<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Lukewarm Security Info]]></title><description><![CDATA[A Security Blog where the info isn't hot or cold, it's... Lukewarm.]]></description><link>https://blog.lukewarmsecurityinfo.com</link><image><url>https://substackcdn.com/image/fetch/$s_!wWyr!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fbee858cb-fb85-498d-9b9c-e0b852c1a258_1280x1280.png</url><title>Lukewarm Security Info</title><link>https://blog.lukewarmsecurityinfo.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 05 May 2026 06:43:03 GMT</lastBuildDate><atom:link href="https://blog.lukewarmsecurityinfo.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Liam Godfrey]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[liam@lukewarmsecurityinfo.com]]></webMaster><itunes:owner><itunes:email><![CDATA[liam@lukewarmsecurityinfo.com]]></itunes:email><itunes:name><![CDATA[Liam Godfrey]]></itunes:name></itunes:owner><itunes:author><![CDATA[Liam Godfrey]]></itunes:author><googleplay:owner><![CDATA[liam@lukewarmsecurityinfo.com]]></googleplay:owner><googleplay:email><![CDATA[liam@lukewarmsecurityinfo.com]]></googleplay:email><googleplay:author><![CDATA[Liam Godfrey]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Lukewarm Security Info Has Moved!]]></title><description><![CDATA[Lukewarm Security Info has a brand new website!]]></description><link>https://blog.lukewarmsecurityinfo.com/p/lukewarm-security-info-has-moved</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/lukewarm-security-info-has-moved</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Thu, 14 Sep 2023 04:19:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fbee858cb-fb85-498d-9b9c-e0b852c1a258_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Lukewarm Security Info has a brand new website! Check it out <a href="https://lukewarmsecurityinfo.com">here</a>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://lukewarmsecurityinfo.com&quot;,&quot;text&quot;:&quot;Brand new website!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://lukewarmsecurityinfo.com"><span>Brand new website!</span></a></p><p>To subscribe to the blog for fortnightly newsletters and new blog updates, visit </p><p><a href="https://lukewarmsecurityinfo.com/#/portal/signup">https://lukewarmsecurityinfo.com/#/portal/signup</a>. Or click the button below</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://lukewarmsecurityinfo.com/#/portal/signup&quot;,&quot;text&quot;:&quot;Subscribe Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://lukewarmsecurityinfo.com/#/portal/signup"><span>Subscribe Now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Reaching for the (virtual) cookie jar]]></title><description><![CDATA[What are computer cookies, how do they work, and are they necessary?]]></description><link>https://blog.lukewarmsecurityinfo.com/p/cookies</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/cookies</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Thu, 08 Jun 2023 23:40:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba9c7aa-0f66-4fd5-9844-5badfac3b87a_1280x1002.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Internet or computer cookies, much like their edible counterparts, come in all different shapes and sizes, each with distinct characteristics and functions. In this post, we&#8217;ll explore the different types of computer cookies, what they&#8217;re used for, and whether they&#8217;re necessary.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TUvq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba9c7aa-0f66-4fd5-9844-5badfac3b87a_1280x1002.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TUvq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba9c7aa-0f66-4fd5-9844-5badfac3b87a_1280x1002.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TUvq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba9c7aa-0f66-4fd5-9844-5badfac3b87a_1280x1002.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TUvq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba9c7aa-0f66-4fd5-9844-5badfac3b87a_1280x1002.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TUvq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba9c7aa-0f66-4fd5-9844-5badfac3b87a_1280x1002.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TUvq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba9c7aa-0f66-4fd5-9844-5badfac3b87a_1280x1002.jpeg" width="556" height="435.24375" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cba9c7aa-0f66-4fd5-9844-5badfac3b87a_1280x1002.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1002,&quot;width&quot;:1280,&quot;resizeWidth&quot;:556,&quot;bytes&quot;:534588,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TUvq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba9c7aa-0f66-4fd5-9844-5badfac3b87a_1280x1002.jpeg 424w, https://substackcdn.com/image/fetch/$s_!TUvq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba9c7aa-0f66-4fd5-9844-5badfac3b87a_1280x1002.jpeg 848w, https://substackcdn.com/image/fetch/$s_!TUvq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba9c7aa-0f66-4fd5-9844-5badfac3b87a_1280x1002.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!TUvq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcba9c7aa-0f66-4fd5-9844-5badfac3b87a_1280x1002.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Chocolate Chip Cookies</figcaption></figure></div><h1>What are cookies?</h1><p>Cookies are small text files stored in your internet browser containing information intended to track user activity, generally aimed at improving your browsing experience. They can be created by the site you&#8217;re visiting (first-party cookies) or by other sites that own some of the content, like ads or images, you see on the webpage you&#8217;re visiting (third-party cookies).</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.lukewarmsecurityinfo.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Lukewarm Security Info is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>These cookies are designed to track various things, thus, there are many different types of cookies. Some of these are listed below. Note, this is a basic classification, and it doesn&#8217;t necessarily adhere to a &#8220;standard.&#8221; Different websites may use different terms for these cookies, so it&#8217;s crucial to understand what you&#8217;re accepting.</p><h2>Authentication Cookies</h2><p>These cookies are used to track a user&#8217;s login session. This way, whenever a new page loads or the site refreshes, the user is still logged in - usually for a set maximum period of time. If you&#8217;ve ever logged into your email on the browser, logged off your computer, logged back into your computer several hours later, opened the browser and you&#8217;re still logged into your email - this is because there are authentication cookies being used to keep your login session. </p><p>For example, when you log into a school, work, or personal Microsoft account, you might be prompted with the option to &#8220;Stay logged in&#8221;. What this does is it saves the cookies in your browser to keep you from having to log into each new platform every time.</p><h2>Session Cookies</h2><p>Differing from authentication cookies, these are designed to track what you do and what is saved in your session. Rather than having the sole purpose of verifying you are who you say you are, like authentication cookies, session cookies track what you&#8217;ve saved or updated in your session to keep those changes for the duration of your session. These are erased when you close your browser.</p><h2>Persistent Cookies</h2><p>Unlike session cookies, persistent cookies remain in your browser until they are manually deleted or until they reach their set expiration date. These cookies often store preferences to enhance your browsing experience over time.</p><h2>Tracking Cookies</h2><p>Marketing teams employ tracking cookies to monitor which pages or products you browse, enabling them to produce targeted ads. However, this aspect of cookies can raise ethical questions. While it&#8217;s understandable for a company like Google to want to learn more about their customers to optimize advertising, this approach can sometimes blur ethical boundaries. It can feel akin to someone monitoring CCTV footage across all stores you visit to deduce your preferences.</p><blockquote><p>Physical customer tracking has posed challenges for retailers in the past. Recent solutions include WiFi Analytics, which measures a customer&#8217;s phone&#8217;s WiFi signal strength to track their movements within the store.</p></blockquote><h1>Understanding the Role of Cookies in Privacy and Cybersecurity</h1><p>Cookies can be exploited in several types of cyberattacks, such as cross-site scripting (XSS) or cross-site request forgery (CSRF). Therefore, understanding how to manage them is essential for safe browsing.</p><p>The use of cookies, particularly third-party cookies, can have a large impact on user privacy. Cookies can help companies build a profile of users&#8217; internet behaviour, which can then be used for targeted advertising.</p><h2>Legal Regulations Around Cookies</h2><p>Various regulations worldwide, such as the General Data Protection Regulation (GDPR) in Europe, mandate companies to get users&#8217; consent before using certain types of cookies. You&#8217;ve likely seen cookie banners on websites asking for your consent in compliance with these laws.</p><h1>Are cookies necessary?</h1><p>Certain cookies, like authentication cookies, are essential. However, while cookies generally aim to enhance your browsing experience, they also enable companies to track your activity to streamline their advertising strategies.</p><h2>Do I have to allow cookies?</h2><p>No. In security, we use the term of zero trust, or the principle of least privilege when deciding how to delegate access to certain files. For example, if you&#8217;re in the sales department, you&#8217;re not going to need access to the files in the operations department for your normal work, so we won&#8217;t give you access to it. This same principle should apply when companies ask for data or permission to track you (cookies).</p><h3>How do I block cookies?</h3><p>Websites typically prompt you to either &#8220;accept all&#8221; cookies, &#8220;reject all&#8221; cookies, or selectively accept/reject cookies. However, complying with these <strong>preferences</strong> depends on the website itself, so it does not always guarantee that cookies won&#8217;t be used.</p><p>Fortunately, privacy-focused browsers such as Brave, Firefox and Opera (to name a few) that either contain plugins that allow cookies to be blocked automatically, or have a built in option (like Brave).</p><h1>TL;DR</h1><p>Cookies are text files containing user information used for various purposes, ranging from authentication to tracking user activity. Cookies have significant implications for both user privacy and cybersecurity. Remember, you don&#8217;t always have to &#8216;accept all&#8217; cookies when you visit a website and, as good privacy practice, it might be better to &#8216;reject all&#8217; that you can.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.lukewarmsecurityinfo.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Lukewarm Security Info is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[What are they: Next-Generation Firewalls (NGFWs)]]></title><description><![CDATA[What are Next-Generation Firewalls and how do they differ from old-school firewalls? Are firewalls important? What role do they have in security?]]></description><link>https://blog.lukewarmsecurityinfo.com/p/what-are-they-next-generation-firewalls</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/what-are-they-next-generation-firewalls</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Fri, 03 Mar 2023 23:06:04 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a5c7386f-913c-46aa-bddd-d66415a86d50_367x550.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.lukewarmsecurityinfo.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.lukewarmsecurityinfo.com/subscribe?"><span>Subscribe now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://lukewarmsecurityinfo.com/posts/firewalls/&quot;,&quot;text&quot;:&quot;View it on the website!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://lukewarmsecurityinfo.com/posts/firewalls/"><span>View it on the website!</span></a></p><h2>What are Traditional Firewalls?</h2><p>Traditional firewalls are network security devices that are designed to monitor and control incoming and outgoing network traffic based on predefined rules. These rules can be based on items such as IP addresses, port numbers and protocols.</p><blockquote><p>To better grasp the concept of IP Addresses, ports, and protocols, imagine a moving truck filled with boxes. The moving truck has a specific house that it&#8217;s going to (IP Address). It has boxes inside that are labelled, with each label representing a different room in the house (different ports). Each of these labels, however, might be written in a different language (protocol) that need to be handled by certain people who understand that language.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!esS1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897c2880-8d01-4882-907b-a765a3bbe54c_367x550.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!esS1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897c2880-8d01-4882-907b-a765a3bbe54c_367x550.jpeg 424w, https://substackcdn.com/image/fetch/$s_!esS1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897c2880-8d01-4882-907b-a765a3bbe54c_367x550.jpeg 848w, https://substackcdn.com/image/fetch/$s_!esS1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897c2880-8d01-4882-907b-a765a3bbe54c_367x550.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!esS1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897c2880-8d01-4882-907b-a765a3bbe54c_367x550.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!esS1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897c2880-8d01-4882-907b-a765a3bbe54c_367x550.jpeg" width="289" height="433.10626702997274" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/897c2880-8d01-4882-907b-a765a3bbe54c_367x550.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:550,&quot;width&quot;:367,&quot;resizeWidth&quot;:289,&quot;bytes&quot;:43067,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!esS1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897c2880-8d01-4882-907b-a765a3bbe54c_367x550.jpeg 424w, https://substackcdn.com/image/fetch/$s_!esS1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897c2880-8d01-4882-907b-a765a3bbe54c_367x550.jpeg 848w, https://substackcdn.com/image/fetch/$s_!esS1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897c2880-8d01-4882-907b-a765a3bbe54c_367x550.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!esS1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F897c2880-8d01-4882-907b-a765a3bbe54c_367x550.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Removal Truck filled with boxes</em></figcaption></figure></div><p>These firewalls can be hardware-based, software-based, or a combination of both, sitting between the outside world and your house - like a security guard, but for your network.</p><p>Without going too complex into the different features traditional firewalls can provide, but the primary one is packet filtering.</p><p>Packet filtering just means that it can allow or block network traffic (moving boxes) based on where it came from (source IP Address), what port number it&#8217;s using (which room it&#8217;s labelled for), and the protocol (which language the label is written in).</p><blockquote><p>For example, a firewall could block all packets (boxes) sent from Joe&#8217;s house, who has an IP Address of 1.2.3.4, or it could block all boxes that are labelled to go into your office (port). More commonly you&#8217;ll find ports being blocked.</p></blockquote><h2>What are Next-Generation Firewalls (NGFWs)?</h2><p>Next Generation Firewalls (NGFWs) are an advanced version of the traditional firewall with additional features such as intrusion prevention, application visibility and control, and advanced threat protection.</p><p>Unlike traditional firewalls that simply control access to network resources based on IP addresses and port numbers, NGFWs have the ability to identify and control applications, users, and content flowing through the network, providing a more granular level of security.</p><h3>What are the components of a NGFW?</h3><p>Below are <em>SOME</em> of the common components utilised in Next Generation Firewalls (NGFWs).</p><h4><strong>1. Application control</strong></h4><p>NGFWs can identify and control applications being used on devices on your home network; including blocking access.</p><h4><strong>2. Intrusion prevention</strong></h4><p>NGFWs can detect (Intrusion Detection System - IDS) and prevents (Intrusion Prevention System - IPS) potentially malicious internet traffic (boxes) based on certain patterns or indicators.</p><h4><strong>3. Threat intelligence</strong></h4><p>Gathering threat feeds and information from other sources allows NGFWs to stay up-to-date on the latest attacks, patterns and indicators to ensure that networks stay safe from any new malicious traffic (boxes).</p><h2>TL;DR</h2><p>Next Generation Firewalls (NGFWs) are advanced network security devices that are capable of conducting all traditional firewall tasks such as packet filtering, but also include features such as intrusion prevention, application visibility and control, and advanced threat protection (threat feeds, pattern and behaviour identification).</p><p>Overall, traditional firewalls are still an essential part of network security, but have limitations in dealing with advanced threats and the growing complexity of network traffic. This has led to the development of Next Generation Firewalls (NGFWs), which offer more advanced capabilities and provide a higher level of protection in this next generation of threats.</p>]]></content:encoded></item><item><title><![CDATA[Poisoning ChatGPT and the world hub of information.]]></title><description><![CDATA[ChatGPT is an AI Language Model that takes information it reads online to answer questions that users pose to it. But how does it know if the information it reads is right?]]></description><link>https://blog.lukewarmsecurityinfo.com/p/chatgpt-llm-poisoning</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/chatgpt-llm-poisoning</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Thu, 16 Feb 2023 21:15:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e89847d2-e521-4811-8ff9-17de11ed7dee_3201x3200.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>What is ChatGPT?</h2><p><a href="https://chat.openai.com/">ChatGPT</a> is an AI Large Language Model created by <a href="https://openai.com/">OpenAI</a> that was released to the public on the 30th of November 2022.</p><p>Large Language Models are a type of Machine Learning Model, which is a subtype of Artificial Intelligence (AI). These models are designed to be able to read, make predictions from, and learn from data. Therefore, the more data available, the more accurate the results are.</p><blockquote><p>There are many Machine Learning Models, of which Language Models are one of them. The &#8220;Large&#8221; simply refers to the scale and amount of data given to the Language Model.</p></blockquote><h2>When the data goes bad.</h2><p>AI can only base it&#8217;s results on the data it&#8217;s been trained with. If an AI machine that generated images (instead of text, for example) was asked to print out a picture of a dumbbell without being told what a dumbbell is, it would have a difficult time generating one, and at the very least would generate one that likely looks nothing to how we would consider a dumbbell to look (probably some strange combination of two objects that contain the words &#8220;dumb&#8221; and &#8220;bell&#8221; in it).</p><p>Consider a case where the AI is presented with a large collection of images of dumbbells and it&#8217;s asked to generate an image of a dumbbell. Google&#8217;s DeepDream project did just that, and this was the result.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XOEh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799b0362-489c-4820-b92a-857554a9eaa6_962x232.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XOEh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799b0362-489c-4820-b92a-857554a9eaa6_962x232.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XOEh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799b0362-489c-4820-b92a-857554a9eaa6_962x232.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XOEh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799b0362-489c-4820-b92a-857554a9eaa6_962x232.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XOEh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799b0362-489c-4820-b92a-857554a9eaa6_962x232.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XOEh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799b0362-489c-4820-b92a-857554a9eaa6_962x232.jpeg" width="962" height="232" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/799b0362-489c-4820-b92a-857554a9eaa6_962x232.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:232,&quot;width&quot;:962,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:33647,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XOEh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799b0362-489c-4820-b92a-857554a9eaa6_962x232.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XOEh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799b0362-489c-4820-b92a-857554a9eaa6_962x232.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XOEh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799b0362-489c-4820-b92a-857554a9eaa6_962x232.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XOEh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799b0362-489c-4820-b92a-857554a9eaa6_962x232.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p></p><p><strong>Why did this happen?</strong> Simple. The majority of the data supplied were likely images like the ones below.</p><h2>What about bad data in ChatGPT?</h2><p>Large Language Models like ChatGPT gather their data from text available on the internet in the forms of books, articles, websites and likely forums. What this <em>can</em> mean, in worst-case scenario, is that ChatGPT and other language models can be racist / sexist / discriminatory purely based on the data it reads in. This has been a big challenge for Language Models to master; how to detect and remove discriminatory views (not just language) from data.</p><h2>The Echo Chamber.</h2><p>Discriminatory language isn&#8217;t the only challenge that Large Language Models (LLM&#8217;s) face. Since LLM&#8217;s gather their data from internet sources, what is stopping a tool like ChatGPT from reading its own output that someone has pasted on the internet, adding itself to the pool of data, and reading what it learnt from itself as human output to influence how it understands humans to interact?</p><p>This probably doesn&#8217;t sound like that big of an issue since ChatGPT would likely have some way to detect whether or not the output was from itself, but what if there was another LLM? If that other LLM received output from ChatGPT as part of it&#8217;s data collection, then it would receive information filtered through the lens of ChatGPT which is built to simply summarise an answer to questions that the user prompts them with.</p><p>The issue of an echo chamber lies in the loop of LLM&#8217;s sending each other information.</p><blockquote><p>It&#8217;s important to emphasise that these LLM&#8217;s dont &#8220;understand&#8221; language in the way that we do. They are coded to be able to read the data given to them and <em>learn</em> what a typical response to that question would be. ChatGPT and other LLM&#8217;s simply regurgitate and summarise information found on the internet.</p></blockquote><h3>The first call.</h3><p>Given the simplicity of spamming the internet with repeated comments from bots (spend 5 minutes on twitter and you&#8217;ll understand what I mean), and the knowledge of locating the places in which information is obtained from the internet for these LLM&#8217;s, there&#8217;s the very real potential for ChatGPT or another LLM to respond to a user&#8217;s question with misinformation that poisoned its way into the data set. Since this (ChatGPT) would probably be a trusted resource, or with people posting the results of ChatGPT comments onto the internet, other LLM&#8217;s would likely be poisoned with the same misinformation - thus beginning the echo chamber.</p><h2>How do we silence the echo?</h2><p>There would be multiple ways, but two ways to stop misinformation from spreading like wildfire through ChatGPT or other LLM&#8217;s are listed below.</p><h4><strong>Blocking Invalid Data</strong></h4><p>This involves detecting whether or not the data being read is misinformation or valid information. The difficulty here lies in the ability to actually detect false information in a way that isn&#8217;t just by consensus (since this can be overrun by bots).</p><h4><strong>Blocking LLM output from being counted as data</strong></h4><p><em>Assuming that the LLM only wants to read human-generated input</em>, a solution to this problem is already being put into active use with the primary goal being to detect whether a student actually did their work or got ChatGPT to do it for them. <br><br><a href="https://gptzero.me/">GPTZero</a>, created by Edward Tian, utilises the &#8220;perplexity&#8221; and &#8220;burstiness&#8221; of output generated by ChatGPT to determine whether or not it was written by a human. This will, however, likely be a cat and mouse game of ChatGPT generating output to avoid this detection, and then the GPTZero finding another way to detect AI output.</p><h2>TLDR</h2><p>ChatGPT is a very powerful tool that, if used improperly, can result in an echo chamber spreading misinformation. Data is powerful, good data can yield good results, but bad data can yield bad results. The work lies in figuring out what is bad data and blocking it so as to not poison these Machine Learning Models.</p>]]></content:encoded></item><item><title><![CDATA[VPNs and Privacy]]></title><description><![CDATA[Do VPNs provide a single point of failure? If so, isn't that a security concern we should be worried about?]]></description><link>https://blog.lukewarmsecurityinfo.com/p/vpn-privacy</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/vpn-privacy</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Thu, 09 Feb 2023 21:15:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fbee858cb-fb85-498d-9b9c-e0b852c1a258_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Recently I was asked a question regarding the privacy that VPN&#8217;s provide and whether they are a good security measure. The reason for this was the single source of failure (or breach point) that using a VPN introduces. If an attacker was able to gain access to the VPN server, then they would have full access to all of your internet traffic (since it&#8217;s decrypted at the VPN server).</p><p><strong>This is a very valid point.</strong></p><p>If I had my VPN turned on ALL the time, then all of my traffic would be sent to a single point which, should that server be compromised or the owner of the server have bad intentions, it would mean that my data is compromised.</p><p>In a recent blog post about <a href="/posts/how-vpns-work">how VPNs work</a>, I introduced some of the benefits of using a VPN. One of these points was the ability to access region-specific content. Although gaining their popularity through this beneficial aspect, VPNs are not the only way to access region-specific content.</p><p>Without diving too deep into a what a proxy is (I&#8217;ll explain it in a later post), it <em>can be</em> (for this case) be described as a VPN without the <em>secure tunnel</em> (unencrypted).</p><p>This then raises the question:</p><h5><strong>What role do VPNs play in privacy and security if we can access region-specific content other ways AND using a VPN introduces a single-source of failure?</strong></h5><h3>It&#8217;s all about trust.</h3><p>VPNs and their secure tunnels allow those on the same network as you (and everyone up the VPN server [including your ISP]) from viewing the data that you send (for example, your login details) and where you send that data (for example, which website). When using public WiFi, the biggest threat is an attacker or someone with a computer that&#8217;s been compromised (with a virus) on the same internet as you.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4wWl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dac1d9a-75eb-4a12-9984-ebfde658df8c_1728x774.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4wWl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dac1d9a-75eb-4a12-9984-ebfde658df8c_1728x774.png 424w, https://substackcdn.com/image/fetch/$s_!4wWl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dac1d9a-75eb-4a12-9984-ebfde658df8c_1728x774.png 848w, https://substackcdn.com/image/fetch/$s_!4wWl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dac1d9a-75eb-4a12-9984-ebfde658df8c_1728x774.png 1272w, https://substackcdn.com/image/fetch/$s_!4wWl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dac1d9a-75eb-4a12-9984-ebfde658df8c_1728x774.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4wWl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dac1d9a-75eb-4a12-9984-ebfde658df8c_1728x774.png" width="1456" height="652" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4dac1d9a-75eb-4a12-9984-ebfde658df8c_1728x774.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:652,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:100566,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4wWl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dac1d9a-75eb-4a12-9984-ebfde658df8c_1728x774.png 424w, https://substackcdn.com/image/fetch/$s_!4wWl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dac1d9a-75eb-4a12-9984-ebfde658df8c_1728x774.png 848w, https://substackcdn.com/image/fetch/$s_!4wWl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dac1d9a-75eb-4a12-9984-ebfde658df8c_1728x774.png 1272w, https://substackcdn.com/image/fetch/$s_!4wWl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4dac1d9a-75eb-4a12-9984-ebfde658df8c_1728x774.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>Diagram showing an attacker attempting to read data sent from a user with a VPN activated.</em></p><blockquote><p>To understand this better, I&#8217;d recommend reading my <a href="https://lukewarmsecurityinfo.com/posts/how-vpns-work">previous post</a> first which dives into what VPNs are and how they work.</p></blockquote><p>One simple way to counter these threats would be to encrypt your data and hide where you&#8217;re sending it to; which is achieved with a VPN.</p><p>It seems to come down to protecting yourself from whatever is a bigger threat to your security and privacy.</p><blockquote><p>Choosing the right VPN service is important. I&#8217;ll be releasing a blog soon about recommendations and what to look for when choosing a VPN service, but for now, my recommendation would be to look into <a href="https://protonvpn.com/">ProtonVPN</a>.</p></blockquote><h3>Recommendations</h3><h4><strong>Public Wifi</strong></h4><p>If you&#8217;re using <strong>public wifi</strong>, then you should 100% use a VPN. There are many guides and proof of concept videos on the internet to show how easy it is for someone to access your unencrypted data on public wifi.</p><h4><strong>Home Network</strong></h4><p>If you&#8217;re using your <strong>hsome network</strong>, it&#8217;s actually recommended that you don&#8217;t use a VPN (unless it&#8217;s for region-specific content or you don&#8217;t trust the website you&#8217;re visiting). This is because of the concerns mentioned above about the single point of failure.</p><h4><strong>Mobile Data</strong></h4><p>If you&#8217;re using your <strong>mobile data / personal hotspot</strong> you <em>probably</em> don&#8217;t need to (although it might be good) practise to. While I&#8217;ve heard of security and privacy issues on mobile data (3G, 4G &amp;amp; 5G), I haven&#8217;t been able to find any proof of concepts or articles about this (in similar usage to public wifi hacking).</p>]]></content:encoded></item><item><title><![CDATA[What is Multi-Factor Authentication?]]></title><description><![CDATA[Data breaches and increased security policies have prompted companies to implement multi-factor authentication across their users. But what is it? Are some forms better than others?]]></description><link>https://blog.lukewarmsecurityinfo.com/p/multi-factor-authentication</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/multi-factor-authentication</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Thu, 24 Nov 2022 21:15:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZRn3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe66441-fafd-4f96-80de-37336f4bb71c_334x652.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Multi-Factor Authentication (MFA) isn&#8217;t a new term. Essentially, it means providing more than one way of authenticating yourself. How this might look in terms of cyber security, is entering a password <strong>and</strong> entering a 6-digit pin.</p><h2>What are some examples of Multi-Factor Authentication?</h2><blockquote><p>Multi-Factor Authentication can come in many forms. Typically there&#8217;s a preference to call two forms of authentication (such as the example above) two-factor authentication (2FA). For the sake of simplicity, this blog will be referring to them as equivalent.</p></blockquote><p>Since MFA is simply multiple forms of authentication, a better question would be to ask <em>what are examples of authentication used as an extra step in the MFA process</em>. Anyways, here&#8217;s a compiling some of the common ways MFA is implemented:</p><h4><strong>OTP (One Time Password)</strong></h4><p>These can be found in <strong>emails</strong> and <strong>text</strong> messages and are valid for only one login, expiring on use.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!q8yg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ebcc54-b185-4f53-a2bb-c1ecfdb56bec_554x150.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!q8yg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ebcc54-b185-4f53-a2bb-c1ecfdb56bec_554x150.png 424w, https://substackcdn.com/image/fetch/$s_!q8yg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ebcc54-b185-4f53-a2bb-c1ecfdb56bec_554x150.png 848w, https://substackcdn.com/image/fetch/$s_!q8yg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ebcc54-b185-4f53-a2bb-c1ecfdb56bec_554x150.png 1272w, https://substackcdn.com/image/fetch/$s_!q8yg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ebcc54-b185-4f53-a2bb-c1ecfdb56bec_554x150.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!q8yg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ebcc54-b185-4f53-a2bb-c1ecfdb56bec_554x150.png" width="554" height="150" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/31ebcc54-b185-4f53-a2bb-c1ecfdb56bec_554x150.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:150,&quot;width&quot;:554,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:18909,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!q8yg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ebcc54-b185-4f53-a2bb-c1ecfdb56bec_554x150.png 424w, https://substackcdn.com/image/fetch/$s_!q8yg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ebcc54-b185-4f53-a2bb-c1ecfdb56bec_554x150.png 848w, https://substackcdn.com/image/fetch/$s_!q8yg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ebcc54-b185-4f53-a2bb-c1ecfdb56bec_554x150.png 1272w, https://substackcdn.com/image/fetch/$s_!q8yg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31ebcc54-b185-4f53-a2bb-c1ecfdb56bec_554x150.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption">Example OTP (One Time Password) email</figcaption></figure></div><h4><strong>TOTP (Time-based One Time Password)</strong></h4><p>TOTPs are the pin codes that you&#8217;ll find in your authenticator apps (Google Authenticator, Authy, Microsoft Authenticator, etc.) that change every 30 seconds. These don&#8217;t expire on use but can be used multiple times within the 30-second time period</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZRn3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe66441-fafd-4f96-80de-37336f4bb71c_334x652.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZRn3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe66441-fafd-4f96-80de-37336f4bb71c_334x652.png 424w, https://substackcdn.com/image/fetch/$s_!ZRn3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe66441-fafd-4f96-80de-37336f4bb71c_334x652.png 848w, https://substackcdn.com/image/fetch/$s_!ZRn3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe66441-fafd-4f96-80de-37336f4bb71c_334x652.png 1272w, https://substackcdn.com/image/fetch/$s_!ZRn3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe66441-fafd-4f96-80de-37336f4bb71c_334x652.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZRn3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe66441-fafd-4f96-80de-37336f4bb71c_334x652.png" width="188" height="366.9940119760479" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3fe66441-fafd-4f96-80de-37336f4bb71c_334x652.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:652,&quot;width&quot;:334,&quot;resizeWidth&quot;:188,&quot;bytes&quot;:99757,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZRn3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe66441-fafd-4f96-80de-37336f4bb71c_334x652.png 424w, https://substackcdn.com/image/fetch/$s_!ZRn3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe66441-fafd-4f96-80de-37336f4bb71c_334x652.png 848w, https://substackcdn.com/image/fetch/$s_!ZRn3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe66441-fafd-4f96-80de-37336f4bb71c_334x652.png 1272w, https://substackcdn.com/image/fetch/$s_!ZRn3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fe66441-fafd-4f96-80de-37336f4bb71c_334x652.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Example TOTP (Time-based One Time Password) from code-generator app</em></figcaption></figure></div><p>.</p><h4><strong>Verification from a trusted device</strong></h4><p>These are typical for platforms that have an application or similar and have a known trusted device. These platforms require the known device (such as your phone) to verify that it&#8217;s you logging in from a new computer.</p><h4><strong>Biometric Verification</strong></h4><p>While this is less common as secondary authentication, it is a means of authentication that can be and has been used alongside pins, passwords, and other forms of authentication.</p><h4><strong>Email Verification</strong></h4><p>Differing from OTP, it&#8217;s becoming increasingly common for the platform you&#8217;re using to send through a link to be opened to verify the login attempt. With <a href="/posts/phishing">phishing</a> becoming more and more prevalent, it&#8217;s important to be wary of the links sent to us by email or other means.</p><h4><strong>Secret Question Verification</strong></h4><p>While it&#8217;s much less common nowadays, a typical way of authenticating someone&#8217;s identity was for them to answer questions they had previously answered; questions such as <em>&#8220;What is your mother&#8217;s maiden name?&#8221;</em> or <em>&#8220;What is the name of your favourite pet?&#8221;</em> etc.</p><h2>Are all Multi-Factor Authentication methods equal?</h2><p>No, not all authentication methods are equal. Certain methods, such as <em>secret question verification</em> and even OTP sent via text messages are weaker than other means such as TOTP or verification from a trusted device.</p><blockquote><p>Hopefully, when required to set up MFA for your login, you are given the option of multiple means - whether that be by receiving a text message or by setting up a code-generator app. While both methods inevitably make your account harder to log into, it&#8217;s important that there&#8217;s a level of understanding of which method is better.</p></blockquote><p>SMS text verification is notoriously simple to crack. KrebsOnSecurty released an article <a href="https://krebsonsecurity.com/2021/03/can-we-stop-pretending-sms-is-secure-now/">here</a> describing a method used by some attackers to intercept SMS OTP codes. Forbes also released an article <a href="https://www.forbes.com/sites/zakdoffman/2020/10/11/apple-iphone-imessage-and-android-messages-sms-passcode-security-update/?sh=e3f5e8d2ede8">here</a> describing the lack of security with these methods. With this in mind, one major takeaway is to <strong>avoid SMS verification</strong> and instead <strong>use TOTP (code-generator apps)</strong>.</p><h2>TLDR</h2><p>Multi-Factor Authentication is simply a means of using multiple forms of authentication to verify a login of an account. These can come in the form of OTP, TOTP, emails, etc. It&#8217;s important to understand the differences in these implementations, but of note SMS verification (OTP) should be avoided, and instead, TOTP (code-generator apps) should be used.</p>]]></content:encoded></item><item><title><![CDATA[What are they: Antivirus]]></title><description><![CDATA[This week we take a look into what antivirus software is and how it works.]]></description><link>https://blog.lukewarmsecurityinfo.com/p/what-is-antivirus</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/what-is-antivirus</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Thu, 10 Nov 2022 21:15:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZxCz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72af9df4-9b17-444d-bf19-b51674e59f2a_1600x1067.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Antivirus</em> is a type of computer software that is designed to find and block viruses like <a href="/posts/ransomware">ransomware</a> or other malicious programs. While different antivirus software implements different methods to protect a users device, there&#8217;s typically always a scanning and blocking method for protecting a device.</p><h2>How does antivirus protect my device?</h2><h4><strong>Scanning</strong></h4><p>Scanning is typically in the form of a <em>Full-System Scan</em> or similar, where each file is hashed (like how <a href="/posts/hashed-passwords">passwords are hashed</a>) and their hash output (fingerprint) is compared to a list of known bad hashes.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZxCz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72af9df4-9b17-444d-bf19-b51674e59f2a_1600x1067.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZxCz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72af9df4-9b17-444d-bf19-b51674e59f2a_1600x1067.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZxCz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72af9df4-9b17-444d-bf19-b51674e59f2a_1600x1067.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZxCz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72af9df4-9b17-444d-bf19-b51674e59f2a_1600x1067.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZxCz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72af9df4-9b17-444d-bf19-b51674e59f2a_1600x1067.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZxCz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72af9df4-9b17-444d-bf19-b51674e59f2a_1600x1067.jpeg" width="410" height="273.4271978021978" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/72af9df4-9b17-444d-bf19-b51674e59f2a_1600x1067.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:410,&quot;bytes&quot;:612758,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZxCz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72af9df4-9b17-444d-bf19-b51674e59f2a_1600x1067.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZxCz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72af9df4-9b17-444d-bf19-b51674e59f2a_1600x1067.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZxCz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72af9df4-9b17-444d-bf19-b51674e59f2a_1600x1067.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZxCz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72af9df4-9b17-444d-bf19-b51674e59f2a_1600x1067.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Fingerprint Scanning</em></figcaption></figure></div><blockquote><p>In less-technical terms, each file has a <em>unique</em> fingerprint. This fingerprint does not change unless the file contents change. It&#8217;s the equivalent of the antivirus software having a database of fingerprints of all the criminals, and then grabbing the fingerprint of every file. If the file&#8217;s fingerprint is in the database, then it&#8217;s flagged as a bad file (and sometimes deleted).</p></blockquote><h4><strong>Blocking</strong></h4><p>Whenever a new file is downloaded, (sometimes) when a website is visited, or an external storage device is connected (like a USB), the antivirus scans the file/s to make sure that none of them have a <em>bad</em> fingerprint (hash value).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5JzG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b63a70-ce5e-4deb-aa72-7b67c0f5010d_1600x1063.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5JzG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b63a70-ce5e-4deb-aa72-7b67c0f5010d_1600x1063.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5JzG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b63a70-ce5e-4deb-aa72-7b67c0f5010d_1600x1063.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5JzG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b63a70-ce5e-4deb-aa72-7b67c0f5010d_1600x1063.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5JzG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b63a70-ce5e-4deb-aa72-7b67c0f5010d_1600x1063.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5JzG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b63a70-ce5e-4deb-aa72-7b67c0f5010d_1600x1063.jpeg" width="442" height="293.55357142857144" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2b63a70-ce5e-4deb-aa72-7b67c0f5010d_1600x1063.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:967,&quot;width&quot;:1456,&quot;resizeWidth&quot;:442,&quot;bytes&quot;:449764,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5JzG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b63a70-ce5e-4deb-aa72-7b67c0f5010d_1600x1063.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5JzG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b63a70-ce5e-4deb-aa72-7b67c0f5010d_1600x1063.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5JzG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b63a70-ce5e-4deb-aa72-7b67c0f5010d_1600x1063.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5JzG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b63a70-ce5e-4deb-aa72-7b67c0f5010d_1600x1063.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Cyber Shield Blocking</em></figcaption></figure></div><blockquote><p>Even if the file&#8217;s fingerprint isn&#8217;t in the database, sometimes the file will still be flagged if it comes from a known bad website (server) or the filename is similar to known virus filenames.</p></blockquote><h2>What devices can get antivirus software?</h2><p>All major operating systems (Windows, Mac, Linux, iOS etc.) have access to <em>some form</em> of antivirus software.</p><p>For some operating systems like iOS, however, the extent at which they can function is limited because of the inbuilt security features of these operating systems - basically, everything is run in it&#8217;s own isolated container.</p><p>This is <strong>good</strong> because it means that malicious applications can&#8217;t access your files (like photos) without access being explicitly given to them. But this also means that antivirus software can&#8217;t access everything it needs to to do <em>deep</em> scans of the device.</p><blockquote><p><strong>Deep Scans</strong> are essentially scans of all of the files found on the device.</p></blockquote><h2>Do I need antivirus software?</h2><p><strong>Yes</strong>.</p><p>Antivirus software is an essential security tool needed on your device. While there are inbuilt security components (like Windows Defender), these are not sufficient to properly protect your device.</p><p>Since antivirus is available on all devices, you should be getting antivirus on all of your devices - not just to protect the device that it&#8217;s on, but also to protect other devices.</p><p>Viruses are usually designed to target one specific operating system. With this, it&#8217;s somewhat common for someone on a Mac computer to download a Windows virus. The Windows virus might not infect their computer, but when they take their Mac to their friends house, it might infect their friend&#8217;s Windows computer. The Antivirus software would detect the Windows virus and delete it even if it isn&#8217;t infecting the Mac computer, inevitably protecting their friend&#8217;s Windows computer.</p><h2>TLDR;</h2><p>Antivirus is a type of software that scans for and blocks viruses on a device. They&#8217;re available on <em>almost</em> all operating systems and it&#8217;s <strong>highly</strong> recommended that everyone installs antivirus on ALL of their devices.</p><p><em><strong>Bitdefender</strong> is currently the highest performing (as of November 2022) antivirus software (detection score). Kaspersky is also rated highly but is <strong>not recommended</strong> due to it&#8217;s ties with Russia, likely resulting in a lack of detection of Russian viruses. Check out <a href="https://www.av-test.org/en/">https:// www.av-test.org/en/</a> for up-to-date antivirus software ratings.</em></p>]]></content:encoded></item><item><title><![CDATA[What is Encryption and how does it work?]]></title><description><![CDATA[Encryption is all around of us, but what are the different types of encryption, how do they work, and where are they used?]]></description><link>https://blog.lukewarmsecurityinfo.com/p/encryption</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/encryption</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Thu, 27 Oct 2022 21:15:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!hNSi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb46ba28-b6a6-4d79-93c4-72b432f3fc2b_4096x2160.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Encryption is a method of scrambling data in a way that can&#8217;t be read (called ciphertext). One feature of this <em>ciphertext</em> is that it needs to be able to be reversed (unlike <a href="/posts/hashed-passwords">hashing algorithms</a>).</p><h2>What are the different types of Encryption Algorithms?</h2><p>There are many different types of encryption algorithms that are used across the world. From how we access websites, to how <a href="/posts/end-to-end-encryption">E2EE apps&#8217;</a> messages are encrypted, even how we watch videos online, everything is encrypted.</p><blockquote><p>These algorithms typically fall into one of two categories: <strong>symmetric</strong> or <strong>asymmetric</strong>, which are differentiatied by how the encryption and decryption keys are implemented, as well as how many keys are required.</p></blockquote><h3>Symmetric Encryption Algorithms</h3><p><strong>Symmetric Encryption</strong> algorithms are essentially where the same key that was used to encrypt the data is also used to decrypt the data. These sort of algorithms are used when encrypting hard drives, laptops, <a href="/posts/password-managers">password managers</a> etc. This is equivalent to a lock on a chest, where the one key is used to lock and unlock the chest (assuming there&#8217;s only one lock on the chest of course)</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hNSi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb46ba28-b6a6-4d79-93c4-72b432f3fc2b_4096x2160.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hNSi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb46ba28-b6a6-4d79-93c4-72b432f3fc2b_4096x2160.jpeg 424w, https://substackcdn.com/image/fetch/$s_!hNSi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb46ba28-b6a6-4d79-93c4-72b432f3fc2b_4096x2160.jpeg 848w, https://substackcdn.com/image/fetch/$s_!hNSi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb46ba28-b6a6-4d79-93c4-72b432f3fc2b_4096x2160.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!hNSi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb46ba28-b6a6-4d79-93c4-72b432f3fc2b_4096x2160.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hNSi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb46ba28-b6a6-4d79-93c4-72b432f3fc2b_4096x2160.jpeg" width="346" height="182.5054945054945" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb46ba28-b6a6-4d79-93c4-72b432f3fc2b_4096x2160.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1456,&quot;resizeWidth&quot;:346,&quot;bytes&quot;:3667645,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hNSi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb46ba28-b6a6-4d79-93c4-72b432f3fc2b_4096x2160.jpeg 424w, https://substackcdn.com/image/fetch/$s_!hNSi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb46ba28-b6a6-4d79-93c4-72b432f3fc2b_4096x2160.jpeg 848w, https://substackcdn.com/image/fetch/$s_!hNSi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb46ba28-b6a6-4d79-93c4-72b432f3fc2b_4096x2160.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!hNSi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb46ba28-b6a6-4d79-93c4-72b432f3fc2b_4096x2160.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption"><em>Digital Key</em></figcaption></figure></div><blockquote><p><strong>AES</strong>, <strong>DES</strong> and <strong>Triple DES</strong> are some common <em>symmetric encryption</em> algorithms. <strong>AES</strong> (Advanced Encryption Standard) was released in 1998 and supersedes <strong>DES</strong> (Data Encryption Standard) (first published in 1977) as the standard for <em>symmetric encryption</em>.</p></blockquote><p>Of these symmetric encryption algorithms, there are two types of traditional ciphers known as substitution ciphers and transposition ciphers.</p><h4><strong>Substitution Ciphers</strong></h4><p>These are ciphers that have a one-to-one mapping of characters to an encoded character. A common example of this is a <em>caesar cipher</em> or <em>ROT13</em>, where each letter is mapped to another letter in the alphabet. For <em>ROT13</em>, all letters are mapped to the letter 13 characters away. The <em>caesar cipher</em> follows the same concept, but instead of the &#8220;rotation&#8221; being 13, it&#8217;s any arbituary value <em>n</em> which is the <em>key</em></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TE1V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a933dd-242b-4db2-9490-1b936ad558bf_517x35.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TE1V!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a933dd-242b-4db2-9490-1b936ad558bf_517x35.png 424w, https://substackcdn.com/image/fetch/$s_!TE1V!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a933dd-242b-4db2-9490-1b936ad558bf_517x35.png 848w, https://substackcdn.com/image/fetch/$s_!TE1V!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a933dd-242b-4db2-9490-1b936ad558bf_517x35.png 1272w, https://substackcdn.com/image/fetch/$s_!TE1V!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a933dd-242b-4db2-9490-1b936ad558bf_517x35.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TE1V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a933dd-242b-4db2-9490-1b936ad558bf_517x35.png" width="517" height="35" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/98a933dd-242b-4db2-9490-1b936ad558bf_517x35.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:35,&quot;width&quot;:517,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:14768,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TE1V!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a933dd-242b-4db2-9490-1b936ad558bf_517x35.png 424w, https://substackcdn.com/image/fetch/$s_!TE1V!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a933dd-242b-4db2-9490-1b936ad558bf_517x35.png 848w, https://substackcdn.com/image/fetch/$s_!TE1V!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a933dd-242b-4db2-9490-1b936ad558bf_517x35.png 1272w, https://substackcdn.com/image/fetch/$s_!TE1V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F98a933dd-242b-4db2-9490-1b936ad558bf_517x35.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption"><em>ROT13 Subsitution Cipher</em></figcaption></figure></div><blockquote><p><strong>Example</strong>: The ciphertext &#8220;Yhxrjnez Frphevgl Vasb vf gur orfg!&#8221; would be decoded to &#8220;Lukewarm Security Info is the best!&#8221; (ROT13).</p></blockquote><h4><strong>Transposition Ciphers</strong></h4><p>These are ciphers where the text is reordered without changing the characters themselves. Common examples of these include the &#8220;Rail Fence Cipher&#8221;, &#8220;Skytale&#8221; (similar to the Rail Fence Cipher), and &#8220;Route Cipher&#8221;.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dJuC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a5fbea3-bb85-4bfe-80a0-53cbf0ed4b91_85x53.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dJuC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a5fbea3-bb85-4bfe-80a0-53cbf0ed4b91_85x53.png 424w, https://substackcdn.com/image/fetch/$s_!dJuC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a5fbea3-bb85-4bfe-80a0-53cbf0ed4b91_85x53.png 848w, https://substackcdn.com/image/fetch/$s_!dJuC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a5fbea3-bb85-4bfe-80a0-53cbf0ed4b91_85x53.png 1272w, https://substackcdn.com/image/fetch/$s_!dJuC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a5fbea3-bb85-4bfe-80a0-53cbf0ed4b91_85x53.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dJuC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a5fbea3-bb85-4bfe-80a0-53cbf0ed4b91_85x53.png" width="121" height="75.44705882352942" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8a5fbea3-bb85-4bfe-80a0-53cbf0ed4b91_85x53.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:53,&quot;width&quot;:85,&quot;resizeWidth&quot;:121,&quot;bytes&quot;:1399,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dJuC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a5fbea3-bb85-4bfe-80a0-53cbf0ed4b91_85x53.png 424w, https://substackcdn.com/image/fetch/$s_!dJuC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a5fbea3-bb85-4bfe-80a0-53cbf0ed4b91_85x53.png 848w, https://substackcdn.com/image/fetch/$s_!dJuC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a5fbea3-bb85-4bfe-80a0-53cbf0ed4b91_85x53.png 1272w, https://substackcdn.com/image/fetch/$s_!dJuC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a5fbea3-bb85-4bfe-80a0-53cbf0ed4b91_85x53.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption"><em>Rail Fence Transposition Cipher</em></figcaption></figure></div><blockquote><p><strong>Example</strong>: The above example would be written in ciphertext as &#8220;SED ERTOE CC&#8221;, being decoded to &#8220;SECRETCODE&#8221; (Rail Fence Cipher).</p></blockquote><h3>Asymmetric Encryption Algorithms</h3><p><strong>Asymmetric Encryption</strong> algorithms use different keys to encrypt and decrypt. The approach behind these is that one key is a <em>public</em> key (publicly known), and one is a <em>private</em> key (kept as a secret to just you). This type of encryption is used to encrypt messages to others, but also as a verification method for message receivers.</p><blockquote><p><strong>RSA</strong> (Rivest, Shamir, and Adleman - names after the three creators) is a commonly used asymmetric encryption algorithm found in many online tools such as HTTPS, <a href="/posts/end-to-end-encryption">E2EE Apps</a>, SSH, and GitHub.</p></blockquote><h4><strong>RSA Encryption Algorithm</strong></h4><p>The RSA Algorithm is a common public-key encryption algorithm that was created in 1977 and is still used today. With complex maths involved, it utilises the mathematics property where summing two numbers together is easy to do, but finding the two original numbers used to sum is much harder. For example, if the sum is 18, three possible values (or key pairs) would be</p><div class="latex-rendered" data-attrs="{&quot;persistentExpression&quot;:&quot;6 \\times 3, 9\\times2, 18\\times 1&quot;,&quot;id&quot;:&quot;RTCAFNIIHJ&quot;}" data-component-name="LatexBlockToDOM"></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FsUX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe35e2988-029f-4210-aaa6-95048ca1f7e4_1600x1600.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FsUX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe35e2988-029f-4210-aaa6-95048ca1f7e4_1600x1600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FsUX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe35e2988-029f-4210-aaa6-95048ca1f7e4_1600x1600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FsUX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe35e2988-029f-4210-aaa6-95048ca1f7e4_1600x1600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FsUX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe35e2988-029f-4210-aaa6-95048ca1f7e4_1600x1600.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FsUX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe35e2988-029f-4210-aaa6-95048ca1f7e4_1600x1600.jpeg" width="342" height="342" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e35e2988-029f-4210-aaa6-95048ca1f7e4_1600x1600.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:342,&quot;bytes&quot;:405882,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FsUX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe35e2988-029f-4210-aaa6-95048ca1f7e4_1600x1600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!FsUX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe35e2988-029f-4210-aaa6-95048ca1f7e4_1600x1600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!FsUX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe35e2988-029f-4210-aaa6-95048ca1f7e4_1600x1600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!FsUX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe35e2988-029f-4210-aaa6-95048ca1f7e4_1600x1600.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Post Box in Bush</figcaption></figure></div><blockquote><p>Imagine a post box. Anyone can put a letter in, (public) but only the person with a certain <em>private</em> key can unlock the box and view the letter. The hole in the box is synonymous to a public key that everyone has access to. The box, however, can only be unlocked and the messages read by the holder of the key.</p></blockquote><h2>TLDR;</h2><p>Encryption algorithms are cryptographic algorithms that output a type of text known as <em>ciphertext</em>. This text needs to be unable to be understood (like <a href="/posts/hashed-passwords">hashing algorithms</a>), but when passed through the same algorithm with the same (symmetric) or different (asymmetric) keys, it needs to be able to be understood again. There are two types of ways to encrypt data, these are <em>symmetric</em> algorithms which have one key to encrypt and decrypt the data, and <em>asymmetric</em> algorithms which have two keys; one to encrypt and one to decrypt.</p>]]></content:encoded></item><item><title><![CDATA[What is End-to-End Encryption?]]></title><description><![CDATA[Taking a look into what End-to-End Encryption is, how it works, and why all End-to-End Encrypting apps are not the same.]]></description><link>https://blog.lukewarmsecurityinfo.com/p/end-to-end-encryption</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/end-to-end-encryption</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Fri, 14 Oct 2022 01:15:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/087fc981-6020-4417-9055-12edea4fc538_1520x851.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8krG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F485ebf95-5696-4b25-9776-10f3cea8145b_1520x851.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8krG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F485ebf95-5696-4b25-9776-10f3cea8145b_1520x851.png 424w, https://substackcdn.com/image/fetch/$s_!8krG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F485ebf95-5696-4b25-9776-10f3cea8145b_1520x851.png 848w, https://substackcdn.com/image/fetch/$s_!8krG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F485ebf95-5696-4b25-9776-10f3cea8145b_1520x851.png 1272w, https://substackcdn.com/image/fetch/$s_!8krG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F485ebf95-5696-4b25-9776-10f3cea8145b_1520x851.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8krG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F485ebf95-5696-4b25-9776-10f3cea8145b_1520x851.png" width="1456" height="815" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/485ebf95-5696-4b25-9776-10f3cea8145b_1520x851.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:815,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Lukewarm Security Info&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Lukewarm Security Info" title="Lukewarm Security Info" srcset="https://substackcdn.com/image/fetch/$s_!8krG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F485ebf95-5696-4b25-9776-10f3cea8145b_1520x851.png 424w, https://substackcdn.com/image/fetch/$s_!8krG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F485ebf95-5696-4b25-9776-10f3cea8145b_1520x851.png 848w, https://substackcdn.com/image/fetch/$s_!8krG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F485ebf95-5696-4b25-9776-10f3cea8145b_1520x851.png 1272w, https://substackcdn.com/image/fetch/$s_!8krG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F485ebf95-5696-4b25-9776-10f3cea8145b_1520x851.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>End-to-End Encryption (E2EE) is a security implementation used to ensure that only the sender and receiver can view a message.</p><blockquote><p>The equivalent would be sending a letter to your friend through the mail in a locked box that only you and your friend have a key for. The letter still needs to go through the post office to get to your friend, but the post office won&#8217;t be able to read the message.</p></blockquote><h2>Where is this used?</h2><p>End-to-End Encryption is used in many online messaging platforms. The most notable of these platforms are <strong>Signal</strong>, <strong>Whatsapp</strong>, <strong>Threema</strong>, <strong>iMessage</strong>, and <strong>WeChat</strong>. It has become much more prominent recently with the rise of privacy demands among users, but the concept has been around for ages (HTTPS could be seen as a form of E2EE).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LiIn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350a8ff-f1b7-4b3c-ac73-88552273bdc4_1600x973.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LiIn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350a8ff-f1b7-4b3c-ac73-88552273bdc4_1600x973.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LiIn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350a8ff-f1b7-4b3c-ac73-88552273bdc4_1600x973.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LiIn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350a8ff-f1b7-4b3c-ac73-88552273bdc4_1600x973.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LiIn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350a8ff-f1b7-4b3c-ac73-88552273bdc4_1600x973.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LiIn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350a8ff-f1b7-4b3c-ac73-88552273bdc4_1600x973.jpeg" width="432" height="262.5824175824176" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f350a8ff-f1b7-4b3c-ac73-88552273bdc4_1600x973.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:885,&quot;width&quot;:1456,&quot;resizeWidth&quot;:432,&quot;bytes&quot;:229454,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LiIn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350a8ff-f1b7-4b3c-ac73-88552273bdc4_1600x973.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LiIn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350a8ff-f1b7-4b3c-ac73-88552273bdc4_1600x973.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LiIn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350a8ff-f1b7-4b3c-ac73-88552273bdc4_1600x973.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LiIn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff350a8ff-f1b7-4b3c-ac73-88552273bdc4_1600x973.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Person Messaging on Phone</em></figcaption></figure></div><h3>How is this implemented?</h3><p>Typically, each <strong>device</strong> has its own decryption key. When sending a message, the text is first encrypted with a secret key that only the sender (you) and receiver know. Since each service uses some type of server to send the message (like a post office), the encrypted message is then sent to the server and forwarded to the receiver. When the message arrives at it&#8217;s destination, the device (end-point) decrypts the message with the key they have on their phone which produces human-readable (plaintext) content.</p><p>End-to-End Encryption means that even if that server is hacked and everything is leaked, the messages won&#8217;t be able to be read because only you and your friend can decrypt them.</p><blockquote><p><strong>Encryption</strong> is used in a number of different services. Most devices are encrypted and require your password to decrypt them for use. Encryption is similar to <a href="/posts/hashed-passwords/">hashing</a>, except it can be reversed if you know the secret that was used to encrypt it. There are a whole range of different forms of encryption which <em>I&#8217;ll write a blog post about soon</em>.</p></blockquote><h2>Are all E2EE messaging apps equal?</h2><p>The short answer is no. There are a couple of things to consider when looking at End-to-End Encrypted messaging apps. Some obvious questions, surrounding the trustworthiness of the End-to-End Encryption practices in certain apps (is it truly End-to-End Encrypted?) are legitimate, but let&#8217;s assume that they are End-to-End Encrypted.</p><blockquote><p><strong>Note</strong>: The following is more of a comment on what other privacy practices are put in place with these End-to-End Encrypted messaging applications.</p></blockquote><p>A &#8220;recently discovered FBI training document&#8221; released in <a href="https://therecord.media/fbi-document-shows-what-data-can-be-obtained-from-encrypted-messaging-apps/">this article</a> from November 2021 contains a brief list of the information able to be obtained from different End-to-End Encrypted messaging platforms.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JtpL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb342e09-b6d5-4c92-bc9b-596aeaef5c10_1520x851.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JtpL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb342e09-b6d5-4c92-bc9b-596aeaef5c10_1520x851.png 424w, https://substackcdn.com/image/fetch/$s_!JtpL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb342e09-b6d5-4c92-bc9b-596aeaef5c10_1520x851.png 848w, https://substackcdn.com/image/fetch/$s_!JtpL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb342e09-b6d5-4c92-bc9b-596aeaef5c10_1520x851.png 1272w, https://substackcdn.com/image/fetch/$s_!JtpL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb342e09-b6d5-4c92-bc9b-596aeaef5c10_1520x851.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JtpL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb342e09-b6d5-4c92-bc9b-596aeaef5c10_1520x851.png" width="550" height="307.864010989011" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/db342e09-b6d5-4c92-bc9b-596aeaef5c10_1520x851.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:815,&quot;width&quot;:1456,&quot;resizeWidth&quot;:550,&quot;bytes&quot;:263034,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JtpL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb342e09-b6d5-4c92-bc9b-596aeaef5c10_1520x851.png 424w, https://substackcdn.com/image/fetch/$s_!JtpL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb342e09-b6d5-4c92-bc9b-596aeaef5c10_1520x851.png 848w, https://substackcdn.com/image/fetch/$s_!JtpL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb342e09-b6d5-4c92-bc9b-596aeaef5c10_1520x851.png 1272w, https://substackcdn.com/image/fetch/$s_!JtpL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb342e09-b6d5-4c92-bc9b-596aeaef5c10_1520x851.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>FBI Lawful Access to data on E2EE Apps</em></figcaption></figure></div><p>To summarise what the FBI can &#8220;legally&#8221; access (based on this image), Whatsapp, iMessage, and Line had message content that can be retrieved, even with End-to-End Encrypted communications. But how?</p><p>For these three mentioned, the way they obtained message content wasn&#8217;t to do with how E2EE was implemented or anything, but that the devices backed up the message content and encryption keys (for iMessage) to the cloud, which meant that they simply needed access to the cloud rather than cracking the encryption.</p><blockquote><p>This raises a good point about security <strong>defence</strong> vs <strong>offence</strong>. Defenders have to block every point of entry for an attacker, whereas an attacker only needs one point of entry. For End-to-End Encryption, while the encryption methods and message exchange might be secure, if the phone (end-point) is insecure, then the easiest point of attack would be to spy on the phone after it has decrypted the messages.</p></blockquote><blockquote><p>With this, however, it&#8217;s important to note that even in this worst case, the attacker only has access to one device&#8217;s messages, not every message sent on the platform.</p></blockquote><h2>Takeaways</h2><p><strong>Use an End-to-End Encryption messaging app</strong>. Privacy and Security are important, and E2EE messaging apps are vital to ensuring that we have privacy when communicating to others.</p><p>In terms of which app to use - I&#8217;d personally recommend <a href="https://signal.org/en/">Signal</a>. It&#8217;s got the best track record (that I know of), is highly praised among the security community, it&#8217;s free, and it&#8217;s popular - so you&#8217;ll likely find that many people that you know are already using it.</p><p><em><strong>Here&#8217;s a video that might help explain End-to-End Encryption more</strong></em>:</p><div id="youtube2-jkV1KEJGKRA" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;jkV1KEJGKRA&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/jkV1KEJGKRA?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Phishing, Fishing, and Vishing]]></title><description><![CDATA[Phishing, Vishing, Smishing, and Spearphishing are all terms used for an attacker trying to get something from a target. But how do we protect ourselves, and what are they exactly?]]></description><link>https://blog.lukewarmsecurityinfo.com/p/phishing</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/phishing</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Thu, 06 Oct 2022 21:15:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9f639a51-c1f1-4314-a212-ab8883db0432_1600x1067.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Phishing</em> is a type of <em>Social Engineering</em> attack in which the attacker <em>pretends</em> to offer something, or <em>be someone else</em> in an attempt to get the target to click on a link or download a file.</p><blockquote><p>An example form of phishing attack is the <a href="/posts/bitb-attacks/">browser-in-the-browser attack</a>, where an attacker mimics the authentication page for another service to try and get the unsuspecting user to supply them with login credentials.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OCtN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc227f7d5-ecb4-4a49-9a12-98ffe4bb1571_1600x1067.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OCtN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc227f7d5-ecb4-4a49-9a12-98ffe4bb1571_1600x1067.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OCtN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc227f7d5-ecb4-4a49-9a12-98ffe4bb1571_1600x1067.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OCtN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc227f7d5-ecb4-4a49-9a12-98ffe4bb1571_1600x1067.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OCtN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc227f7d5-ecb4-4a49-9a12-98ffe4bb1571_1600x1067.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OCtN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc227f7d5-ecb4-4a49-9a12-98ffe4bb1571_1600x1067.jpeg" width="460" height="306.77197802197804" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c227f7d5-ecb4-4a49-9a12-98ffe4bb1571_1600x1067.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:460,&quot;bytes&quot;:285938,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OCtN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc227f7d5-ecb4-4a49-9a12-98ffe4bb1571_1600x1067.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OCtN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc227f7d5-ecb4-4a49-9a12-98ffe4bb1571_1600x1067.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OCtN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc227f7d5-ecb4-4a49-9a12-98ffe4bb1571_1600x1067.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OCtN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc227f7d5-ecb4-4a49-9a12-98ffe4bb1571_1600x1067.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Phishing for a Bank Card</em></figcaption></figure></div><p>There are multiple terms for variations of the typical email phishing, such as vishing (voice phishing) and smishing (SMS phishing) that all describe different <strong>avenues</strong> in which an attacker targets their victim.</p><h2>Where does it come from?</h2><p><strong>Phone &#8220;freaks&#8221; and fishing for information.</strong></p><p>Back when telephone hacking was big(ger) and the Captain Crunch whistle could give you a free phone call, a term was created to group the people who found &#8220;hacks&#8221; or ways to trick different technology - &#8220;phone freakers&#8221; or &#8220;phreaks&#8221;.</p><p>From here, &#8220;phreaks&#8221; were associated with those fishing for information or scamming others, hence the term &#8220;phishing&#8221;. <em>We really do enjoy combining words.</em></p><blockquote><p>Although phishing was originally born from an association with phone hacking, it&#8217;s more commonly found in email campaigns nowadays, with email being a more common means of communication.</p></blockquote><h2>What is Spear phishing?</h2><p><strong>Spear phishing is a targeted form of phishing</strong>. While phishing attacks are generally there to &#8220;pick the low-hanging fruit&#8221;, spear phishing attackers typically have more information about their target and adjust their message for that specific person. This could mean impersonating someone from inside their company, advertising a specific niche of hobbies that they might be into or attempting to exploit them when an aspect of their personal life is in jeopardy (i.e., financial pressures).</p><blockquote><p>Phishing attacks are more typically a &#8220;spray&#8221; type of attack; where a large number of people are sent the same email to catch out the few who bite. Spear phishing attacks would typically be sent to a single person.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PyxH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1eebf45-af2f-4b4a-9016-d7edab8bc1e8_1600x1067.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PyxH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1eebf45-af2f-4b4a-9016-d7edab8bc1e8_1600x1067.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PyxH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1eebf45-af2f-4b4a-9016-d7edab8bc1e8_1600x1067.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PyxH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1eebf45-af2f-4b4a-9016-d7edab8bc1e8_1600x1067.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PyxH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1eebf45-af2f-4b4a-9016-d7edab8bc1e8_1600x1067.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PyxH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1eebf45-af2f-4b4a-9016-d7edab8bc1e8_1600x1067.jpeg" width="484" height="322.7774725274725" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1eebf45-af2f-4b4a-9016-d7edab8bc1e8_1600x1067.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:484,&quot;bytes&quot;:224909,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PyxH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1eebf45-af2f-4b4a-9016-d7edab8bc1e8_1600x1067.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PyxH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1eebf45-af2f-4b4a-9016-d7edab8bc1e8_1600x1067.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PyxH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1eebf45-af2f-4b4a-9016-d7edab8bc1e8_1600x1067.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PyxH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1eebf45-af2f-4b4a-9016-d7edab8bc1e8_1600x1067.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Mobile Phone user clicking on an email</em></figcaption></figure></div><h2>How do I protect myself?</h2><p>The most common advice is to simply never click on links sent to you from someone you don&#8217;t know. If it leads to a page that you need to access, however, it&#8217;s much better to type the link into the URL bar yourself. Better yet, if you could find the same page by a quick search, locate it that way rather than clicking on the link.</p><blockquote><p>Anyone can very easily pretend a link is going to one page when it&#8217;s in fact leading to another. Read more about how this works here: <a href="https://lukewarmsecurityinfo.com/gotcha">https://blog.lukewarmsecurityinfo.com/posts/phishing-links</a></p></blockquote><p><em>Typically</em>, if you hover over the link on your computer, the <strong>true link location</strong> will be shown in the <strong>bottom left</strong> of the browser window. This can be used as a method to verify that a link does indeed lead to where it&#8217;s saying it does.</p><blockquote><p>Browser-in-the-browser attacks are an exception to this, which is explained more in-depth <a href="https://blog.lukewarmsecurityinfo.com/posts/bitb-attacks">here</a>.</p></blockquote><h2>What can we do better to protect others from phishing?</h2><p><strong>In my opinion</strong>, there&#8217;s no need to depend on links for access to (most) things anymore. The common uses of links in emails (that I can think of) are:</p><ul><li><p>Email Verification</p></li><li><p>Filling in a questionnaire</p></li><li><p>Viewing a specific page</p></li><li><p>Verifying a new device</p></li><li><p>Shared online files (Dropbox, Google Docs)</p></li></ul><p>With all of these, there are simple workarounds to solve the requirement of a link existing. Almost all of these can be supplemented with providing the user some sort of one-time or persistent access key to view/locate the document, image or questionnaire.</p><blockquote><p><strong>For example</strong>, to access a dropbox file that&#8217;s available for public viewing, share the unique identifier of the file (that&#8217;s in the URL anyways) with a generic <em>find your file</em> search section for the user to supply the unique identifier. This eliminates the requirement for links in emails and still provides the user with access to the document. There are no extra security measures that providing a link will do that cannot be implemented another way.</p></blockquote>]]></content:encoded></item><item><title><![CDATA[Why Privacy Matters]]></title><description><![CDATA[Privacy is something that we all care about, but when it comes to online privacy we sometimes forget how much we actually care.]]></description><link>https://blog.lukewarmsecurityinfo.com/p/privacy</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/privacy</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Thu, 29 Sep 2022 22:15:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf3d721-1abf-4e15-a355-5590033c51ee_1600x1274.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Privacy is a complicated thing, and our view on privacy has been tainted by companies that rely on our lack of desire for privacy</em>.</p><p>We all know what <em>privacy</em> is, and I&#8217;m sure you&#8217;ve heard many times before <em>how much online privacy matters</em>. This blog post isn&#8217;t here to convince you to start to care about privacy. This is just to <strong>help</strong> you realise that privacy is something that you already care about and rely on but don&#8217;t realise the extent to which it is exploited <strong>online</strong>.</p><blockquote><p>This blog is only part of a series and will continue to be updated. Privacy is vital, which has become even more evident with the recent data breaches.</p></blockquote><p>When I speak with others about online privacy, and why it&#8217;s not much of a concern to them, these are some of the responses I receive.</p><h3>I have nothing to hide.</h3><p>Have you ever said anything to a friend that might be offensive if it&#8217;s taken out of context? Or shared something with your doctor that you&#8217;d rather not have everyone know about? Do you lock your front door, or have a password on your phone or email account?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zLBX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf3d721-1abf-4e15-a355-5590033c51ee_1600x1274.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zLBX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf3d721-1abf-4e15-a355-5590033c51ee_1600x1274.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zLBX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf3d721-1abf-4e15-a355-5590033c51ee_1600x1274.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zLBX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf3d721-1abf-4e15-a355-5590033c51ee_1600x1274.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zLBX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf3d721-1abf-4e15-a355-5590033c51ee_1600x1274.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zLBX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf3d721-1abf-4e15-a355-5590033c51ee_1600x1274.jpeg" width="384" height="305.6703296703297" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/adf3d721-1abf-4e15-a355-5590033c51ee_1600x1274.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1159,&quot;width&quot;:1456,&quot;resizeWidth&quot;:384,&quot;bytes&quot;:1193056,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zLBX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf3d721-1abf-4e15-a355-5590033c51ee_1600x1274.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zLBX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf3d721-1abf-4e15-a355-5590033c51ee_1600x1274.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zLBX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf3d721-1abf-4e15-a355-5590033c51ee_1600x1274.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zLBX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fadf3d721-1abf-4e15-a355-5590033c51ee_1600x1274.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>No Privacy</em></figcaption></figure></div><p>If we truly have nothing to hide, then by all means send all of your login details for all of your accounts to my email address <a href="mailto:liam@lukewarmsecurityinfo.com">here</a> and I&#8217;ll read through all of your texts, emails and post all that I find online for your friends, family, neighbours, bosses etc. to see. After all, if there&#8217;s nothing to hide, then this wouldn&#8217;t matter, right?</p><p>In reality, all of us have certain things we&#8217;d rather not share with the entire world. <strong>This is why privacy is important</strong>.</p><blockquote><p><strong>Privacy</strong> and <strong>Secrets</strong> are not the same. While you might want to keep your secrets private (kind of core to it being a secret), some things require privacy. <strong>For example</strong>, when you go to your room to get dressed, it&#8217;s clear that you&#8217;re getting dressed, that&#8217;s not a secret, but typically you&#8217;d want some form of privacy with this. It&#8217;s probably safe to assume that (as fully grown adults) we wouldn&#8217;t want to get completely dressed and undressed in front of our grandparents&#8230; right?</p></blockquote><h3>They already know everything anyway.</h3><p>This, being one of the most common arguments for why not to bother about privacy, is <strong>wrong</strong>. An important view to have when it comes to companies having your data is <strong>perspective</strong>; if you stopped sharing everything online today, then in 10 years, their data on you is much less relevant. Even if 90% of your life has been shared on social media up to this point, <strong>it doesn&#8217;t mean that the rest of your life needs to be shared</strong>.</p><blockquote><p>Just because you&#8217;ve always eaten sugar, that doesn&#8217;t mean you <strong>always have</strong> to eat sugar. Similarly with online privacy, just because you&#8217;ve always posted <em>everything</em> online, it doesn&#8217;t mean that you need to continue to do so.</p></blockquote><p>All in all, online privacy is comparable to &#8220;see it to believe it&#8221;, in that if we can&#8217;t directly see the consequences of it, we don&#8217;t fully comprehend the extent of it. If someone was physically standing there watching us all the time, then we would (most likely) feel quite uncomfortable about that, but when it comes to online, most of us are ok with people watching everything we do there; because we can&#8217;t physically see them watching us.</p><h2>Recommended Follow-up</h2><p>Below is a recording of a TED Talk by <strong>Glenn Greenwalk</strong> titled &#8220;Why Privacy Matters&#8221;. This is a phenomenal talk that looks into why privacy matters. I&#8217;d highly recommend watching this video to learn more about why privacy matters, and how it&#8217;s something we already all take into consideration; but just forget about when it comes to being online.</p><div id="youtube2-pcSlowAhvUk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;pcSlowAhvUk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/pcSlowAhvUk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[A Brief Overview of Ransomware]]></title><description><![CDATA[What is ransomware? And what should I do if I see ransomware? Here, blog we take a brief look into some of the information you should know about this type of computer virus, and how to mitigate them.]]></description><link>https://blog.lukewarmsecurityinfo.com/p/ransomware</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/ransomware</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Thu, 22 Sep 2022 22:15:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d60f0f37-e236-43f2-a7de-3e5b445a0afa_6000x4000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>What is Ransomware?</h2><p>Most of you would have heard of the word <em>ransom</em> before, or to &#8216;<em>demand a ransom</em>&#8217; &#8211; typically to pay for the release of a captive. Ransomware is the cyber version of that.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!F8jG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F496cbc38-fc29-4e8f-b79a-6add8357ede1_6000x4000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!F8jG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F496cbc38-fc29-4e8f-b79a-6add8357ede1_6000x4000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!F8jG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F496cbc38-fc29-4e8f-b79a-6add8357ede1_6000x4000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!F8jG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F496cbc38-fc29-4e8f-b79a-6add8357ede1_6000x4000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!F8jG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F496cbc38-fc29-4e8f-b79a-6add8357ede1_6000x4000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!F8jG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F496cbc38-fc29-4e8f-b79a-6add8357ede1_6000x4000.jpeg" width="560" height="373.46153846153845" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/496cbc38-fc29-4e8f-b79a-6add8357ede1_6000x4000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:560,&quot;bytes&quot;:8212894,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!F8jG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F496cbc38-fc29-4e8f-b79a-6add8357ede1_6000x4000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!F8jG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F496cbc38-fc29-4e8f-b79a-6add8357ede1_6000x4000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!F8jG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F496cbc38-fc29-4e8f-b79a-6add8357ede1_6000x4000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!F8jG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F496cbc38-fc29-4e8f-b79a-6add8357ede1_6000x4000.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>A Ransom Note</em></figcaption></figure></div><p>Historically it has been where a hacker unleashed a type of malware (computer virus) onto a victim&#8217;s computer that encrypts all of their files and data. The hacker then demands some sort of payment for them to decrypt the computer and allow the victim to access their files again.</p><blockquote><p><strong>Encrypting</strong> is a method of scrambling some form of text or data in a certain way so that it cannot be understood by a reader. <strong>Decrypting</strong> is unscrambling that text or data so that it can be understood. The different methods of scrambling data are known as encryption algorithms.</p></blockquote><h2>What do I do if I&#8217;ve been &#8216;Ransomwared&#8217;?</h2><p>The advice given to people when they&#8217;re in this type of situation is to <strong>never pay the ransom</strong>.</p><p><strong>Why?</strong></p><ol><li><p>The attacker might not give you a decryption key.</p></li><li><p>Even if the key works, it&#8217;s likely that you won&#8217;t get a full file recovery.</p></li><li><p>By paying the ransom, it&#8217;s funding the ransomware business. If ransomware attacks don&#8217;t lead to payments, then they won&#8217;t become a viable method of obtaining money which would (hopefully) lead to them not being used anymore.</p></li></ol><p>Fortunately, there are several resources online that have publicly available <em>decryption keys</em> for different types of ransomware.</p><blockquote><p><strong>Decryption Keys</strong> are passwords or some type of secret that the decryption algorithm needs to correctly unscramble to text/data.</p></blockquote><p>One example of this is a tool known as <strong><a href="/resources#Crypto-Sheriff">Crypto Sheriff</a></strong> which allows the user to type in the information provided to you in the ransom note, and searches their database for known decryption keys.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9lx7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75d38a7-5ad1-46ca-ada8-09b8510e0933_4096x2160.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9lx7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75d38a7-5ad1-46ca-ada8-09b8510e0933_4096x2160.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9lx7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75d38a7-5ad1-46ca-ada8-09b8510e0933_4096x2160.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9lx7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75d38a7-5ad1-46ca-ada8-09b8510e0933_4096x2160.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9lx7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75d38a7-5ad1-46ca-ada8-09b8510e0933_4096x2160.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9lx7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75d38a7-5ad1-46ca-ada8-09b8510e0933_4096x2160.jpeg" width="382" height="201.4945054945055" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d75d38a7-5ad1-46ca-ada8-09b8510e0933_4096x2160.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:768,&quot;width&quot;:1456,&quot;resizeWidth&quot;:382,&quot;bytes&quot;:3667645,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9lx7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75d38a7-5ad1-46ca-ada8-09b8510e0933_4096x2160.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9lx7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75d38a7-5ad1-46ca-ada8-09b8510e0933_4096x2160.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9lx7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75d38a7-5ad1-46ca-ada8-09b8510e0933_4096x2160.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9lx7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd75d38a7-5ad1-46ca-ada8-09b8510e0933_4096x2160.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption"><em>Encryption Key</em></figcaption></figure></div><p>The other solution would be to restore from a previous backup. While this could lead to some type of data loss, depending on how long ago your last backup was; which leads into&#8230;</p><h2>How do I prevent / prepare for a Ransomware attack?</h2><p><strong>Backups</strong>These are by far the greatest &#8216;<em>counter</em>&#8217; to a ransomware attack, since the <em>threat</em> of not being able to access important files is made redundant.</p><blockquote><p>It&#8217;s always good practice to keep multiple backups, including an <em>offline</em> backup, which is one that&#8217;s not connected to your company network so that the backups too won&#8217;t be encrypted.</p></blockquote><h4><strong>Update / Patch Devices</strong></h4><p>Patching known vulnerabilities is always going to be one of the easiest and best security measures you can take for your devices. Leaving devices and software out of date is like leaving your house, knowing that the front door is broken and anyone can just walk in.</p><h4><strong>Antivirus</strong></h4><p>A lot of basic ransomware or other forms of computer viruses can be stopped with antivirus software. I&#8217;ll be writing a blog post looking into different antivirus software soon, but the recommendations for now would be to look into <a href="https://www.bitdefender.com/">Bitdefender</a> and to <em><strong>STAY AWAY</strong> from Kaspersky (Russian Antivirus Software)</em>.</p><h4><strong>Social Engineering Education</strong></h4><p>One of the most common avenues for ransomware to get into a company or home network is by a user clicking on a malicious link - typically from an email. <strong>Phishing</strong> is a type of <em>Social Engineering</em> attack in which the attacker pretends to offer something, or be someone else to try in an attempt to get the target to click on a link or download a file. <em>I&#8217;ll be posting a blog about phishing soon.</em></p><blockquote><p>Phishing attacks are typically a general <em>spray</em> attack in which an attacker sends an email out to a whole bunch of people and hopes for a response back from some of them. Spearphishing is a more targeted version of this.</p></blockquote><h4><strong>Zero trust model (businesses)</strong></h4><p>Employee training and knowledge will always be vital in protecting your organisation, but no one is perfect, and even the most trained person who&#8217;s constantly on the lookout can be tricked. This is why it&#8217;s important to adopt something like the <em>Zero Trust Model</em>.</p><p>In short, this is basically where each user only had access to what they <strong>need</strong> to access. This can help restrict a ransomware attack to only the files that a specific user has access to which, under this model, would hopefully not be all of the company files.</p><h4><strong>Encrypting your files</strong></h4><p>To be clear, I don&#8217;t mean encrypting all of your files if you don&#8217;t need to, but for those with important information, it could be nice to add a little extra protection. Why this might be important will become more evident below.</p><h2>How has Ransomware evolved?</h2><p>Unfortunately, with the world becoming smarter in how they counter ransomware attacks by simply restoring from a backup, attackers have had to come up with new ways to keep the money rolling in.</p><p><em>Origami Evolution</em></p><p>One of these ways was an added element of <strong>leaking company data</strong> in a ransomware attack. What this means, is that typical attacks (on companies at least) would encrypt all of their files as well as threaten to leak those files (potentially classified) to the public internet, typically if the ransom isn&#8217;t paid within a time frame.</p><p>With this, there&#8217;s also usually the threat of &#8220;<em>Do not contact the police or we will leak your company information</em>&#8221; which (and fair enough) adds a lot more pressure on companies to pay the ransom.</p><h3>How do we counter this evolved version?</h3><p>Some of the measures mentioned above such as <strong>Backups</strong>, <strong>Zero Trust Model</strong>, and <strong>Encrypting your files</strong> can all be viable solutions to limit the damage caused by a ransomware attack. With the time frames though, it&#8217;s <strong>vital</strong> that a plan is in place to deal with this type of situation. While some companies have money set aside for ransom payments, having a cyber security company / branch on your <strong>incident response plan</strong> is vital, not just to protect your data, but also for possible legal repercussions afterwards.</p><h2>TLDR;</h2><p>To summarise, ransomware is a type of computer virus that encrypts your files and demands that you send money to the attacker to gain access to your files and to stop them from leaking your data to the public internet. The advice given on what to do if you are the victim of a ransomware attack is to not pay the ransom. There are several steps you can take to <em>mitigate</em> the damage caused by a ransomware attack, and steps you can take to prevent a ransomware attack in general, since most are caused by opportunity, rather than being targeted.</p>]]></content:encoded></item><item><title><![CDATA[What are Hashed Passwords?]]></title><description><![CDATA[Briefly looking into what hashed passwords are, where they're used, what their characteristics are and why we use them.]]></description><link>https://blog.lukewarmsecurityinfo.com/p/hashed-passwords</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/hashed-passwords</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Thu, 08 Sep 2022 14:00:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/0b729c2e-17d7-45ed-ad19-fb0d1efd17d4_4267x3200.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Briefly looking into what hashed passwords are, where they're used, what their characteristics are and why we use them.</p><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!d9qu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaeb22ac-5db2-49f9-aaa5-fb522fc94ddc_4267x3200.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!d9qu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaeb22ac-5db2-49f9-aaa5-fb522fc94ddc_4267x3200.png 424w, https://substackcdn.com/image/fetch/$s_!d9qu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaeb22ac-5db2-49f9-aaa5-fb522fc94ddc_4267x3200.png 848w, https://substackcdn.com/image/fetch/$s_!d9qu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaeb22ac-5db2-49f9-aaa5-fb522fc94ddc_4267x3200.png 1272w, https://substackcdn.com/image/fetch/$s_!d9qu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaeb22ac-5db2-49f9-aaa5-fb522fc94ddc_4267x3200.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!d9qu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaeb22ac-5db2-49f9-aaa5-fb522fc94ddc_4267x3200.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aaeb22ac-5db2-49f9-aaa5-fb522fc94ddc_4267x3200.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Lukewarm Security Info&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Lukewarm Security Info" title="Lukewarm Security Info" srcset="https://substackcdn.com/image/fetch/$s_!d9qu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaeb22ac-5db2-49f9-aaa5-fb522fc94ddc_4267x3200.png 424w, https://substackcdn.com/image/fetch/$s_!d9qu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaeb22ac-5db2-49f9-aaa5-fb522fc94ddc_4267x3200.png 848w, https://substackcdn.com/image/fetch/$s_!d9qu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaeb22ac-5db2-49f9-aaa5-fb522fc94ddc_4267x3200.png 1272w, https://substackcdn.com/image/fetch/$s_!d9qu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faaeb22ac-5db2-49f9-aaa5-fb522fc94ddc_4267x3200.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>When looking around at cyber security concepts, one term that is used often is <em>hashed password</em> or to <em>hash</em> something. What this is, in a basic overview, is a one-way encrypted version of something.</p><p><em>Diagram showing plaintext and hashed text</em></p><blockquote><p><strong>Plaintext</strong> describes text that is human readable / understandable, such as (hopefully) this blog post, or the word &#8220;password&#8221;. <br><strong>Hashed</strong> describes text that has gone through a hashing function and is typically a little less human readable, such as <em>5f4dcc3b5aa765d61d8327deb882cf99</em>.</p></blockquote><h2>What is a hashing function?</h2><p>Hashing functions (or hashing algorithms) are functions that take some type of data, run it through a series of complex mathematical steps, and spit out a result that looks like a weird string of letters and numbers.</p><blockquote><p>Some of the most common hash functions include <strong>SHA256</strong>, <strong>SHA512</strong>, <strong>MD5</strong> and many others.</p></blockquote><p>Hash functions, however, are much more complex than just taking in data and spitting out a result. There are several <em>rules</em> that a hash function must live by for it to be used / counted as a hash function.</p><p>These rules / attributes a <em>hash</em> function must have are:</p><ul><li><p>Repeatable</p></li><li><p>Unique</p></li><li><p>Unpredictable</p></li><li><p>Irreversible</p></li><li><p>Consistent</p></li></ul><h3>What do these rules/attributes mean?</h3><p><strong>Repeatable</strong>The repeatable attribute means that every time the same text is <em>hashed</em> with that hash function, it gets the same result. This should be the same result, independent of the time of day, computer hardware, operating system etc.</p><blockquote><p>For example, if I run the <em>plaintext</em> &#8220;password&#8221; through the <strong>MD5</strong> <em>hashing algorithm</em>, it should <strong>always</strong> produce the result <em>5f4dcc3b5aa765d61d8327deb882cf99</em>.</p></blockquote><p><strong>Unique</strong>Hash results must all be unique, meaning that (to the best of their ability), there should <em>ideally</em> only be one input to produce that result.</p><p>Since it&#8217;s mathematically impossible to only have one input for each possible output (there are an infinite number of possible inputs and a finite number of possible outputs), as long as another input that produces the same output (<em>collision value</em>) cannot be predicted/ calculated, this is ok.</p><blockquote><p>Having multiple inputs that produce the same <em>hash</em> output is called a <strong>hash collision</strong>.</p></blockquote><p><strong>Unpredictable</strong>Hash results should not be able to be calculated or predictable, meaning that there should be <em><strong>no correlation</strong></em> between the hash of <em>password1</em> and <em>password2</em> for example.<strong>Irreversible</strong>It should not be possible to find the original input of a hash function based on its output. In essence, this should be a one-way encryption, and should not be able to be decrypted / reversed.</p><p><em>Note: <strong>Rainbow Tables</strong> are not decrypting / reversing the input since it only shows a <strong>possible</strong> input for the same output</em></p><blockquote><p>A common way for someone to <em>find the reverse</em> of a hash output is through what is known as a <strong>Rainbow Table</strong>. These are databases or <em>tables</em> filled with various inputs, and their corresponding hash outputs.<br>To try this for yourself, paste in <em>5f4dcc3b5aa765d61d8327deb882cf99</em> into your search engine, and you should be able to find the result quite quickly.<br><em>(Hint: It&#8217;s the MD5 hash for &#8220;password&#8221;)</em></p></blockquote><p><strong>Consistent</strong>This is more about the output of a hash, while it should be repeatable, <strong>ALL</strong> hash outputs should be the <strong>same length</strong>. This is part of the <strong>unpredictable</strong> nature of a hash, ensuring that all hash outputs are just as difficult to crack as each other.</p><blockquote><p>All hashes have their own <em>Fixed-length Output</em>. For example, the <strong>MD5</strong> hash has a fixed-length output of 128 bits (or 32 <strong>hexadecimal</strong> digits). Also, all hex outputs are in hexadecimal digits, meaning that they are a combination of (lowercase <strong>OR</strong> UPPERCASE) letters and numbers.</p></blockquote><h2>Where are hashed passwords used?</h2><p>Hashed passwords (ideally) are used whenever a website or server stores your password for login. What happens, is that when you register for a website, the website takes a <em>hash</em> of the password you typed in, and then stores that in their database, next to your username.</p><p><strong>Why?</strong>If a website / company gets hacked (for example), the attackers can only grab the <em>hashed</em> passwords, meaning they don&#8217;t know what the actual password was (<strong>irreversible</strong> attribute).</p><p>Since one of the attributes of a hashed password is that it&#8217;s <strong>repeatable</strong>, every time we type in our password to the website to log in, the password that we typed in is <em>hashed</em> the same way as it was originally, and compared to what is stored on the websites database. If they match (<strong>uniqueness</strong> attribute saves us here), then the user entered the correct password, if they don&#8217;t, then their password was incorrect.</p><h2>How do we secure a hashed password even further?</h2><p>With <strong>Rainbow Tables</strong> and the like threatening the <strong>irreversible</strong> nature of hashed password, security engineers have become creative in their attempts to counter these tables, namely with <strong>salt</strong> and <strong>pepper</strong>.</p><p><em>Salt and Pepper</em></p><p><strong>Salt</strong>A Salt (not the edible kind) is a random string of characters added to the start/end of a users password <em>before</em> it&#8217;s hashed. For example, if I registered an account on a website, and typed in my password as &#8220;password&#8221;, the website would take that password, add (for example) &#8220;supersecretcodethatwasrandomlygenerated&#8221; to the start of it (so the <em>password</em> being hashed is &#8220;supersecretcodethatwasrandomlygeneratedpassword&#8221;), <strong>and then</strong> they hash that new <em>password</em> and store it in the database.</p><p>Then, whenever someone tries to log into that account, they type in their password, the <em>Salt</em> is added to the start of it, and then it&#8217;s compared to the hash in the database.</p><blockquote><p><strong>Salt</strong>&#8217;s are typically consistent across all users, meaning that typically a website would use one <em>randomly generated</em> salt on all passwords.</p></blockquote><p><strong>Pepper</strong>Pepper (again, not the edible kind) is similar to a salt, and works the same way, except it only applies to one user, meaning that each user would have a different <strong>pepper</strong>.</p><p>Typically, these are stored on a database, near username and hashed password, and are added to the password <strong>before</strong> it&#8217;s hashed <em>as well as</em> the salt.</p>]]></content:encoded></item><item><title><![CDATA[Top Recommended Password Managers]]></title><description><![CDATA[Looking at some of the top password managers, and which ones I would recommend for which use.]]></description><link>https://blog.lukewarmsecurityinfo.com/p/recommended-password-managers</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/recommended-password-managers</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Mon, 05 Sep 2022 14:00:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e3a33d79-0a13-4867-86a6-da5d465db9a5_1920x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Looking at some of the top password managers, and which ones I would recommend for which use.</p><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!U_Ed!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd730b448-714c-4d9e-bb69-19c4d214d7f8_1920x1280.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!U_Ed!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd730b448-714c-4d9e-bb69-19c4d214d7f8_1920x1280.png 424w, https://substackcdn.com/image/fetch/$s_!U_Ed!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd730b448-714c-4d9e-bb69-19c4d214d7f8_1920x1280.png 848w, https://substackcdn.com/image/fetch/$s_!U_Ed!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd730b448-714c-4d9e-bb69-19c4d214d7f8_1920x1280.png 1272w, https://substackcdn.com/image/fetch/$s_!U_Ed!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd730b448-714c-4d9e-bb69-19c4d214d7f8_1920x1280.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!U_Ed!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd730b448-714c-4d9e-bb69-19c4d214d7f8_1920x1280.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d730b448-714c-4d9e-bb69-19c4d214d7f8_1920x1280.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Login screen with username and password&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Login screen with username and password" title="Login screen with username and password" srcset="https://substackcdn.com/image/fetch/$s_!U_Ed!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd730b448-714c-4d9e-bb69-19c4d214d7f8_1920x1280.png 424w, https://substackcdn.com/image/fetch/$s_!U_Ed!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd730b448-714c-4d9e-bb69-19c4d214d7f8_1920x1280.png 848w, https://substackcdn.com/image/fetch/$s_!U_Ed!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd730b448-714c-4d9e-bb69-19c4d214d7f8_1920x1280.png 1272w, https://substackcdn.com/image/fetch/$s_!U_Ed!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd730b448-714c-4d9e-bb69-19c4d214d7f8_1920x1280.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><p>First of all, if you&#8217;re still considering whether or not to use a password manager - you should. Check out my blog giving a brief overview of some of the benefits of using a password manager <a href="/posts/password-managers">here</a>.</p><h4>What to consider</h4><p>When choosing a password manager, there are some things to consider:</p><ul><li><p>What are the capabilities? (i.e., MFA Code Generation, Random Password Generation, Generating Backups, Password Sharing etc.)</p></li><li><p>What is the support like? (i.e., Is it community-driven? Are there resources online if I get stuck?)</p></li><li><p>What are the costs? (Can I trial the software if there is a cost?)</p></li><li><p>Personal or Business use?</p></li><li><p>What platforms are their apps available on? (i.e., iOS, Mac, Windows, Linux, Android, Browser)</p></li></ul><p><strong>TLDR</strong>For those starting out with a password manager, I would suggest trying <strong><a href="#1password">1Password</a></strong>. While it is paid, it&#8217;s quite cheap at $2.99 USD/month. It has many user-friendly features such as password recovery and travel mode, and has lots of online support available if you get stuck.</p><h1>Summaries</h1><h2>Bitwarden</h2><p><em>Bitwarden Logo</em></p><blockquote><p>Best Open-Source Password Manager.</p></blockquote><p><strong><a href="https://bitwarden.com">Bitwarden</a></strong>is an open-source (their source code is available for anyone to view / scrutinise) password manager with Free, Premium and Family packages for Personal use, as well as options for Business use.</p><ul><li><p>MFA Integration</p></li><li><p>Password Generation</p></li><li><p>Simple Import / Export</p></li><li><p>Password Sharing</p></li><li><p>Free option</p></li><li><p>Cloud-Sync</p></li><li><p>Cross-Platform</p><ul><li><p>iOS/Android</p></li><li><p>Windows/Mac/Linux</p></li><li><p>Web-Application</p></li></ul></li></ul><h2>1Password</h2><p><em>1Password Logo</em></p><blockquote><p>Best for Mac &amp;amp; Best for Families.</p></blockquote><p><strong><a href="https://1password.com">1Password</a></strong>is a cross-platform password manager with Individual and Family paid options available (14 day free trial) for Personal use, as well as business options. 1Password provides a strong support base, with user-friendly features. 1Password was originally built for Mac.</p><ul><li><p>MFA Integration</p></li><li><p>Password Generation</p></li><li><p>Simple Import / Export</p></li><li><p>Password Sharing</p></li><li><p>Free option</p></li><li><p>Cloud-Sync</p></li><li><p>Cross-Platform</p><ul><li><p>iOS/Android</p></li><li><p>Windows/Mac/Linux</p></li><li><p>Web-Application</p></li></ul></li></ul><h2>LastPass</h2><p><em>LastPass Logo</em></p><blockquote><p>Best for browser use.</p></blockquote><p><strong><a href="https://lastpass.com">LastPass</a></strong>is a <em>freemium</em> password manager, storing passwords online. Lastpass was recently involved in a data breach, leaking some of their source code and other information, but remains to be a popular password manager. It is known for it&#8217;s good customer support and ease-of-use.</p><ul><li><p>MFA Integration</p></li><li><p>Password Generation</p></li><li><p>Simple Import / Export</p></li><li><p>Password Sharing</p></li><li><p>Free option</p></li><li><p>Cloud-Sync</p></li><li><p>Cross-Platform</p><ul><li><p>iOS/Android</p></li><li><p>Windows/Mac/Linux</p></li><li><p>Web-Application</p></li></ul></li></ul><h2>Dashlane</h2><p><em>Dashlane Logo</em></p><blockquote><p>Best for password security.</p></blockquote><p><strong><a href="https://dashlane.com">Dashlane</a></strong>is a french-based company that launched its password manager in 2009. One of the benefits of Dashlane is the <em>Dark Web Monitoring</em>, which allows users to ensure that their passwords haven&#8217;t been leaked online.</p><ul><li><p>MFA Integration</p></li><li><p>Password Generation</p></li><li><p>Simple Import / Export</p></li><li><p>Password Sharing</p></li><li><p>Free option</p></li><li><p>Cloud-Sync</p></li><li><p>Cross-Platform</p><ul><li><p>iOS/Android</p></li><li><p>Windows/Mac/Linux</p></li><li><p>Web-Application</p></li></ul></li></ul><h2>Keeper</h2><p><em>Keeper Logo</em></p><blockquote><p>Best for businesses.</p></blockquote><p><strong><a href="https://keepersecurity.com">Keeper</a></strong>was rated by pcmag as their top password manager for 2022. The pros mentioned here include full password / file history, secure password sharing features, good user-interface as well as a wide variate of record type templates for storing all of your data in a secure place.</p><ul><li><p>MFA Integration</p></li><li><p>Password Generation</p></li><li><p>Simple Import / Export</p></li><li><p>Password Sharing</p></li><li><p>Free option</p></li><li><p>Cloud-Sync</p></li><li><p>Cross-Platform</p><ul><li><p>iOS/Android</p></li><li><p>Windows/Mac/Linux</p></li><li><p>Web-Application</p></li></ul></li></ul><h2>KeePassXC</h2><p><em>KeePassXC Logo</em></p><blockquote><p>Best choice for Linux &amp;amp; Most secure.</p></blockquote><p><strong><a href="https://keepassxc.org/">KeePassXC</a></strong>is a freely available, offline password manager that is local to a device (it&#8217;s not connected to any servers). This was ranked as most secure due to the range of authentication methods that can be added in order to gain access to the database, as well as it being fully offline, meaning that there&#8217;s no risk of a company data breach leaking the master password for your password manager.</p><ul><li><p>MFA Integration</p></li><li><p>Password Generation</p></li><li><p>Simple Import / Export</p></li><li><p>Password Sharing</p></li><li><p>Free option</p></li><li><p>Cloud-Sync</p></li><li><p>Cross-Platform</p><ul><li><p>iOS/Android</p></li><li><p>Windows/Mac/Linux</p></li><li><p>Web-Application</p></li></ul></li></ul>]]></content:encoded></item><item><title><![CDATA[Insecure In-App Browsing]]></title><description><![CDATA[Looking into what in-app browsers are, the security and privacy concerns around them, and how to protect yourself.]]