<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[CryptoAUSTRALIA Blog]]></title><description><![CDATA[News, events and updates]]></description><link>https://blog.cryptoaustralia.org.au/</link><image><url>https://blog.cryptoaustralia.org.au/favicon.png</url><title>CryptoAUSTRALIA Blog</title><link>https://blog.cryptoaustralia.org.au/</link></image><generator>Ghost 1.19</generator><lastBuildDate>Sat, 24 Feb 2018 19:10:16 GMT</lastBuildDate><atom:link href="https://blog.cryptoaustralia.org.au/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[ANNOUNCEMENT: Jeremiah Cruz joins CryptoAUSTRALIA]]></title><description><![CDATA[Introducing Jeremiah Cruz as CryptoAUSTRALIA's Project Manager. Jeremiah will work with CryptoAUSTRALIA on our 'Digital Privacy for Professionals' initiative as a volunteer.]]></description><link>https://blog.cryptoaustralia.org.au/2018/01/17/jeremiah-cruz-joins-cryptoaustralia/</link><guid isPermaLink="false">5a5ea0111485011fbcea1b0d</guid><category><![CDATA[Announcements]]></category><dc:creator><![CDATA[CryptoAUSTRALIA]]></dc:creator><pubDate>Wed, 17 Jan 2018 03:12:26 GMT</pubDate><media:content url="https://blog.cryptoaustralia.org.au/content/images/2018/01/cover.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://blog.cryptoaustralia.org.au/content/images/2018/01/cover.jpg" alt="ANNOUNCEMENT: Jeremiah Cruz joins CryptoAUSTRALIA"><p>FOR IMMEDIATE RELEASE:</p>
<p>Introducing <a href="https://www.linkedin.com/in/jeremiah-cruz-352163117/">Jeremiah Cruz</a> as CryptoAUSTRALIA's Project Manager</p>
<p>We are pleased to announce that Jeremiah will work with CryptoAUSTRALIA on our <a href="https://blog.cryptoaustralia.org.au/2017/12/12/2017-year-in-review-and-future-plans/">'Digital Privacy for Professionals' initiative</a> as a volunteer throughout 2018.</p>
<p>Jeremy is a teacher and passionate gamer who sees the weird relationship between tech, law, games and culture. He co-wrote a paper assessing major ISPs password policies and the potential threat they posed to the end users. Jeremy is also a passionate tutor who teaches kids coding.</p>
<p>CryptoAUSTRALIA is a leading authority promoting a society where Australians can defend their privacy. CryptoAUSTRALIA empowers privacy concerned citizens through hands-on education and research relating to digital privacy and online security.</p>
</div>]]></content:encoded></item><item><title><![CDATA[How to Pick the Best Threat-blocking DNS Provider (Updated)]]></title><description><![CDATA[Alternative DNS services promises to offer protection from malware, ransomware and phishing. These providers promise some level of threat protection, but how good are they? Let's find out!]]></description><link>https://blog.cryptoaustralia.org.au/2017/12/23/best-threat-blocking-dns-providers/</link><guid isPermaLink="false">5a3dbaf31485011fbcea1af4</guid><category><![CDATA[Domain Name System]]></category><category><![CDATA[Pi-hole]]></category><category><![CDATA[Malware]]></category><dc:creator><![CDATA[Gabor Szathmari]]></dc:creator><pubDate>Sat, 23 Dec 2017 11:24:44 GMT</pubDate><media:content url="https://blog.cryptoaustralia.org.au/content/images/2017/12/dns3-cover-2.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/dns3-cover-2.jpg" alt="How to Pick the Best Threat-blocking DNS Provider (Updated)"><p>A handful of alternative DNS services offer protection from malware, ransomware and phishing. Providers like OpenDNS and Quad9 can blackhole DNS requests for blocking network traffic associated with botnets, phishing and exploits. These DNS providers promise some level of threat protection, but what do they know? Do they know things? Let's find out!</p>
<p>CryptoAUSTRALIA has compared the threat-blocking performance of ten different DNS providers. Our assessment can reveal that Norton ConnectSafe, SafeDNS and Strongarm have managed to block the largest number of harmful websites.</p>
<h2 id="comparingdnsproviders">Comparing DNS Providers</h2>
<p><a href="https://blog.cryptoaustralia.org.au/2017/12/12/introduction-malware-blocking-dns">In our previous article</a>, we introduced a range of malware blocking and anti-phishing alternative DNS services. Each of those boasts its anti-malware and anti-phishing features, but how do we know which service is the most effective? To our best knowledge, there are no independent tests measuring the actual performance of these services.</p>
<p>Therefore, CryptoAUSTRALIA is releasing a new utility called <strong>DiNgoeS</strong> today. This tool can measure and compare the actual threat-blocking performance of ten different DNS providers.</p>
<h3 id="howdingoesworks">How DiNgoeS Works</h3>
<p>Our new tool is straightforward. DiNgoeS downloads a list of domains known for malicious activity from the hpHosts service first. Then it attempts to resolve each domain with every threat-blocking DNS provider. If DiNgoeS finds that a DNS response is blackholed, it considers the blocking action successful.</p>
<p>Once all domains are resolved, DiNgoeS generates a simple report (as shown below). The numbers show how many domains were successfully blocked by each alternative DNS provider.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/dingoes-screenshot.png" alt="How to Pick the Best Threat-blocking DNS Provider (Updated)"></p>
<p>In addition to the simple summary, DiNgoeS also generates a detailed CSV report of the threat blocking capabilities. The detailed report can be used for further calculations or trend graphs.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/dingoes-csv-report.png" alt="How to Pick the Best Threat-blocking DNS Provider (Updated)"></p>
<p>Our tool currently supports OpenDNS, Comodo (2x), Norton ConnectSafe, Quad9, Neustar, SafeDNS, Safesurfer, Strongarm and Yandex.DNS. As for threat data, DiNgoeS relies on three <a href="https://hosts-file.net/">hpHosts</a> feeds: exploits (EXP), malware (EMD) and phishing (PSH).</p>
<p>DiNgoeS is now <a href="https://github.com/cryptoaustralia/dingoes">available on GitHub</a> and pull requests are welcome.</p>
<h2 id="initialfindings">Initial Findings</h2>
<p>We pulled a fresh list of 500 domains known from malicious activity (EXP, EMD and PSH respectively) on 23 December, and ran DiNgoeS from four different locations (Sydney x2, Frankfurt and N. Virginia). The reason behind the four scans was to iron out the DNS resolution errors (e.g. network congestion, throttling) by taking the average of the four separate results.</p>
<p>Our first results show that Norton ConnectSafe, SafeDNS and Strongarm has managed to prevent the largest number of threats from the ten providers under this assessment.</p>
<p><a href="https://blog.cryptoaustralia.org.au/content/images/2017/12/report-diagram-23-12-2017.png"><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/report-diagram-23-12-2017.png" alt="How to Pick the Best Threat-blocking DNS Provider (Updated)"></a></p>
<p>The highest number of websites was blocked by <strong>Norton ConnectSafe</strong>. This service was able to stop the largest number of the threats. Interestingly, ConnectSafe excels at blocking browser and OS exploits. As for its anti-phishing and anti-malware capabilities, the service is as effective as the others behind. Note that the total number is a bit exaggerated compared to the rest of the herd, as ConnectSafe was hijacking about 300 domains in the EXP category, even though these domains were already offline.<sup class="footnote-ref"><a href="#fn1" id="fnref1">[1]</a></sup></p>
<p>The runner-ups are <strong>SafeDNS</strong> and <strong>Strongarm</strong>. Although they both managed to block the same amount of domains, there is a subtle difference between the two services. While SafeDNS did block a significant number of domains associated with malware activity, Strongarm did perform well with blocking phishing content.</p>
<p>The next in the line is <strong>Quad9</strong>. This service did manage to block a high-number of malware-related domains. The explanation is probably that the block list of this service is based on the <a href="https://exchange.xforce.ibmcloud.com/">IBM X-Force</a> threat intelligence service. Unfortunately, the DNS service did not seem to block too many exploits and phishing domains this time.</p>
<p>The following services are <strong>Neustar Free Recursive DNS</strong> and <strong>Safesurfer</strong>. Both services seem to perform all right in the malware and exploits categories. They did not perform well with phishing. To Safesurfer's defence, it is advertised as an anti-pornography filter, albeit the <a href="https://www.safesurfer.co.nz/faqs/">FAQ claims the service can block malware, phishing and botnet activity</a> as well.</p>
<p><strong>OpenDNS Home</strong> performed better-than-average with malware-related domains. Sadly, the exploit-blocking capabilities seem to be inadequate, as OpenDNS managed to block zero domains from the hpHosts EXP feed.</p>
<p>The next two are <strong>Comodo SecureDNS</strong> and <strong>Comodo Shield</strong>. They managed to block a fair number of malware-related domains, but they did not block much in the other two categories. Interestingly, the results are quite similar, probably because the same company is operating both of these services.</p>
<p>Finally, the last one on the list is <strong>Yandex.DNS</strong>. This service has barely managed to block any malicious sites from any of the hpHosts feeds, although Yandex.DNS boasts its <a href="https://dns.yandex.com/">malware-blocking capabilities</a>. Maybe the service can block more threats targeting Yandex's primary audience in Russia.</p>
<h3 id="thesmallprint">The Small Print</h3>
<p>Our assessment is not meant to be comprehensive, unbiased or complete.</p>
<p>Firstly, we relied on threat data from a single provider only: <em>hpHosts</em>, which was an arbitrary choice. If any of the alternative DNS providers happen to source threat data from hpHosts, it probably distorts our results.</p>
<p>Second of all, occasional DNS resolution errors did occur due to intermittent network issues and throttling. As these errors were unpredictable and random, we ran the scans from four different locations (Sydney x2, Frankfurt and North Virginia) and took the average of the results.</p>
<p>We ran the scan on a single day (2017-12-23), so the results might be different if the scans are rerun at a later date.</p>
<p>Despite these limitations, we believe that the assessment gives our readers a general idea about how the different alternative DNS providers perform compared to each other.</p>
<p>The raw CSV reports generated by DiNgoeS, and our calculations are <a href="https://dl.cryptoaustralia.org.au/files/threat-blocking-capabilities-report-2017-12-23.zip">available to download here</a>. Comments are welcome on <a href="https://twitter.com/CryptoAustralia">Twitter</a> or <a href="https://cryptoaustralia.org.au/contact">in private</a>.</p>
<h2 id="summary">Summary</h2>
<p>A handful of alternative DNS providers provide threat-blocking capabilities. These services could protect laptops, smartphones and other devices from malware, ransomware and phishing by blackholing DNS requests.</p>
<p>As the actual performance of these threat-blocking DNS providers was previously unknown, CryptoAUSTRALIA has developed a new tool for measuring the effectiveness of these services. <a href="https://github.com/cryptoaustralia/dingoes">DiNgoeS</a>, our new command-line tool, can calculate the total number of domains each DNS service manages to block.</p>
<p>Our assessment found that alternative DNS providers, such as Norton ConnectSafe, SafeDNS and Strongarm live up to the expectations, while other services could improve in certain areas.</p>
<p><em>This article is a revision of our previous report published on 21/12/2017. Due to a bug in DiNgoeS, our Quad9 results were inaccurate. We quickly fixed the bug and re-ran the assessment. We thank the Quad9 engineers for drawing our attention to the issue.</em></p>
<p><em>CryptoAUSTRALIA is a not-for-profit organisation running hands-on workshops for privacy concerned-citizens and professionals. <a href="https://cryptoaustralia.org.au/newsletter">Sign up for the newsletter</a> or <a href="https://twitter.com/CryptoAustralia">follow us on Twitter</a> for the latest updates. Image courtesy of <a href="https://pixabay.com/en/bricks-wall-stones-structure-459299/">Pixabay</a>.</em></p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="fn1" class="footnote-item"><p>We did not correct the results with these false-positives, as other services did exhibit a similar behaviour to a smaller extent <a href="#fnref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
</div>]]></content:encoded></item><item><title><![CDATA[Introduction to Malware-blocking DNS Services]]></title><description><![CDATA[How can you protect your family from malware and phishing with just a little effort? Various alternative DNS providers with built-in threat blocking capabilities are now available to the public. This article helps you pick the right one for keeping your devices safe and secure.]]></description><link>https://blog.cryptoaustralia.org.au/2017/12/19/introduction-malware-blocking-dns/</link><guid isPermaLink="false">5a10250a300862707214b6b8</guid><category><![CDATA[Domain Name System]]></category><category><![CDATA[Pi-hole]]></category><category><![CDATA[Malware]]></category><dc:creator><![CDATA[Gabor Szathmari]]></dc:creator><pubDate>Tue, 19 Dec 2017 04:30:00 GMT</pubDate><media:content url="https://blog.cryptoaustralia.org.au/content/images/2017/12/cover-1.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/cover-1.jpg" alt="Introduction to Malware-blocking DNS Services"><p>How can you protect your family from malware and phishing with just a little effort? Various alternative DNS services with built-in threat blocking capabilities are now available to the public. This article introduces these public DNS services and helps you pick the right one for keeping your devices safe and secure.</p>
<p>There are different products and services available for blocking malware, ransomware and deceptive websites, including a myriad of <a href="https://blog.cryptoaustralia.org.au/2017/08/24/why-free-antivirus-better-than-no-av-and-worse-than-paid-av/">anti-virus software</a>, the <a href="https://wiki.mozilla.org/Security/Safe_Browsing">Google Safe Browsing browser integration</a>, or browser plugins like <a href="https://blockade.io/">Blockade</a>. In our previous article, we <a href="https://blog.cryptoaustralia.org.au/2017/11/15/favourite-block-lists-cryptoaustralia/">introduced a handful of block lists</a> that gives an additional layer of protection for your Pi-hole.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/malware_screenshot.jpg" alt="Introduction to Malware-blocking DNS Services"></p>
<h2 id="sophisticatedthreats">Sophisticated Threats</h2>
<p>Anyone can inadvertently navigate to deceptive websites, and the purpose of these products is to prevent the web browser from loading the webpage or downloading a file.</p>
<p>How do these mistakes happen? Deceptive emails may contain web links pointing to pixel-perfect copies of login pages, or malvertising can load fake Flash updates or exploit kits in a hidden iframe. These attacks are getting more and more sophisticated, so out-of-date pieces of advice such as <em>&quot;do not click on links in emails with poor English&quot;</em> are becoming less relevant.</p>
<h2 id="blocklistissues">Block List Issues</h2>
<p>Furthermore, each website blocking technique (anti-malware, Google Safe Browsing, etc.) has its limitations, so it is a sensible decision to rely on multiple layers of protection.</p>
<p>The first issue is the delay. The latest <a href="https://www.webroot.com/download_file/view/946">WebRoot Threat Report suggests</a> that <em>&quot;84% of all phishing sites last less than 24 hours&quot;</em>. In other words, time is crucial: the sooner a website gets on the block list, the better. As standard blocking services (Safe Browsing, anti-malware products, etc.) acquire reputation data from different sources, malicious domains may end up too late on their block lists.</p>
<p>Secondly, none of the website blocking services is meant to be comprehensive. While more cautious providers may prefer to keep their customers happy by keeping false-positives low, others may focus on blocking targeted attacks only. The block lists are curated by humans one way or the other, which inherently makes the block lists biased.</p>
<p>Because reaction time is crucial, and block lists are not comprehensive, we should not rely on a single technology.</p>
<h2 id="dnsbasedblocking">DNS Based Blocking</h2>
<p>As we learned on the <a href="https://blog.cryptoaustralia.org.au/2017/11/02/pi-hole-network-wide-ad-blocker/">Pi-hole workshop</a>, DNS blackholing is a technique that can be used for blocking malicious activity. The Pi-hole blocks ads, trackers, C2 and phishing domains by responding to DNS queries on the block list with NXDOMAIN (i.e. domain not found).</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/strongarm-blocked.jpg" alt="Introduction to Malware-blocking DNS Services"></p>
<p>A similar approach is also offered by a range of alternative DNS servers. The premise of these public DNS services is analogous to the Pi-hole: if your computer tries to resolve the domain name of a malicious website (e.g. <code>badsite.com</code>), the server hijacks the DNS request. Public servers typically respond with a false IP address pointing to an informative <strong>'this website has been blocked'</strong> page.</p>
<p>DNS-based blocking is very simple, and it only takes a few steps to configure. You can either change the upstream DNS servers either on your <a href="https://www.lifewire.com/how-to-change-dns-servers-on-most-popular-routers-2617995">home router</a> or <a href="https://github.com/pi-hole/pi-hole/wiki/Upstream-DNS-Providers">your Pi-hole device</a>. Once DNS queries start going through the third-party servers, you are all set.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/pihole-dns.jpg" alt="Introduction to Malware-blocking DNS Services"></p>
<h3 id="listofthreatblockingdnsservices">List of Threat-blocking DNS Services</h3>
<p>We are aware of the following DNS services offering malware blocking and anti-phishing capabilities to home users (as of December 2017):</p>
<ul>
<li><a href="https://www.opendns.com/">OpenDNS Home</a> (comes with admin panel with optional user registration) - <code>208.67.222.222</code>, <code>208.67.220.220</code></li>
<li><a href="https://www.comodo.com/secure-dns/">Comodo Secure DNS</a> - <code>8.26.56.26</code>, <code>8.20.247.20</code></li>
<li><a href="https://connectsafe.norton.com/configureRouter.html">Norton ConnectSafe</a> - <code>199.85.126.10</code>, <code>199.85.127.10</code></li>
<li><a href="https://www.quad9.net/">IBM Quad 9</a> - <code>9.9.9.9</code></li>
<li><a href="https://www.neustar.biz/security/dns-services/free-recursive-dns-service">Neustar Free Recursive DNS</a> - <code>156.154.70.2</code>, <code>156.154.71.2</code></li>
<li><a href="https://www.safedns.com/">SafeDNS</a> (comes with admin panel with optional user registration) - <code>195.46.39.39</code>, <code>195.46.39.40</code></li>
<li><a href="https://shield.dome.comodo.com/">Comodo Shield</a> (comes with admin panel with optional user registration) - <code>8.26.56.10</code>, <code>8.20.247.10</code></li>
<li><a href="https://strongarm.io/">Strongarm</a> (comes with admin panel with optional user registration) - <code>54.174.40.213</code>, <code>52.3.100.184</code></li>
<li><a href="https://dns.yandex.com/advanced/">Yandex.DNS</a> - <code>77.88.8.88</code>, <code>77.88.8.2</code></li>
<li><a href="https://www.safesurfer.co.nz/">SafeSurfer</a> (paid service, main focus is blocking adult websites) - <code>104.155.237.225</code>, <code>104.197.28.121</code></li>
</ul>
<p><em>Disclaimer: Be aware that organisations operating these services will have access to your DNS resolution history, which may allow them to reconstruct your browsing history. If you have privacy concerns over this, have a look at our latest guide on <a href="https://blog.cryptoaustralia.org.au/2017/12/05/build-your-private-dns-server/">self-hosted malware-blocking DNS servers</a> instead.</em></p>
<h3 id="butwaittheresmore">But Wait, There's More!</h3>
<p>Certain DNS providers come with an optional admin panel, which typically allows you to:</p>
<ul>
<li>View DNS activity on your network (domains allowed/blocked)</li>
<li>Block website categories (adult, gambling, social media, etc.)</li>
<li>Block individual domains (e.g. <code>facebook.com</code>)</li>
</ul>
<p>The following screenshot shows how you can block website categories with Comodo Shield:</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/comodo-categories-1.jpg" alt="Introduction to Malware-blocking DNS Services"></p>
<h2 id="summary">Summary</h2>
<p>Malware-blocking and anti-phishing DNS servers can be an excellent companion to other anti-malware services, such as anti-malware products and browser plugins. It takes just a few clicks to change the default DNS servers (provided by your ISP) to these third-party servers with the additional protection built-in. Be careful, though! Your DNS requests go a third-party and this may raise some privacy concerns.</p>
<p>Great, so there are almost a dozen providers available. But how we can pick the best DNS service with the most advanced anti-malware capabilities? Their marketing pitch makes them all look the same. Which service is the lemon? <a href="https://blog.cryptoaustralia.org.au/2017/12/23/best-threat-blocking-dns-providers/">In the second part of this article</a>, we help you pick the right DNS service provider.</p>
<p><em>Image courtesy of <a href="https://pixabay.com/en/dna-deoxyribonucleic-acid-dns-1500076/">Pixabay</a></em></p>
</div>]]></content:encoded></item><item><title><![CDATA[Burgers and Privacy – Interview with Jon Lawrence]]></title><description><![CDATA[Karissa Breen interviews Jon Lawrence, the Executive Officer of the Australian digital rights group 'Electronic Frontiers Australia']]></description><link>https://blog.cryptoaustralia.org.au/2017/12/14/burgers-with-jon-lawrence-efa/</link><guid isPermaLink="false">5a2d20ebfd7eed393d873992</guid><dc:creator><![CDATA[Karissa A. Breen]]></dc:creator><pubDate>Thu, 14 Dec 2017 04:30:00 GMT</pubDate><media:content url="https://blog.cryptoaustralia.org.au/content/images/2017/12/cover-5.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/cover-5.jpg" alt="Burgers and Privacy – Interview with Jon Lawrence"><p>Since I got in the middle of the privacy community in Sydney, I am particularly interested the challenges both vulnerable individuals and organisations face. Just a few weeks ago, I had an unpleasant experience at the doctor whereby <a href="https://blog.cryptoaustralia.org.au/2017/10/03/whats-up-doc/">my sensitive health details got mixed up with someone else's</a>. Various organisations work hard in Australia to not let things like this happen to anyone.</p>
<p>One of the groups I have been following recently is Electronic Frontiers Australia (EFA). It grabbed my attention recently as a fresh new board got elected just last month and since then, the community around the organisation seems to be revitalised. EFA is not only one of the biggest privacy and digital rights group in Australia, but it is working for the community for more than 2X years.</p>
<p>What I found personally interesting is that the EFA chair is a woman for the first time ever, and there are a couple of initiatives since the election to help vulnerable women such as victims of domestic abuse.</p>
<p>So, I got very excited when I learned that the EFA's executive officer, Jon Lawrence was in town. We quickly arranged a meeting at a burger joint to chit-chat about the organisation's plans for the new year over.</p>
<p>We sat down at Down 'n' Out, a weird clone of the famous chain from California. Although I am a bit familiar with Jon's work, this was my first time meeting him face to face. Although he was on the road for days, he was <em>[It was the end of the day, so by this point we were both feeling pretty hungry and keen to start our chat]</em>. Once our order was taken, Jon did not hesitate to kick off the conversation.</p>
<p><strong>Cast:</strong></p>
<ul>
<li><strong>Jon:</strong> <a href="https://twitter.com/jon_lawrence">Jon Lawrence</a>, Executive Officer, Electronic Frontiers Australia</li>
<li><strong>KB:</strong> <a href="https://twitter.com/iamkarissabreen">Karissa A. Breen</a>, Technologist, Karissa Breen Industries</li>
<li><strong>Nick:</strong> <a href="https://twitter.com/iamkarissabreen">Nick Kavadias</a>, Former EFA Board Member, now CryptoAUSTRALIA</li>
</ul>
<p><strong>KB:</strong><br>
<em>&lt;&lt; introductions, small talk&gt;&gt;</em></p>
<p><strong>Jon:</strong><br>
<em>&lt;&lt; small talk &gt;&gt;</em></p>
<p><strong>KB:</strong><br>
So there's a couple of questions that I wanted to ask collectively. But then, maybe it's more of a conversation about what you've built up.</p>
<p><strong>Jon:</strong><br>
Sure.</p>
<p><strong>KB:</strong><br>
I noticed that you guys' had a press release about having a new female apart of your board. Why was it such a big deal that your first woman had been elected as the EFA chair? <em>[Can be visited at: <a href="https://www.efa.org.au/2017/10/16/first-female-leadership/">https://www.efa.org.au/2017/10/16/first-female-leadership/</a>]</em></p>
<p><strong>Jon:</strong><br>
Well, it's been a long time coming. I think because of the challenges we've had as an organisation for quite a long time is, you know, diversity, generally.</p>
<p><strong>KB:</strong><br>
Yep, totally.</p>
<p><strong>Jon:</strong> And gender diversity, so we've obliged part of that. I mean, a sort of core... Across the quarter base is kind of your technical community, which does have a... You know, there is a gender bias in our community. So... But that's not really... There are other organisations that we work with that have done great work on this sort of stuff. In our communities and in Australia particularly. They've done a really good job.</p>
<p><strong>KB:</strong><br>
Yes.</p>
<p><strong>Jon:</strong><br>
And it's certainly something that we've been trying to do, and I think it's exciting that we've had that breakthrough. I think, if anything, it's going to mean that, you know, there's an example there and it shows to other women, but potentially other underrepresented groups that there's an opportunity for them to get involved, and help the organization.</p>
<p>And I think it's inevitable that having female leadership will make it more likely that we do things that are creating the sort of environments that attract more women, to the environment.</p>
<p>I've certainly never been convinced that I've had the answer to those sort of questions, so.</p>
<p><strong>KB:</strong><br>
So, I guess on the back of that, how do you think more women are getting involved with EFA?</p>
<p><strong>Jon:</strong><br>
Well, I mean you know, there certainly are women in that sort of tech industry and tech field, and I know there's a lot of great women doing some great leadership stuff, and we've certainly had some of them around.</p>
<p>We do tend to see, I think, one of our other fallbacks is sort of the policy area, so it tends be a lot worse, and the gender balance there is, if anything, probably the other way. So, you know, that's certainly one area that we've seen a lot of women come through. There's some fantastic women in that sector. Generally I think that's more diverse than the tech sector, at least it used to be. I don't know how close the stereotype is to reality, but it's certainly something the tech sector has struggled with for a while.</p>
<p><strong>KB:</strong><br>
You are absolutely correct Jon. What would be... the biggest issue for Australians moving forward, given everything that's going on in the market?</p>
<p><strong>Jon:</strong><br>
Well, I think the sort of, the kind of comprehensive, ubiquitous surveillance capabilities that come into place are pretty unprecedented and will be essentially impossible to wind back once they're in place.</p>
<p><strong>KB:</strong><br>
…yes, that is true.</p>
<p><strong>Jon:</strong><br>
You know it is true that lots of people willingly allow themselves to be surveilled on Facebook now that it works like that.</p>
<p><strong>KB:</strong><br>
Yes</p>
<p><strong>Jon:</strong><br>
But, of course, there's no other choice there. Everyone uses Facebook. Some people, well, a lot of people are actually able to, use pseudonyms and protect their identity, so a lot of minority groups have those sorts of issues. But this also includes teachers, judges and police officers. They need to be able to have an online existence without necessarily being social with it.</p>
<p>So it's a bit of a chance, I guess, but yeah. We've had the manual for data retention, so all the details of where you're going on your phone, the phone calls you're making, and who you're making them to. That's all now being recorded. We've got this facial recognition database, which it essentially going to have every adult in Australia in it. That's pretty impressive stuff, and there's not a whole lot, well it doesn't leave a whole lot of space for private activity.</p>
<p><strong>KB:</strong><br>
Is there anything else happening that worries you recently?</p>
<p><strong>Jon:</strong><br>
The other thing that's happening - and this is in the Summerland and Elmerland and - the cash is essentially disappearing from society as well, so it will soon be affect... it's not long before it will be effectively impossible to do anonymous transactions.</p>
<p><strong>KB:</strong><br>
Yep. The traceability will become...</p>
<p><strong>Jon:</strong><br>
Absolutely, so you know, it's...</p>
<p><strong>KB:</strong><br>
Vacant.</p>
<p><strong>Jon:</strong><br>
Yeah. And you know, you put those</p>
<p>Nick:<br>
This is yours! <em>[Hands over the burger tray]</em></p>
<p><strong>KB:</strong><br>
Thank you so much! <em>[Eyes light up]</em></p>
<p><strong>Nick:</strong><br>
Did you get a burger, Jon?</p>
<p><strong>Jon:</strong><br>
Yeah.</p>
<p><strong>Nick:</strong><br>
Where's the burger order?</p>
<p><strong>KB:</strong><br>
Oh.</p>
<p><strong>Nick:</strong><br>
Sorry.</p>
<p><strong>KB:</strong><br>
That's alright. Thank you, I got fries</p>
<p><strong>Nick:</strong><br>
Do you need cutlery or anything?</p>
<p><strong>Jon:</strong><br>
I'll just take a napkin thanks… Where was I? So..</p>
<p><strong>KB:</strong><br>
Anonymous transactions... <em>[giggles]</em></p>
<p><strong>Jon:</strong><br>
Yeah, we're always told, you know, that there's computing capabilities innate in terrorism. I mean, for our children, and the reality is that yes, they're almost certainly helpful in those regards, but... they will be useful for developing.</p>
<p><strong>KB:</strong><br>
Yes…</p>
<p><strong>Jon:</strong><br>
And that's our number one, and that list will grow over time, and that's just how these things work.</p>
<p>I think Australians are generally pretty trusting of our government, so we're really not the sort of anti-authority society that we like to think we are. And what make it worse...</p>
<p><strong>KB:</strong><br>
Yes… You mean we're relatively compliant?</p>
<p><strong>Jon:</strong><br>
Absolutely!</p>
<p><strong>KB:</strong><br>
Hmmm, yes.</p>
<p><strong>Jon:</strong><br>
The good thing, I think, about Australians…</p>
<p><strong>KB:</strong><br>
We have road rules that are implemented (giggles)</p>
<p><strong>Jon:</strong><br>
Yes. We're actually a pretty law abiding society, and pretty happy to comply with the government, and pretty happy to give government pretty broad counts. And, while we have relatively, sort of, benign governments, it's rare that community situations where things get nasty, or war breaks out. It's not possible...</p>
<p><strong>KB:</strong><br>
No one's well known…</p>
<p><strong>Jon:</strong><br>
All of a sudden you've got the infrastructure set up for a police attack.</p>
<p><strong>KB:</strong><br>
Do you believe Australia's are almost walking into this next phase of evolution almost blindly?</p>
<p><strong>Jon:</strong><br>
Yeah, I think so. You know, you look at the UK who are a couple steps ahead of us at the present.</p>
<p><strong>KB:</strong><br>
Yep</p>
<p><strong>Jon:</strong><br>
Yeah, that's definitely helping. And London, for example, is like one CCTV camera for every three people. I think we certainly are seeing - and this is has been building over the last year or so.</p>
<p><strong>KB:</strong><br>
Yep</p>
<p>So we had the census that got a lot of people talking about... privacy issues on the front page. The central leak kid fiasco - that sort of fit into that. Facial recognition also. These are now becoming mainstream issues, and being talked about in the mainstream media in a way that we haven't seen... I haven't really seen since I've been involved in it.</p>
<p>So in a sense, that's quite encouraging because, at least, the conversation has been had. I'm in the situation now, where I talk to my family and they know exactly what I'm talking about!</p>
<p><strong>KB:</strong><br>
Well…</p>
<p><strong>Jon:</strong><br>
I was talking to my sister when I said I was speaking with the media today, she goes, &quot;Oh, is it about facial recognition software?&quot; And I went, &quot;yes, yes it is.&quot;</p>
<p><strong>KB:</strong><br>
Yasss!</p>
<p><strong>Jon:</strong><br>
Yes, I thought they might be interested in that, so. You know, having that stuff in the mainstream media is...</p>
<p><strong>KB:</strong><br>
Sure. Please continue.</p>
<p><strong>Jon:</strong><br>
Get people talking about it, then hopefully, we can work with the Australian electronic organisations to build the level of education and knowledge around these things and in the wider community. But also, within political class as well. There are some politicians, of course, that I guess are really good on this stuff, but we have to step it up with others.</p>
<p><strong>KB:</strong><br>
Yes.</p>
<p><strong>Jon:</strong><br>
I’ve been here in both the major parties as well. They don't speak out so much because it is the party rules, but they certainly exist. But on the whole, the level of, understanding and conceptual understanding... They don't need to know the technical exams about roads. They need to understand things in a sort of conceptual, architectural way. That's very important.</p>
<p>We thought Malcolm Turnbull was... I think Turnbull does actually understand these things certainly in a way that he's read a sense of it.</p>
<p><strong>KB:</strong><br>
Yeah, wow.</p>
<p><strong>Jon:</strong><br>
But that hasn't helped us in the way that some would have liked.</p>
<p><strong>KB:</strong><br>
So how do you think we can collaborate... to help Australia? What would be your advice on how to do this better and a more unified approach. From my point of view, it's quite disparate at the moment. What would be your advice on the education piece, and do you think it should be incumbent for massive enterprises to talk more openly about this?</p>
<p><strong>Jon:</strong><br>
I think there is a natural division of labor between peer favorites and frontal policy focus and organizations because Australia is out there, on the ground talking about the educational and training working in Australia, and of course, we can work together on that better.</p>
<p>I think there's a real role for the commercial sector to play on this. I think there's a number of sectors that do this already. I mean banks, for obvious reasons, have a very clear interest in making sure their customers have a say in what efficiency looks like, and how encryption works and so forth, and they've done a really good job!</p>
<p>I think on the privacy side of things, ironically, I think Facebook has done a great job…</p>
<p>…and has probably done as much with telling people about privacy as anyone else. Facebook and Google have got lot better over the last few years about telling people. They are going to real efforts to tell people about their privacy policies.</p>
<p><strong>KB:</strong><br>
Yes, that is true.</p>
<p><strong>Jon:</strong><br>
Pushing out prompts to people to go and look at their privacy settings and so forth. They've got a lot better at doing that.</p>
<p>That doesn't stop the whole organization on Facebook is pretty much anti-privacy, but still I think they take it seriously because at the end of the day, if their users don't trust them, they'll go away.</p>
<p><strong>KB:</strong><br>
They wouldn't have a platform…</p>
<p><strong>Jon:</strong><br>
Yeah.</p>
<p><strong>KB:</strong><br>
There’s only one last question. Coming back to being together-unified, we talked about the disparity between... do you think it's even worthwhile having some sort of a front facing ambassador or champion to really drive this forward?</p>
<p><strong>Jon:</strong><br>
Yeah, I mean somebody like Scott Ludlam on this sort of issue... He can pull a crowd. I mean he can get radio attention in a way that, I never will. Yeah, and I think...</p>
<p><strong>KB:</strong><br>
Well…</p>
<p><strong>Jon:</strong><br>
Well, you know. But I mean he's very good at it, and he's got fantastic hair and he has seventy-thousand Twitter followers and...</p>
<p>No I think it is important to have high spokes people because that's how you get attention.</p>
<p><strong>KB:</strong><br>
Yeah, a crowd brings a crowd!</p>
<p><strong>Jon:</strong><br>
But it will be interesting in... As you told me earlier, you know, the greens are introducing Bill Right. I think that's going to be a very interesting conversation, and you know, policy discussion. I think... I wouldn't be that optimistic about it happening very short term, but you know... It's something the labor party would support in principal.</p>
<p>I've spoken to people on this coalition side of this...</p>
<p><strong>KB:</strong><br>
Yep.</p>
<p><strong>Jon:</strong><br>
...And I don't think... You know they sort of tend to shy away from, sort of, commemoration sorts of things.</p>
<p><strong>KB:</strong><br>
Yep.</p>
<p><strong>Jon:</strong><br>
So I don't know if there'll be too much yet. But it will be interesting, and you know, if we can get any additional protection, you know, any additional enforcement protections we can get on privacy and so on and so forth are a step forward because there really are so few of them, and you know, they're coming into constitution so…</p>
<hr>
<p>After a pretty good chat with Jon, we had eaten all burgers and fries. It was interesting as the chat was so casual and it was a great way to find out more about what the EFA does. If you too are interested in finding out more or getting involved, please <a href="https://www.efa.org.au/">check out some of their stuff here</a>. You can <a href="https://www.efa.org.au/get-involved/">sign-up as a volunteer</a> on the EFA website or subscribe to the <a href="http://lists.efa.org.au/mailman/listinfo/privacy">EFA Privacy mailing list</a>.</p>
<p>The End.</p>
<p><em>Image courtesy of <a href="https://pixabay.com/en/burger-hamburger-roll-barbecue-2762371/">Pixabay</a></em></p>
</div>]]></content:encoded></item><item><title><![CDATA[CryptoAUSTRALIA's 2017 Year in Review and Future Plans]]></title><description><![CDATA[Wow, 2017 was a wild ride! CryptoAUSTRALIA is one-year-old this month, and we could not have done it without the generous support of the community. In this article, we express our gratitude to our friends and outline our exciting plans for 2018.]]></description><link>https://blog.cryptoaustralia.org.au/2017/12/12/2017-year-in-review-and-future-plans/</link><guid isPermaLink="false">5a2d12e4fd7eed393d873990</guid><category><![CDATA[Announcements]]></category><dc:creator><![CDATA[Gabor Szathmari]]></dc:creator><pubDate>Mon, 11 Dec 2017 23:00:00 GMT</pubDate><media:content url="https://blog.cryptoaustralia.org.au/content/images/2017/12/cover-4.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/cover-4.jpg" alt="CryptoAUSTRALIA's 2017 Year in Review and Future Plans"><p>Wow, 2017 was a wild ride! CryptoAUSTRALIA is one-year-old this month, and we could not have done it without the generous support of the community. In this article, we express our gratitude to our friends and outline our exciting plans for 2018.</p>
<h2 id="ayearfullofevents">A Year Full of Events</h2>
<p>This year we have been busy with bringing you a range of exciting talks and workshops. We kicked off the year with <strong>Roland Wen</strong>’s presentation about election hacking, as a reflection of the scandal around the US presidential elections. The following month, our guests had a chance to learn how they could sanitise their social media presence before job interviews or cross-border travels.</p>
<p>In May, we brought the privacy community together for Privacy Awareness Week with an insightful panel discussion with <strong>Dr Elizabeth Coombs</strong> <sup class="footnote-ref"><a href="#fn1" id="fnref1">[1]</a></sup>, <strong>Dr Suelette Dreyfus</strong> <sup class="footnote-ref"><a href="#fn2" id="fnref2">[2]</a></sup>, <strong>Jon Lawrence</strong> <sup class="footnote-ref"><a href="#fn3" id="fnref3">[3]</a></sup>, <strong>David Vaile</strong> <sup class="footnote-ref"><a href="#fn4" id="fnref4">[4]</a></sup>, and <strong>Professor Brian Martin</strong> <sup class="footnote-ref"><a href="#fn5" id="fnref5">[5]</a></sup>. The panel shared their thoughts on issues threatening the privacy of Australian citizens, such as the metadata retention scheme.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/paw-1.jpg" alt="CryptoAUSTRALIA's 2017 Year in Review and Future Plans"></p>
<p>We also had a chance to welcome <strong>Stephen Blanks</strong> (NSWCCL), who gave us his insight into the lack of protection of fundamental rights in Australia. <strong>Julie Posetti</strong> also shared the findings from her UNESCO study about information source protection in the digital age. Additionally, we organised a joint-event with <strong><a href="http://www.walkleys.com">The Walkley Foundation</a></strong>, where journalists had a chance to learn secure communication practices and to develop metadata sanitisation skills.</p>
<p>We also covered numerous other technical areas with the hands-on workshops, such as secure communication by using the <a href="https://blog.cryptoaustralia.org.au/2017/03/21/run-your-end-to-end-encrypted-chat-server-matrix-riot/">Matrix secure-chat platform</a>, intrusion detection with honey tokens, and ad-blocking with Pi-hole. We finished off the year with an event demonstrating how breach data is routinely used to hack individuals. Besides our speakers, we would also like to thank our workshop instructors, namely <strong>Alexi Chiotis</strong>, <strong>Kate Golden</strong>, <strong>Adel Karimi</strong> and <strong>Daniel Reddi</strong> for their efforts.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/honeytokens.jpg" alt="CryptoAUSTRALIA's 2017 Year in Review and Future Plans"></p>
<p>Lastly, we would like to say a big thank you to <strong>Dr Suelette Dreyfus</strong> (Blueprint for Free Speech<sup class="footnote-ref"><a href="#fn6" id="fnref6">[6]</a></sup>) and <strong>Robin Doherty</strong> (ThoughtWorks) for bringing <strong>Marcy Wheeler</strong> to the CryptoParty event in Melbourne. Marcy (also known as <a href="https://twitter.com/emptywheel">@emptywheel</a>) is an independent US journalist writing about national security and civil liberties. Due to the incredible efforts of Suelette and Robin, the Melbourne community had a chance to hear Marcy’s insights on the upcoming legislation changes affecting the Five Eyes Alliance.</p>
<p>We would also like to express our gratitude to all our volunteers for helping us this year, including <strong>Zoltan Balazs</strong>, <strong>Andy Bennett</strong>, <strong>Peter Borbely</strong>, <strong>Karissa Breen</strong>, <strong>Michael van Coppenhagen</strong>, <strong>John Gerardos</strong>, <strong>Denis Khoshaba</strong>, <strong>Pawan Kumar</strong>, <strong>Takahiro Nei</strong>, <strong>Peter Tonoli</strong> and <strong>Ed Yuwono</strong> for their dedication and passion.</p>
<p>We thank our very generous financial sponsors for helping us succeed. First of all, <strong>NCryptcellular</strong> for supporting us throughout this year. We thank <strong>Mercury ISS</strong>, <strong>NTT Security</strong> and <strong>NCryptcellular</strong> (again!) for making the <a href="https://cryptoaustralia.org.au/events/paw2017">Privacy Awareness Event</a> happen. We'd also like to thank <strong>Fishburners</strong> and <strong>Infopeople</strong> for generously allowing us the use of their spaces for events.</p>
<p>Lastly, we are grateful for all the support we received from the fantastic community. Our events could not have happened without your generous support both online and offline.</p>
<h2 id="whatwilltheyear2018bring">What Will the Year 2018 Bring?</h2>
<p>In the next year, our goal is to focus on two main directions: events and projects. We will continue our tradition of bringing exciting speakers and workshops to the the general public. In addition to the events, however, we plan to expand our activities into research.</p>
<h3 id="workshopsftw">Workshops FTW</h3>
<p>Our privacy is in danger, and this is not going away soon. State-sponsored hacking, mass-surveillance, metadata retention and cyber-crime are just a few things invading our privacy on a daily basis. In addition, governments have started pushing tech companies into <a href="https://arstechnica.com/tech-policy/2017/10/trumps-doj-tries-to-rebrand-weakened-encryption-as-responsible-encryption/">backdooring their secure communication platforms</a> (e.g. WhatsApp). To add insult to injury, private companies are now referring to our personal data as ‘<a href="https://www.economist.com/news/leaders/21721656-data-economy-demands-new-approach-antitrust-rules-worlds-most-valuable-resource">the new oil</a>’ that is fuelling the digital economy.</p>
<p>As a reflection to these threats invading our privacy, we intend to organise more hands-on workshops over the next year. We believe in the learning-by-doing approach, and reckon that we should possess the necessary skills to defend our privacy until data governance policies change for the better.</p>
<p>So keep an eye on our <a href="https://cryptoaustralia.org.au/events">Events page</a> for the latest workshops. If you are interested in being a workshop instructor on a one-off or regular basis, then please email us at <a href="mailto:cfp@cryptoaustralia.org.au">cfp@cryptoaustralia.org.au</a>. In case you are keen on bringing our events to other cities, please apply as an event coordinator <a href="https://blog.cryptoaustralia.org.au/2017/12/12/2017-year-in-review-and-future-plans/(https://cryptoaustralia.org.au/volunteer)">here</a>.</p>
<h3 id="digitalprivacyforprofessionals">Digital Privacy for Professionals</h3>
<p>Professionals in industries such as law, medicine and accounting deal with confidential client information and communications. In 2018, we plan to provide events and resources for professionals that cater to the individual needs of specific professional industries.</p>
<p>Sign up for our <a href="http://eepurl.com/ddt0kP">special newsletter</a> to get the latest on this initiative. We will keep you updated as the project is moving forward. If you would like to participate, <a href="https://cryptoaustralia.org.au/volunteer">let us know</a>.</p>
<h2 id="closingnotes">Closing Notes</h2>
<p>We certainly have an exciting year ahead full of events and projects. The digial privacy of citizens has never been in such danger as it is now.</p>
<p>So help us to make our initiatives happen <a href="https://cryptoaustralia.org.au/volunteer">sign up as a volunteer today</a>. We are also looking for content creators, social media and community managers, event coordinators, fundraising managers and project managers.</p>
<p>If your company is looking for a good cause to support, then please write to us for our sponsorship options at <a href="mailto:sponsorship@cryptoaustralia.org.au">sponsorship@cryptoaustralia.org.au</a>.</p>
<p>Keep an eye on our <a href="https://blog.cryptoaustralia.org.au">blog</a> and <a href="https://cryptoaustralia.org.au/library">library</a> for the latest practical technical guides, research and reports about digital privacy and security. To never miss an event, sign up to <a href="https://cryptoaustralia.org.au/events">one of our groups on Meetup</a>. You can also follow us on <a href="https://twitter.com/CryptoAustralia">Twitter</a> or subscribe to the <a href="https://cryptoaustralia.org.au/newsletter">newsletter</a> for the latest news and events.</p>
<p>Lastly, we finish this year off with an <a href="https://www.meetup.com/CryptoAUSTRALIA-Digital-Self-Defence-Privacy/events/245598520/">EOY party on Tuesday</a>! Join us with our friends from <strong><a href="http://sectalks.org">SecTalks</a></strong> and <strong><a href="http://www.ruxmon.com/sydney/">Ruxmon</a></strong> for drinks and nibbles.</p>
<p><a href="https://www.meetup.com/CryptoAUSTRALIA-Digital-Self-Defence-Privacy/events/245598520/"><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/eoy-party-1.png" alt="CryptoAUSTRALIA's 2017 Year in Review and Future Plans"></a></p>
<p>Hope to see you in 2018!<br>
Gabor &amp; The CryptoAUSTRALIA Team</p>
<p><em>Cover photo courtesy of <a href="https://pixabay.com/en/volunteers-hands-voluntary-help-2653999/">Pixabay</a></em></p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="fn1" class="footnote-item"><p>Former NSW Privacy Commissioner <a href="#fnref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="fn2" class="footnote-item"><p>Blueprint for Free Speech <a href="#fnref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="fn3" class="footnote-item"><p>Electronic Frontiers Australia <a href="#fnref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="fn4" class="footnote-item"><p>Australian Privacy Foundation <a href="#fnref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="fn5" class="footnote-item"><p>Whistleblowers Australia <a href="#fnref5" class="footnote-backref">↩︎</a></p>
</li>
<li id="fn6" class="footnote-item"><p>Blueprint for Free Speech provides research and analysis in support of freedom of expression for all people, as described by the UN Declaration of Human Rights - <a href="https://blueprintforfreespeech.net">https://blueprintforfreespeech.net</a> <a href="#fnref6" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
</div>]]></content:encoded></item><item><title><![CDATA[Build a Privacy-respecting and Threat-blocking DNS Server]]></title><description><![CDATA[DNS blackholing can help you protect your devices from malware, ransomware and phishing. This guide shows how you can build your private DNS server that can block threats and protects your privacy.]]></description><link>https://blog.cryptoaustralia.org.au/2017/12/05/build-your-private-dns-server/</link><guid isPermaLink="false">5a22b457fd7eed393d87396f</guid><category><![CDATA[Domain Name System]]></category><category><![CDATA[Pi-hole]]></category><category><![CDATA[Malware]]></category><dc:creator><![CDATA[Gabor Szathmari]]></dc:creator><pubDate>Tue, 05 Dec 2017 04:30:00 GMT</pubDate><media:content url="https://blog.cryptoaustralia.org.au/content/images/2017/12/cover-2.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/cover-2.jpg" alt="Build a Privacy-respecting and Threat-blocking DNS Server"><p>DNS blackholing can be a powerful technique for blocking malware, ransomware and phishing on your home network. Although numerous public DNS services boast threat-blocking features, these providers cannot guarantee you total privacy. The following article shows how you can build your private DNS server and add threat-blocking capabilities by using DNS Response Policy Zones (RPZ).</p>
<p>In our previous piece, we showed how you could add <a href="https://blog.cryptoaustralia.org.au/2017/11/15/favourite-block-lists-cryptoaustralia/">additional feeds to your Pi-hole</a> for malware and phishing blocking. You can also use third-party DNS servers (e.g. OpenDNS, Norton ConnectSafe) for their threat-blocking features. We encourage to use both of these techniques, but you should be aware of their limitations.</p>
<h2 id="delayandprivacyissues">Delay and Privacy Issues</h2>
<p>The first problem of Pi-hole feeds is the reaction time. The latest <a href="https://www.webroot.com/download_file/view/946">WebRoot Threat Report suggests</a> that <em>&quot;84% of all phishing sites last less than 24 hours&quot;</em>. In other words, the faster a website gets on the blocklist, the better. Sadly, the <a href="https://github.com/pi-hole/pi-hole/blob/ecde2225122904a89543712ec8f2b0fd1da26ff6/advanced/pihole.cron#L19">Pi-hole blocklists are updated once a week</a> by default. Although you can change the update frequency, it is still far from real-time blocking.  Many of the lists are community maintained with unoffical targets of monthly updates.</p>
<p>The other issue is privacy. If you are forwarding your DNS requests to a third-party company, you are essentially giving away your web browsing history. Good <a href="https://www.privateinternetaccess.com/blog/2017/12/once-again-privacy-promises-from-a-company-are-worth-nothing-because-companies-cant-promise-anything/">privacy policies will not protect you and your data</a>. Even if the company champions good privacy practices, a change in the management or a warrant can break those promises in the blink of an eye.</p>
<h2 id="dnsbaseddomainblocking">DNS-based Domain Blocking</h2>
<p>A private DNS server can be a solution to both of these concerns. First of all, you can host a private DNS server in your favourite datacentre. Secondly, you can block DNS queries requesting malicious domains with the Response Policy Zone (RPZ) feature.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/12/dns-rpz-diagram.svg" alt="Build a Privacy-respecting and Threat-blocking DNS Server"></p>
<p>As for the privacy concerns, as the operation of the DNS server is under your control, you can configure what queries to log and when. Also, DNS resolution happens on your private server, so no third-party has access to the queries being submitted.<sup class="footnote-ref"><a href="#fn1" id="fnref1">[1]</a></sup></p>
<p>As for the threat-blocking capabilities, you can add an overlay with Response Policy Zones (RPZ). This feature is simple: your DNS server can override DNS query responses when the domain in question is on the blocklist. RPZs are currently supported by BIND9, PowerDNS and a few other commercial products. For a detailed explanation of RPZs, <a href="https://dnsrpz.info/">please</a> <a href="https://en.wikipedia.org/wiki/Response_policy_zone">read</a> <a href="http://www.zytrax.com/books/dns/ch9/rpz.html">these</a> <a href="https://blogs.cisco.com/security/using-dns-rpz-to-block-malicious-dns-requests">articles</a>.</p>
<p>A further advantage of the RPZ feature is simplicity and agility. Firstly, the reputation feeds are pulled from the remote sources with standard DNS zone file transfers. There is no need to convert the blocklists into another format. Secondly, new domains on the remote blocklist are promptly pushed to your DNS server. The remote server emits a standard <code>NOTIFY</code> message, which triggers your private server to download the changes and apply them immediately.</p>
<h2 id="dnsresolverbuildinstructions">DNS Resolver Build Instructions</h2>
<p>We suggest picking a hosting provider close to your physical location to keep the DNS resolution snappy. What you will need:</p>
<ul>
<li>a physical or virtual server</li>
<li>at least 2 GB of memory (4 GB is preferred)</li>
<li>Ubuntu 16.04 LTS</li>
<li>a fixed IP address</li>
<li>familiarity with SSH and the command line</li>
</ul>
<p>The first step is spinning up a new instance running Ubuntu, and installing the necessary packages:</p>
<pre><code># apt-get update &amp;&amp; apt-get dist-upgrade
# apt-get install bind9
</code></pre>
<p>As reputation feeds can be 50-150 megabytes large, BIND tends to eat up that sweet-sweet memory. So, to prevent the <a href="https://unix.stackexchange.com/questions/282155/what-is-the-out-of-memory-message-sacrifice-child">kernel killing </a> the BIND process when the system is running out of memory, we suggest setting up a swap file.</p>
<pre><code># fallocate -l 2G /swap.img
# chmod 600 /swap.img
# mkswap /swap.img
# swapon /swap.img
# echo '/swap.img none  swap  sw 0  0' &gt;&gt; /etc/fstab
</code></pre>
<p>That was easy! Now we shall move on to the actual configuration part.</p>
<p><em><strong>Warning:</strong> In our example, we are adding the data feeds from <a href="http://www.surbl.org/">SURBL</a>. Please note that if you copy-paste the settings below, the zone transfer <strong>will NOT work</strong>. You will need to subscribe to the data feed at SURBL and ask their customer service to whitelist the IP address of your DNS server. Read more about the availability of data feeds after the configuration section.</em></p>
<p>Replace the contents of <code>/etc/bind/named.conf.options</code> with the following settings:</p>
<pre><code>acl goodclients {
        localhost;
        localnets;
        1.2.3.4;  # Replace this with your home IP address
};

options {
	directory &quot;/var/cache/bind&quot;;
	max-cache-size 10m;
	cleaning-interval 30;
	max-cache-ttl 3600;
	max-ncache-ttl 3600;

	allow-query { goodclients; };
	allow-recursion { goodclients; };
	allow-query-cache { goodclients; };
	allow-transfer { none; };
	allow-update { none; };

	version &quot;none&quot;;
	recursion yes;
	
	auth-nxdomain no;
	listen-on-v6 { none; };

	response-policy {
		zone &quot;rpz.mw.surbl.org&quot;;
		zone &quot;rpz.ph.surbl.org&quot;;
		zone &quot;rpz.cr.surbl.org&quot;;
		zone &quot;rpz.abuse.surbl.org&quot;;
	} qname-wait-recurse no;
};
</code></pre>
<p>To secure against <a href="https://www.us-cert.gov/ncas/alerts/TA13-088A">DNS amplification attacks</a>, your DNS server will only respond to the clients specified under the <code>goodclients</code> section. Therefore, you have to replace <code>1.2.3.4</code> with the public IP address of your home network (use <a href="https://www.whatismyip.com/">whatismyip.com</a>  or <a href="https://www.google.com/search?q=whats+my+ip">this search</a> to find out what your IP is).</p>
<p>As for blocking, the magic happens in the <code>response-policy</code> section. We tell BIND here to override the DNS responses in case a domain features in one of the <a href="http://www.surbl.org/lists">SURBL zone files</a>.</p>
<p>We are not ready yet. Save the file and now create a new file named <code>/etc/bind/named.conf.surbl</code>, and add the following:</p>
<pre><code>zone &quot;rpz.mw.surbl.org&quot; {
        type slave;
        masters { 94.228.131.210; 94.228.131.211; };
        file &quot;/var/cache/bind/rpz.mw.surbl.org&quot;;
        allow-query { goodclients; };
};

zone &quot;rpz.ph.surbl.org&quot; {
        type slave;
        masters { 94.228.131.210; 94.228.131.211; };
        file &quot;/var/cache/bind/rpz.ph.surbl.org&quot;;
        allow-query { goodclients; };
};

zone &quot;rpz.cr.surbl.org&quot; {
        type slave;
        masters { 94.228.131.210; 94.228.131.211; };
        file &quot;/var/cache/bind/rpz.cr.surbl.org&quot;;
        allow-query { goodclients; };
};

zone &quot;rpz.abuse.surbl.org&quot; {
        type slave;
        masters { 94.228.131.210; 94.228.131.211; };
        file &quot;/var/cache/bind/rpz.abuse.surbl.org&quot;;
        allow-query { goodclients; };
};
</code></pre>
<p>In this file, we specify where our DNS server can download the reputation feeds from: <code>94.228.131.210</code> and <code>94.228.131.211</code>. <em>Note: These two IP addresses belong to SURBL and you need a subscription.</em></p>
<p>Finally, edit <code>/etc/bind/named.conf</code> and append the following to the end:</p>
<pre><code>include &quot;/etc/bind/named.conf.surbl&quot;;
