Stop Hacklore - An Open Letter

80 points by rslabbert


natkr
  1. Keep critical devices and applications updated: Focus your attention on the devices and applications you use to access essential services such as email, financial accounts, cloud storage, and identity-related apps. Enable automatic updates wherever possible so these core tools receive the latest security fixes. And when a device or app is no longer supported with security updates, it’s worth considering an upgrade.

There's a massive trust problem here, and it's largely on the vendors to fix it. It's hard to tell people that they should enable updates when that means constantly worrying about features getting dropped because someone wanted to sell more cars, or getting a bunch of "AI" anti-featues (including outright spyware!), or just getting infected by traditional malware (see also: the whole supply chain debate lately). And even if you do buy into the mandatory update mentality (which I still largely do! new security issues do get discovered and it is important that we fix them!) vendors then get to use EOLs as a shiny "give us more money" button, despite said updates only really being required because of their fuckups in the first place.

It reminds me of a toot I saw a few months ago..

also updated [app] while i had the pending updates list open, because it is the ~one thing on my phone that i can trust to not get worse if i just yolo update it without checking the changelog

ty [dev] for being non-terrible

And it's hard not to take it as an indictment of the whole industry.

(Of course, [dev] has made plenty of mistakes of their own too, and will continue doing so.. But we won't get anywhere if we don't at least try.)

dzwdz
  1. Turn off Bluetooth and NFC: Wireless exploits in the wild are extraordinarily rare and typically require specialized hardware, physical proximity, and unpatched devices.

Wasn't the recent Android security bulletin about an RCE in the Bluetooth stack? This wasn't officially confirmed, but this commit sure looks interesting.

Also, why the hell are attackers with "specialized hardware" outside of our threat model? A Flipper Zero isn't exactly expensive.


Their FAQ kinda addresses this:

I just saw a news story about a new security flaw that affects one of the items in the Hacklore list. Doesn’t that invalidate this advice?

No. All software has bugs—some of them security or privacy related—and it’s inevitable that flaws will occasionally be found in systems that handle things like WiFi, QR codes, or USB connections. When that happens, the right question isn’t “Should we tell millions of people to change their behavior?” but rather “Which manufacturer and product were affected, and what are they doing to fix it?”

Security defects are a normal part of the software lifecycle. The responsible reaction is to expect software makers to patch their products quickly and transparently—not to shift the burden onto users. We need to move the responsibility for staying cyber safe upstream, to the companies best positioned to make security improvements at scale. We need to demand software that is secure by design.

This seems ill-advised. Sure, you can demand software to be secure by design all you want, but right now we're stuck with the software we have. Why not reduce the attack surface?

Sure, I think this site's advice is aimed towards your average Joe, but I really doubt they're turning off Bluetooth and NFC for security? On the other hand, I fear that people who are at a higher risk - e.g. activists - will stumble upon this letter, and get convinced that they don't need to take the precautions they used to take.


The resources are also a bit weird. The VPN section starts off with

VPNs are heavily marketed, but most people do not need one for security. These resources explain when a VPN is useful, when it is not, and why built-in protections on modern devices already handle many of the risks.

It then links Apple's page about iCloud Private Relay... but that is marketing material for a product that is very similar to a VPN. This section also links to e.g. a Tom Scott video and NYT. I have nothing against Tom Scott, but do they seriously not have better sources?