></description><link>https://blog.lukewarmsecurityinfo.com/p/in-app-browsers</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/in-app-browsers</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Sun, 04 Sep 2022 23:15:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/7339ca46-678c-41c9-b999-360adc13c0a9_1750x1500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Looking into what in-app browsers are, the security and privacy concerns around them, and how to protect yourself.</p><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nGhU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323d0531-6531-4154-92a9-ef8255615903_1750x1500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nGhU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323d0531-6531-4154-92a9-ef8255615903_1750x1500.png 424w, https://substackcdn.com/image/fetch/$s_!nGhU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323d0531-6531-4154-92a9-ef8255615903_1750x1500.png 848w, https://substackcdn.com/image/fetch/$s_!nGhU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323d0531-6531-4154-92a9-ef8255615903_1750x1500.png 1272w, https://substackcdn.com/image/fetch/$s_!nGhU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323d0531-6531-4154-92a9-ef8255615903_1750x1500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nGhU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323d0531-6531-4154-92a9-ef8255615903_1750x1500.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/323d0531-6531-4154-92a9-ef8255615903_1750x1500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Facebook Messenger's In-App Browser&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Facebook Messenger's In-App Browser" title="Facebook Messenger's In-App Browser" srcset="https://substackcdn.com/image/fetch/$s_!nGhU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323d0531-6531-4154-92a9-ef8255615903_1750x1500.png 424w, https://substackcdn.com/image/fetch/$s_!nGhU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323d0531-6531-4154-92a9-ef8255615903_1750x1500.png 848w, https://substackcdn.com/image/fetch/$s_!nGhU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323d0531-6531-4154-92a9-ef8255615903_1750x1500.png 1272w, https://substackcdn.com/image/fetch/$s_!nGhU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F323d0531-6531-4154-92a9-ef8255615903_1750x1500.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><h2>What are in-app browsers?</h2><p>Mobile applications such as Facebook, Instagram, Snapchat, Facebook Messenger, Discord and (more recently in the news) <strong>TikTok</strong> have their own in-app browsers that allow users to open links in a browser from within the application.</p><p>In-app browser, put simply, are inbuilt browsers that are used to open links while inside a mobile app. For example, if you&#8217;ve ever clicked on a link inside Facebook Messenger, you&#8217;ll notice that there&#8217;s a small pop-up that comes up with the website - this is their inbuilt browser.</p><p><em>Facebook Messenger&#8217;s In-App Browser</em></p><h3>Why are these insecure?</h3><p><a href="https://internet2-0.com/whitepaper/tiktok-inapp-browsers/">Internet 2.0</a> recently released an analysis into the TikTok in-app browser, noting how when websites are loaded inside this in-app browser, pages are injected with malicious javascript before displaying it to the user that is used to track the users activity across their browsing session.</p><p>What this meant was that whenever a user clicked on a link from within the app, and the in-app browser was opened, anything that the user did to interact with the webpage, whether that be purchase a ticket (inputting credit card details), visiting a shopping site, reading a blog post etc. was all recorded and sent back to TikTok.</p><blockquote><p>Not all in-app browsers inject malicious javascript into the pages, but it&#8217;s <strong>safer</strong> to assume that what we do inside an <em>in-app browser</em> is being tracked.</p></blockquote><h2>How do I protect myself?</h2><p>The simplest way to protect against these possible privacy issues is to open the link in your browser, rather than within the app itself. This can be done by either copy and pasting the link into your browser, or (once opened within the in-app browser) there is <em>typically</em> an option to open the link in your default browser.</p><p><em>Opening the link in your default browser</em></p><p>While not all in-app browsers are there with malicious intent, it&#8217;s always better to take these small security measures to ensure that your data, credit card details and activity aren&#8217;t being tracked or recorded.</p><h2>How can I detect if my activity is being recorded?</h2><p>Twitter user <a href="https://twitter.com/KrauseFx/status/1560372215048175617">@KrauseFx</a> linked an online tool used in the investigation of the TikTok in-app browser called <a href="https://inappbrowser.com/">InAppBrowser.com</a> that allows anyone to check what data is being recorded by the in-app browser, by analysing the javascript injected into the website.</p><p><em>InAppBrowser.com analysis of common in-app browsers</em></p><blockquote><p>Keep in mind, this tool only detects some of the common /known ways that in-app browsers track user data. Even if the tool doesn&#8217;t detect any tracking javascript, it doesn&#8217;t mean that you&#8217;re not being tracked.</p></blockquote><p><em>For more information, view the original blog announcement of this tool by KrauseFx <a href="https://krausefx.com/blog/announcing-inappbrowsercom-see-what-javascript-commands-get-executed-in-an-in-app-browser">here</a>.</em></p>]]></content:encoded></item><item><title><![CDATA[What are they: Password Managers]]></title><description><![CDATA[What are password managers, and why are they so important? Password Managers have become more and more popular lately, but how do they work? Are they more of an inconvenience?]]></description><link>https://blog.lukewarmsecurityinfo.com/p/password-managers</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/password-managers</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Thu, 01 Sep 2022 23:00:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Xs6Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3fdca1-4a36-4d55-aa6c-4a60ca0ccd03_500x515.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A Password Manager is a tool that is used to keep a copy of all of your passwords.</p><p>While a sticky note or your memory might keep track of all of the passwords that you&#8217;re using, more likely than not, you&#8217;re reusing the same passwords more than once, which can pose a <strong>major</strong> security risk to yourself</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6x_y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2c2fd01d-b6e5-4b02-a27c-c53f6c976a11_300x274.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6x_y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2c2fd01d-b6e5-4b02-a27c-c53f6c976a11_300x274.png 424w, https://substackcdn.com/image/fetch/$s_!6x_y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2c2fd01d-b6e5-4b02-a27c-c53f6c976a11_300x274.png 848w, https://substackcdn.com/image/fetch/$s_!6x_y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2c2fd01d-b6e5-4b02-a27c-c53f6c976a11_300x274.png 1272w, https://substackcdn.com/image/fetch/$s_!6x_y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2c2fd01d-b6e5-4b02-a27c-c53f6c976a11_300x274.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6x_y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2c2fd01d-b6e5-4b02-a27c-c53f6c976a11_300x274.png" width="300" height="274" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/2c2fd01d-b6e5-4b02-a27c-c53f6c976a11_300x274.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:274,&quot;width&quot;:300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:48447,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6x_y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2c2fd01d-b6e5-4b02-a27c-c53f6c976a11_300x274.png 424w, https://substackcdn.com/image/fetch/$s_!6x_y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2c2fd01d-b6e5-4b02-a27c-c53f6c976a11_300x274.png 848w, https://substackcdn.com/image/fetch/$s_!6x_y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2c2fd01d-b6e5-4b02-a27c-c53f6c976a11_300x274.png 1272w, https://substackcdn.com/image/fetch/$s_!6x_y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2c2fd01d-b6e5-4b02-a27c-c53f6c976a11_300x274.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Sticky Note with Passwords</em></figcaption></figure></div><p>Password managers are a simple and secure way of holding all of your passwords, and making sure that all of your accounts are secure online.</p><h2>Why should I use a password manager?</h2><h5>Easier to manage</h5><p>The most obvious answer as to why you should use a password manager is that it&#8217;s easier to manage your passwords&#8230; it&#8217;s in the name. You can view all of your unique passwords from one place, without having to remember any of them.</p><h5>Securing all of your accounts</h5><p>One of the major security risks in personal security is the reuse of passwords. The reason for this, is that if that password gets leaked, then every login with that password is open to being breached.</p><p><strong>My passwords won&#8217;t be leaked because I keep them in a secure place!</strong></p><p>The majority of times, password leaks are not your fault at all. Most of these happen when a company is hacked and the user passwords (or <em><a href="https://lukewarmsecurityinfo.com/progress">password hashes</a></em>) are released to the public.</p><p>With a password manager (and proper use), however, if the worst-case scenario happens of one of your passwords being leaked, then you&#8217;ll have to change just the one site that uses that password.</p><h2>What are the best practices of using a password manager?</h2><p>With all of your passwords being held in one place, we need to make sure that that one place is secure. To do this:</p><ul><li><p>Make sure that your <em>master password</em> is <strong>unique</strong>, <strong>strong</strong> and <strong>not used before</strong>.</p></li><li><p>Secure your password manager login with <strong><a href="https://lukewarmsecurityinfo.com/progress">Multi-Factor Authentication (MFA)</a></strong>.</p></li><li><p>Regularly <strong>backup</strong> your passwords. Most password managers have the option of exporting the <em>database</em>. Make sure these are offline backups, such as a USB in a <em>safe</em>.</p></li></ul><blockquote><p>Make sure that your <em>Master Password</em> (the one used to access your password manager) is secure and not used before. Losing this could mean losing all of your passwords. It&#8217;s best to write this one down&#8230;</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Xs6Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3fdca1-4a36-4d55-aa6c-4a60ca0ccd03_500x515.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Xs6Z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3fdca1-4a36-4d55-aa6c-4a60ca0ccd03_500x515.png 424w, https://substackcdn.com/image/fetch/$s_!Xs6Z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3fdca1-4a36-4d55-aa6c-4a60ca0ccd03_500x515.png 848w, https://substackcdn.com/image/fetch/$s_!Xs6Z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3fdca1-4a36-4d55-aa6c-4a60ca0ccd03_500x515.png 1272w, https://substackcdn.com/image/fetch/$s_!Xs6Z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3fdca1-4a36-4d55-aa6c-4a60ca0ccd03_500x515.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Xs6Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3fdca1-4a36-4d55-aa6c-4a60ca0ccd03_500x515.png" width="500" height="515" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/7f3fdca1-4a36-4d55-aa6c-4a60ca0ccd03_500x515.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:515,&quot;width&quot;:500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:339227,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Xs6Z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3fdca1-4a36-4d55-aa6c-4a60ca0ccd03_500x515.png 424w, https://substackcdn.com/image/fetch/$s_!Xs6Z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3fdca1-4a36-4d55-aa6c-4a60ca0ccd03_500x515.png 848w, https://substackcdn.com/image/fetch/$s_!Xs6Z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3fdca1-4a36-4d55-aa6c-4a60ca0ccd03_500x515.png 1272w, https://substackcdn.com/image/fetch/$s_!Xs6Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7f3fdca1-4a36-4d55-aa6c-4a60ca0ccd03_500x515.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Password Strength Cracking Timeline (sourced from HiveSystems)</em></figcaption></figure></div><p>To make best use of the password manager and to make sure that you&#8217;re as secure online as possible:</p><ul><li><p>Make sure all of your passwords are randomly generated using a combination of <strong>UPPERCASE</strong>, <strong>lowercase</strong>, <strong>numb3rs</strong> and <strong>$ymbols</strong>, as well as being <strong>at least</strong> 12 characters in length.</p></li><li><p>Organise your passwords so that they&#8217;re easier to find&#8230;</p></li></ul><h4>What password manager should I use?</h4><p><em>Check out my <a href="https://lukewarmsecurityinfo.com/posts/recommended-password-managers">Recommended Password Managers</a> for a list of recommended password managers</em>.</p>]]></content:encoded></item><item><title><![CDATA[How it works: Virtual Private Network (VPN)]]></title><description><![CDATA[Virtual Private Networks or VPN's are one of the most commonly used terms when it comes to cyber security, but what is a VPN and how does it work?]]></description><link>https://blog.lukewarmsecurityinfo.com/p/how-vpns-work</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/how-vpns-work</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Thu, 25 Aug 2022 14:00:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!J1Fu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7bd65211-5f10-42c8-9385-c4c70824e828_1728x774.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A Virtual Private Network (VPN) acts almost as a middle-man between your network connections. The path of a web request from a device connected to a VPN goes from the users device, through to the VPN server via a secure tunnel, and then on towards the website.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J1Fu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7bd65211-5f10-42c8-9385-c4c70824e828_1728x774.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J1Fu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7bd65211-5f10-42c8-9385-c4c70824e828_1728x774.png 424w, https://substackcdn.com/image/fetch/$s_!J1Fu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7bd65211-5f10-42c8-9385-c4c70824e828_1728x774.png 848w, https://substackcdn.com/image/fetch/$s_!J1Fu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7bd65211-5f10-42c8-9385-c4c70824e828_1728x774.png 1272w, https://substackcdn.com/image/fetch/$s_!J1Fu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7bd65211-5f10-42c8-9385-c4c70824e828_1728x774.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J1Fu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7bd65211-5f10-42c8-9385-c4c70824e828_1728x774.png" width="546" height="244.5" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/7bd65211-5f10-42c8-9385-c4c70824e828_1728x774.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:652,&quot;width&quot;:1456,&quot;resizeWidth&quot;:546,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;VPN Connection from Client to Server&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="VPN Connection from Client to Server" title="VPN Connection from Client to Server" srcset="https://substackcdn.com/image/fetch/$s_!J1Fu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7bd65211-5f10-42c8-9385-c4c70824e828_1728x774.png 424w, https://substackcdn.com/image/fetch/$s_!J1Fu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7bd65211-5f10-42c8-9385-c4c70824e828_1728x774.png 848w, https://substackcdn.com/image/fetch/$s_!J1Fu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7bd65211-5f10-42c8-9385-c4c70824e828_1728x774.png 1272w, https://substackcdn.com/image/fetch/$s_!J1Fu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7bd65211-5f10-42c8-9385-c4c70824e828_1728x774.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>VPN Connection from Client to Server</em></figcaption></figure></div><p>Put simply, what a VPN means is that every time you send a request to load a page, or download a file, the request first gets sent to the VPN server and then to the website.</p><h2>How does a VPN protect me?</h2><p>Since all of your internet traffic is being sent first to a VPN server, and then to the website that you visit, this means that all the website thinks, is all of the traffic is coming from the VPN server. What this means, therefore, is that the VPN server hides your computer from the website, giving you <strong>privacy</strong>.</p><p>The <strong>security</strong> aspect of a VPN comes from how your requests are sent to the VPN server. When your computer first connects to the VPN server, it establishes a <em>secure tunnel</em> for all of the requests to be sent through, which means that all of your traffic is encrypted with a secret key that only your computer and the VPN server know - which is never reused again.</p><blockquote><p>Since everything you send / receive is being passed through a VPN server, this will mean that your internet connection will be slower. It depends on where the VPN server is, as well as the quality of the server on how much slower it could be.</p></blockquote><h2>What does a VPN provide?</h2><p>From a high overview, VPN&#8217;s provide <strong>privacy</strong> and <strong>security</strong>, but what does that mean and what are some other benefits?</p><h5>Access to region-specific content</h5><p>With the <strong>privacy</strong> features of a VPN, and since all of your traffic looks like it&#8217;s coming from the VPN server, if your VPN server is located in a different country (for example, United States of America), all of your web traffic to websites looks like it&#8217;s coming from within that country. What this means is that if there is content that is only accessible for computers inside that country, you&#8217;ll be able to access it since all of your traffic looks like it&#8217;s coming from within that country.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!j5pU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feb09f571-1923-43a3-9b07-c34c04b4e399_1280x654.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j5pU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feb09f571-1923-43a3-9b07-c34c04b4e399_1280x654.png 424w, https://substackcdn.com/image/fetch/$s_!j5pU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feb09f571-1923-43a3-9b07-c34c04b4e399_1280x654.png 848w, https://substackcdn.com/image/fetch/$s_!j5pU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feb09f571-1923-43a3-9b07-c34c04b4e399_1280x654.png 1272w, https://substackcdn.com/image/fetch/$s_!j5pU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feb09f571-1923-43a3-9b07-c34c04b4e399_1280x654.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j5pU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feb09f571-1923-43a3-9b07-c34c04b4e399_1280x654.png" width="590" height="301.453125" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/eb09f571-1923-43a3-9b07-c34c04b4e399_1280x654.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:654,&quot;width&quot;:1280,&quot;resizeWidth&quot;:590,&quot;bytes&quot;:137667,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!j5pU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feb09f571-1923-43a3-9b07-c34c04b4e399_1280x654.png 424w, https://substackcdn.com/image/fetch/$s_!j5pU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feb09f571-1923-43a3-9b07-c34c04b4e399_1280x654.png 848w, https://substackcdn.com/image/fetch/$s_!j5pU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feb09f571-1923-43a3-9b07-c34c04b4e399_1280x654.png 1272w, https://substackcdn.com/image/fetch/$s_!j5pU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Feb09f571-1923-43a3-9b07-c34c04b4e399_1280x654.