Active Topics

 


Reply
Thread Tools
Posts: 3 | Thanked: 1 time | Joined on Apr 2012
#1
I've just bought an old and very cheap N900 to play with. I'm not familiar with Maemo. Now I'm wondering what it can do that Android can't.

One of the things about Android is security and privacy. Even with projects such as:

- Cyanogenmod (open source, but it only goes so far)
- Replicant; an attempt to be very open source but failed with binary modem drivers
- the Guardian project; great idea but what about the permissions of other apps
- various permissions apps

It is very easy to slip into allowing an app carte blanche to the whole phone and if you do that then how secure is your privacy anyway? Now bear in mind how tempting it is to use Google Play for installs and that means Google Talk transmitting *something* to their servers randomly.

So one thing that the N900 could be useful for could be as a very secure 2nd phone. Store your Bitcoin wallet here. Make encrypted VoIP calls. Send secure SMS. All in the knowledge that it's much more open source and therefore has the potential to be more secure than Android.

Where can I find more info on this?
Would I be better off with a different O/S? But if so, what? What are the limitations of the hardware? Is it option with the greatest potential for FOSS and security?
 
Posts: 2,102 | Thanked: 1,937 times | Joined on Sep 2008 @ Berlin, Germany
#2
You are fooled, if you think in categories like one phone system is more secure than another!

Here are my top concerns as disillusioned user using a phone for security sensitive stuff:
1. The (mis)-use of sudo and root to give some applications the possibility to do their intended purpose without any passwords at all, is simply a big, big security hole in the linux system.
2. While real (as in: for the PC) linux distributions do a lot of work to fix bugs and security holes, the aging libs and kernel in maemo is not maintained by nokia, maemo devs, or kernel.org at all, it is simply an old kernel. In the beginning you could get packages from Debian installed, but even getting them from some repository archive for one release before Debian Oldstable, they do not install, because the libs in Debian Pre-Oldstable were at some time maintained, and they do not anymore play nice here in Maemo.
3. The real security concept seems to be: 'Well, nobody cares for us, we are a small, a very small, target, with no real appstore, but a number of repositories, where you have to really learn a new way of contributing, if you are an application developer and a widget set, nobody else uses in the phone market'.

There is no security awareness in smartphone business, well, RIM had it for some time. There is no real encryption, the GSM protocol for data and voice is hacked since a couple of years. There is no easy setup of, even, email encryption, not dreaming about Voip, SMS, chat or a wallett. Applications to monitor the users are common practice, be it from manufacturers, providers or application developers.

To take advantage of FOSS and the concept of 'providing security by openness', there are too few developers actively contributing security fixes. I like the fact, that from day to day people here have still new features in their applications and new ideas. But security is not on anyone's agenda.

Last edited by michaaa62; 2012-08-30 at 06:30.
 

The Following 10 Users Say Thank You to michaaa62 For This Useful Post:
Posts: 1,808 | Thanked: 4,272 times | Joined on Feb 2011 @ Germany
#3
@michaaa62,

While I tend to agree with what you've written, we need to remind ourselves that the N900 (with Maemo5) is not a smartphone but a mobile Linux box.

All this "app permissions" stuff comes from the realm of smartphones (Symbian, Android, iOS, etc.) You (normally) don't have such systems under normal Linux.

Most user programs in Maemo run under the "user" credentials (like in any other linux).

The only way for a (user) program to become root without user intervention is when said program has been added to the sudoers list (either by the user or by postinstall) -- OK, or by setting the setuid bit, but this happens very rarely, and mostly manually --

Programs that are in the sudoers list are usually there for a reason, so there's not much we can do about that.

One could of course create new application-specific users/groups and configure applications to run as an application-specific user, but then you'd have to tweak a lot so that those applications also can display on the ("user"-owned) X session (or perhaps running a separate X session on a separate VT, don't know if this is possible with Maemo).

In short: your average Linux box behaviour.
 

The Following 2 Users Say Thank You to reinob For This Useful Post:
erendorn's Avatar
Posts: 738 | Thanked: 983 times | Joined on Apr 2010 @ London
#4
the problem with smartpone security is not root access. It is user data access, which are obviously not prevented in any way by running programms as user and not root.
This is also true for a linux box, because it only depends on the fact that critical informations are stored on the device unencrypted.
This is should be managed by a security framework, sandboxing applications and restricting API, and this is completely absent from the N900.
You may have to check, but it's fairly possible that recording the screen and the mic can be done with user privileges.
Also, because the kernel is unmaintained, sudoers list is most likely not the only way to get root level anymore (possible security breaches).

So it's more like youre average 2 years old system, without the security framework.
 

The Following 4 Users Say Thank You to erendorn For This Useful Post:
misterc's Avatar
Posts: 1,625 | Thanked: 998 times | Joined on Aug 2010
#5
thinking aloud here, but...
even though root maybe easily hacked (i'm not aware that i have to enter any password when typing root ?!?) doesn't the very fact that we have a very small user base protect us against "hackers"?
it's fun to hack on our beloved N900s, but what "crook" would be interested in it?

for the applications running in user space, in how far would putting our data under root:root (i think) protect it from casual app access?

final thought about spying apps... doesn't the limited mem & cpu resources protect us against the worst of those in that an app / deamon / whatever that would intercept kbd / sound / touch / display would practically bring the N900 to a standstill?
__________________
information is a necessary though no sufficient condition to rationality...
 
erendorn's Avatar
Posts: 738 | Thanked: 983 times | Joined on Apr 2010 @ London
#6
<disclaimer: I'm no security nor OS programming expert>
When you consider that in the desktop you need a market share of more than 10-15% to be targeted by specific attacks, I'd say yes, there's no way someone would write one just for the N900 (or even for Harmattan).
Maybe you could fall generic attacks (like flash based, because we don't have official java ), that sometimes impact linux as well, but it shouldn't be worse than your average desktop.

But for a targeted attack, reporting ps regularly to a server, and then recording only when something interesting is happening (with DBUS), you should be able to record whatever you need without to much impact (screen recording is a bit more demanding, uses a noticeable part of CPU)
 
Posts: 2,102 | Thanked: 1,937 times | Joined on Sep 2008 @ Berlin, Germany
#7
Is there something like 'Whistling in the dark forest' saying in English? Anyway, you are luring yourself in wrong security:
Maybe you could fall generic attacks (like flash based, because we don't have official java ), that sometimes impact linux as well, but it shouldn't be worse than your average desktop.
Basically flash on the N900 is ancient and insecure, the kernel is also unmaintained since ages, Java is a hack for the N900 and not fixed or maintained, openssh is version 5.1xxx, while the PC has 6.0 in Debian based Linux ( raising major version in linux is never done without a reason! )

Did you ever read the comment
TEXT="rootsh is now deprecated for it poses too much of a security risk. However, you can still obtain a root shell by running the commands 'root' or 'sudo gainroot'."
echo $TEXT
in /usr/bin/rootsh, nevertheless the command stays there!
 

The Following 2 Users Say Thank You to michaaa62 For This Useful Post:
Posts: 251 | Thanked: 70 times | Joined on Nov 2009
#8
Why we do have openssl and gnupg everywhere and our email cleints don't do gnupg, IM does not do OTR and SIP does not do zRTP always made me wonder.
 
Posts: 1,548 | Thanked: 7,510 times | Joined on Apr 2010 @ Czech Republic
#9
Originally Posted by arkanoid View Post
IM does not do OTR
Yeah, Jabber OTR would be nice. Anyone knows why it is not supported ? Old libs ?
__________________
modRana: a flexible GPS navigation system
Mieru: a flexible manga and comic book reader
Universal Components - a solution for native looking yet component set independent QML appliactions (QtQuick Controls 2 & Silica supported as backends)
 
Posts: 2,102 | Thanked: 1,937 times | Joined on Sep 2008 @ Berlin, Germany
#10
And some more to get paranoid:
http://yro.slashdot.org/story/12/08/...by-governments

I felt the need to specially quote this part:
The two men said they discovered mobile versions of the spyware customized for all major mobile phones. But what made the software especially sophisticated was how well it avoided detection.
 
Reply

Tags
bs tags, go away, spoon feeding


 
Forum Jump


All times are GMT. The time now is 23:10.