GUO Yixuan on 6 Sep 2015 08:31:39 -0700 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] Cheap Nexus 6 |
On Sun, Sep 06, 2015 at 10:02:13AM -0400, Rich Freeman wrote: > On Sun, Sep 6, 2015 at 2:54 AM, brainbuz <brainbuz@brainbuz.org> wrote: > > > > With so many phones coming to market with a fingerprint reader, any smart > > phone that doesn't have one is obsolete junk. PINS and swipes are really > > inconvenient compared to fingerprint and given the personal data thats going > > on phones these days I don't see how a more secure and more convenient means > > of securing the device can be considered optional. > > > > A fingerprint reader only helps with security if the storage is > completely encrypted (both the media/sdcard and data regions) either > using a strong enough key to resist brute-force attacks, or using some > mechanism that ensures a limitation on number of attempts per second. > > Chromebooks employ a TPM chip to accomplish the second. The password > you enter is combined with an encrypted key stored on disk, and fed > into the TPM to decrypt using a key stored in the chip. If the > decryption fails then the password is wrong. If the decryption > succeeds it yields the strong key used to access the storage contents. > The TPM itself limits the number of attempted decrypts per second (it > is slow), and you can't perform the process without it unless you > extract the key stored inside (and the TPM is engineered to make this > incredibly difficult even for a very sophisticated attacker). > > As far as I'm aware Android does not do anything like this - the only > entropy in the system is whatever you enter in your password (which by > default is intended to be a screen lock key you enter all the time), > and there is nothing that guarantees that attacks on the storage will > be rate-limited - you just need to extract the encrypted contents of > the flash chips and attack it with the computer of your choice. I think Android at least provide some support for TPM or similar hardware based keystore[1]. However, I'm not sure whether the mandatory encryption in Android 5 and Nexus 9/6 is making use of it. [1] https://developer.android.com/training/articles/keystore.html#SecurityFeatures However, using TPM might make it more difficult for debugging. (my guessing) Regards, Yixuan > I'd rate Android's data security as pretty casual overall. I have no > idea how it compares to iOS, but it is nowhere near as strong as > ChromeOS (on a device with a supported TPM - which includes all > commercially-sold machines but not anything you just build yourself). > It doesn't hurt that ChromeOS devices tend to have keyboards which > encourage more complex passwords, but either way an attacker with full > hardware access (including taking the thing apart but not defeating > the TPM) is limited to about 2 attempts per second at most. > > Now, maybe with a fingerprint reader you'd be more encouraged to enter > a really long and complex password at boot. If the thing allows the > first unlock to use the fingerprint then they're storing the password > somewhere and that is another potential vulnerability, depending on > whether it involves a TPM. > > -- > Rich ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug