this post was submitted on 08 Mar 2024
1 points (100.0% liked)

Europe

8484 readers
1 users here now

News/Interesting Stories/Beautiful Pictures from Europe πŸ‡ͺπŸ‡Ί

(Current banner: Thunder mountain, Germany, πŸ‡©πŸ‡ͺ ) Feel free to post submissions for banner pictures

Rules

(This list is obviously incomplete, but it will get expanded when necessary)

  1. Be nice to each other (e.g. No direct insults against each other);
  2. No racism, antisemitism, dehumanisation of minorities or glorification of National Socialism allowed;
  3. No posts linking to mis-information funded by foreign states or billionaires.

Also check out [email protected]

founded 1 year ago
MODERATORS
 

Four German military officials discussed what targets German-made Taurus missiles could potentially hit if Chancellor Olaf Scholz ever allowed them to be sent to Kyiv, and the call had been intercepted by Russian intelligence.

According to German authorities, the "data leak" was down to just one participant dialling in on an insecure line, either via his mobile or the hotel wi-fi.

The exact mode of dial-in is "still being clarified", Germany has said.

"I think that's a good lesson for everybody: never use hotel internet if you want to do a secure call," Germany's ambassador to the UK, Miguel Berger, told the BBC this week. Some may feel the advice came a little too late.

Eyebrows were raised when it emerged the call happened on the widely-used WebEx platform - but Berlin has insisted the officials used an especially secure, certified version.

Professor Alan Woodward from the Surrey Centre for Cyber Security says that WebEx does provide end-to-end encryption "if you use the app itself".

But using a landline or open hotel wi-fi could mean security was no longer guaranteed - and Russian spies, it's now supposed, were ready to pounce.

(page 2) 23 comments
sorted by: hot top controversial new old
[–] [email protected] 0 points 8 months ago (1 children)

Yeah blame it on hotel internet, not their shitty communication service that's not encrypted.

load more comments (1 replies)
[–] [email protected] 0 points 8 months ago

Bad article

[–] [email protected] 0 points 8 months ago* (last edited 8 months ago) (2 children)

What an amazing feat of incompetence! They’d be better off just using Signal…

They’d be quantum proof as well πŸ˜… https://signal.org/blog/pqxdh/

[–] [email protected] 0 points 8 months ago (1 children)

They even have their own Matrix Messenger they could have used...

BWMessenger

load more comments (1 replies)
load more comments (1 replies)
[–] [email protected] 0 points 8 months ago (4 children)

How the f*ck do you think you can have a "secure" call over uncontrolled networks, devices and locations?

The stupidity!

[–] [email protected] 0 points 8 months ago

Called in via SIP or unencrypted mobile network, i bet. Probably because the client via VPN was "too slow"

load more comments (3 replies)
[–] [email protected] 0 points 8 months ago (1 children)

Isn't like very basic security advice to not use random connections for sensitive information? But than again it's Germany, pretty sure he has his password written down on a sticky note.

load more comments (1 replies)
[–] [email protected] 0 points 8 months ago

an especially secure, certified version

Bwahahahahahhahahahhahahhaa

[–] [email protected] 0 points 8 months ago* (last edited 8 months ago) (6 children)

This doesnt add up... If the software was properly encrypted they shouldn't have been able to carry out a man in the middle attack right?

[–] [email protected] 0 points 8 months ago

It they used the client, yes. But in you dial in via sip, that opens up so many ways to screw up. Old software, open wifi, legacy hardware, you name it.

[–] [email protected] 0 points 8 months ago

Yes, it’s not the 90s anymore. The network is hostile. If it’s not, nice but you’d be a fool to trust even your own. Encryption all the way!

[–] [email protected] 0 points 8 months ago (3 children)

Maybe he dialed in by telephone? It would be a complete boomer move, but I’ve seen people do it.

[–] [email protected] 0 points 8 months ago

He most likely did, at least from what I can deduce from the published recording.

[–] [email protected] 0 points 8 months ago (1 children)

A researcher in cryptography in Berlin, Henning Seidler, believes the most likely theory is that the officer dialled in via his mobile phone and the call was picked up by spies' antenna who can also "forward" the traffic onto the main, official antenna.

Seems like the more likely theory

[–] [email protected] 0 points 8 months ago* (last edited 8 months ago) (5 children)

That is an expensive way to lose your job!

[–] [email protected] 0 points 8 months ago (1 children)

"Intelligence" services cost taxpayers billions a year, so the billion dollar question is why is it possible to dial in to "official" military communications over insecure channels at all?

Why doesn't the government run their own signal or matrix infra? Why are they paying Cisco, and introducing the numerous attack vectors of a proprietary optionally-encrypted service?

The threat of surveillance capitalism isn't just in the dragnet surveillance of the population. It's in the profiteering of "partnerships" between private and public β€” the drive of corrupt and incompetent political and military leadership to direct funds to sub-optimal proprietary services and protocols, instead of leveraging public funding to contribute to open-source and make hardened systems ubiquitous.

[–] [email protected] 0 points 8 months ago (2 children)

The funny thing is, that the Bundeswehr actually has a communications platform based on Matrix: bwMessenger goes live for Bundeswehr, element.io

Why they're not using it? Who knows...

load more comments (2 replies)
load more comments (4 replies)
load more comments (1 replies)
[–] [email protected] 0 points 8 months ago (2 children)

yes, one side has to automatically or manually accept a fake certificate/key to MITM end to end encryption. you know, like when your browser says "certificate error" and you click on advanced->accept anyway or something like that. if the software always accepts or he manually accepted one, the MITM guy can substitute his own encryption key/cert and decrypt and re-encrypt on the fly.

[–] [email protected] 0 points 8 months ago* (last edited 8 months ago) (6 children)

If you're looking at who is allowed to issue trusted root certificates in common browsers and operating systems, nobody needs to accept nothing to have every possible man in the middle from every major country's intelligence services already in there.

load more comments (6 replies)
[–] [email protected] 0 points 8 months ago (2 children)

It's always one of two possibilities: shit software or idiot users

[–] [email protected] 0 points 8 months ago

Why not both?

[–] [email protected] 0 points 8 months ago* (last edited 8 months ago)

In this case shit software. For a secure conference software there should be no possibility for the user to accept invalid certificates.

The developer always has to plan with what we call a DAU in germany (DΓΌmmster anzunehmender User = dumbest user possible), and even that user should have no possibility to accidentally share a secure conference. So as a developer I would: Lock the user to certificates and encryption keys I deem secure and hook into the low level OS functions to grab the screen and disable them to prevent accidental sharing via software like Anydesk and the like which the user forgot to close. This would even interrupt the functions of a simple trojan on the PC.

Of course a dedicated attacker with physical or admin access to the device could always break these. But then you have another big security breach.

load more comments (2 replies)
[–] [email protected] 0 points 8 months ago

This is the best summary I could come up with:


He sounds relaxed on the line as he chats with two colleagues about the "mega" view from his room, and how he's just come back from a drink at a nearby hotel where there's an incredible swimming pool.

Over the next 40 minutes, the group appear to touch upon highly sensitive military issues, including the ongoing debate over whether Germany should send Taurus cruise missiles to Ukraine.

The four participants discussed what targets German-made Taurus missiles could potentially hit if Chancellor Olaf Scholz ever allowed them to be sent to Kyiv - a contentious issue in Germany.

"You have to choose a certain kind of disguise for this disaster," says Mr Kiesewetter, who's also worked at the Nato military alliance and is a member of Germany's opposition conservative CDU party.

But German government figures find suggestions that they are somehow soft on Russia increasingly irritating, particularly because Berlin has donated more weapons aid to Ukraine than any other nation in Europe.

It's further exposed domestic divisions about whether to send Taurus missiles to Ukraine and prompted a wider discussion about the country's perceived defence and security weaknesses.


The original article contains 1,075 words, the summary contains 187 words. Saved 83%. I'm a bot and I'm open source!

load more comments
view more: β€Ή prev next β€Ί