Feeds

Think crypto hides you from spooks on Facebook? THINK AGAIN

Traffic fingerprints reveal all, say boffins

Security for virtualized datacentres

Activists just got another reason to worry about what spooks might be able to learn about them, with boffins demonstrating that a decent traffic fingerprint can tell an attacker what's going on, even if an app is defended by encryption.

The researchers from the Universities of Padua and Rome have found that for activities like posting messages on a friend's Facebook wall, browsing a profile on a social network, or sending an e-mail, there's no need to decrypt an encrypted data flow.

In this paper at Arxiv, the researchers note that even in the hands of a knowledgable user there are opportunities for “malicious adversaries willing to trace people … the adversary can still infer a significant amount of information from the properly encrypted traffic.”

For example, if an attacker “knows” what a Twitter post's traffic typically looks like even if encrypted, and can observe both the traffic from the phone and the timing of a post appearing on Twitter, it is possible to de-anonymise the posts and associate them with the phone (and therefore the user), they assert.

The attack scenarios tested in the paper include identifying an activist whose traffic is encrypted, by correlating the inferred activity coming from a device with the time that posts appear on social networks; identifying communications between users on a similar basis; or building a behavioural profile of a target.

Inputs to the analysis included IP addresses and ports (which aren't encrypted, even if user “content” is), along with size, direction (incoming or outgoing) and timing of the communications, along with machine learning techniques using samples of traffic from apps like Facebook, Gmail and Twitter to act as seeds for their algorithms.

Those algorithms plus the visible TCP/IP data provide a data set that allows user actions – read or send e-mail, post on Twitter, post on Facebook and so on – to be classified without looking inside the packets, they write: “Our classification method is based on the detection of the sets of flows that are distinctive of a particular user action.”

They also used different accounts to train their algorithms from the accounts used in their test set, to “assure that the results of the classification do not depend on the specific accounts that have been analysed”. The study claims the tests show a classification accuracy of different actions between 91 per cent and 100 per cent.

“A powerful attacker such as a Government, could use these insights in order to de-anonimize user actions that may be of particular interest” is the study's glum conclusion.

Note: While such work has been performed on fixed networks, the boffins note that the techniques in prior work could not easily be moved to the mobile sphere. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NASTY SSL 3.0 vuln to be revealed soon – sources (Update: It's POODLE)
So nasty no one's even whispering until patch is out
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
FBI boss: We don't want a backdoor, we want the front door to phones
Claims it's what the Founding Fathers would have wanted – catching killers and pedos
Kill off SSL 3.0 NOW: HTTPS savaged by vicious POODLE
Pull it out ASAP, it is SWISS CHEESE
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.