<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Did Apple just boost mobile security?</title>
	<atom:link href="https://javacard.vetilles.com/2014/09/12/did-apple-just-boost-mobile-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com/2014/09/12/did-apple-just-boost-mobile-security/</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Thu, 18 May 2017 07:26:32 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>By: 0x54</title>
		<link>https://javacard.vetilles.com/2014/09/12/did-apple-just-boost-mobile-security/#comment-18810</link>
		<dc:creator><![CDATA[0x54]]></dc:creator>
		<pubDate>Mon, 30 Mar 2015 06:44:13 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/?p=893#comment-18810</guid>
		<description><![CDATA[It really depends on who is attempting to hack the secure element of Apple&#039;s smart devices.

Secure elements contain cryptographic processors that are made from huge companies known to have rather complex relationships with state agencies and SIGINT/COMINT units of nation states.

NXP (EU), Atmel (US), Freescale (US) ... are just a few of the foundries that have a steady supply of cryptographic capable chips for secure elements and the likes. They have a common thing which is relationship to Governments.

We know that technology empowers both ways and is commonly considered a dual use product (Govt and Civil). A country can make justifications to backdoor a product for their own access which would leave the other users not within their legal jurisdiction seriously impaired on the security side now that the backdoor keys are held in certain Govt&#039;s hands.

If we are talking about petty theft and hacking just for monetary profits, some of these so called secure elements from large foundries have already been badly shamed by their false advertisement of security which given an operator&#039;s manual and a couple of time to think through and experiment, a university research student or a knowledgeable and motivated hacker might find a way through due to silly mistakes.

If we are talking about compromisation and sniffing of foreign important people&#039;s iPads, Blackberries, Android phones and other portable smart devices, they are as insecure since the backdoor keys to the cryptographic chips used to secure portable smart devices used by national diplomats and important people are compromised at the foundry levels.

You can imagine what happens if Nation A uses chips made by Nation B finds that Nation B snoops on Nation A and the relation can be complex when Nation B accidentally fields the chips into it&#039;s national services and what if Nation A manages to find the backdoor.

How secure is secure element ? In this current age of Govt&#039;s eagerness to implement key escrow and backdoors, we are no less secure because security is observed by it&#039;s weakest link where the weakest link is that one single master backdoor key that makes or breaks a system. We all we we are careless with keys and keys are not always labelled or handled with care. What happens if this single master backdoor key gets leaked into the world where it should never have been in the first place .......]]></description>
		<content:encoded><![CDATA[<p>It really depends on who is attempting to hack the secure element of Apple&#8217;s smart devices.</p>
<p>Secure elements contain cryptographic processors that are made from huge companies known to have rather complex relationships with state agencies and SIGINT/COMINT units of nation states.</p>
<p>NXP (EU), Atmel (US), Freescale (US) &#8230; are just a few of the foundries that have a steady supply of cryptographic capable chips for secure elements and the likes. They have a common thing which is relationship to Governments.</p>
<p>We know that technology empowers both ways and is commonly considered a dual use product (Govt and Civil). A country can make justifications to backdoor a product for their own access which would leave the other users not within their legal jurisdiction seriously impaired on the security side now that the backdoor keys are held in certain Govt&#8217;s hands.</p>
<p>If we are talking about petty theft and hacking just for monetary profits, some of these so called secure elements from large foundries have already been badly shamed by their false advertisement of security which given an operator&#8217;s manual and a couple of time to think through and experiment, a university research student or a knowledgeable and motivated hacker might find a way through due to silly mistakes.</p>
<p>If we are talking about compromisation and sniffing of foreign important people&#8217;s iPads, Blackberries, Android phones and other portable smart devices, they are as insecure since the backdoor keys to the cryptographic chips used to secure portable smart devices used by national diplomats and important people are compromised at the foundry levels.</p>
<p>You can imagine what happens if Nation A uses chips made by Nation B finds that Nation B snoops on Nation A and the relation can be complex when Nation B accidentally fields the chips into it&#8217;s national services and what if Nation A manages to find the backdoor.</p>
<p>How secure is secure element ? In this current age of Govt&#8217;s eagerness to implement key escrow and backdoors, we are no less secure because security is observed by it&#8217;s weakest link where the weakest link is that one single master backdoor key that makes or breaks a system. We all we we are careless with keys and keys are not always labelled or handled with care. What happens if this single master backdoor key gets leaked into the world where it should never have been in the first place &#8230;&#8230;.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
