Settings

Theme

Facebook Helped the FBI Exploit Vulnerability in a Secure Linux Distro (2020)

gizmodo.com

60 points by paravirtualized a year ago · 27 comments

Reader

neilv a year ago

> But they did so quietly and without notifying the developers of Tails afterwards of the major security flaw,

I don't immediately see an ethical problem with developing a zero-day exploit to catch a suspected/presumed very bad person like that, so long as: (1) it's used only for that one target; (2) you promptly start the responsible disclosure to upstream, and later public.

Unfortunately, the nice, clean ethics gets more complicated when that zero-day is temporarily in the hands of an organization that would presumably also use it for other targets.

Historically, some good and important government organizations have had complications, such as some personnel not believing in the rules and checks&balances under which they're supposed to operate, or personnel acting under direction of leadership or outside politicians who're misaligned with national laws and values.

If someone with the ability to develop a zero-day wanted to catch the very bad people, while not compromising all the lawful civil rights leaders and journalists who bother some questionable politician, how would they do that?

  • benterix a year ago

    The vulnerable code was scraped in later releases so I don't think they could use this exploit against other people anyway.

    • neilv a year ago

      I should've clarified that I meant to ask a more general question.

      Going back to a particular exploit, certainly it could be used against multiple targets, in a small time window.

      There multiple potential targets (for various reasons) at any time.

      And there's also the option of mass-compromising endpoints or servers of a platform, and adding new hidden backdoors/weaknesses that persist long after the initial vulnerability is removed (e.g., in various kinds of firmware).

      Or even just mass-cataloging of one-time compromised identities.

  • 2OEH8eoCRo0 a year ago

    I disagree with number 2 but otherwise agree with you. I'd prefer they do this but it's not a moral imperative IMO.

evgpbfhnr a year ago

Please add a "(2020)" to the title, only noticed after reading this and looking for details about the actual vuln to check if I had something to update...

markx2 a year ago

This appears to be the original article: https://www.vice.com/en/article/facebook-helped-fbi-hack-chi...

jmclnx a year ago

Seems they sent a video with a trap in it, nice work by the FBI and Facebook and of course the victim who worked with the FBI to do this.

I think this is a better and easier way of finding these criminals then trying to pass laws to allow back-doors in the OS.

Interesting read

lucasRW a year ago

As usual, very hard to take a stance on that kind of stuff.

Yes, satisfactory to see the FBI being able to catch that type of scum.

But at the same time I can't help thinking that next, it's going to be the UK governement hacking distros to find out from which IP you posted a meme on Twitter.

  • mingus88 a year ago

    For every feel good story we hear of the bad guys getting caught, you bet there are dozens of stories in that murky grey area where we really don’t think either side are the good guys.

  • big-green-man a year ago

    Well as others have pointed out, it's one thing to deliberately engineer a backdoor, its another to find an exploit in an existing system and then use it to stop a scumbag from hurting people. One is a total violation of someone's privacy and expectation, another is simply good ol police work.

    So I'm happy with this outcome and even not opposed to the procedure, but I'm very much against deliberately engineering backdoors in systems. I think that position is pretty consistent and sound.

Malidir a year ago

As said, this is a very old article that has done the rounds on all the forums and social before.

All the major governments and the companies are known to have zero day exploits saved up for a rainy day.

Hence why countries like China ban Windows from government staff, and why USA ban Huwaei/hikvision etc in kind.

username81 a year ago

I wonder how this is possible. As far as I understand, tails uses two VMs, so the entire VM uses tor without running the tor service. So how did it send the real IP if all the system's traffic is routed through an external Tor router? It's also quite surprising to me that the FBI spends so much resources on catching ordinary paedophiles, I'd expect such a high level of operations to be used to find high-level ransomware groups or something.

  • bauruine a year ago

    Tails is a single machine that runs Tor you are mixing it up with Whonix which uses a gateway VM with Tor on it and a workstation VM that gets routed via the gateway.

  • dazld a year ago

    You are confusing Tails with Whonix.

  • mingus88 a year ago

    Yeah I’d love to read the details of the exploit.

    There’s a chance it became classified, if for example the exploit depends on the existence of FBI managed tor nodes, and we aren’t ready to let everyone know that the feds are all over the onion network infra.

    • username81 a year ago

      >FBI managed tor nodes

      There have been a number of very strange arrests of tor users by FBI and other western special services. The one I remember was when they took down the hydra's (basically russian silk road) and doxed it's creators. The idea of tor being infiltrated by feds seems very logical, considering that Tor got a good reputation, and is, basically, a great honeypot. I'd consider it a real threat if I were a criminal. But are there any networks that are resistant to malicious nodes?

trustno2 a year ago

(2020)

firesteelrain a year ago

Kudos to Facebook for identifying a novel way to capture this criminal.

But every time I read these types of articles, I am not shocked to learn about the folks working at these tech companies seemingly against working with law enforcement whatsoever.

If it was your child, wouldn’t you want to help rather than stand on principles?

That’s what gets me every time.

  • richardwhiuk a year ago

    - Which law enforcement agencies do you choose to work with?

    - All of them?

    - Just the US ones?

    - What about employees who aren't US citizens?

    - Which crimes are you happy to help enforce?

    - To what extent are you happy to be used as a tool of the US criminal justice system?

    - Do you want to enable the US government to have dragnet surveillance of the entire world?

    Bear in mind, the US government is very keen on using it's power for economic advantage, and not just for criminal enforcement.

    In some cases it's clear cut - it's clearly in Meta's interest to safeguard children on their platform.

    In some cases it's clear that not co-operating is probably the right thing to do - e.g. protecting a journalist reporting on North Korea.

    • big-green-man a year ago

      - any as long as they meet my criteria

      - see above

      - see above

      - what?

      - any crimes that involve coercion of others and nothing else

      - to the extent I can help stop coercion of others and nothing else

      - no.

  • janice1999 a year ago

    You are surely not naive enough to think they will use this surveillance tool just against child predators, right?

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection