[149056] in cryptography@c2.net mail archive
[Cryptography] Fwd: Open Source USB stick for cryptography
daemon@ATHENA.MIT.EDU (Joshua Marpet)
Wed Jan 15 09:03:51 2014
X-Original-To: cryptography@metzdowd.com
In-Reply-To: <CAECrB6J4j22D-tJXHLjxBfRfZ2recFTLEdQjwAH58Cfr_Xz9Sg@mail.gmail.com>
Date: Tue, 14 Jan 2014 23:49:30 -0500
From: Joshua Marpet <joshua.marpet@guardedrisk.com>
To: "cryptography@metzdowd.com List" <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
--===============6791204828320408145==
Content-Type: multipart/alternative; boundary=f46d04182808d686f904effb083a
--f46d04182808d686f904effb083a
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Howdy Josh,
I'm too damned busy these days to join any new projects, but I'm happy
to provide some pointers.  Please forward this to the list if you
think that'd be handy, and also tell them that I'm happy to contribute
free Facedancer PCBs toward their effort.
My solo disk work is available as the video of my talk from 29C3 and
as a short article in Poc||GTFO 00:02, which can be found by googling
for pocorgtfo00.pdf.  The first covers active disk antiforensics with
a Facedancer board, and the second with an iPod running Rockbox.
Sadly, I never got around to finishing my blog post from 29C3, so
suffering through that long video is necessary.  (I'm a sinner, I
know!)
I also did some work on replacement firmware for a Seagate drive with
Jonas Zaddach and a few other fine folks.  We were making a remotely
accessible backdoor, but the exact same principles can be used to
patch the antiforensics tricks that I mentioned at 29C3 and in
PoC||GTFO into a real disk.
https://archive.org/details/Acsac13Zaddach
There's not much value in doing an FPGA, as fast microcontrollers with
excellent USB controllers are cheap and plentiful.  I still think that
the best way to do it is with antiforensics destroying the information
on detecting tampering, but an excellent and well verified crypto
implementation in a smart card chip might remove the danger of
accidentally triggering a disk's self destruct.
It will also be worth looking at Bunnie's talk from 30C3, where he
reverse engineered an SD card's controller chip.  Patching a perfectly
vanilla, hello-kitty-branded card is definitely the best way to do
this in the field, and his lecture provides a damned good resource for
that.
Drinks in Philly the next time I make it to Samland?
Cheers from M=FCnchen,
--Travis
On Mon, Jan 13, 2014 at 12:06 PM, Joshua Marpet
<joshua.marpet@guardedrisk.com> wrote:
> The Metzdowd cryptography mailing list was making noises about epoxying
> chips on a USB stick, and  i coughed and mentioned you.  They asked.
>
> " I Googled him and saw his recent blog
> posts.  He seems like quite a brilliant hardware hacker.
>
> I'd be interested in his thoughts on an open-source usb stick for
> crypto.  Would he go totally open, making everything probable, or
> would he encase it in epoxy?  Is there value in making the
> microcontroller an open-source synthesized core in an FPGA, or can we
> trust an Atmel microcontroller?  Do we really have to have an external
> ppwer supply, because that wont fit in my pocket?  Is this whole idea
> a waste of time, or is it doable in a useful way?"
>
> If you want to get involved, these are some serious crypto people, but
> mostly people without funding.  Lots of academics, Silent circle people
are
> on there, just figured I'd mention it.
>
> J
> --
>
> Joshua A. Marpet
>
> Managing Principal
>
> GuardedRisk
>
>
>
> Before the Breach and After The Incident!
>
>
> 1-855-23G-RISK (855-234-7475)
>
>
> Cell: (908) 916-7764
>
> Joshua.Marpet@guardedrisk.com
>
> http://www.GuardedRisk.com
>
>
>
>
--
.us +1.267.401.2597
.de +49.152.23.90.76.92
--=20
*Joshua A. Marpet*
Managing Principal
*GuardedRisk*
*Before the Breach **and **After The Incident!*
1-855-23G-RISK (855-234-7475)
Cell: (908) 916-7764
Joshua.Marpet@guardedrisk.com
http://www.GuardedRisk.com
--f46d04182808d686f904effb083a
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
<div dir=3D"ltr"><br><div class=3D"gmail_quote"><br><br>Howdy Josh,<br>
<br>
I'm too damned busy these days to join any new projects, but I'm ha=
ppy<br>
to provide some pointers. =A0Please forward this to the list if you<br>
think that'd be handy, and also tell them that I'm happy to contrib=
ute<br>
free Facedancer PCBs toward their effort.<br>
<br>
My solo disk work is available as the video of my talk from 29C3 and<br>
as a short article in Poc||GTFO 00:02, which can be found by googling<br>
for pocorgtfo00.pdf. =A0The first covers active disk antiforensics with<br>
a Facedancer board, and the second with an iPod running Rockbox.<br>
Sadly, I never got around to finishing my blog post from 29C3, so<br>
suffering through that long video is necessary. =A0(I'm a sinner, I<br>
know!)<br>
<br>
I also did some work on replacement firmware for a Seagate drive with<br>
Jonas Zaddach and a few other fine folks. =A0We were making a remotely<br>
accessible backdoor, but the exact same principles can be used to<br>
patch the antiforensics tricks that I mentioned at 29C3 and in<br>
PoC||GTFO into a real disk.<br>
<a href=3D"https://archive.org/details/Acsac13Zaddach" target=3D"_blank">ht=
tps://archive.org/details/Acsac13Zaddach</a><br>
<br>
There's not much value in doing an FPGA, as fast microcontrollers with<=
br>
excellent USB controllers are cheap and plentiful. =A0I still think that<br=
>
the best way to do it is with antiforensics destroying the information<br>
on detecting tampering, but an excellent and well verified crypto<br>
implementation in a smart card chip might remove the danger of<br>
accidentally triggering a disk's self destruct.<br>
<br>
It will also be worth looking at Bunnie's talk from 30C3, where he<br>
reverse engineered an SD card's controller chip. =A0Patching a perfectl=
y<br>
vanilla, hello-kitty-branded card is definitely the best way to do<br>
this in the field, and his lecture provides a damned good resource for<br>
that.<br>
<br>
<br>
Drinks in Philly the next time I make it to Samland?<br>
<br>
Cheers from M=FCnchen,<br>
--Travis<br>
<div class=3D"HOEnZb"><div class=3D"h5"><br>
<br>
On Mon, Jan 13, 2014 at 12:06 PM, Joshua Marpet<br>
<<a href=3D"mailto:joshua.marpet@guardedrisk.com">joshua.marpet@guardedr=
isk.com</a>> wrote:<br>
> The Metzdowd cryptography mailing list was making noises about epoxyin=
g<br>
> chips on a USB stick, and =A0i coughed and mentioned you. =A0They aske=
d.<br>
><br>
> " I Googled him and saw his recent blog<br>
> posts. =A0He seems like quite a brilliant hardware hacker.<br>
><br>
> I'd be interested in his thoughts on an open-source usb stick for<=
br>
> crypto. =A0Would he go totally open, making everything probable, or<br=
>
> would he encase it in epoxy? =A0Is there value in making the<br>
> microcontroller an open-source synthesized core in an FPGA, or can we<=
br>
> trust an Atmel microcontroller? =A0Do we really have to have an extern=
al<br>
> ppwer supply, because that wont fit in my pocket? =A0Is this whole ide=
a<br>
> a waste of time, or is it doable in a useful way?"<br>
><br>
> If you want to get involved, these are some serious crypto people, but=
<br>
> mostly people without funding. =A0Lots of academics, Silent circle peo=
ple are<br>
> on there, just figured I'd mention it.<br>
><br>
> J<br>
> --<br>
><br>
> Joshua A. Marpet<br>
><br>
> Managing Principal<br>
><br>
> GuardedRisk<br>
><br>
><br>
><br>
> Before the Breach and After The Incident!<br>
><br>
><br>
> 1-855-23G-RISK <a href=3D"tel:%28855-234-7475" value=3D"+18552347475">=
(855-234-7475</a>)<br>
><br>
><br>
> Cell: <a href=3D"tel:%28908%29%20916-7764" value=3D"+19089167764">(908=
) 916-7764</a><br>
><br>
> <a href=3D"mailto:Joshua.Marpet@guardedrisk.com">Joshua.Marpet@guarded=
risk.com</a><br>
><br>
> <a href=3D"http://www.GuardedRisk.com" target=3D"_blank">http://www.Gu=
ardedRisk.com</a><br>
><br>
><br>
><br>
><br>
<br>
<br>
<br>
</div></div><span class=3D"HOEnZb"><font color=3D"#888888">--<br>
.us <a href=3D"tel:%2B1.267.401.2597" value=3D"+12674012597">+1.267.401.259=
7</a><br>
.de <a href=3D"tel:%2B49.152.23.90.76.92" value=3D"+4915223907692">+49.152.=
23.90.76.92</a><br>
</font></span></div><br><br clear=3D"all"><div><br></div>-- <br><div dir=3D=
"ltr"><p style=3D"margin:0px"><b><span style=3D"font-size:10pt;font-family:=
'MS Reference Sans Serif',sans-serif"><font color=3D"#000000">Joshu=
a A. Marpet</font></span></b></p>
<p style=3D"margin:0px"><font face=3D"MS Reference Sans Serif, sans-serif" =
color=3D"#000000">Managing Principal</font></p><p style=3D"margin:0px"><fon=
t face=3D"MS Reference Sans Serif, sans-serif" color=3D"#000000"><b>Guarded=
Risk</b></font></p>
<p style=3D"margin:0px;color:rgb(80,0,80)"><span style=3D"font-size:5pt;fon=
t-family:'MS Reference Sans Serif',sans-serif;color:navy"><u></u>=
=A0</span></p><p style=3D"margin:0px"><font color=3D"#ff0000"><span style=
=3D"font-family:'MS Reference Sans Serif',sans-serif"><font><b><i>B=
efore the Breach=A0</i></b></font></span><b style=3D"font-size:small;font-f=
amily:'MS Reference Sans Serif',sans-serif"><i>and=A0</i></b><b sty=
le=3D"font-size:small;font-family:'MS Reference Sans Serif',sans-se=
rif"><i>After The Incident!</i></b></font></p>
<p style=3D"margin:0px;color:rgb(80,0,80)"><span style=3D"font-family:'=
MS Reference Sans Serif',sans-serif;color:navy"><font><b><i><br></i></b=
></font></span></p><p style=3D"margin:0px"><span style=3D"color:rgb(0,0,0);=
font-size:10pt;font-family:'MS Reference Sans Serif',sans-serif">1-=
855-23</span><span style=3D"font-size:10pt;font-family:'MS Reference Sa=
ns Serif',sans-serif"><font color=3D"#ff0000">G-RISK</font></span><span=
 style=3D"color:rgb(0,0,0);font-size:10pt;font-family:'MS Reference San=
s Serif',sans-serif"> (855-234-7475)</span></p>
<p style=3D"margin:0px"><span style=3D"font-size:10pt;font-family:'MS R=
eference Sans Serif',sans-serif"><font color=3D"#000000"><br></font></s=
pan></p><p style=3D"margin:0px"><span style=3D"font-size:10pt;font-family:&=
#39;MS Reference Sans Serif',sans-serif"><font color=3D"#000000">Cell: =
(908) 916-7764=A0</font></span></p>
<p style=3D"margin:0px;color:rgb(80,0,80)"><a href=3D"mailto:Joshua.Marpet@=
guardedrisk.com" target=3D"_blank">Joshua.Marpet@guardedrisk.com</a></p><p =
style=3D"margin:0px;color:rgb(80,0,80)"><a href=3D"http://www.GuardedRisk.c=
om" target=3D"_blank">http://www.GuardedRisk.com</a></p>
<p style=3D"margin:0px;color:rgb(80,0,80)"><span style=3D"font-size:9pt;col=
or:rgb(31,73,125)"><u></u>=A0<u></u></span></p><p style=3D"margin:0px;color=
:rgb(80,0,80);text-align:justify"><br></p></div>
</div>
--f46d04182808d686f904effb083a--
--===============6791204828320408145==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============6791204828320408145==--