Rechercher dans ce blog

Monday, August 16, 2021

For smartphone makers, security is a matter of economics - GCN.com

mobile browsing (ImYanis/Shutterstock.com)

INDUSTRY INSIGHT

For smartphone makers, security is a matter of economics

The Pegasus Project, a recent reporting effort to go behind the scenes of NSO Group’s infamous mobile spyware, has opened many peoples’ eyes to the potential for smartphones to be compromised and weaponized against their users. Reports have confirmed that individuals within government, from heads of state to diplomats, are particularly vulnerable to this threat given the value they represent to spies. In the wake of the Pegasus Project, much of the attention has turned to Apple, whose sterling security reputation is seemingly at odds with the ability of Pegasus operators to remotely and surreptitiously take total control of a targeted individual’s iPhone -- in many cases without any interaction required from the victim.

To understand why smartphone makers provide adequate security for the majority of users but struggle to contain the latest and greatest threats facing government users and other high-risk individuals at the hands of nation-state actors and cyber-arms dealers like NSO Group, it’s important to realize that smartphones are primarily commercial products. With any commercial device, manufacturers weigh security decisions against factors like usability, user preferences, implementation costs and reputational risk. In other words, security is viewed through an economic lens.  

This tension can be illustrated by considering how smartphones frustrate common security practices.

Limiting smartphone features

An axiom of software development is that more features mean more code, and more code means a greater likelihood of vulnerabilities. If security were the prime consideration, smartphone makers like Apple and Samsung would limit the number of features and focus more on system stability and security.

In the real world, proprietary new features and services not only attract new customers but increase customer lock-in within the vendor’s ecosystem. Apple’s iMessage service, for example, was originally designed to share text messages and photos, but over the years it has come to offer features like GIFs, emojis and third-party app integrations. Each of these extensions and interconnections increases the chances that skilled hackers will find and exploit a security gap. Yet, to many iPhone users, these features make iMessage an indispensable tool.

Slowing down the release schedule

Properly vetting code before it’s released is tedious and time-consuming, but critical for maintaining system security. In the push to release features to market as quickly as possible, this process tends to get shortchanged.

At Apple’s annual Worldwide Developers Conference, a litany of new capabilities are introduced to both maximize user interest and attract development efforts around these features. Such feature-heavy iOS releases create a harrowing schedule that leaves Apple developers with little time to vet new features for security flaws. Importantly, each new iOS release must be tested on each supported iPhone model (iOS 14 supports a whopping 19 models). It’s no surprise that Apple has come under fire in recent years for the multitude of bugs that accompany each major iOS release. So far this year, the company has already had to patch 13 zero-day vulnerabilities.

Developing a security-first architecture

If Android or iPhone were engineered for security above all else, the user experience would be drastically different. Since many of the exploit chains affecting smartphones result from the challenges of parsing complex data, smartphone makers could abandon this practice altogether. Imagine iMessage with just text -- no links, no images, no app integrations -- it’s clear why this option is a nonstarter.

Developing a security-first architecture also requires the use of specialized, isolated hardware, which is difficult and expensive to implement. And, given the space and power constraints of modern phones, focusing on hardware security may mean compromising on other areas such as camera size/quality and battery life, which happen to be two of the most important user considerations in purchasing a new smartphone.

Offering deep analysis to users

With an advanced threat like Pegasus, victims have no idea that they’ve been attacked. This situation is exacerbated by the fact that smartphones only offer limited security analysis tools to users. To effectively combat Pegasus, users would require greater visibility into their device’s filesystem, processes and system logs.

It’s understandable why, in addition to legitimate security reasons, Apple would want to limit such deep analysis. The company’s focus on the customer experience (“It just works”) is an incredibly valuable brand asset, and forcing users to deal with security notifications could be an unnerving and distracting experience that would go against this philosophy. Apple also doesn’t want any of the bad press or social media buzz that would result from users broadcasting that they suspect they’ve been hacked based on such analysis.

Increasing the size of the security team

Apple, for its part, has attracted some of the most skilled security talent on the planet and has increased its investment in its security team over the years. To match the offensive hacking skills of intelligence agencies and commercial surveillance providers, however, the company would need to effectively subsidize its own offensive hacking unit. Consider that NSO Group alone reported $243 million in revenue in 2020, and it becomes clear how much Apple would have to invest to credibly defend against Pegasus and other advanced mobile threats.


Adblock test (Why?)


For smartphone makers, security is a matter of economics - GCN.com
Read More

No comments:

Post a Comment

Atlanta Fed chief to head chamber in 2022, sees diversity as economic fuel - The Atlanta Journal Constitution

AJC - Logo - Main logo_ddn_tag_Site JN with T...