This is stupid. Their justification is an “unusual degree of vulnerabilities.”
So why not outlaw vulnerabilities? Impose real fines or jail time, or at the very least a civil liability that can’t be waived be EULA. Better than an unconstitutional bill of attainder.
Why not?
Well…
It discourages self-reporting, makes vendors hostile to security researchers, opens the door to endless litigation over whose component actually “caused” a vulnerability… encourages CYA culture (like following a third-party spec you know is bad rather than making a good first-party one, because it guarantees blame will fall on another party)
In a complex system with tight coupling, failure is normal, so you want to have a good way to monitor and remedy failure rather than trying to prevent 100% of it. The last thing you wanna do is encourage people to be hostile to failure-monitoring.
(See also: Normal Accident theory)
So why not outlaw vulnerabilities?
Of course! If we make vulnerabilities illegal, then all the programmers will make perfect software! The solution was so easy!
There is definitely a difference in quality when talking about import software.
Also, “outlawing vulnerabilities” would not mean to simply assume everyone starts making perfectly secure software, but rather that you’re fined if you can’t prove your processes are up to spec and you adhered to best practices during development. Additionally, vendors are obliged to maintain their software and keep it secure.
And surprise, surprise, the EU ratified laws that do exactly that (and more) recently. In fact, they’ll be in effect very soon:
Because the NSA, CIA, and FBI love them. Vault 7, Magic Lantern, Intel ME and AMD PSP, Dual elliptic curve, COTTONMOUTH-I, ANT/TAO catalog, etc.
Hell, Microsoft willingly reports vulnerabilities and exploits to the government for them to use.
North Korea wishes it had this level of control on the goods its citizens willingly buy.
Outlaw vulnerabilities? Do they just get little virtual handcuffs when they’re found? If I find a Microsoft vulnerability I get arrested? Not sure I’m following this one.
Edit: it’s really obvious most of you haven’t worked in infosec.
When WannaCry was a major threat to cybersecurity, shutting down banks and hospitals, it was found that it used a backdoor Microsoft intentionally kept open for governments to use.
https://en.wikipedia.org/wiki/WannaCry_ransomware_attack
EternalBlue is an exploit of Microsoft’s implementation of their Server Message Block (SMB) protocol released by The Shadow Brokers. Much of the attention and comment around the event was occasioned by the fact that the U.S. National Security Agency (NSA) (from whom the exploit was likely stolen) had already discovered the vulnerability, but used it to create an exploit for its own offensive work, rather than report it to Microsoft.[15][16]
https://en.wikipedia.org/wiki/EternalBlue
EternalBlue[5] is a computer exploit software developed by the U.S. National Security Agency (NSA).[6] It is based on a vulnerability in Microsoft Windows that allowed users to gain access to any number of computers connected to a network. The NSA knew about this vulnerability but did not disclose it to Microsoft for several years, since they planned to use it as a defense mechanism against cyber attacks.
In real life, if I do not prevent someone from doing a crime that I am aware of was premeditated, I am guilty of not doing my duty. Corporations are people thanks to Citizens United, and governments are ran by people, so uphold them to the same standards they subject the populace to.
If you are Microsoft, then yeah. You’d go to jail when a Windows vulnerability is found.
In all seriousness though: it would be more likely to be just a civil penalty, or a fine. If we did want corporate jail sentences, there are a few ways to do it. These are not specific to my proposal about software vulnerabilities being crimes; it’s about corporate accountability in general.
First, a corporation could have a central person in charge of ethical decisions. They would go to prison when the corporation was convicted of a jailable offense. They would be entitled to know all the goings on in the company, and hit the emergency stop button for absolutely anything whenever they saw a legal problem. This is obviously a huge change in how things work, and not something that could be implemented any time soon in the US because of how much Congress loves corporations, and because of how many crimes a company commits on a daily basis.
Second, a corporation could be “jailed” for X days by fining them X/365 of their annual profit. This calculation would need to counter clever accounting tricks. For example some companies (like Amazon, I’ve heard) never pay dividends, and might list their profit as zero because they reinvest all the profit into expanding the company. So the criminal fine would take into account some types of expenditures.
Presumably that, once exploited, vulnerabilities are an offense that the DOJ can fine the company for. I think that’s quite reasonable.
I’d go further, an unpatched vulnerability is offense that the DOJ can fine the company for
The news source of this post could not be identified. Please check the source yourself. Media Bias Fact Check | bot support
So is it bad cuz there’s loopholes to spy on us or is it bad because of who has access to the loopholes?
Gonna be real with you bro. I know the govt is spying on me. And I don’t care. They can have my music preferences and what I watch on youtube. What games I play. I don’t care. I promise I’m very boring.
It just doesn’t matter. At all. Dramatic spy novel nerds will talk about HUMINT and leverage. Totally dude. Please. Share my porn preferences publicly. See how far it gets you. Lol.
Such a fucking moronic take.
Hey guys. I don’t lock my doors either! Why let someone you don’t know run rampant in your personal space is beyond me. It’s insane imo.
Speaking of moronic takes. Yours.
Apples and avocados. Dumbass.
They’re spying on all of us. We can’t do anything about it. Thanks George Bush.
I just don’t care which govt does it. In fact I’d prefer the Chinese govt. At least they’re not actively making my life worse year over year.
https://www.npr.org/2022/05/10/1097482967/roe-v-wade-supreme-court-abortion-period-apps
You may not have anything to hide right now, neither did these women at one point in time. Things change. Privacy matters.
All of yall are way out in the weeds.
I didn’t agree with it when Homeland Security was a new term on the news. I didn’t agree with it when Snowden proved all us “conspiracy nuts” right about it. And I don’t agree with it now, but the NSA Authorization gets passed like clockwork every year anyway.
It happening. And it’s gonna keep happening. I just don’t care if China sees it too. That’s all.
Yeah it doesn’t matter now. Do a little research on fascism and how tolerant they are or anything seen as “outside the norm” (with the “norm” being a strict set of behavior that the regime finds acceptable. On that day).
Eventually, they absolutely will care about those preferences, and they will separate (and probably execute) people based on them. This isn’t anything new.
You’re making this absurdly naive assumption that the people taking your data are doing so to protect you.
Anyway, get in contact with me and we can set something up so that every single conversation and button press on your phone is instantly sent to thousands of people for review. Shouldn’t be a problem, right?
In a statement cited by Reuters, TP-Link reportedly claimed that it does not sell routers in the U.S. In May, the company announced it had “completed a global restructuring” and that TP-Link Corporation Group — with headquarters in Irvine, California and Singapore — and TP-Link Technologies Co., Ltd. in China are “standalone entities.”
Son of a bitch. I just bought a TP-Link Omada wireless access point. I wonder if they’re in the same category. The article doesn’t go into that level of detail.
Yeah I’ve got a handful of switches and a WAP from them… I somehow never realized they were out of the PRC. Will probably shift away from their stuff now.