Friday, 28-Sep-12 09:35
Miksi tukea joukkoliikennettä

Yksi argumentti, jota en kovin usein ole nähnyt esitettävän, on yksinkertaisesti tämä:

Mitä useampi pyöräilee tai käyttää joukkoliikennettä työmatkallaan, sitä enemmän autoilijoilla on tilaa.

Noin karrikoidusti kuulostaa joskus siltä, että palavasilmäiset nuoret yrittävät vakuuttaa vanhat autoilijasedät ja -tädit luopumaan siitä omasta autostaan. Mutta näinhän ei ole, vaan joukkoliikenteen lisäämisen tavoitteena on pitää huolta siitä, että ne jotka sitä autoa haluavat tai joutuvat käyttämään, mahtuisivat sinne tielle ilman ruuhkia, kun ne jotka haluaisivat käyttää joukkoliikennettä tai pyöräillä, mutta joutuvat autoilemaan, saadaan pois sieltä häiritsemästä.

Tässä valossa on oikeasti vaikea ymmärtää, miksi kukaan vastustaisi joukkoliikenteen lisäämistä ja pyöräilyn helpottamista, koska on paljon halvempaa ja yksinkertaisempaa saada ihmisiä pois tieliikenteen jaloista kuin rakentaa lisää autoteitä. Tonttimaata kun on melko vähän ja sekin kannattaisi käyttää asuntoihin, ja maan alle ja ylle rakentaminen on hillittömän kallista...

(No juu, on tämä nyt yksinkertaistusta ja populismia. Mut hei, järkiargumentteja voi mennä lueskelemaan vaikka Otso Kivekkään blogista. ;-)

Saturday, 22-Sep-12 18:23
Radio Eyes

The story is making rounds about someone finally figuring out that you can just make a copy of a public transport ticket with an NFC phone, then use the ticket, then reset the ticket to its original state by writing the original content to it with the same NFC phone.

You can claim that this is a big security vulnerability, but in fact it really isn't. It's the equivalent of a public transport company issuing paper tickets using regular printer paper, and then punching a hole to it when it's used. You can make a photocopy of the ticket you received, and just keep making more photocopies and throw away the punched ones.

There was no security in the first place, so it's not a security breach. The only reason nobody figured this out earlier was the fact that nobody had cheap, ubiquitous NFC readers available - Radio Eyes, I call them. You've already got two perfectly good EyeBall Mk2 Photon Detection Engines installed by default, so figuring out that there's no security in a printed A4 you can put through a copy machine isn't really a big brain exercise. Calling it a security breach would be like calling stealing candy from a kid the "greatest crime since Enron."

This is an example of a technical term called "security through obscurity", which is the rather dubious practice of just making stuff hard to find instead of actually protecting things through algorithms. And I'm pretty sure a lot of the other early NFC ticket/card manufacturers have made the same mistake as the Amsterdam PTA. [Fun fact: the Ultralite cards are manufactured by NXP, Nee Philips Semiconductors, a Dutch company. And this particular trick with the travel cards has been "exposed" at least once before - though at that time you couldn't download an App to get the free trips...]. The ISO-14443 family of standards, which is the basis for NFC, has been around for a very long time, and there's a metric fuckton of still operational systems out there whose developers probably never thought an inch about security, because "it was just going to be for our use only."

In a world where everyone can have radio eyes, and you can download an app to open them for you, you just can't continue relying on obscurity.

A lot more of these coming your way soon.

Updating the story now that kids are out with their mom... As an example, this tag is on the front door of the house. My N9 tells me that it's a "Type 2 Tag", which in other words means it's a Mifare Ultralite. Now, if the developers never bothered to make it read-only, anyone could just use their phone to overwrite the contents with links to say, cat pictures.

Also, I finally found the link to the original hack of the Amsterdam transport ticket from 2007: https://ovchip.cs.ru.nl/Event_history#The_UVA_Ultralight_crack. It should be noted that the hack has been public knowledge for at least five years, and the Amsterdam PTA hasn't bothered to fix the problem yet. So there really is no security involved. :-) (The link above has plenty of other information about different attacks on the Dutch public transport system too. Interesting stuff if you're into it.)

Of course, the difference is that now you can download an app for it - which is something I've been expecting for years now ;-)

You can buy your own Mifare Ultralights for $0.50/piece from anywhere. Go hack! ;-)


Private comments? Drop me an email. Or complain in a nearby pub - that'll help.



More info...  
"Main" last changed on 10-Aug-2015 21:44:03 EEST by JanneJalkanen.