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>World Map - region-specific content</em></figcaption></figure></div><p></p><h5>Secure Browsing</h5><p>Certain online activities such as online banking need to stay secure. With a VPN, since your traffic is encrypted between the user and the VPN server in an extra layer of encryption, this means that anyone connected to the same internet connection as you, won&#8217;t be able to decrypt or view the information you are sending over the internet. While it&#8217;s still not great to use public wifi, this means that even public wifi would be secured enough to use it for online banking.</p><h5>Hiding your IP address</h5><p>With all of your requests going through a VPN server, the website that you&#8217;re visiting thinks that the computer sending the requests is the VPN server. Therefore, if you were to check your IP address when connected to a VPN server, it would be the IP address of the VPN server, not your computer, which means that a VPN server hides your IP address when online.</p><h2>When should I use a VPN?</h2><p>Typically, it&#8217;s safe to not use a VPN on your home networks - since they&#8217;re generally private anyways, but it depends on what you&#8217;re wanting a VPN for.</p><blockquote><p>It&#8217;s recommended that VPN&#8217;s are used <strong>all of the time</strong> when travelling overseas.</p></blockquote><p>If you want a VPN just to stay more secure online, then use a VPN whenever you&#8217;re connected to publicly accessible wifi. This could be at work, at the airport, at school etc. It&#8217;s also recommended that you use a VPN when you&#8217;re on your mobile data.</p><p>If you want a VPN for better privacy online, then use a VPN all the time - on your home wifi, on publicly accessible wifi, mobile data and other private networks.</p>]]></content:encoded></item><item><title><![CDATA[Malware Throughout History: The Morris Worm]]></title><description><![CDATA[Diving into the worlds first major attack on the internet - how it worked, and the repercussions of it.]]></description><link>https://blog.lukewarmsecurityinfo.com/p/morris-worm</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/morris-worm</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Thu, 18 Aug 2022 14:00:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!GAjz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F35342fdc-56e6-41d7-9cbd-0be97a1f673c_1920x1228.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>What is a computer worm?</h2><p>A computer worm is a type of self-contained malware that replicates itself and spreads laterally (across computers in the same network) throughout a network without the need to call back to a command and control centre (a server that gives it instructions on what to do).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GAjz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F35342fdc-56e6-41d7-9cbd-0be97a1f673c_1920x1228.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GAjz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F35342fdc-56e6-41d7-9cbd-0be97a1f673c_1920x1228.png 424w, https://substackcdn.com/image/fetch/$s_!GAjz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F35342fdc-56e6-41d7-9cbd-0be97a1f673c_1920x1228.png 848w, https://substackcdn.com/image/fetch/$s_!GAjz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F35342fdc-56e6-41d7-9cbd-0be97a1f673c_1920x1228.png 1272w, https://substackcdn.com/image/fetch/$s_!GAjz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F35342fdc-56e6-41d7-9cbd-0be97a1f673c_1920x1228.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GAjz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F35342fdc-56e6-41d7-9cbd-0be97a1f673c_1920x1228.png" width="1456" height="931" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/35342fdc-56e6-41d7-9cbd-0be97a1f673c_1920x1228.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:931,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;computer-virus&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="computer-virus" title="computer-virus" srcset="https://substackcdn.com/image/fetch/$s_!GAjz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F35342fdc-56e6-41d7-9cbd-0be97a1f673c_1920x1228.png 424w, https://substackcdn.com/image/fetch/$s_!GAjz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F35342fdc-56e6-41d7-9cbd-0be97a1f673c_1920x1228.png 848w, https://substackcdn.com/image/fetch/$s_!GAjz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F35342fdc-56e6-41d7-9cbd-0be97a1f673c_1920x1228.png 1272w, https://substackcdn.com/image/fetch/$s_!GAjz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F35342fdc-56e6-41d7-9cbd-0be97a1f673c_1920x1228.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>What this means, is that it&#8217;s not controlled by any particular server and that once released, it cannot be stopped since it automatically duplicates itself and attempts to infect all other computers on the network.</p><p>There are, however, like anything, cases where this isn&#8217;t the case and a callback server is required for the worm to do it&#8217;s damage. An example of this is a virus called WannaCry which, while still able to spread across computers, lays dormant as long as the domain <em>iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea. com</em> is registered.</p><blockquote><p>The domain <a href="http://iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/">iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com</a> is currently &#8216;<strong>Sinkholed</strong>&#8217; (to hand out illegitimate routes to certain domains - can be used to capture unwanted traffic, to disable a botnet, for example) by <a href="https://www.kryptoslogic.com/">Kryptos Logic</a>.</p></blockquote><h2>What is the Morris Worm?</h2><p>The morris worm, being considered as the first major attack on the Internet, was first unleashed on the evening on November 2, 1988 from a computer at MIT (Massachusets Institute of Technology).</p><p>Designed to exploit multiple backdoors on specific Unix devices and to stay hidden, it hit 10% (6 000) of the internet within the first 24 hours. It worked similar to a DOS (Denial-of-service), in that it was designed to hog resources from the computer until it shuts down.</p><p>The specific exploits it would run were vulnerabilities in <em>Unix Sendmail</em>, <em>finger</em> and <em>rsh/exec</em>, as well as brute-forcing login credentials on the targets computer; based on their username.</p><h3>How did it work?</h3><p>How the Morris worm would work is:</p><p>First, check if the Morris worm is already running on the target computer.</p><blockquote><p>The worm was capable of infecting a computer up to 7 times. <strong>Why seven?</strong> This was to stop someone from spawning a <em>fake</em> Morris worm instance in an attempt to stop the worm from infecting the computer.</p></blockquote><p>Second, attempt to spread to another computer on the network, through exploiting a known vulnerability, or guessing weak passwords.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ks8k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F340fcba6-906b-49d6-bb83-becab8f7d412_1280x961.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ks8k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F340fcba6-906b-49d6-bb83-becab8f7d412_1280x961.png 424w, https://substackcdn.com/image/fetch/$s_!ks8k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F340fcba6-906b-49d6-bb83-becab8f7d412_1280x961.png 848w, https://substackcdn.com/image/fetch/$s_!ks8k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F340fcba6-906b-49d6-bb83-becab8f7d412_1280x961.png 1272w, https://substackcdn.com/image/fetch/$s_!ks8k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F340fcba6-906b-49d6-bb83-becab8f7d412_1280x961.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ks8k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F340fcba6-906b-49d6-bb83-becab8f7d412_1280x961.png" width="540" height="405.421875" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/340fcba6-906b-49d6-bb83-becab8f7d412_1280x961.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:961,&quot;width&quot;:1280,&quot;resizeWidth&quot;:540,&quot;bytes&quot;:220591,&quot;alt&quot;:&quot;Connected Network&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Connected Network" title="Connected Network" srcset="https://substackcdn.com/image/fetch/$s_!ks8k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F340fcba6-906b-49d6-bb83-becab8f7d412_1280x961.png 424w, https://substackcdn.com/image/fetch/$s_!ks8k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F340fcba6-906b-49d6-bb83-becab8f7d412_1280x961.png 848w, https://substackcdn.com/image/fetch/$s_!ks8k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F340fcba6-906b-49d6-bb83-becab8f7d412_1280x961.png 1272w, https://substackcdn.com/image/fetch/$s_!ks8k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F340fcba6-906b-49d6-bb83-becab8f7d412_1280x961.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Connected Network</figcaption></figure></div><p>Once the targets computer was infected by the worm too many (7) times, it would run out of computing resources required to work properly, and begin to malfunction.</p><h3>Who created it?</h3><p><a href="https://en.wikipedia.org/wiki/Robert_Tappan_Morris">Robert Tappan Morris</a> had designed the worm as a learning project, that soon spun out of control.</p><p>While there are questions are the original motives of the worms creation, he knew the importance of covering his tracks - which was evident in how he hacked into an MIT Computer to launch the attack.</p><p>This worm led to the first conviction under the newly introduced 1986 Computer Fraud and Abuse Act and left Morris with a fine and 400 hours of Community Service.</p><h4>Additional Resources / Further Reading</h4><ul><li><p><a href="https://www.fbi.gov/history/famous-cases/morris-worm">FBI News Release</a></p></li><li><p><a href="https://www.hypr.com/morris-worm/">Deeper look into Morris Worm</a></p></li><li><p><a href="https://0x00sec.org/t/examining-the-morris-worm-source-code-malware-series-0x02/685">Analysis of the Morris Worm</a></p></li><li><p><a href="https://github.com/arialdomartini/morris-worm">Decomposed Source Code</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Browser in the Browser Attacks]]></title><description><![CDATA[A quick view on what Browser-In-The-Browser (BITB) attacks are and how to spot one.]]></description><link>https://blog.lukewarmsecurityinfo.com/p/bitb-attacks</link><guid isPermaLink="false">https://blog.lukewarmsecurityinfo.com/p/bitb-attacks</guid><dc:creator><![CDATA[Liam Godfrey]]></dc:creator><pubDate>Thu, 11 Aug 2022 23:00:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2f905021-b50f-4591-89db-cab294073036_700x484.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>What is a Browser-In-The-Browser (BITB) attack?</h2><p>A browser in a browser attack put simply is a <strong>phishing</strong> technique that allows an attacker to spawn a pop-up window in the user&#8217;s browser that appears to link to a legitimate website. It&#8217;s primarily used to mimic legitimate third-party authentication methods in an attempt to steal login credentials.</p><blockquote><p><strong>Phishing</strong> is a type of <em>social engineering</em> where an attacker would typically send the target some form of email claiming to be someone else, or promoting some sort of website with a malicious link.</p></blockquote><h3>Where is this exploited?</h3><p>Many online services nowadays allow you to log in with another service. As an example, a website like <a href="https://www.canva.com/">Canva</a> allows you to log in or &#8216;continue&#8217; with a range of services such as Google, Facebook, Apple, Microsoft and Clever, as well as the typical email login.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4o4T!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ffc8906-9a44-4b50-a1db-3cb3a53a881c_946x988.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4o4T!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ffc8906-9a44-4b50-a1db-3cb3a53a881c_946x988.png 424w, https://substackcdn.com/image/fetch/$s_!4o4T!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ffc8906-9a44-4b50-a1db-3cb3a53a881c_946x988.png 848w, https://substackcdn.com/image/fetch/$s_!4o4T!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ffc8906-9a44-4b50-a1db-3cb3a53a881c_946x988.png 1272w, https://substackcdn.com/image/fetch/$s_!4o4T!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ffc8906-9a44-4b50-a1db-3cb3a53a881c_946x988.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4o4T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ffc8906-9a44-4b50-a1db-3cb3a53a881c_946x988.png" width="530" height="553.5306553911205" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/0ffc8906-9a44-4b50-a1db-3cb3a53a881c_946x988.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:988,&quot;width&quot;:946,&quot;resizeWidth&quot;:530,&quot;bytes&quot;:479945,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4o4T!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ffc8906-9a44-4b50-a1db-3cb3a53a881c_946x988.png 424w, https://substackcdn.com/image/fetch/$s_!4o4T!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ffc8906-9a44-4b50-a1db-3cb3a53a881c_946x988.png 848w, https://substackcdn.com/image/fetch/$s_!4o4T!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ffc8906-9a44-4b50-a1db-3cb3a53a881c_946x988.png 1272w, https://substackcdn.com/image/fetch/$s_!4o4T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ffc8906-9a44-4b50-a1db-3cb3a53a881c_946x988.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Canva Login Screen</figcaption></figure></div><p></p><p>When any of these are clicked, a small <em>pop-up window</em> appears with the login page for whatever service you decided to use.</p><blockquote><p>These authentication pop-up windows are what attackers use for a BITB attack.</p></blockquote><h3>How do they do this?</h3><p>For an attacker to make a convincing phishing page, they need at least one of the following, but typically both:</p><ol><li><p>The webpage must look the same.</p></li><li><p>The URL must look the same, or be so similar that someone would miss the mistake.</p></li></ol><blockquote><p><strong>URL Example</strong>: <em>twiter.com</em> vs <em>twitter.com</em> or <em>facebook.com</em> vs <em>focebook.com</em></p></blockquote><h4>Convincing Webpage</h4><p>It&#8217;s quite simple for an attacker (or anyone) to replicate a webpage. Anyone can view the source code of a webpage by right-clicking on their mouse and clicking &#8216;View page source&#8217;. Since the source code contains everything that makes the website look the way it does, someone simply needs to copy and paste this to a new website, make a few small adjustments, and then they have an identical looking webpage.</p><blockquote><p>The <strong>source code</strong> is like the blueprint of a house that comes with the walls, doors, windows and roof all installed. Browsers read the source code and render the page to look the way it does, which is why copy and pasting the source code would give you (almost) the same result.<br><em>Almost</em>, because sometimes things like the font or certain images don&#8217;t load properly and require the source code to be adjusted slightly.</p></blockquote><h4>Convincing URL?</h4><p>Getting the url to look like the real url has been one of the biggest issues attackers have faced when it comes to phishing.</p><blockquote><p>Many social media companies, such as Facebook or Instagram would typically own / have purchased (or even banned the purchase) of many similar domains in order to decrease these sort of attacks.</p></blockquote><p>There have been multiple different avenues over the years such as using a domain name that looks similar to the original, using the actual website to link to another page (a url redirect), or more recently where attackers used a special character in the url so that when the url was read by the browser, it was read backwards.</p><blockquote><p>What this meant was that a url like <em>google.com/k9d8K3j/yl.tib</em> would be read by the browser as <em>bit.ly/j3K8d9k/moc.elgoog</em> which could lead to something more malicious than google.</p></blockquote><p>With this attack, however, while the actual URL is not the same as the original, with some javascript code, an attacker is able to make the URL <strong>look</strong> like it&#8217;s the same as the original website.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WKdd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2f905021-b50f-4591-89db-cab294073036_700x484.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WKdd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2f905021-b50f-4591-89db-cab294073036_700x484.png 424w, https://substackcdn.com/image/fetch/$s_!WKdd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2f905021-b50f-4591-89db-cab294073036_700x484.png 848w, https://substackcdn.com/image/fetch/$s_!WKdd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2f905021-b50f-4591-89db-cab294073036_700x484.png 1272w, https://substackcdn.com/image/fetch/$s_!WKdd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2f905021-b50f-4591-89db-cab294073036_700x484.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WKdd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2f905021-b50f-4591-89db-cab294073036_700x484.png" width="700" height="484" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/2f905021-b50f-4591-89db-cab294073036_700x484.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:484,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:19323,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WKdd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2f905021-b50f-4591-89db-cab294073036_700x484.png 424w, https://substackcdn.com/image/fetch/$s_!WKdd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2f905021-b50f-4591-89db-cab294073036_700x484.png 848w, https://substackcdn.com/image/fetch/$s_!WKdd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2f905021-b50f-4591-89db-cab294073036_700x484.png 1272w, https://substackcdn.com/image/fetch/$s_!WKdd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2f905021-b50f-4591-89db-cab294073036_700x484.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Fake vs Real Facebook Authentication pop-up (sourced from mrd0x.com).</em></figcaption></figure></div><h3>How do you spot the difference?</h3><p>BITB attack browsers are not genuine browsers (like actual authentication pop-up windows are), they are simple HTML code that someone has built to try and look like a browser pop-up. With this, they have certain limitations that a <strong>genuine</strong> browser doesn&#8217;t have.</p><blockquote><p>The usual tactic of hovering over the link to see the URL at the bottom corner will not work as a verification method.</p></blockquote><p>One of these limitations is that the fake browser can&#8217;t be moved around outside of the browser window, or over the address bar. With that, here are some things you can do to test whether or not it&#8217;s a genuine authentication pop-up.</p><ol><li><p>Can you move it off the webpage?</p><ul><li><p>i.e. Onto a separate screen, over the URL bar at the top of your browser.</p></li></ul></li><li><p>(If you&#8217;re tech savvy) Check the source code.</p><ul><li><p>Are scripts being rendered from the authentication webpage (i.e. Facebook or Google)? Or from the website that you&#8217;re visiting (i.e. Canva)?</p></li></ul></li></ol><blockquote><p>If the images are being rendered from the external website that you are authenticating your account from (such as logging into Facebook and the images are rendered from facebook.com), this is <strong>GOOD</strong>. If they are rendered from the website you&#8217;re visiting (such as Canva), this is <strong>BAD</strong>.</p></blockquote><div class="pullquote"><p><em>Originally discovered by <a href="https://mrd0x.com/">mrd0x</a> - bitb templates created <a href="https://github.com/mrd0x/BITB">here</a> - information referenced from <a href="https://mrd0x.com/browser-in-the-browser-phishing-attack/">this article</a></em></p></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.lukewarmsecurityinfo.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Lukewarm Security Info! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>