</code></pre>
<p>Restart your DNS server to apply the new changes:</p>
<pre><code># systemctl restart bind9
</code></pre>
<p>If everything has been configured properly, you should see messages in <code>/var/log/syslog</code> similar to:</p>
<pre><code>Dec  3 12:00:26 myserver named[1196]: transfer of 'rpz.abuse.surbl.org/IN' from 94.228.131.210#53: connected using 172.12.34.52#51172
Dec  3 12:00:26 myserver named[1196]: zone rpz.abuse.surbl.org/IN: transferred serial 1512302336
</code></pre>
<h3 id="debugging">Debugging</h3>
<p>If something does not work, the first thing you should check is whether you are allowed to retrieve the remote feeds from SURBL:</p>
<pre><code>$ dig AXFR @94.228.131.210 rpz.cr.surbl.org
</code></pre>
<p>The command above should retrieve a lengthy list of domains from the <code>cr</code> blocklist.</p>
<p>To verify whether domain blackholing is operating correctly, run the following command on your DNS server:</p>
<pre><code>$ dig @127.0.0.1 test.cr.surbl.org
</code></pre>
<p>Your DNS server should respond with <code>status: NXDOMAIN</code> in the <code>-&gt;&gt;HEADER&lt;&lt;-</code> section and <code>ADDITIONAL SECTION</code> should feature <code>SOA	dev.null. zone.surbl.org.</code>.</p>
<pre><code>; &lt;&lt;&gt;&gt; DiG 9.10.3-P4-Ubuntu &lt;&lt;&gt;&gt; @127.0.0.1 test.cr.surbl.org
; (1 server found)
;; global options: +cmd
;; Got answer:
;; -&gt;&gt;HEADER&lt;&lt;- opcode: QUERY, status: NXDOMAIN, id: 37220
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 2

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;test.cr.surbl.org.		IN	A

;; ADDITIONAL SECTION:
rpz.cr.surbl.org.	180	IN	SOA	dev.null. zone.surbl.org. 1512301442 180 180 604800 180

;; Query time: 0 msec
;; SERVER: 127.0.0.1#53(127.0.0.1)
;; WHEN: Sun Dec 03 12:07:13 UTC 2017
;; MSG SIZE  rcvd: 99
</code></pre>
<p>If one of these is failing, check your configuration files and event log again.</p>
<h2 id="sowhichblocklistshouldiuse">So Which Blocklist Should I Use?</h2>
<p>So the million dollar question: which blocklist should I use? There are a few providers on the market. Luckily, we did a little investigation, so you do not have to.</p>
<p>The following providers offer reputation feeds via DNS zone transfers:</p>
<ul>
<li><a href="https://service.dissectcyber.com/rpz/">DissectCyber</a></li>
<li><a href="https://www.farsightsecurity.com/2016/07/06/molloy-nodrpz/">Farsight Security</a></li>
<li><a href="https://www.infoblox.com/products/dns-firewall/">Infoblox</a></li>
<li><a href="https://www.spamhaustech.com/free-trial/">Spamhaus</a></li>
<li><a href="http://www.surbl.org/lists">SURBL</a></li>
<li><a href="https://www.switch.ch/security/services/dns-firewall/">SWITCH</a></li>
<li><a href="http://www.threatstop.com/solutions/threatstop-dns-firewall-overview">ThreatStop</a></li>
<li><a href="https://strongarm.io/">Strongarm</a></li>
<li><a href="https://www.malwarepatrol.net/enterprise-threat-data/#RPZ">Malware Patrol</a></li>
</ul>
<p>The overall experience with these feed providers is mixed. Even though we found good-quality feeds, almost every single company is only targeting the commercial market. Unfortunately, this either makes the purchase difficult or expensive for a home user.</p>
<p>Our first pick was <strong>DissectCyber</strong>, as this company seemed to target home users as well. Alas, we found a very unusual sign-up process and the control panel was just way too confusing. Secondly, we could not figure out where the reputation data was coming from, so we had some doubts with regards to the quality of the feeds. We gave up after a few failed registration attempts and moved on to the other providers.</p>
<p>We contacted <strong>Farsight Security</strong> then.<sup class="footnote-ref"><a href="#fn2" id="fnref2">[2]</a></sup> Their blocklist revolves around the Newly Observed Domains (NOD) concept, based on the idea that emerging threats are hosted on new domains (e.g. someone registers <code>pay-pal.com</code> for hosting a phishing site). Unfortunately, the subscription fee costs an arm and a leg (i.e. thousands of US dollars), so Farsight is not an option for home users. On a related note, the customer rep tipped me off that <a href="https://krebsonsecurity.com/">Brian Krebs</a> is also a Farsight user, and researchers may get access to the feeds for free under the company's <a href="https://www.farsightsecurity.com/grant-access/">grant programme</a>.</p>
<p>Our next try was <strong>Infoblox</strong>, which did not seem to offer any RPZ feeds on a subscription basis. We suspect the Infoblox feeds are available to their customers only. We also tried to request access to the <strong>SWITCH</strong> feeds. One of the customer reps got back to us, but once the agent learned that we are a not-for-profit, his emails stopped coming. As for <strong>ThreatStop</strong>, the company did not bother to respond.</p>
<p><strong>Malware Patrol</strong> offers their feeds in multiple formats, including zone transfers. The pricing seemed to be appealing at first: the premium feeds cost U$3.59/month. We subscribed to the premium package, but we quickly found out that the feeds are only available in a zipped format. It turned out zone transfers come with the commercial (and more expensive) subscriptions only.</p>
<p>We had high hopes for the <strong>Spamhaus</strong> feed, as their DNSBL service is one of the best when it comes to Spam filtering. Spamhaus offers a feed called <a href="https://www.spamhaus.org/drop/">'DROP' (Don't Route Or Peer Lists)</a> for free, but we did not find it that useful. The <em>real thing</em> is what they call the 'Standard group' with a price tag of U$250/year. We were a bit disappointed here, as the subscription may be a sensible investment for small businesses, but probably not for a home user.</p>
<p><strong>Strongarm</strong>, on the other hand, targets home-users. Although the free personal subscription does not include the RPZ feeds, the U$3/user/month <a href="https://strongarm.io/pricing/">Business package</a> does. This offer sounds like a fair deal.</p>
<p>We got hold of a free trial from <strong>SURBL</strong>. We were impressed by the quality of the <a href="http://www.surbl.org/lists">feeds</a>, as they are curated from a handful of open-source and commercial sources. New domains are pushed out as delta updates every 10-15 minutes. Quite surprisingly, the latest additions to the <a href="https://hosts-file.net/">hpHosts phishing and malware feed</a> are quickly blocked by SURBL, too. We were also satisfied with the technical support team, who helped us set up the service in no time. However, the disappointing thing, again, was the sales team at SecurityZones (SURBL sells the subscription via third-parties). The team just got back to us this morning with a few follow up questions and a quote, weeks after our initial request.</p>
<p>In summary, Strongarm seems to be the strongest contender from the pack. We found both its customer service and the price tag home-user friendly. The second and third place go to SURBL and Spamhaus for the perceived level of quality, but their customer service was somewhat disappointing.</p>
<h2 id="summary">Summary</h2>
<p>So, does a private DNS server worth all this hassle? Maybe, it depends on your preferences and your budget.</p>
<p>As for the malware blocking and anti-phishing capabilities, providers of threat data are not ready for serving the end-user market. The pricing is too expensive, and the companies are not dealing with individual subscribers. We hope these feeds will be reasonably priced for the home-user market.</p>
<p>Until then, one potential option to overcome the obstacles is pooling up. For example, the $250/year Spamhaus feed allows the protection of maximum 350 users. If a group of friends can subscribe to Spotify Family family, why they do not spend a few dollars each on threat protection? As for alternative feeds, Strongarm probably worth the small investment (U$3/user/month), but we would prefer the more enterprise-grade feeds (if they were available) from SURBL and Spamhaus. If you do not mind retrieving blocklists in a different format and <a href="https://www.malwarepatrol.net/bind9-configuration-guide/">converting them</a>, you may want to look into the zipped Malware Patrol feeds.</p>
<p>If your top priority is privacy, however, you should run your private DNS server. As a side effect, your DNS server will validate DNSSEC signatures. To hide and secure traffic between the DNS server and the clients, we would undoubtedly add <a href="https://www.dnscrypt.org/">DNSCRYPT</a> to the equation as well.</p>
<p>What are your thoughts? Who is your preferred threat-feed provider? How do you block threats on your home network? Let us know on Twitter at <a href="https://twitter.com/CryptoAustralia">@CryptoAUSTRALIA</a>.</p>
<p><em>Image courtesy of <a href="https://pixabay.com/en/fence-railing-wrought-iron-barrier-450670/">Pixabay</a></em></p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="fn1" class="footnote-item"><p>Except your hosting provider <a href="#fnref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="fn2" class="footnote-item"><p>Fun fact: the man behind the DNS RPZ standard works for Farsight Security <a href="#fnref2" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
</div>]]></content:encoded></item><item><title><![CDATA[CryptoAUSTRALIA's Favourite Block Lists]]></title><description><![CDATA[Our biased collection of malware and phishing website blocking domain blacklists for the Pi-hole]]></description><link>https://blog.cryptoaustralia.org.au/2017/11/15/favourite-block-lists-cryptoaustralia/</link><guid isPermaLink="false">5a0a7984300862707214b6a8</guid><category><![CDATA[Pi-hole]]></category><category><![CDATA[Malware]]></category><dc:creator><![CDATA[Gabor Szathmari]]></dc:creator><pubDate>Wed, 15 Nov 2017 04:30:00 GMT</pubDate><media:content url="https://blog.cryptoaustralia.org.au/content/images/2017/11/stop-cover.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://blog.cryptoaustralia.org.au/content/images/2017/11/stop-cover.jpg" alt="CryptoAUSTRALIA's Favourite Block Lists"><p>Pi-hole is a network-wide ad blocking service you can install on a Raspberry Pi. The project is praised for its advertisement blocking capabilities, but did you know that you can also block malware and phishing websites on your home network? The following article details our favourite blacklists helping you protect your devices from malware and nefarious activities on your home network.</p>
<p>If you have not installed Pi-hole yet, please check out our blog post (<em>Coming soon!</em>) or drop-in to <a href="https://cryptoaustralia.org.au/events">one of our workshops</a> first. Once you have it up and running, the <a href="https://github.com/pi-hole/pi-hole/blob/master/adlists.default">default block list</a> on the Pi-hole is already blocking ads and to a smaller extent, malware.</p>
<p>As of today, the default installation features two block lists: <a href="https://github.com/StevenBlack/hosts">StevenBlack's Unified Host List</a> and <a href="http://www.malwaredomains.com/">DNS-BH Malware Domains</a>. While the former combines other smaller block lists for blocking adware and malware, the latter is a <a href="https://www.sans.org/reading-room/whitepapers/dns/dns-sinkhole-33523">decent</a> anti-malware list provided by <a href="https://www.riskanalytics.com/">RiskAnalytics</a>. The two block lists already do their job. However we recommend adding a few more community-managed block lists to your Pi-hole (<em>Settings --&gt; Pi-Hole's Block Lists</em>) for a more comprehensive protection.</p>
<p>The following list features our favourite domain block lists for the Pi-hole. Please note that the list is not meant to be impartial nor comprehensive.</p>
<h2 id="malwareandphishing">Malware and Phishing</h2>
<ul>
<li><code>https://hosts-file.net/exp.txt</code> - <a href="https://hosts-file.net/">hpHosts</a> - Websites hosting exploits</li>
<li><code>https://hosts-file.net/emd.txt</code> - <a href="https://hosts-file.net/">hpHosts</a> - Websites hosting malware</li>
<li><code>https://hosts-file.net/psh.txt</code> - <a href="https://hosts-file.net/">hpHosts</a> - Phishing websites</li>
<li><code>https://www.malwaredomainlist.com/hostslist/hosts.txt</code> - Extensive anti-malware list by <a href="https://blog.cryptoaustralia.org.au/2017/11/15/favourite-block-lists-cryptoaustralia/www.malwaredomainlist.com">Malware Domain List</a></li>
<li><code>https://v.firebog.net/hosts/Airelle-hrsk.txt</code> - <a href="http://rlwpx.free.fr/WPFF/hosts.htm">Airelle's list</a> of phishing domains</li>
<li><code>https://v.firebog.net/hosts/Shalla-mal.txt</code> - <a href="http://www.shallalist.de/categories.html">Shalla's Ad and Spyware Blacklists</a></li>
<li><code>https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt</code> - <a href="https://ransomwaretracker.abuse.ch/blocklist/">Ransomware Tracker</a> - Ransomware C2 server block list (generic)</li>
<li><code>https://ransomwaretracker.abuse.ch/downloads/LY_C2_DOMBL.txt</code> - <a href="https://ransomwaretracker.abuse.ch/blocklist/">Ransomware Tracker</a> - Ransomware C2 server block list (Locky)</li>
<li><code>https://ransomwaretracker.abuse.ch/downloads/CW_C2_DOMBL.txt</code> - <a href="https://ransomwaretracker.abuse.ch/blocklist/">Ransomware Tracker</a> - Ransomware C2 server block list (CryptoWall)</li>
<li><code>https://ransomwaretracker.abuse.ch/downloads/TC_C2_DOMBL.txt</code> - <a href="https://ransomwaretracker.abuse.ch/blocklist/">Ransomware Tracker</a> - Ransomware C2 server block list (TeslaCrypt)</li>
<li><code>https://ransomwaretracker.abuse.ch/downloads/TL_C2_DOMBL.txt</code> - <a href="https://ransomwaretracker.abuse.ch/blocklist/">Ransomware Tracker</a> - Ransomware C2 server block list (TorrentLocker)</li>
<li><code>http://www.networksec.org/grabbho/block.txt</code> - <a href="http://threatexpert.com/">ThreatExpert.com</a>'s malware and adware block list</li>
<li><code>https://isc.sans.edu/feeds/suspiciousdomains_Medium.txt</code> - <a href="https://www.dshield.org">DShield.org Suspicious Domain List</a> (Medium-level)</li>
<li><code>http://someonewhocares.org/hosts/hosts</code> - <a href="http://someonewhocares.org/">Dan Pollock's</a> list for blocking ads and spyware</li>
<li><code>https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt</code> - <a href="https://disconnect.me/">Disconnect.me</a> anti-malvertising block list</li>
<li><code>http://www.joewein.net/dl/bl/dom-bl.txt</code> - <a href="http://www.joewein.de/sw/blacklist.htm">jwSpamSpy</a> - Domains featured in Spam emails</li>
<li><code>https://raw.githubusercontent.com/ZeroDot1/CoinBlockerLists/master/hosts</code> - <a href="https://github.com/ZeroDot1/CoinBlockerLists/">CoinBlockerLists</a> - Blocks browser-based cryptocurrency miners</li>
</ul>
<h2 id="tracking">Tracking</h2>
<ul>
<li><code>https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/win10/spy.txt</code> - <a href="https://github.com/crazy-max/WindowsSpyBlocker">WindowsSpyBlocker</a> - Blocks Windows 10 telemetry domains</li>
<li><code>https://v.firebog.net/hosts/static/SamsungSmart.txt</code> - Blocks Samsung SmartTV trackers</li>
<li><code>https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt</code> - <a href="https://disconnect.me/">Disconnect.me</a> anti-tracking block list</li>
<li><code>https://v.firebog.net/hosts/Easyprivacy.txt</code> - <a href="https://easylist.to/">EasyPrivacy</a> -  A privacy companion of the popular EasyList ad block list</li>
</ul>
<h2 id="ads">Ads</h2>
<ul>
<li><code>https://hosts-file.net/ad_servers.txt</code> - <a href="https://hosts-file.net/">hpHosts</a> - Blocks ad and tracking servers</li>
<li><code>https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt</code> - <a href="https://disconnect.me/">Disconnect.me</a> ad-blocker list</li>
<li><code>https://gist.githubusercontent.com/anudeepND/adac7982307fec6ee23605e281a57f1a/raw/5b8582b906a9497624c3f3187a49ebc23a9cf2fb/Test.txt</code> - Block YouTube ads</li>
<li><code>https://v.firebog.net/hosts/Easylist.txt</code> - <a href="https://easylist.to/">EasyList</a> - Might be familiar from the uBlock and Adblock browser plugins</li>
<li><code>https://v.firebog.net/hosts/AdguardDNS.txt</code> - Block list powering the <a href="https://adguard.com/">Adguard</a> ad blocker</li>
</ul>
<p>A copy-pasteable list for your Pi-hole <a href="https://gist.githubusercontent.com/gszathmari/45db036b38a07dcea33fd8f29d335ce6/raw/24b83c2433a67d1428495241b3fdeac6cc87e94b/cryptoaustralia-favourite-block-lists">is available here</a>. For more block lists, make sure to visit <a href="https://wally3k.github.io/">https://wally3k.github.io/</a></p>
<h2 id="morefrequentupdates">More Frequent Updates</h2>
<p>By default, the Pi-hole cron job updating the block lists runs on Sunday at 01:59 am. To get a fresh block list each day, we need to increase the update frequency as the following:</p>
<ol>
<li>Open <code>/etc/cron.d/pihole</code> in your favourite text editor</li>
<li>Locate the following line:<br>
<code>59 1 * * 7 root PATH=&quot;$PATH:/usr/local/bin/&quot; pihole updateGravity</code></li>
<li>Replace number <code>7</code> (Sunday) with <code>*</code> (every day). Your new entry should look like this:<br>
<code>59 1 * * * root PATH=&quot;$PATH:/usr/local/bin/&quot; pihole updateGravity</code></li>
<li>Save the file and enjoy the daily updates</li>
</ol>
<p><strong>Missing something? What is your favourite block list and why? Ping us on <a href="https://twitter.com/CryptoAustralia">Twitter</a> and let us know.</strong></p>
<p><em>Image courtesy of iStock</em></p>
</div>]]></content:encoded></item><item><title><![CDATA[November Workshop: Running a Network-wide Ad-blocker, and a Whole Lot More!]]></title><description><![CDATA[CryptoAUSTRALIA have an upcoming workshop on setting up a network-wide ad blocker called Pi-hole. Nick Kavadias from the CryptoAUSTRALIA team explains why you need it and why it's a whole lot more than just another ad-blocker browser plugin.]]></description><link>https://blog.cryptoaustralia.org.au/2017/11/02/pi-hole-network-wide-ad-blocker/</link><guid isPermaLink="false">59f984ba300862707214b682</guid><category><![CDATA[Events]]></category><category><![CDATA[Pi-hole]]></category><dc:creator><![CDATA[Nick Kavadias]]></dc:creator><pubDate>Thu, 02 Nov 2017 04:31:26 GMT</pubDate><media:content url="https://blog.cryptoaustralia.org.au/content/images/2017/11/sagittarius-a-black-hole-milky-way-center.adapt.1900.1.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://blog.cryptoaustralia.org.au/content/images/2017/11/sagittarius-a-black-hole-milky-way-center.adapt.1900.1.jpg" alt="November Workshop: Running a Network-wide Ad-blocker, and a Whole Lot More!"><p>On 15 November 2017, CryptoAUSTRALIA is <a href="https://www.meetup.com/CryptoAUSTRALIA-Digital-Self-Defence-Privacy/events/244498649/">holding a workshop</a> in Sydney on how to get a network-based ad blocker called <a href="https://pi-hole.net/">Pi-hole</a> up and running on your home network. Pi-hole can be configured to run on a PC with any modern Linux distribution, but we’ll be focusing on getting it working on a small, ARM-based computing device called a Raspberry Pi (RPi), which costs about $100.</p>
<p>You may ask, why should I go to the trouble of running a dedicated network device to block ads? I run <a href="https://www.ublock.org/">uBlock</a>, <a href="https://www.eff.org/privacybadger">Privacy Badger</a>, <a href="https://noscript.net/">NoScript</a>, or <a href="https://adblockplus.org/">AdBlock Plus</a> and have an anti-virus subscription. Do I really need this? <strong>YES, absolutely!</strong></p>
<p>The reality is you probably do not or cannot run anti-virus on all your computing devices, like your <a href="https://www.wired.com/2017/02/smart-tv-spying-vizio-settlement/">Smart TV</a>, and not all devices support browser plug-ins.  If you’re like me and have kids, they get all the hand-me-down smartphones which don’t even support the latest Android/iOS security patches, let alone have support for ad blockers, and even devices which do, it's just not possible to block many ads built into apps.</p>
