Bad ● Can significantly decrease security ● You can permanently break your phone ● Will Void Your Warranty
  • 25. In Conclusion... ● It's healthy to be paranoid about your phone ● Don't loose your phone! ● Trust what you install (Open Source) ● Root and install custom firmware ● Use a stronger screen lock ● Audit your phone ● Encrypt Everything!
  • 26. Thank You! Cooper Quintin cooper@radicaldesigns.org Twitter: @cooperq Jabber: cooperq@jabber.ccc.de OTR: 9B3470B9 B1F10651 B5840FEB 026D6CF7 2D949F6F PGP: 75FB9347 FA4B22A0 5068080B D0EA7B6F F0AFE2CA