The University of British Columbia
UBC - A Place of Mind
The University of British Columbia
Peter A. Allard School of LawLegal Constraints on (Digital) Creativity
  • Home
  • Thoughts
  • News of the Week
  • Class Presentations
  • Course Outline
  • Knowledge Themes
  • Resources
    • Media
    • Jon’s Talks
  • About
    • Thanks
    • Community/Participate
    • Jon’s Bio

The Lenovo and SSL/TLS Nightmare

By Ryan Vogt on February 23, 2015

In under a year, two horrible incidents (that I can recall) involving SSL/TLS have made the news (I’ll place a link to the older one in the comments). As a cryptography nerd, that makes me happy.

SSL/TLS is a protocol that protects online communication. It ensures that your communications are encrypted end-to-end (e.g., only you and your bank’s computer can read it, and no one can modify it in transit without you knowing), and it authenticates one end of the communication (e.g., you know it’s actually your bank to whom you’re talking).

This week’s emerging story was clearly a deliberate decision by someone(s) to sabotage to the functioning of SSL/TLS on Lenovo computers. And it’s making the news.

The very high-level version: both end-to-end encryption and (more importantly) authentication are broken because of malicious software installed by default on certain Lenovo computers.

I’ll try to keep the details below high-level. If anyone wants to geek out on a more technical explanation, please feel free to ask in the comments section.

Fundamentally, SSL/TLS requires you to trust someone in order to work. That someone is called a certification authority (“CA”). For example, when I connect to the UBC Connect eLearning Site, I trust that I’m actually talking to UBC Connect, because a company called thawte has issued some electronic credentials to UBC, which the UBC Connect server presents to me when I connect to it. So, the whole system only works if I actually trust thawte not to irresponsibly (or maliciously!) issue fake UBC credentials to other people. Which CAs you trust matters.

Lenovo computers come, by default, trusting an extra CA. That CA is a malicious program running on the Lenovo itself. When that malicious software detects you attempting to make an outbound SSL/TLS connection (say, to UBC Connect), the malicious software quickly issues itself credentials signed by that additional CA (i.e., the software issues itself credentials) claiming to be UBC Connect, and intercepts your connection attempt. You trust the CA, so you think you’re talking to UBC Connect. In fact, you’re talking to the malicious software on your own computer.

The malicious software then starts a second, independent connection between itself and the real UBC Connect.

You think you’re talking to UBC Connect, and UBC Connect (once you log in) thinks it’s talking to you. But both you and UBC Connect are wrong: you’re both talking to the malicious software.

Why? So that the malicious software can modify the data flowing from UBC Connect to you, to insert ads into it (i.e., end-to-end encryption is broken, because the communication is modified in-transit).

Here’s the real kicker, though. Because of how the software can instantly issue new credentials to itself, combined with some flaws in the malicious software itself, other people’s computers can issue credentials that the malicious software will trust.

So, when the malicious software tries to connect to UBC Connect, it might actually be connecting to Dr. Evil’s computer, and never realize it’s not connecting to UBC Connect (i.e., authentication is broken). So, the connection now looks like:

You <-> Malicious software inserting ads <-> Dr. Evil <-> UBC Connect

Now you have two problems, both of which affect your ability to communicate safely (Dr. Evil) and effectively (ad-inserting malware) online.

Here is the CERT disclosure, for anyone who wants more technical details.

Cheers!

Read More | 1 Comment

News of the Week Top 5; February 18, 2015

By Jon Festinger on February 22, 2015

1. Why the Copyright Board of Canada Needs a Leafs-Style Tear-Down

Screen Shot 2015-02-22 at 5.03.28 PM

2. The Canadian Privacy Cases of 2014

Screen Shot 2015-02-22 at 5.03.57 PM

3. How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last: “Equation Group” ran the most advanced hacking operation ever uncovered.

Screen Shot 2015-02-22 at 5.05.53 PM

4. Russia Reaches The Censorship Endgame: Banning VPNs, Tor And Web Proxies

Screen Shot 2015-02-22 at 5.08.58 PM

5. Facebook still suspending Native Americans over ‘real name’ policy: Unlike Katy Perry’s Left Shark, many have to provide multiple forms of ID to prove they are who they say they are in latest row over controversial policy

Screen Shot 2015-02-22 at 5.11.08 PM

jon

Read More | No Comments

Conference version of “Relating Memes of Justice & Technology”

By Jon Festinger on February 22, 2015

Screen Shot 2015-02-22 at 4.17.56 PM

Though most but far from all of the slides in this presentation to the 2015 SLS Conference at TRU Law on February 5, 2015 have made it into some the decks in this course, thought it might be slightly helpful to anyone really interested in the ideas if the latest full presentation appeared all in one place.