<p>Our workshop will cater for people from a wide range of backgrounds and abilities:</p>
<p>If don't know much about RPi, but still want to get your hands dirty. <em>(Bring your laptop! We will make a working Pi-hole virtual machine available and we’ll also bring along our own device so you can see what it’s all about.)</em></p>
<p>If you own a RPi and want to bring it along to configure.  <em>(We recommend you bring a new SD/micro SD card which is at least 2GB in size, so you don't destroy your current RPi setup.)</em></p>
<p>If you want to learn how to run Pi-hole on your home network to block ads, malware, viruses, command and control servers, and phishing attacks, then this workshop is for you.</p>
<p>If you want to learn how to stop your kids accessing pornography, gambling and other undesirable websites on all your internet-enabled devices, then this workshop is for you.</p>
<p>If you want to save your precious internet bandwidth because your internet speeds suck, then this workshop is for you.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/11/dashboard212.png" alt="November Workshop: Running a Network-wide Ad-blocker, and a Whole Lot More!"></p>
<p>What the workshop will cover:</p>
<ul>
<li>What hardware/software Pi-hole supports;</li>
<li>How Pi-hole does its magic in blackholing internet traffic;</li>
<li>How to get the latest version of Rasbian Lite up and running and install Pi-hole without ever having to plug your RPi into a monitor, keyboard, or mouse;</li>
<li>Various ‘hacks’ on running Pi-hole on your home network and get it working with your home router/ wifi access point;</li>
<li>How to manage and customise the Pi-hole block lists and other advanced DNS configurations; and</li>
<li>How to run Pi-hole away from your home network.</li>
</ul>
<p>If you do not own a RPi, but are keen on getting one before the workshop, our friends at <a href="https://www.littlebirdelectronics.com.au">Little Bird Electronics</a>, who are official resellers of Raspberry Pi in Australia and based in Sydney, have provided us with a discount code to use on their online store until the end of November. The code is <code>10OFFLBE</code>. <em>Note: The code does not apply to Raspberry Pi Zero or Raspberry Pi Zero W - these devices can run Pi-hole, but require the purchase of a separate USB Ethernet dongle</em>.</p>
<p>We recommend you purchase either a <a href="https://www.littlebirdelectronics.com.au/raspberry-pi-3-beginners-kit">Raspberry Pi 3 Beginners Kit</a>, or if you’re looking for a barebones setup, then get yourself a <a href="https://www.littlebirdelectronics.com.au/raspberry-pi-3~38194">Raspberry Pi 3 Model B</a> and a <a href="https://www.littlebirdelectronics.com.au/raspberry-pi-official-case-for-raspberry-pi-3">case</a>. You'll also need to find an old microSD card which is at least 2 GB and a micro USB cable/wall charger.</p>
<p><strong>You can sign-up to the workshop on our Meetup page</strong> (Quick, limited spaces!): <a href="https://www.meetup.com/CryptoAus-Sydney/events/244498283/">https://www.meetup.com/CryptoAus-Sydney/events/244498283/</a></p>
<p><em>If you are interested in other privacy focused Raspberry Pi projects, check out our <a href="https://blog.cryptoaustralia.org.au/2017/10/05/5-privacy-focused-raspberry-pi-projects/">article from earlier here</a></em></p>
<p>See you at the workshop!!</p>
</div>]]></content:encoded></item><item><title><![CDATA[ANNOUNCEMENT: CryptoAUSTRALIA is stepping down as CryptoParty organiser in Melbourne]]></title><description><![CDATA[We are announcing that CryptoAUSTRALIA is stepping down as an organiser for the CryptoParty Melbourne Meetup group]]></description><link>https://blog.cryptoaustralia.org.au/2017/10/27/cryptoaustralia-stepping-down-cryptoparty-organiser-melbourne/</link><guid isPermaLink="false">59e81e08300862707214b64e</guid><category><![CDATA[Announcements]]></category><dc:creator><![CDATA[CryptoAUSTRALIA]]></dc:creator><pubDate>Thu, 26 Oct 2017 22:50:58 GMT</pubDate><content:encoded><![CDATA[<div class="kg-card-markdown"><p>We are announcing that CryptoAUSTRALIA is stepping down as an organiser for the <a href="https://www.meetup.com/CryptoParty-Melbourne/">CryptoParty Melbourne</a> Meetup group.</p>
<p>Just like in Sydney, we have been busy bringing you exciting workshops and speakers throughout the year. We have grown to cover a wide range of privacy topics in Melbourne including FOI requests, Matrix Chat and digital security for movement organisers. We would like to thank you for supporting us with your participation during these events so far.</p>
<p>We are currently planning a shift to a different style of events in Melbourne, and as a result, the ownership of the Meetup group is changing to be not connected to CryptoAUSTRALIA.</p>
<p>Over the course of this week, we have assigned <a href="https://www.meetup.com/help/article/2397734/">full 'Organiser' rights</a> to <a href="https://blog.cryptoaustralia.org.au/2017/08/31/personnel-changes-melbourne-events/">former volunteer, Peter Tonoli</a>, while all CryptoAUSTRALIA members have <a href="https://www.meetup.com/help/customer/portal/articles/465025-step-down-as-organizer/">stepped down</a> in parallel. Today, we have disassociated the group from the <a href="https://www.meetup.com/pro/cryptoaustralia/">CryptoAUSTRALIA Meetup Pro account</a>, which now completes the transition.</p>
<p>We encourage the existing members of the Meetup group as well as the greater privacy community to get involved to keep the CryptoParty movement going in Melbourne.</p>
<p>As for CryptoAUSTRALIA, nothing has changed: our vision of a society where everyone in Australia possesses the necessary skills to defend their privacy. Keep an eye on our future announcements as we have some exciting plans for 2018 in our pocket!</p>
<p>We would like to thank everyone who has ever contributed to organising CryptoParty events in Melbourne since 2012. We also thank all the volunteers and guests who have helped us along the way to make the events happen. Our team look forward to seeing you all at future CryptoAUSTRALIA events.</p>
<p>For details of future events you can follow us on social media:</p>
<ul>
<li><a href="https://twitter.com/CryptoAustralia">https://twitter.com/CryptoAustralia</a></li>
<li><a href="https://fb.me/CryptoStraya">https://fb.me/CryptoStraya</a></li>
<li><a href="https://cryptoaustralia.org.au/newsletter">https://cryptoaustralia.org.au/newsletter</a></li>
<li><a href="https://www.meetup.com/pro/cryptoaustralia">https://www.meetup.com/pro/cryptoaustralia</a></li>
</ul>
<p>Kind Regards,<br>
The CryptoAUSTRALIA Team</p>
</div>]]></content:encoded></item><item><title><![CDATA[How Economists Can Help Protect Personal Data]]></title><description><![CDATA[‘Information asymmetry’ and ‘moral hazard’ are well-studied problems in economics. But can we apply them to data privacy?]]></description><link>https://blog.cryptoaustralia.org.au/2017/10/25/how-economists-help-protect-personal-data/</link><guid isPermaLink="false">59f00ba0300862707214b65b</guid><dc:creator><![CDATA[Gabor Szathmari]]></dc:creator><pubDate>Wed, 25 Oct 2017 05:45:46 GMT</pubDate><media:content url="https://blog.cryptoaustralia.org.au/content/images/2017/10/cover.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/cover.jpg" alt="How Economists Can Help Protect Personal Data"><p>If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands?</p>
<p>It can be difficult to predict if the supermarket manages your sensitive details securely and responsibly. The company may store them on vulnerable servers waiting for hackers to attack. Also, your data might be sold to data brokers for things like <a href="https://www.gizmodo.com.au/2013/03/big-data-brokers-they-know-everything-about-you-and-sell-it-to-the-highest-bidder/">targeted advertising</a> and <a href="https://motherboard.vice.com/en_us/article/mg9vvn/how-our-likes-helped-trump-win">political purposes</a>. Companies are often opaque with their data management practices, and it can be difficult to understand what is happening once our private details are handed over.</p>
<p>This article borrows a few solutions from economics and attempts to apply them to questionable data handling practices.</p>
<h3 id="identityverificationinaustralia">Identity Verification in Australia</h3>
<p>One of my pet peeves is the ‘<a href="https://en.wikipedia.org/wiki/100_point_check">100 points check</a>’. In Australia we rely on this personal identification system for things like job applications, rental agreements, bank and credit card applications or managed Bitcoin wallet applications.</p>
<p>This identification procedure has been in use since 1988, when home computers stored data on cassettes, and the primary display of a home computer was a TV set. Today, even though many organisations or transactions do not have legislative requirements or reporting obligations (such as banks) to require a 100 point ID check, many organisations ask for it anyway, just to make sure they know they are really dealing with the right person.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/commodore.jpg" alt="How Economists Can Help Protect Personal Data"></p>
<h3 id="badpracticesatarealestateagency">Bad Practices at a Real Estate Agency</h3>
<p>So, I applied for a lovely apartment recently, which is already a stressful procedure on its own. As part of the rental application process, I was asked to provide a stack of documents to the real estate agent including: a scanned copy of my passport, driver’s licence, Medicare card, and bank statements.</p>
<p>The first shock came when I was instructed to send these documents in a simple email. To make matters worse, I had to do it even before I was shortlisted as a potential tenant. Considering that about 20 people had turned up on the apartment viewing (Sydney… doh!), the agent would be receiving hundreds of email applications per day with all sorts of sensitive documents attached.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/tenancy-agreement.jpg" alt="How Economists Can Help Protect Personal Data"></p>
<p>As a security professional, I began to worry about the long-term fate of my documents. Questions were racing in my head: Is my real estate agent going to store my documents on an encrypted drive or just in a <a href="https://www.theregister.co.uk/2017/09/04/us_security_clearance_aws_breach/">shared S3 bucket with some misconfigured permissions</a>? Will the agent share these files with third-parties and how? How secure is the agent’s email server? Will my email and sensitive attachments linger around in the agent’s inbox waiting for a hacker to take the email account over? Will I be notified if my personal details are compromised?</p>
<p>This situation was an example of the information asymmetry between my real estate agent and me. The agent knew what would happen to the documents once they were sent in, while I did not. Now, this imbalance allows my agent to spend as little as possible on good security and privacy practices. What is more insidious is that it enables them to sell my data to data brokers and marketing agencies, without my knowledge either legally or illegally. So what can we do about this? Fortunately, this is a well-explored area in Economics called ‘<a href="https://en.wikipedia.org/wiki/Principal%E2%80%93agent_problem">principal–agent problem</a>’ and it is solvable.</p>
<h2 id="borrowingideasfromeconomics">Borrowing Ideas from Economics</h2>
<p>The ‘principal–agent problem’ occurs when one party (the “agent”) has more or better quality information than the customer (the “principal”). Agents acting on behalf of the customer may exploit the situation if the incentives are not set right.</p>
<p>For example, a taxi driver, who knows a city like the back of her hand, may rip off her passengers who are unfamiliar with the city. Restaurants may relax on their hygiene and food safety standards because their patrons cannot see what is happening in the kitchen. This conflict of interest is also known as ‘<a href="https://en.wikipedia.org/wiki/Moral_hazard">moral hazard</a>’.</p>
<iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/_ZeGKi1CY_Y?start=59" frameborder="0" allowfullscreen></iframe>
<p>In general, the same situation applies when we trust companies - like my real estate agent - with sensitive information. If the agent had the incentives to manage documents securely, they would probably need to hire a security expert. The expert would set things up like a secure file sharing solution, two-factor authentication and introduce good data disposal practices. The problem is that these additions cost money and real estate agents are incentivised not to foot the bill. In other words, my real estate agent is not interested in protecting my data, but signing rental agreements for as many apartments as possible in the shortest amount of time.</p>
<h2 id="howwecansolvetheinformationasymmetry">How We Can Solve the Information Asymmetry</h2>
<p>To eliminate the moral hazard problem, we have to <a href="https://www.mruniversity.com/courses/principles-economics-microeconomics/solutions-moral-hazard-example">either lessen the information asymmetry or change the incentives</a>. Customers either have to understand what they are getting into, or companies need to be interested in good data management practices.</p>
<p>Before we explore the various options, just a word about public shaming. The usual media circus after a data breach is rarely effective. Apart from a few exceptions, companies never go bankrupt, <a href="https://www.comparitech.com/blog/information-security/data-breach-share-price/">stock prices are not significantly affected on the long-term</a>, and the number of customers bounces back eventually. The general public are quickly desensitised by the continuous news of data breaches, or the attention soon shifts to the latest data breach.</p>
<h3 id="solution1educationandtransparency">Solution 1: Education and Transparency</h3>
<p>The first solution to the moral hazard problem is a combination of education and transparency. If customers knew what the proper data management practices are, and they could observe them in action, customers would be able to make informed decisions. Ideally, customers should recognise if something is wrong before they hand over their personal data.</p>
<p>As for my real estate agent, I knew that the practices were terrible. It was clear to me from the start that the agency was applying lousy information security practices. Emails with sensitive attachments is a no-no as they are not encrypted en-route. Furthermore, copies of the emails linger in the sender’s outbox and the recipient’s inbox. If one of the <a href="http://www.rew.ca/news/fraud-alert-1.1342185">mailboxes is compromised</a>, the documents can easily be retrieved. As for transparency, I had no clue where my files would be stored and how they would be disposed. I could only assume the worst.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/real-estate-phishing.jpg" alt="How Economists Can Help Protect Personal Data"></p>
<p>The problem is that I spent about a decade in the information security industry. Without boasting about my skills here, it is unrealistic to expect from everyone to be an information security expert. Even if the company is fully transparent, one would need a high-level of technical knowledge to understand what is going on. Most of us, understandably, are not willing to invest years in understanding secure data management practices and have better things to do. Education may work in simple situations, but not this one.</p>
<h3 id="solution2ratingsitesanduserreviews">Solution 2: Rating Sites and User Reviews</h3>
<p>The second option is lowering the incentives to exploit the information asymmetry situation. For example, rating sites like Yelp! makes restaurant-owners interested in providing a better service rather than cutting corners here and there. If a restaurant is continuously getting bad reviews for the overall experience, it will soon go out of business. Amazon, Airbnb and eBay are also good examples how poor user-ratings can drive sellers with poor practices (as known as ‘<a href="https://en.wikipedia.org/wiki/The_Market_for_Lemons">lemons</a>’) out from the market.</p>
<p>We should let customers rate companies by their privacy and data management practices. Does a company have an upload portal for sensitive documents? Is strong authentication (e.g. two-factor) available? Is it easy to delete an account? Five stars! Does the loyalty program <a href="https://www.gizmodo.com.au/2013/03/big-data-brokers-they-know-everything-about-you-and-sell-it-to-the-highest-bidder/">sell your personal details and your purchase history to data brokers</a>? Is the business asking for more information that it needs to provide you its service? Booo, 0/10!</p>
<p>Recently, security blogger, Troy Hunt went as far as suggesting to put warning labels on IoT devices:</p>
<blockquote class="twitter-tweet" data-lang="en"><p lang="en" dir="ltr">Hey <a href="https://twitter.com/vtechtoys?ref_src=twsrc%5Etfw">@vtechtoys</a>, how about put this warning on the box so it can be seen before purchasing? Yeah, didn’t think so... <a href="https://t.co/erdFdUp4jS">https://t.co/erdFdUp4jS</a> <a href="https://t.co/qRUUCmz1SY">pic.twitter.com/qRUUCmz1SY</a></p>&mdash; Troy Hunt (@troyhunt) <a href="https://twitter.com/troyhunt/status/918567609099984897?ref_src=twsrc%5Etfw">October 12, 2017</a></blockquote>
<script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
<p>On a related note, the OAIC <a href="https://www.oaic.gov.au/engage-with-us/consultations/notifiable-data-breaches/">Notifiable Data Breaches scheme</a> could also serve as a  some kind of rating system. From 2018, Australian companies earning over $3M in revenue will be required to submit a formal report to the Information Commissioner in circumstances where they have been hacked and personal or financial data was involved. If I could simply look up how many times my real estate agency was affected by a data breach, I would certainly pick a different company if they had previously been involved in a data breach.</p>
<h3 id="solution3certificationprograms">Solution 3: Certification Programs</h3>
<p>The third option is a licensing scheme, in which independent third-parties could review and enforce good data management practices. Certifications can reward and enforce good practices in other industries. For example, taxi drivers cannot even operate without a licence. Mandatory certifications can guarantee and enforce a minimum standard of service within an industry.</p>
<p>Another successful certification program is <a href="http://www.haccp.com.au/">HACCP</a>, which keeps restaurants clean around the world. This certification scheme prescribes food handling and good hygiene practices that keep customers safe from biological hazards. Some of the rules may seem bureaucratic and cumbersome, but at the end of the day, patrons do not usually leave HACCP-compliant restaurants with food poisoning.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/haccp.jpg" alt="How Economists Can Help Protect Personal Data"></p>
<p>We could apply the same approach to companies handling sensitive personal information. For instance, we could let an independent body tell us whether a company is managing sensitive data responsibly. What if all organisations that carry out the ‘100 point ID checks’ had to be compliant with a collection of rigorous security practices? What if my rental agency would not be allowed to process documents for the 100 points check if the company was negligent? In case a restaurant does not comply with the rules, HACCP food safety auditors can revoke or suspend their licences. Similarly, my rental agency without the identity checks should not be able to sign new lease agreements.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/100-points-bank.jpg" alt="How Economists Can Help Protect Personal Data"></p>
<p>On a related note, failed self-regulatory certificate programs demonstrate that certifications are not taken seriously if the penalties are rarely enforced. <a href="https://www.pcisecuritystandards.org/">PCI DSS</a> is probably one of the better-known ones, which is supposed to apply good information security practices to companies processing credit card payments. However, <a href="https://nakedsecurity.sophos.com/2014/04/23/pci-dss-why-it-fails/">fines are almost never imposed</a>, and <a href="https://securityledger.com/2017/09/report-data-breaches-claim-2-billion-records-in-h1-more-than-all-of-2016/">data breaches are still rampant</a>.</p>
<h2 id="thisisalltheorybutdothesepracticeswork">This is all Theory! But Do These Practices Work?</h2>
<p>The three approaches outlined above may sound academic, but they are already working practice. User ratings and certifications protect privacy and security of the Internet everyday, and here is how:</p>
<ul>
<li>
<p>User ratings are used to tackle phishing. A service called <a href="https://www.spamcop.net/">SpamCop</a> is a DNS-based email block list (DNSBL) that powers the email filter of a flurry of free (Postfix, Sendmail) and commercial email gateways (Cisco IronPort). Anyone can ‘rate’ phishing emails by submitting them to SpamCop on a voluntary basis. Emails which end up on the SpamCop blocklist are usually blocked by email gateways integrated with SpamCop, and they never reach the recipient's mailbox.<br>
<img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/spamcop-2.jpg" alt="How Economists Can Help Protect Personal Data"></p>
</li>
<li>
<p>Internet users are protected by a rating system called <a href="https://safebrowsing.google.com/">Google Safe Browsing</a>, which is a service that allows anyone to flag malicious and deceptive websites. Popular web browsers like Firefox and Chrome are all integrated to this service. Every time you visit a site, your web browser looks the URL up on the Safe Browsing service. If the website is flagged as malicious, the browser rejects to load the page.</p>
</li>
<li>
<p>As for independent ratings, the <a href="https://thatoneprivacysite.net/vpn-comparison-chart/">VPN Comparison Chart</a> is an independent certification scheme that works. The maintainer nicknamed ‘That One Privacy Guy’ is essentially a ‘certification body’ who is widely accepted within the privacy community as an authority. His VPN Chart is a checklist of good privacy and security practices. More than two-hundred paid VPN providers are assessed against a hundred of different criterions such as jurisdiction and logging practices. That One Privacy Guy's <a href="https://thatoneprivacysite.net/vpn-review-badge-chart/">Badge Chart</a> shows which paid VPN providers are embracing good privacy practices. The consensus within the privacy community is that the VPN providers from the top of the list are safe to use.</p>
</li>
</ul>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/vpn-badge-2.png" alt="How Economists Can Help Protect Personal Data"></p>
<p>In summary, the Internet community can fight deceptive emails and websites by closing the information gap with these services. As for certifications, the Internet community has accepted a quasi-authority that rates third-party VPN providers by a set of arbitrarily-chosen good practices.</p>
<h2 id="theinformationasymmetryissolvable">The Information Asymmetry is Solvable</h2>
<p>As some of the practical examples from above demonstrate, the information gap between companies which store our sensitive personal data and the consumer is solvable. Principles borrowed from economics, namely education, rating systems, and regulations could be applied to solve the privacy challenges between sellers and customers.</p>
<p>The first option that closes the information gap is education. If customers knew how their personal data is to be managed by a company, they would be able to make more informed decisions. However, it is impractical to train all consumers into full-blown information security professionals to allow them to make these decisions on their own.</p>
<p>Community-powered rating systems, on the other hand, could signal whether a company is responsibly managing personal data or not. Better informed customers could rate the data management practices of a company, which would allow others to make a better-informed decisions. Albeit rating systems are inherently imperfect, issues like fake reviews are well understood and can be managed.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/uranium-ore-review.jpg" alt="How Economists Can Help Protect Personal Data"></p>
<p>Finally, industry-specific certifications and legislation could ensure that our sensitive data ends up in safe hands. The threat of losing business because of the loss of licence can be a strong incentive to apply good data management practices. For instance, peak bodies, self-regulatory organisations or legislation could specify minimum standards, and companies who fail to tick all the boxes should not be able to carry out the 100 points ID checks. The threat of losing business could incentivise companies to invest into better security and data management practices.</p>
<h2 id="whatisnext">What Is Next?</h2>
<p>If you are in Australia, participate in the ongoing <a href="https://www.oaic.gov.au/engage-with-us/consultations/notifiable-data-breaches/">consultation process of the Notifiable Data Breaches scheme</a>. If you are living abroad, keep an eye on emerging trends like <a href="https://www.schneier.com/news/archives/2017/08/is_it_time_to_regula.html">IoT regulations</a> and <a href="http://www.eugdpr.org/">GDPR</a>, they are both exciting areas to explore further. As for the 100 points check, it is likely that the <a href="https://auspostenterprise.com.au/insights/digitising-services/future-of-identity-services-lies-in-choice-control-and-security">AusPost Digital iD™</a> or other Verification of Identity (VoI) providers will replace or complement the current online identity checking practices.</p>
<p><em>The author is the president of the not for profit organisation named <a href="https://cryptoaustralia.org.au/">CryptoAUSTRALIA</a>, whose vision is a society where everyone in Australia has the necessary skills to defend their privacy.</em></p>
<p><em>Edits and peer review: <a href="https://twitter.com/nkav">Nick Kavadias</a></em></p>
<p><em>Image Credits:</em></p>
<ul>
<li><a href="https://www.pinterest.co.uk/pin/48061921004830592/">https://www.pinterest.co.uk/pin/48061921004830592/</a></li>
<li><a href="https://www.tinytickle.co.uk/commodore-ads/images/kids-education.jpg">https://www.tinytickle.co.uk/commodore-ads/images/kids-education.jpg</a></li>
<li><a href="http://www.infosurv.com/survey-incentives-to-use-or-not-to-use/">http://www.infosurv.com/survey-incentives-to-use-or-not-to-use/</a></li>
</ul>
</div>]]></content:encoded></item><item><title><![CDATA[How We Tried 5 Privacy Focused Raspberry Pi Projects]]></title><description><![CDATA[How our team got together to trial five Raspberry Pi projects for turning one into an engaging CryptoAus workshop]]></description><link>https://blog.cryptoaustralia.org.au/2017/10/05/5-privacy-focused-raspberry-pi-projects/</link><guid isPermaLink="false">59d4d3b2d433d019c64e2bcc</guid><category><![CDATA[Pi-hole]]></category><category><![CDATA[Events]]></category><dc:creator><![CDATA[Gabor Szathmari]]></dc:creator><pubDate>Thu, 05 Oct 2017 03:54:04 GMT</pubDate><media:content url="https://blog.cryptoaustralia.org.au/content/images/2017/10/cover-2.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/cover-2.jpg" alt="How We Tried 5 Privacy Focused Raspberry Pi Projects"><p>At CryptoAUSTRALIA we are always asking ourselves the question: How can we teach everyone in Australia to defend their privacy? We believe in the “learning-by-doing” approach, so what could be more fun and engaging than a hands-on workshop? Once we realised how many excellent privacy-related tools are available for the Raspberry Pi, we began looking into dozens of these projects. So we hand-picked a shortlist of the interesting ones from the plethora of RPi projects available and got together on the long weekend to trial them.</p>
<p>We planned to get together on a glorious Saturday to eat as many hot dogs as humanly possible and to showcase the shortlisted projects to each other. The goal was to pick the best project by day’s end and turn it into an exciting series of CryptoAus workshops for the benefit of the community. The clear winner was the ad and malware blocking project 'Pi-Hole' and here is why.</p>
<h2 id="theshortlistedraspberrypiprojects">The Shortlisted Raspberry Pi Projects</h2>
<p>We picked the project candidates a couple of days before the get-together. Our selection criteria was simple: if the project had something to do with privacy, we gave it a go.</p>
<p>The final list of candidates we settled on was the following:</p>
<ul>
<li><a href="https://pi-hole.net/">Pi-Hole</a> – Ad-blocking service on your home LAN</li>
<li>Tor/VPN gateway – Protect the privacy of your network traffic from the ISP</li>
<li><a href="http://e2guardian.org/">e2guardian</a>/<a href="http://www.squidguard.org/">squidGuard</a> – Block malware and phishing websites on your devices</li>
<li><a href="https://www.circl.lu/projects/CIRCLean/">CIRCLean</a> – USB flash drive sanitiser</li>
<li><a href="https://www.bro.org">Bro IDS</a> – Detect if you have a malware-infected computer on your network</li>
</ul>
<h2 id="gettingourhandsdirty">Getting Our Hands Dirty</h2>
<p>So everyone got together around 10 am at my apartment along with their RPis and a few other accessories. Nick brought an LCD screen and keyboard with him, which turned out to be a good idea. Ed brought an old Raspberry Pi Model 1, so we were able to test how a project would run on a Pi Zero (they both have the same CPU and memory). Aiza got her USB card reader, and Roland brought his charming smile.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/image-2.jpg" alt="How We Tried 5 Privacy Focused Raspberry Pi Projects"></p>
<p>We spent the first hour setting up a second switch that Ed had smuggled in from the UK. My home router only had two available Ethernet ports for the five Raspberry Pi devices, so we desperately needed at least an additional four Ethernet ports. Ed fired up his shoddy BT router, which was probably full of unpatched vulnerabilities, and it was ready to go after a few missteps. We concluded that we would need a proper 8 or a 16-port purpose-built switch for an actual CryptoAus workshop to avoid long troubleshooting sessions.</p>
<p>In the meantime, we flashed a few SD cards with <a href="https://www.raspberrypi.org/downloads/raspbian/">Raspbian Stretch</a> and <a href="https://www.raspberrypi.org/downloads/noobs/">NOOBS</a>. Raspbian Lite can run on a 2 GB card, while NOOBS requires at least 8 GB. Once the wired and wireless networks were up and running, we quickly hooked up our RPis on the LAN and popped the freshly-written SD cards into the devices.</p>
<p>Raspbian has SSH disabled by default for security reasons unless an empty file named ‘ssh’ is written on the boot partition. Raspbian was then ready for action. We discovered NOOBS needed some user interaction and additional package downloads to get ready. As we are short on both network bandwidth and time on CryptoAus workshops, NOOBS will not be our choice of OS this time.</p>
<p>Once the Pis all booted up, we began installation of the projects, except for CIRCLean, but more about this later.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/image-3.jpg" alt="How We Tried 5 Privacy Focused Raspberry Pi Projects"></p>
<h3 id="pihole">Pi-Hole</h3>
<p>Pi-Hole is essentially a DNS server with a friendly web interface. The premise is that you run a DNS service on the local network, and use the Raspberry Pi as the server. Pi-Hole will take care of the DNS resolution by proxying the DNS traffic to third-party DNS services and blocking requests that feature on its blacklist.</p>
<p>Pi-Hole can be installed with a single command: <code>curl -sSL https://install.pi-hole.net | bash</code>. While this approach makes the installation process very simple, it is a bit scary as we were piping unknown Linux commands from a remote script file as the root user. However, we like to live life dangerously, so we did it anyway.</p>
<p>Nonetheless, the installation only took a couple of minutes. Once it was complete, we were able to connect to the admin panel with a web browser. We navigated to the ‘Settings’ tab and changed two things: the upstream DNS servers and the blocklists.</p>
<p>The default upstream DNS servers on the Pi-Hole are <a href="https://developers.google.com/speed/public-dns/">Google DNS</a> (8.8.8.8, 8.8.4.4), which offers neat things like DNSSEC signature validation. Some people, however, may prefer privacy-respecting DNS services like <a href="https://servers.opennic.org/">OpenNIC</a>. Other built-in options available like <a href="https://www.comodo.com/secure-dns/">Comodo</a>, <a href="https://dns.norton.com/">Norton ConnectSafe</a>) offer advanced security features, such as phishing protection. Paid upstream DNS services such as <a href="https://strongarm.io/">Strongarm</a> or <a href="https://umbrella.cisco.com/products/features">Cisco Umbrella</a> can be added to enjoy the benefits of advanced malware protection and web content filtering capabilities.</p>
<p>Long story short, we decided on free <a href="https://www.opendns.com/home-internet-security/">OpenDNS service</a> because of its essential security features. OpenDNS can block malware, phishing and botnet domains, as well as dodgy website categories like ‘Web Spam’.</p>
<p>The gist of Pi-Hole is the DNS-based blacklist, which is compiled from third-party blocklists. If a client makes a DNS request to Pi-Hole, and the requested hostname is on the blacklist, Pi-Hole will hijack the DNS response and will respond with a faux DNS record. The tampering is a good thing in this context, as the connecting clients will not be able to connect to third-party advertising servers or malicious websites to display ads or execute malware.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/image-6.jpg" alt="How We Tried 5 Privacy Focused Raspberry Pi Projects"></p>
<p>The default blocklist is not too restrictive. Depending on your personal preferences, you may only want to block ads and malware traffic, while others prefer blocking inappropriate websites at home. We found two excellent blacklist sources for malicious domains: <a href="https://wally3k.github.io/">The Big Blocklist Collection</a> and <a href="http://dsi.ut-capitole.fr/blacklists/index_en.php">Fabrice Prigent’s list</a>.</p>
<p>The Big Blocklist Collection features various feeds compiled for the Pi-Hole. Feeds such as Easylist feature in the well-known browser plugins like uBlock andAdBlock. Other feeds sourced from malware researchers such <a href="https://zeustracker.abuse.ch/">Zeus Tracker</a> are also available. In the end, we picked Easylist and Disconnect.me’s “simple ad” and “simple malvertising” lists. Interestingly, there is also a list for Samsung SmartTV owners who wish to block the chatty “smart” features of their TV's.</p>
<p>Fabrice Prigent maintains the other blocklist. His list is utilised by proxy servers such as squidGuard or e2guardian. Prigent maintains a website categorisation list, similar to commercial proxy appliances (e.g. BlueCoat. IronPort), where unwanted websites can be blocked by categories such as pornography, gambling, games or malware. Depending on your preferences, you may also prefer protecting your family from certain website categories.</p>
<p>We concluded that Pi-Hole is relatively straightforward to install and operate. The web UI is very intuitive and easy to use. We all agreed that this project is ideal for a CryptoAus workshop because our guests could just take their devices back home (or rebuild them in no time) and be up and running very quickly blocking ads and malware. The security and privacy benefits of a Pi-Hole device are immediate.</p>
<h3 id="torgateway">Tor Gateway</h3>
<p>The second project we have looked into is a secure gateway using Tor. The premise of the project is that you could run the Tor client on a Raspberry Pi and create a new Wifi Access Point (AP). The traffic from the devices connected to this AP are then tunnelled through the Tor network.</p>
<p>We thought that the project could potentially be useful for privacy-enthusiasts, who wish to minimise their metadata or penetration testers who prefer to keep their IP address hidden. OPSEC mistakes happen all the time with computer-based Tor clients, and this device would protect the user from IP and network traffic leaks.</p>
<p>The word ‘project’ is a bit of an exaggeration here because the Tor guides were more like ad-hoc write-ups than comprehensive and well-maintained projects. Nevertheless, we managed to source a few of these write-ups and gave them a try:</p>
<ul>
<li><a href="http://makezine.com/projects/browse-anonymously-with-a-diy-raspberry-pi-vpntor-router/">http://makezine.com/projects/browse-anonymously-with-a-diy-raspberry-pi-vpntor-router/</a></li>
<li><a href="https://learn.adafruit.com/onion-pi/what-youll-need">https://learn.adafruit.com/onion-pi/what-youll-need</a></li>
<li><a href="https://www.lifehacker.com.au/2017/03/how-to-anonymise-your-browsing-with-a-tor-powered-raspberry-pi/">https://www.lifehacker.com.au/2017/03/how-to-anonymise-your-browsing-with-a-tor-powered-raspberry-pi/</a></li>
<li><a href="https://pimylifeup.com/raspberry-pi-tor-access-point/">https://pimylifeup.com/raspberry-pi-tor-access-point/</a></li>
</ul>
<p>The problem we found with the guides was that they were not updated. Some of them were written for the Raspberry Pi 1 or 2 – which does not come with a built-in wifi device. Others were built on previous editions of Raspbian, where the wireless configuration was a bit different.</p>
<p>Long story short, we spent a good amount of time reading the various HOWTOs and trying to adopt them for Raspberry Pi 3 and Raspbian Stretch. There were a few issues with doing this. The first was that the various guides used different IP addressing, NAT and firewall rules, although we managed to overcome this. The real killer was the Wifi AP configuration. Even though we followed the official guide to install <code>hostapd</code>, our devices were not able to connect to the new access point for some reason. They just kept connecting and connecting, but the process never completed.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/image-5.jpg" alt="How We Tried 5 Privacy Focused Raspberry Pi Projects"></p>
<p>We spent more than an hour trying to debug the AP issue, the Wifi was simply not working. In this project's current state we thought it was unacceptable for a real-workshop. Getting the wifi AP working needs some work. Even though we still reckon a Tor gateway is really useful, we called it quits and gave up on the idea of running this as a workshop.</p>
<h3 id="e2guardiansquidguard">e2guardian / squidGuard</h3>
<p>This project was an ad-hoc idea that stemmed from the success with Pi-Hole earlier that day. We thought, Pi-Hole is something great, but its main purpose is ad-blocking and not content filtering. Pi-Hole has limitations because it can only do DNS blocking. In circumstances where we want to protect kids from accessing inappropriate content, we need URL filtering. So we thought we'd looked at a proxy service for a more sophisticated protection.</p>
<p>I vaguely remembered squidGuard, which is an add-on to the open-source <a href="http://www.squid-cache.org/">Squid proxy</a>. After some quick research, we found two ways to block website categories with open-source tools: squidGuard and e2guardian.</p>
<p>The first pick was <a href="http://www.squidguard.org/">squidGuard</a>, which runs Squid proxy under the covers. Now both squidGuard and Squid need to be configured from the command-line and it can get a bit messy. The complicated configuration process was a bit worrying considering the mixed experience levels of participants we get at CryptoAus workshops. Secondly, we only have about 1 to 1.5 hours before guests start to lose interest. We concluded that this would not work because of lots of manual steps and time constraints.</p>
<p>We also gave <a href="http://e2guardian.org/">e2guardian</a> a try. The project is a fork of the stale Dansguardian project. Sadly, the configuration experience was very similar to squidGuard.</p>
<p>The final nail in the coffin was when we discovered that almost every single free third-party website categorisation project had been abandoned. The heart of these projects are the third-party feeds with lists of inappropriate websites and URLs assigned into the unwanted website categories.</p>
<p>Although we thought a proxy is a good method for filter offensive content at home, we found the projects inappropriate for the workshops because of complexity and project inactivity. The installation and configuration should be automated or be easy to be a viable choice for a CryptoAus workshop. Simple web GUIs are ideal, where users can just tick and untick website categories(e.g. malware, gambling). Both these projects require configuration file editing.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/image-4.jpg" alt="How We Tried 5 Privacy Focused Raspberry Pi Projects"></p>
<h3 id="circlean">CIRCLean</h3>
<p>This project is an interesting one: <a href="https://www.circl.lu/projects/">CIRCLean</a> is a USB sanitiser tool created by <a href="https://www.cert.lu/">CERT Luxembourg</a>. A CIRCLean device can potentially be used by those receiving files on USB drives frequently such as journalists.</p>
<p>A USB drive with malicious intent could:</p>
<ul>
<li>Trick the computer into recognising the device as a keyboard and type a pre-written set of keystrokes. For example, a <a href="https://hakshop.com/products/usb-rubber-ducky-deluxe">USB Rubber Ducky</a> could open a Terminal, then download and install a backdoor on the computer in under a minute. <a href="https://arstechnica.com/information-technology/2016/09/stealing-login-credentials-from-a-locked-pc-or-mac-just-got-easier/">Computers can be disguised as flash drives</a>, too.</li>
<li>Autorun, AutoPlay or <a href="https://threatpost.com/stuxnet-lnk-exploits-still-widely-circulated/125089/">exploits</a> run a malicious file automatically</li>
<li>The files themselves may also hide malicious content</li>
</ul>
<p>What a CIRCLean device does is transfer the files from an untrusted USB flash drive to a second USB device. CIRCLean merely copies text and audio files from one to the other. On the other hand, files with active content (Word documents with macros) are flagged as ‘dangerous’ once they are copied to the second device. Executable files are also renamed to <code>DANGEROUS_filename_DANGEROUS</code>.</p>
<p>Once we downloaded the latest CIRCLean image from GitHub, we <code>dd</code>’d the image file onto the memory card. As opposed to the other projects, the image already comes with an older edition of Raspbian, so it should have started working out of the box - as we thought.</p>
<p>Once we popped the card in, we tried to figure out what to do now. We wanted to SSH into the device to download the latest updates, but the device just did not respond. We had a second look at the CIRCLean instruction manual, and apart from a <a href="https://github.com/CIRCL/Circlean#usage">short HOWTO guide</a>, we found the documentation quite brief. We managed to find a few other files under the <code>doc/</code> folder on GitHub, but we did find <a href="https://github.com/CIRCL/Circlean/blob/master/doc/image_setup_checklist.md">the documentation</a> neither self-explanatory nor relevant.</p>
<p>We ended up wondering what to do now with the device. We probably should have connected the Raspberry Pi to LCD screen at this point to see what was going on. However, we got a bit demotivated by then, so we gave up after a few additional SSH attempts and moved on to the next project.</p>
<p>Nonetheless, we think this is an admirable project and would probably give it another try on a separate occasion. The documentation, however, could be a bit more extensive. Perhaps a video guide would lower the bar for everyone, especially if the target audience does not necessarily possess advanced tech skills such as journalists.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/image-1.jpg" alt="How We Tried 5 Privacy Focused Raspberry Pi Projects"></p>
<h3 id="broids">Bro IDS</h3>
<p>We ran out of hot dogs our attention had started to shift to the AFL Grand Final by the time we got to this last one. The premise of this idea was to install a homebrew Intrusion Detection System (IDS) on a Raspberry Pi for detecting malware activity on your home network. This would allow users to identify and disconnect an infected device from your network before valuable files and sensitive passwords would start leaving your computer.</p>
<p>But first, what is an IDS? A typical IDS is usually an appliance that big corporates buy for a fortune, the incident handler team wastes their time with false positive alerts and years later the device ends up in the bin.</p>
<p><a href="https://www.bro.org">Bro IDS</a>, on the other hand, is a robust system that features a powerful scripting language and lots of functionality straight out of the box. Simply put, it inspects network traffic on the LAN and looks for signs of suspicious activity. For example, if one of your laptops starts connecting to a malware command-and-control (C2) domain, it is very likely that the device has been compromised. So, we thought it might be a good idea to put Bro IDS on a Raspberry Pi for policing your devices on your home LAN.</p>
<p>We found a few promising projects with varying levels of maturity:</p>
<ul>
<li><a href="https://github.com/TravisFSmith/SweetSecurity">https://github.com/TravisFSmith/SweetSecurity</a></li>
<li><a href="https://www.tripwire.com/state-of-security/security-data-protection/sweet-security-part-2-creating-a-defensible-raspberry-pi/">https://www.tripwire.com/state-of-security/security-data-protection/sweet-security-part-2-creating-a-defensible-raspberry-pi/</a></li>
<li><a href="https://github.com/musicmancorley/BriarIDS">https://github.com/musicmancorley/BriarIDS</a></li>
<li><a href="http://www.binorassocies.com/en/blogs/2016/03/brostash.html">http://www.binorassocies.com/en/blogs/2016/03/brostash.html</a></li>
<li><a href="https://www.sneakymonkey.net/2016/10/30/raspberrypi-nsm/">https://www.sneakymonkey.net/2016/10/30/raspberrypi-nsm/</a></li>
<li><a href="https://xn--blgg-hra.no/2015/11/installing-bro-the-network-security-monitor-on-raspberry-pi/">https://bløgg.no/2015/11/installing-bro-the-network-security-monitor-on-raspberry-pi/</a></li>
</ul>
<p>The most promising one was <a href="https://github.com/TravisFSmith/SweetSecurity">SweetSecurity</a>, which is a collection of scripts to install Bro IDS and other tools with a few commands. Once a fresh installation of Raspbian was up and running, we cloned SweetSecurity and ran the installer.</p>
<p>Unfortunately, we ran into problems again. First of all, the full install requires at least 2 GB of RAM, while the Raspberry Pi Model 3 only has 1 GB. No worries, we re-ran the installer and picked ‘Sensor Install’ which is supposed to only deploy Bro IDS. It turned out that the scripts install Bro from source, so compilation on an RPi would have taken too long. Normally, this is not an issue. However, we would hit the 1-1.5 limit on the CryptoAus workshop. At this point in the afternoon we were all exhausted, so we started to wrap this up.</p>
<h2 id="whatdidwechooseandwhy">What Did We Choose and Why</h2>
<p>By the end of the session, we all felt that Pi-Hole was the strongest contender for the CryptoAus workshop.</p>
<p>We found that Pi-Hole was very easy to install and configure, and it provides a great deal of privacy and security benefits for the user and their families. Pi-Hole installs and configures itself with just a minimal user interaction. Although the default configuration just works fine, it was easy to fine-tune the device with a web browser. We found the admin panel was easy to use and every configuration option was just self-explanatory. Finally, Pi-Hole ran perfectly on older RPi devices with slower processors and lower memory, such as the original Model 1 (also Pi Zero).</p>
<p>Furthermore, we thought that the additional value CryptoAUSTRALIA could bring to the workshop was the know-how around:</p>
<ul>
<li>the third-party DNS servers</li>
<li>the ad and malware blocklists</li>
<li>the website category filters</li>
</ul>
<p>Different DNS services offer different benefits: while some of them focus on privacy, others provide protection from phishing and other malicious websites. Same goes for the blocklists: some of them can blackhole ads, while others can block other things like URL shorteners or phishing sites. Certain lists and the website category filters could help protect the family from inappropriate content such as adult content. We have all this experience accumulated in the team, and we are ready to hand it over.</p>
<h3 id="whatabouttheothers">What About the Others?</h3>
<p>We found the other five projects also had benefits, but unfortunately, the constraints of the workshop would not allow us to feature any of them. We would give CIRCLean a try again probably at an event for journalists. We would reconsider the Tor gateway one if a HOWTO were available for Raspberry Pi 3 or the process would be automated with scripts or Ansible. Sadly, e2guardian and squidGuard seem to be too complicated, and Bro just takes too much time to set everything up.</p>
<h2 id="whatisnext">What Is Next?</h2>
<p>We still have to figure a few details out, like do we provide hardware at the workshop or we let everyone to bring their own? Should we provide memory cards with Raspbian on it, or do we even include time at the event for writing the OS onto the card? Will we have enough time remaining then? Or what blocklists to suggest and why? If you are keen answering these questions or volunteering with this up-coming workshop, please drop us a line.</p>
<p>Otherwise, keep an eye on our event page and our <a href="https://twitter.com/cryptoaustralia">Twitter feed</a>, as we will be publishing more details about the upcoming CryptoAus workshop in the forthcoming weeks.</p>
<p><em>If you are interested in the upcoming Raspberry Pi workshop, make sure to <a href="https://twitter.com/CryptoAustralia">follow us on Twitter</a> and subscribe to our Meetup groups at <a href="https://cryptoaustralia.org.au/events">https://cryptoaustralia.org.au/events</a></em></p>
<p><em>Disclaimer: None of the brands on the photos nor Raspberry Pi has sponsored CryptoAUSTRALIA</em></p>
</div>]]></content:encoded></item><item><title><![CDATA[What's Up Doc?]]></title><description><![CDATA[Healthcare and human errors: How did a simple visit to my doctor turn into a privacy breach]]></description><link>https://blog.cryptoaustralia.org.au/2017/10/03/whats-up-doc/</link><guid isPermaLink="false">59d2b731d433d019c64e2bc6</guid><dc:creator><![CDATA[Karissa A. Breen]]></dc:creator><pubDate>Tue, 03 Oct 2017 00:45:54 GMT</pubDate><media:content url="https://blog.cryptoaustralia.org.au/content/images/2017/10/doc-cover-1.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/doc-cover-1.jpg" alt="What's Up Doc?"><p>So I am pretty bad at going to the doctor on time, yes I am one of <em>those</em> people who get the overdue notifications on the weekly.</p>
<p>I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts it’s one of those situations where you put your script in your bag and run out.</p>
<p>When I needed to return back to the doctor, overdue of course. I realised that when I was consulting my nurse, they asked me my date of birth, which is totally normal. But then I heard this awkward silence, “that is not correct Miss Breen”. I was actually super concerned that I couldn’t remember my date of birth... #awkward.</p>
<h2 id="thecomedyoferrors">The Comedy of Errors</h2>
<p>The doctor then called me by a different name, and it wasn’t Karissa... it was some randoms name! I then took back the script to realise that the document was actually not my script... it was in fact someone else’s! I perused the document and yep there it was, full name, date of birth, address and phone number, enough to create a fake identity under this person’s name. Things were definitely uncomfortable on both ends by this point.</p>
<p>The part that set me back by this situation was that no one from the doctor's surgery really knew how to handle the situation. After some backwards and forwards, I started to feel pretty bad that I had a random person’s private details in my hands. For someone who is a security person, this raised great concerns as I am not sure if everyone would be honest as I was about this situation.</p>
<p>When you hear on the news around data breaches, this is an example of an accident that could go terribly wrong. My original doctor wasn’t actually in that day, so another doctor had to “make some changes” on my script. I then had to go back to the pharmacy with an “updated” script.</p>
<p>But, what concerns me is that I actually don’t know if this same situation with my details has landed in the hands of some other random in Sydney and is floating about. I think the main problem is the lack of due diligence on both ends. I probably should have checked before leaving the doctor when I was issued with the script. Although, I do believe doctors need to be mindful of ensuring they are not giving away sensitive information to the next person.</p>
<h2 id="securitytroublesinthehealthcaresector">Security Troubles in the Healthcare Sector</h2>
<p>The <a href="http://www.verizonenterprise.com/verizon-insights-lab/dbir/">Verizon Data Breach Investigation Report</a> is an annual report on data breach trends. Verizon uses questionnaires and hundreds of key industry players to contribute to the report with data and feedback.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/dbir.png" alt="What's Up Doc?"></p>
<p>Healthcare is usually one category in the report. Take a look at the 2017 report, you can find the relevant section on page 22. According to the report, the major reason of data breaches in healthcare are: <strong>'Human Errors'</strong> (the report calls it 'Miscellaneous Errors') and <strong>'Physical Theft and Loss'</strong>.</p>
<p>The paragraph with the heading <strong>&quot;A comedy of errors&quot;</strong> perfectly shows what Human Errors mean and actually this ties into my current example shared above.</p>
<p>Check out page 50, there is a section dedicated to <strong>&quot;Miscellaneous Errors&quot;</strong> elaborating this data breach type in detail.</p>
<p>If you open the 2016 report, and look for the similar sections, you see it has not really changed over time. Human Errors in Healthcare is #1. If you go to page 11, the matrix underpins this claim.</p>
<p>Check it out here:</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/matrix-dbir.jpg" alt="What's Up Doc?"></p>
<h2 id="whatcanwedo">What Can We Do</h2>
<p>The takeaway from my own experience is that humans make mistakes and training can help prevent these situations from happening. Implementing correct processes in place would have remediated this situation quickly and would limited upheaval.</p>
<p><em>Here is the example of the script, for privacy reasons, the details have been redacted.</em></p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/10/receipt.jpg" alt="What's Up Doc?"></p>
<p>For Australians, The Australia Privacy Foundation raised the threats of the consolidated patient register called '<a href="https://www.privacy.org.au/campaigns/myhr/">My Health Record</a>'.</p>
<p>Human errors are a bad case of things like this going wrong. This is my own personal story and I wanted to share with you that these types of incidents happen on the daily and it is not always an organised crime for these types of events. I would be super keen to <a href="mailto:karissa@karissabreen.com">hear your own personal stories</a>, with something similar.</p>
<p>Keep on keepin’ on,<br>
<strong>KB</strong></p>
<p><em>This article first appeared in <a href="https://www.kabtechnology.com/single-post/2017/09/29/Whats-up-Doc">Karissa Breen's blog</a>. Photo courtesy of <a href="https://www.flickr.com/photos/149902454@N08/35081941020/in/photolist-Vs57Q5-iXgVYv-4rNgLg-7nhevd-8PBcVd-n92pdP-54XALL-hL95uB-5Ez381-c3Z2hb-5G8v4g-63QLz6-9QXTeX-9xhtSr-aUyBwe-9fmxji-Evuv-bqihmj-81LwNX-7nBd2K-bzS3pD-fA1TS9-YW9Cyq-dHYcU8-cne61J-dVgaqM-dHYcwD-aUyt8r-eaRQV1-a8tDrJ-esrHN-eaRS2f-eaRRBE-7nF82w-eaRSoj-aUyDAD-5Mqas3-96ju5f-b33r5r-eNwAdB-4oCome-9Qut2a-aUyv3P-4V1yvZ-bmXcYm-nvf8UF-9141Uq-qnVoHw-ibE2R6-xXdZu">Hamza Butt</a></em></p>
</div>]]></content:encoded></item><item><title><![CDATA[Cheap Shots are taking Creep Shots of Women]]></title><description><![CDATA['Creep Shots' is a worrying new trend targeting women. We are taking a closer look, explain what this means and what women to do about it]]></description><link>https://blog.cryptoaustralia.org.au/2017/09/19/cheap-shots-are-taking-creep-shots-of-women/</link><guid isPermaLink="false">59be4f01d433d019c64e2bb8</guid><category><![CDATA[Online Safety]]></category><dc:creator><![CDATA[Karissa A. Breen]]></dc:creator><pubDate>Tue, 19 Sep 2017 00:30:00 GMT</pubDate><media:content url="https://blog.cryptoaustralia.org.au/content/images/2017/09/creepshots-cover-1.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://blog.cryptoaustralia.org.au/content/images/2017/09/creepshots-cover-1.jpg" alt="Cheap Shots are taking Creep Shots of Women"><p>Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you?</p>
<p>Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to.</p>
<h2 id="whatisacreepshot">What is a Creep Shot?</h2>
<p>A creep shot is a photo taken directly of women in public by men.</p>
<p>Creep shots are focused on female’s bodies that are clothed. These cheap shots are sexually suggestive rather than sexually explicit. Cheap shots are a slight variation of the technology-driven sexual cyber violence that we have all heard of like revenge porn, up skirting and unsolicited male pics.</p>
<p>As everyone wants to be innovative and ‘trending’, new technologies like camera pens, Google Glass and shoe spy cameras has allowed more people to take photos, however, technology has made it easier for the cheap shots to capture their token creep shots. This is even going next level that there are cheap shot websites where men are assessing the calibre of the cheap shots with other creep shot men.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/09/image-1.jpg" alt="Cheap Shots are taking Creep Shots of Women"></p>
<p>What is going on in the world? Good question, I am asking the same thing. There is really limited knowledge on why people do what they do. Although it did become apparent that the creep shots thought it was harmful and funny, good joke lads. Perhaps some of the creep shots feel it’s their only way to fit and feel a part of a club – how about joining the golf club?</p>
<h2 id="helpisavailable">Help is Available</h2>
<p>We have been noticing that other nations are trialling cyber harassment helpline. One of the <a href="https://digitalrightsfoundation.pk/wp-content/uploads/2017/07/Cyber-Harassment-Helpline-Six-Month-Report.pdf">initiatives hosted by Pakistan</a> addresses the gaps women face when dealing with these pretty awkward situations. The helpline also offers a safe house for women to feel supported. The support staff have developed in-depth privacy which includes caller confidentiality and high-quality support service.</p>
<p>This ridiculous behaviour puts women in a vulnerable position and potentially put them at risk if they confront the creepers.</p>
<p>As for Australia, the <a href="https://www.esafety.gov.au/women">Office of the eSafety Commissioner</a> has put together some material called <strong>eSafety Women</strong> to assist them when they are feeling vulnerable or threatened by some creeper related activity. This initiative is to empower women to take control of their online experiences.</p>
<p>Please review the eSafety Women program here: <a href="https://www.esafety.gov.au/women">https://www.esafety.gov.au/women</a></p>
<p>Stop creepin’!</p>
<p><em>CryptoAUSTRALIA thanks <a href="https://twitter.com/info_aus">Rosie Williams</a> for her valuable input that improved this article</em></p>
</div>]]></content:encoded></item><item><title><![CDATA[CryptoAUSTRALIA Signs Open Letter for Transparent Intelligence Sharing Activities]]></title><description><![CDATA[International coalition writes to intelligence oversight bodies in over 40 countries seeking information on intelligence sharing activities]]></description><link>https://blog.cryptoaustralia.org.au/2017/09/15/open-letter-transparent-intelligence-sharing-activities/</link><guid isPermaLink="false">59b931dad433d019c64e2ba7</guid><category><![CDATA[Announcements]]></category><dc:creator><![CDATA[CryptoAUSTRALIA]]></dc:creator><pubDate>Thu, 14 Sep 2017 21:29:00 GMT</pubDate><media:content url="https://blog.cryptoaustralia.org.au/content/images/2017/09/cover.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://blog.cryptoaustralia.org.au/content/images/2017/09/cover.jpg" alt="CryptoAUSTRALIA Signs Open Letter for Transparent Intelligence Sharing Activities"><p>The Australian Government must ensure transparency of its intelligence sharing with other countries in order to safeguard Australian citizens’ private information, a coalition of privacy and human rights organisations said at the launch of a new campaign.</p>
<p>An international coalition of 30+ organisations led by Privacy International (PI) has written to national intelligence oversight bodies in over 40 countries, including Australia, seeking information on the intelligence sharing activities of their governments.</p>
<p>Countries, including Australia, may use secret intelligence sharing arrangements to circumvent international and domestic rules against direct surveillance. These arrangements can also lead to the exchange of information that can facilitate human rights abuses, particularly in countries with poor human rights records or weak rule of law.</p>
<p>National intelligence oversight bodies hold intelligence agencies accountable to the public by exercising scrutiny over the legality, propriety, effectiveness, and efficiency of the intelligence activities of their governments. Recently <a href="https://theintercept.com/2017/08/19/nsa-spy-hub-cia-pine-gap-australia/">it was revealed</a> that intelligence from the Pine Gap base in Alice Springs is being used by the US in its deadly, covert drone strike program that has caused significant civilian casualties overseas.</p>
<p>The coalition of human rights organisations has written to countries including those who form the <a href="https://privacyinternational.org/node/1480">Five Eyes Alliance</a>, which is a secretive, global surveillance arrangement between the United States, the United Kingdom, Canada, Australia and New Zealand. The letter was also sent to nearly all of the countries forming surveillance partnerships that have grown from the Five Eyes: the Nine-Eyes (the Five Eyes plus Denmark, France, the Netherlands and Norway), the 14-Eyes (the Nine-Eyes plus Belgium, Germany, Italy, Spain and Sweden), and the 43-Eyes (the 14-Eyes plus the 2010 members of the International Security Assistance Forces to <a href="http://www.nato.int/cps/en/natohq/topics_69366.htm">Afghanistan</a>).</p>
<p>Specifically, organisations are seeking more information about whether these national oversight bodies:</p>
<ul>
<li>Are informed about the intelligence sharing activities of their governments;</li>
<li>Can independently oversee the intelligence sharing activities of their governments;</li>
<li>Can access all relevant information about the intelligence sharing activities of their governments;</li>
<li>Can review decisions by their governments to share intelligence and/or conduct independent investigations into the intelligence sharing activities of their governments; and</li>
<li>Cooperate with other oversight bodies to supervise the intelligence sharing activities of their governments.</li>
</ul>
<p>A deadline of 31 October 2017 has been given for each national oversight body to respond. PI has created <a href="https://privacyinternational.carto.com/builder/28fccac2-3349-46e5-91bd-fd676d0efe1f/embed">an interactive map</a>, which illustrates the countries included in the campaign and the national intelligence oversight bodies that have been contacted in each country. The map will be updated when responses are received.</p>
<p>PI has also provided national oversight bodies with <a href="https://www.documentcloud.org/documents/3990954-PI-Briefing-to-National-Intelligence-Oversight.html">a briefing</a> highlighting the international human rights implications of intelligence sharing arrangements between governments, with recommendations to increase transparency around these activities.</p>
<p>The global coalition of 30+ human rights organisations includes 6 Australian-based organisations: Australian Lawyers for Human Rights, CryptoAUSTRALIA, Digital Rights Watch, Electronic Frontiers Australia, the Human Rights Law Centre, and the NSW Council for Civil Liberties.</p>
<p><strong>Scarlet Kim, Legal Officer at Privacy International, said:</strong></p>
<p><em>&quot;As intelligence agencies around the world have expanded their surveillance capabilities, so has the amount of information they exchange with each other, including data collected in bulk. These sharing arrangements are shrouded in secrecy and shielded from accountability. National oversight bodies perform a critical role in holding intelligence agencies accountable. The public has a right to know whether their mandates include scrutiny of intelligence sharing and what form this scrutiny takes.&quot;</em></p>
<p><strong>Benedict Coyne, President, Australian Lawyers for Human Rights, said:</strong></p>
<p><em>“In the light of the legislation that the Australian Federal Government has passed requiring retention of Australians’ personal data, it is particularly important that Australians are informed about what is being done with that data, and how their privacy rights are being eroded without any public scrutiny.”</em></p>
<p><strong>Gabor Szathmari, President of CryptoAUSTRALIA, said:</strong></p>
<p><em>“While many Australian citizens are rightly concerned about the state of national security at the present moment, citizens would also like to be reassured that intelligence gathering is only conducted for the purpose of ensuring the security of citizens.”</em></p>
<p><em>“Australian oversight bodies should be empowered to act on behalf of the citizens of Australia and ensure that intelligence agencies are operating in a fair and transparent manner serving the people of Australia. These bodies include the Inspector-General of Intelligence and Security, Independent National Security Legislation Monitor, and the Parliamentary Joint Committee on Intelligence and Security.”</em></p>
<p><strong>Tim Singleton Norton, Chair of Digital Rights Watch, said:</strong></p>
<p><em>“The Australian public have a right to know the scale of privacy invasion that is being undertaken under the guise of national security. Our human rights to privacy are being compromised by widespread warrantless surveillance without adequate safeguards, and our partnerships with foreign governments such as those that form the Five Eyes is resulting in increasingly less transparency and oversight. Australian citizens have a right to understand these processes and what is being done to ensure they are accountable to a public good.”</em></p>
<p><strong>Emily Howie, Director of Legal Advocacy at the Human Rights Law Centre, said:</strong></p>
<p><em>“There are untold legal consequences of intelligence sharing that demand immediate inquiry. Documents revealed this year show that Australians are likely involved in intelligence sharing with the United States to locate the targets of the deadly US drone strike program.  If true, Australians could be complicit in civilian deaths from drone strikes - that might mean complicity in war crimes.”</em></p>
<p>*“The government has been given free reign to scoop up our personal information but won’t provide guarantees for how that information is passed on, including to international partners. It’s unacceptable and makes each and every one of us vulnerable.” *</p>
<p><strong>Dr Lesley Lynch from the NSW Council for Civil Liberties, said:</strong></p>
<p><em>“Whilst we accept that the Government must act to protect its citizens from current complex global security challenges (and intelligence gathering alliances with allies will be part of that), there is an obvious danger is that, in the process, we trash the very  core liberties that are fundamental to a healthy democracy.”</em></p>
<p><em>“Mass electronic surveillance by government agencies is a real threat to our democratic way of life if not appropriately constrained by effective independent oversight  - including sufficient transparency for the community to have a broad understanding of what kind of surveillance is conducted, on whom, who has access and how it is used.”</em></p>
<p><em>“Australia has a number of bodies oversighting our intelligence and security agencies. There has been some recent and welcome expansion of their responsibilities and  powers to match the rapid proliferation of our counter-terrorism laws. However, many questions remain as to the overall effectiveness of this oversight. Furthermore, the extreme secrecy and limited reporting to the public by these bodies makes it impossible for the community to exercise  effective democratic control as to the broad nature of our state surveillance agenda – at home or abroad. We must have a more balanced and less secretive approach to our national security policy.”</em></p>
<p><strong>Read the letters here:</strong> <a href="http://dl.cryptoaustralia.org.au/files/pi-open-letter/AUS%20Open%20Letter%20on%20Intelligence%20Sharing%20and%20Oversight%20%28INSLM%29.pdf">Independent National Security Legislation Monitor</a>, <a href="http://dl.cryptoaustralia.org.au/files/pi-open-letter/AUS%20Open%20Letter%20on%20Intelligence%20Sharing%20and%20Oversight%20%28Inspector-General%29.pdf">Inspector-General of Intelligence and Security</a>, <a href="http://dl.cryptoaustralia.org.au/files/pi-open-letter/AUS%20Open%20Letter%20on%20Intelligence%20Sharing%20and%20Oversight%20%28Parliamentary%20Joint%20Comm.%20Intel.%20Security%29.pdf">Parliamentary Joint Committee on Intelligence and Security</a>, <a href="http://dl.cryptoaustralia.org.au/files/pi-open-letter/PI%20Briefing%20to%20National%20Intelligence%20Oversight%20Bodies.pdf">PI Briefing</a></p>
<p><strong>See what people say on Twitter under the <a href="https://twitter.com/hashtag/intsharing">#IntSharing hashtag</a></strong></p>
<p><em>Update (20/10/2017): Response from the Parliamentary Joint Committee on Intelligence and Security Department of the House of Representatives is <a href="https://dl.cryptoaustralia.org.au/files/pi-open-letter/19.10.17%20to%20Privacy%20International%20et%20al.pdf">now available here</a></em></p>
<p><em>Update (2/11/2017): Response from the Inspector General of Intelligence and Security <a href="https://dl.cryptoaustralia.org.au/files/pi-open-letter/oig017_1-11-2017_16-05-53.pdf">is now available here</a></em></p>
</div>]]></content:encoded></item><item><title><![CDATA[Do I need AntiVirus on macOS?]]></title><description><![CDATA[Most macOS users still believe that macOS is free from malware. But
this is not true.But what is the solution? AV for macOS, or something
else?]]></description><link>https://blog.cryptoaustralia.org.au/2017/09/06/do-i-need-antivirus-on-macos/</link><guid isPermaLink="false">599e5543d433d019c64e2b72</guid><category><![CDATA[Malware]]></category><dc:creator><![CDATA[Zoltan Balazs]]></dc:creator><pubDate>Wed, 06 Sep 2017 02:05:41 GMT</pubDate><media:content url="https://blog.cryptoaustralia.org.au/content/images/2017/08/cover-2.png" medium="image"/><content:encoded><![CDATA[<div class="kg-card-markdown"><img src="https://blog.cryptoaustralia.org.au/content/images/2017/08/cover-2.png" alt="Do I need AntiVirus on macOS?"><p>I often get asked &quot;Should I use Antivirus software on my Mac?&quot; The answer is: it depends.</p>
<p><em>Note: This is a multipart article, <a href="https://blog.cryptoaustralia.org.au/2017/08/24/why-free-antivirus-better-than-no-av-and-worse-than-paid-av/">Part 1 is available here</a></em></p>
<p>The risk of getting infected on macOS is significantly lower than on Windows. But it is not completely zero. It is hard to find any good study on this topic (<a href="https://community.norton.com/en/blogs/norton-protection-blog/pc-or-mac-which-more-resistant-cyber-threats">here is one</a>), but this is a widely accepted fact at the moment. There are many factors which contribute to this lower risk:</p>
<ol>
<li>Fewer people use macOS than Windows</li>
<li>macOS upgrades (major releases) are typically free for a longer time than the Windows, therefore more Mac users update their OS than Windows users. Microsoft started the free upgrade from Windows 7 to Windows 10 some years ago, but previously, an upgrade like this was not free.</li>
<li>People using macOS tend to pay for their software and are less likely to pirate it from shady sites. Pirated software may contain adware, backdoors and hidden Bitcoin miner software that may harm your computer.</li>
</ol>
<p>Personally, I am not a fan of macOS Antivirus. macOS Antivirus never was the focus of development at AV companies. It is mostly reactive, and there are a lot less proactive features in it than in the Windows counterpart. For example, on Windows, AV can warn when a program accesses the webcam. On macOS, the AV can turn off the webcam, but it can’t warn when a program accesses the webcam.</p>
<p>When looking at independent tests of macOS Antivirus, you have to know that most labs do not have access to the latest macOS threats, so they tend to test with old and known malware. Which means the gap between synthetic test results (100%) and real life are even wider than in the case of Windows Antivirus tests. In other words, anti-malware tests you may read in magazines can be very misleading, as these tests are far from representing the real-life situation.</p>
<p>Also, macOS includes its own AV called <a href="https://support.apple.com/en-us/HT202491">GateKeeper</a>, which does a basic job of preventing the user from running malicious programs. GateKeeper prevents known malware from starting and warns the user if (s)he tries to execute unsigned stuff.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/08/image1.png" alt="Do I need AntiVirus on macOS?"></p>
<p>But there are ways around GateKeeper. For example: scripts (e.g. Python). Or Microsoft Office macros. Or in-memory malware. Or probably tens (hundreds?) of other ways. These techniques all can circumvent the built-in protection on Mac, which the more sophisticated malware products frequently do.</p>
<h2 id="sothenhowdoiprotectmyself">So then how do I protect myself?</h2>
<p>Instead of focusing on Antivirus, I recommend people install software which can restrict unauthorised access to critical parts of the operating system.</p>
<h3 id="networking">Networking</h3>
<p>One of the best security tools for macOS is <a href="https://www.obdev.at/products/littlesnitch/index.html">Little Snitch</a>. It is a software firewall which will notify the user every time an unknown application starts to communicate over the Internet. Training it in the first few days can be a bit time consuming, but after this time it performs nicely.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/08/image4.jpg" alt="Do I need AntiVirus on macOS?"></p>
<p>Problems can arise with application updates themselves not causing rules to not work anymore. Online meeting applications (GoToMeeting, Webex) can be particularly troublesome – these are updated frequently, and they may try to communicate with hosts on arbitrary ports.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/08/image3.png" alt="Do I need AntiVirus on macOS?"></p>
<h3 id="fileaccess">File Access</h3>
<p>Another great macOS tool is <a href="https://beta.f-secure.com/key/XFence">F-Secure X-Fence</a> (formerly Little Flocker), which monitors read and write file access. The same training concept applies as with Little Snitch – after the initial training period, it just works.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/08/image7.png" alt="Do I need AntiVirus on macOS?"></p>
<p>On the above screenshot, Microsoft Word tried to read/write/execute the <code>133t_0day.sh</code>. If the user blocks on Deny, this exploit is blocked.</p>
<h3 id="persistence">Persistence</h3>
<p><a href="https://objective-see.com/products/blockblock.html">BlockBlock</a> is a tool which alerts users when a program is installed that tries to execute itself every time the computer boots. Most malware uses some form of persistence to stay on a host after a restart. Because malware at some point in time has it to register itself with the OS; there are few ways to persist in an OS and most malware uses the same techniques, so this can be detected by AV software.</p>
<p>Note that I have not had first-hand experience with BlockBlock.</p>
<p><img src="https://blog.cryptoaustralia.org.au/content/images/2017/08/image6.png" alt="Do I need AntiVirus on macOS?"></p>
<p>On the screenshot, the <code>osxMalware</code> application tried to install itself, so it starts with every boot of the system. By clicking on 'Block', the user can block this action.</p>
<h2 id="conclusion">Conclusion</h2>
<p>By supervising the network communication, file access and persistence, users can create a safe environment, where totally new and unknown malware can be blocked. But these solutions can be a pain for novice users.</p>
<p>But trusting AV on macOS is not as a good choice as it is on Windows. For example, the <a href="https://babyphd.net/2017/08/wtf-is-safefinderoperatormac-campaign/">following article</a> details a malware campaign targeting macOS users, which went unnoticed by most macOS AV engine.</p>
<p>If you are a novice user, you can try to protect yourself with AV designed for macOS, but don’t expect much.</p>
<p>If you are a security conscious macOS user with some experience in IT, there are steps you can take to sleep better at night without AV (see <a href="https://www.obdev.at/products/littlesnitch/index.html">Little Snitch</a>, <a href="https://beta.f-secure.com/key/XFence">X-Fence</a> or <a href="https://objective-see.com/products/blockblock.html">BlockBlock</a>). While a determined attacker may find ways around your defences, whitelisting network, file access and OS service persistence is a good start against common threats.</p>
<blockquote class="embedly-card"><h4><a href="https://twitter.com/pwnsdx/status/845174836934598657">Sabri on Twitter</a></h4><p>CIA bypassed Little Snitch by injecting its malware into the browsers. Could have still been spotted with activity monitor</p></blockquote>
<script async src="//cdn.embedly.com/widgets/platform.js" charset="UTF-8"></script>
<p><em>Zoltan (<a href="https://twitter.com/zh4ck">@zh4ck</a>) is a full-time AntiVirus bypasser and public speaker from Hungary. He frequently rants on Twitter about how people should try things harder. He has experience from both blue and red side, and enjoys the cat and mouse game between attackers and defenders.</em></p>
<p><em>Peer review: AC</em></p>
<p><em>Photo courtesy of <a href="https://www.flickr.com/photos/38025693@N06/13165775453">Jose</a></em></p>
</div>]]></content:encoded></item></channel></rss>