This piece has been evolving one. It continues to evolve (as recently as this afternoon) under the heavy thumb of my constant tinkering. Click on the image above to download the PowerPoint.

jon

Read More | No Comments

Tuesday Presentation Materials

By amjadkdr on February 22, 2015

Ahead of my presentation on Tuesday, please check out the following:

Glen Greenwald: Why privacy matters

 

Sarah Lewis: Creativity and Privacy Go Hand in Hand

  • Chapter 11 of Code 2.0

Have a great weekend,

Amjad

Read More | No Comments

“Press Start: Culture, Industry, and Innovation in Japanese Gaming” conference @ UBC – February 27 & 28, 2015

By Jon Festinger on February 21, 2015

Screen Shot 2015-02-21 at 1.38.04 PM

Video games are within the purview of this course but because of  the “other” course we have generally stayed away from the subject. That said the conference at UBC t his coming Friday and Saturday, February 27 & 28, 2015 may be of some interest. Scholars, players, and designers will come together in a wide variety of panels to discuss Japanese video-games and gaming culture. The conference is completely free and open to the public with a simple RSVP.

I will be presenting on “Legal, Normative & Cultural Perspectives on Mods and Modding of Japanese Video Games” as part of a panel on “Economics and Law in the Gaming Industry” at 11:30 AM – 12:30 PM at the UBC Asian Centre, 1871 West Mall.

The website for the conference can be found at https://pressstartubc.wordpress.com/

jon

Read More | No Comments

Jon Ronson on public shaming

By tbud on February 21, 2015

Jon Ronson will be coming out with a new book next month entitled So You’ve Been Publicly Shamed. As one of my classmates has pointed out in a previous blog post, social media is increasingly being used as a forum for public shaming; a ‘digital mob’, so to speak. Ronson was also interviewed in this interesting Vulture article on news anchor Brian Williams and how that transgression fits into the wider narrative of public shaming.

Read More | No Comments

The ‘Reddit exodus’

By tbud on February 21, 2015

Currently in the news:

“… In a strange twist that perfectly illustrates the current culture-wide debate around online speech, a group of disgruntled users have begun an exodus off the site — claiming, against all odds, that Reddit is censoring them as a matter of corporate policy.”

There is also a Gawker news article that expands on this ‘exodus’ of sorts.

Read More | No Comments

Utilitarian Justifications at the Grammys

By Alex B on February 15, 2015

Recording Academy president Neil Portnow used the Grammys as an opportunity to highlight the importance of copyright protection, using a argument you might recognize as utilitarian:

“What if we’re all watching the Grammys a few years from now and there’s no Best New Artist award because there aren’t enough talented artists and songwriters who are actually able to make a living from their craft?” … “While ways of listening to music evolve, we must remember that music matters in our lives, and that new technology must pay artists fairly.”

http://www.billboard.com/articles/events/grammys-2015/6465670/grammys-2015-neil-portnow-streaming-payouts

Maybe if he tried making paper airplanes with some of his friends he would see stronger protection doesn’t always result in more creativity.

Read More | No Comments

News of the Week Top 5; February 11, 2015

By Jon Festinger on February 15, 2015

1. An Open Letter to Prime Minister Cameron: 20th-century solutions won’t help 21st-century surveillance (Jonathan Zittrain)

Screen Shot 2015-02-15 at 6.00.59 PM

2. US’s ‘Naughty List’ Of Countries Whose Intellectual Property Rules We Don’t Like Is A Joke That’s No Longer Funny

Screen Shot 2015-02-15 at 6.02.18 PM

3. Left Shark Bites Back: 3D Printer Sculptor Hires Lawyer To Respond To Katy Perry’s Bogus Takedown

Screen Shot 2015-02-15 at 6.05.09 PM

4. Coding Creativity: Copyright and the Artificially Intelligent Author (Annemarie Bridy)

Screen Shot 2015-02-15 at 6.06.33 PM

5. Labels, not Spotify, are (hurting) artists and breaking the music industry. Here’s how to fix it.

Screen Shot 2015-02-15 at 6.09.13 PM

jon

Read More | No Comments

Class 5 & 6 Slides; February 3 & 10, 2015

By Jon Festinger on February 15, 2015

Have remixed the last two sets of slides into one (hopefully coherent) whole…

jon

Screen Shot 2015-02-15 at 5.37.34 PM

Read More | No Comments

  • Previous
  • 1
  • …
  • 6
  • 7
  • 8
  • …
  • 13
  • Next

UBC Open Badges More information about UBC Open Badges can be found at http://badges.open.ubc.ca/

Subscribe2


 

Check out the UBC Video Game Law Course
LEGAL CONSTRAINTS ON (DIGITAL) CREATIVITY: The Course
This is the website for the course "Legal Constraints on Digital Creativity" being offered at the Allard School of Law, UBC. Among the purposes of this website is near real-time engagement with and about course materials. As well as to solicit additional comments, reactions and thoughts from students as well as academic and creative colleagues regarding the content, pedagogy and delivery of the course. The course is a cousin to Video Game Law which has recently completed its 8th academic year. That course examines how legal constructs apply to a particular advanced form of interactive media. This course is not fixed on any one digital form. It asks how law is altering, circumscribing and entwining our creative instincts and powers. The course description reads: This course examines the implications to the human creative process engendered by law and legalities. The invention of digital worlds has resulted in changes and advancements that could scarcely be imagined, with much more still to come. As significant as was the coming of the Internet, the development of software languages, and the growth of social media, they are only part of the story. Among the most profound changes is a fundamental shift in our conception and understanding of what “creativity” means and how it manifests. With today’s tools it is clearer than ever that everyone is a content creator. It is particularly in this light of the democratization of creativity that this course seeks to understand the content realms. Today many legal perspectives are rights based. Rather than another dialectic on rights, we will catalogue and debate the myriad ways creativity is in fact restrained, shaped, and altered even while “freedom of speech/expression” is acknowledged. Above all we will seek to specifically identify the roles of law & regulation in this process. In so doing we will deepen our understanding of censorship, its conventions and guises. We will travel with the creator on the journey their content traverses. In particular we will focus on how intended and received meanings are altered as a consequence of the constraints we identify. We will in every class proceed from the inside out, from the creation of an idea through stages of gestation, fixation, distribution, communication, reception, comprehension, interpretation, and understanding. Our classes will examine different levels of creative constraint, as well as cataloguing their consequences to creators, the creative process, and democracy itself. We will, employing various methods, survey the following layers of control, moving from purely private to state sponsored: a. Creative Models & Community Constraints (extra-legal) b. Technological & Structural Constraints c. Copyright, Remixing & Modding d. Trademarks, Patents & the IP Business (including "IP trolling”) e. Contractual Constraints (EULA’s, ToS’ and the “Post IP World”) f. Privacy, Defamation, & Personality Rights  g. Industry & Medium Regulation in a Digital Age (net neutrality, neg regulation & the future of “Broadcasting”) h. Consumer Protection (“Big Data” as well as psychological manipulations or “brain-gaming”) i. Criminal/Obscenity/Taxation/Currency/Gambling Law & Regulation j. Internet Governance & Surveillance (and the meanings of “Hacking”) On the site you will find sections for the Syllabus and for the materials. Both are, of necessity in this fast moving digital world, always works in progress. jon


Tweets by @jonfestinger
#ubclcc Tweets


Creative Commons License

CONSTRAINTS RELATED TO THIS WEBSITE

You agree that the comments you contribute to this website may find their way into the course, other iterations of the course, other courses, lectures, books, or anywhere at all, without any acknowledgment or obligation to you. That said, you are legally responsible for your comments you make to this site under all applicable laws. This site is not intended and must not be used as a source of legal advice. Please see the Terms of Use referenced at the bottom of the page for additional constraints. As well you will find a version of these words on the submission forms (unless you are a student in the course, in which case you will have full authorship privileges).  And no, the irony of this disclaimer having regard to the subject matter of this website and the course to which it relates, is not lost on the writer.

Your ideas are greatly appreciated.

Peter A. Allard School of Law, University of British Columbia
1822 East Mall
Vancouver, BC Canada V6T 1Z1
Tel 604 822 3151
Fax 604 822 8108
Website allard.ubc.ca
Back to top
The University of British Columbia
  • Emergency Procedures |
  • Terms of Use |
  • Copyright |
  • Accessibility