Secure PDAs 111
An anonymous reader writes "This article at LinuxDevices.com introduces a unique Linux-based 'secure PDA' co-developed by IBM and Consumer Direct Link, Inc. (CDL). The Paron MPC combines the functions of a PDA, Bluetooth wireless access, cellular telephone, and biometric fingerprint recognition, along with a security-oriented hardware/software architecture. The device is claimed to be the world's first handheld wireless device with built-in biometric user authentication. The Paron is based on an Intel StrongARM SA-1110 processor and uses a Linux 2.4.x kernel and provides a GUI environment and PDA app suite based on Trolltech's Qtopia and Opera's browser much like the Sharp Zaurus."
So other PDA's are palm... (Score:4, Funny)
Re:DUMB (Sc0re:5, Crazy) (Score:1)
Re:Yeah, but - (Score:1)
Re:Yeah, but - (Score:2)
Biometric security (Score:5, Informative)
Re:Biometric security (Score:3, Funny)
Oh, trust me! I wipe my sensor everytime.
Re:Biometric security (Score:1)
Re:Biometric security (Score:1)
Re:Biometric security (Score:5, Informative)
there's a picture of it herehttp://www.brighthand.com/article/iPAQ_5400 [brighthand.com]
Although this would proably leave a very small cross secion of the print behind, it shouldn't be enough to get a good capture of. (now the ones you leave on the sides and bottom. . . well that's another story)
Re:Biometric security (Score:1)
It's not THAT easy. Take anything you find on the internet at face value. Just because someone says that they have done it, doesn't mean that you can just walk off of the street and do it. The materials are readily available, but the process is an extreme pain in the a$$. Even, then you aren't guarnteed that it will work. Also, the fingerprint reader shown on the device is of capacitance type. It measures the dielectric properties of the finger placed on the reader.
Dusting the fingerprint is easy. Lifting the fingerprint and getting enough points is harder. Getting a clear image from the lifted print is harder still. "Creating a good scan with illustrator" is also not easy and will not get you by a capacitance fingerprint reader. There have to be ridges on whatever fingerprint that you place on the capacitance scanner, meaning the finger (or fake) need to be 3D.
The moral: it's a lot harder than everyone thinks. Don't trivialize it. Biometric applications may not be ready for wide scale applications, but they definitely have the potential. The hurdle will be educating people so that they can tell the truth from the fluff.
secure PDA (Score:1, Funny)
damn newspeak
No SD/MMC or CF slots... (Score:1)
I put my PDA in a safe. (Score:2)
Re:I put my PDA in a safe. (Score:1)
Microsoft knows all and sees all. If you know hte combination, then they know it as well.
All hail the Gates keeper, master of our soul.
Re:Sounds like a sweet little machine (Score:1)
This thing can never be secure for one reason.
Have a look at the Bluetooth spec. The Bluetooth data transfer rate is on the order of Olog(n) and any generic scanner which can be picked up at WalMart can be modded to read data at Olog(n/2).
This means you can connect up any old PC running Gnu/RedHat via the serial port to the scanner and suck the data right in. Sourceforge has several open source programs which capture data from scanners which could be used.
Doesn't anyone do any research on this stuff before making it public?
Warmest regards,
--Jack
Re:Sounds like a sweet little machine (Score:1)
BioMetric User Identification (Score:3, Insightful)
Instead, it's linux-based. Neat-o.
The true hypocrite is the one who ceases to perceive his deception, the one who lies with sincerity. ~André Gide
you must admit (Score:5, Insightful)
There's plenty of automatic-MS-bashing that goes on here, and plenty of automatic-MS-bashing-bashing. But if you look at the facts and stick to the numbers, it's not very farfetched to assume Microsoft is always trying to screw us somehow.
Look at Palladium, with which they will entrench DRM on every desktop. Look at Word's closed and obfuscated binary file format. Look at all their OEM tricks, and EULA abuse, their fake Switch ads and their systematic abuse of power.
Their strategy (whose final step is most assuredly "PROFIT !!") has been to fuck consumers and users as much as they can get away with and rob their pockets of change. Next to a Finnish hobbyist's OS, they look pretty bad.
Re:you must admit (Score:1)
So, if Microsoft sees a demand for DRM (from copyright holders, not users, but if they don't do it, someone else will) then they should try to be the first on the market to push it. Security of content is a inconvenience for us but don't blame Micorsoft, blame the people making a demand for it.
BTW, I use Debian.
Re:you must admit (Score:1)
It's funny on zdnet a few days ago they had an article about what Palladium brings to the user and they had several use-case scenarios...in every case I couldn't help but wonder why anyone would want it on their computer. It seems like it's entire purpose is to protect someone's bottom line be it the software manufacturer, or some record label etc.
Re:BioMetric User Identification (Score:2)
That's because Microsoft will likely want to control the "biometric user identification" information in some way (like keeping it in a centralized DB that they control and requiring net access to use biometric ID).
Re:BioMetric User Identification (Score:1)
If Microsoft use biometric user ID ... (Score:2)
Re:BioMetric User Identification (Score:2)
Instead, it's linux-based. Neat-o.
Firstly, i don't know who this "we" is. But I wouldn't be screaming anything at a microsoft version of this, other than "neat-o". Assuming it was the same thing - a biometric security device. You use your fingerprint instead of a password. If the MS version had you using your fingerprint instead of an implant in the back of your neck that tracked your every move, sure. I'd be screaming bloody 1984. If my implant let me, that is.
Re:BioMetric User Identification (Score:2, Insightful)
Personally, I think Linux is "neat-o" because it gives you the freedom to inspect and modify the code. If they coded something into it that sent my biometric info back to HQ, or did something else sneaky, I could just take that bit of the code out. If the code itself is closed-source, in that case I would just modify the kernel.
Free software makes 1984 scenarios impossible. That's what "Freedom" is about. Just like free societies makes the real 1984 impossible.
Why do we take nuclear weapons away from dictators but let democratic societies keep them? Because it's much harder to abuse power in a democratic society, where power is diffused. Same with software, on a lesser scale.
OT: Nuclear Weapons (Score:1)
Wrong. ``We'' take nuclear weapons away from dictators because ``we'' are strong and they are weak, and we want it to stay that way. Or actually, I don't think ``we'' take away nuclear weapons from anyone, for the fact that they have them makes them powerful enough that they can say ``keep your hands of or else...''
It's not like we take China's nuclear weapons away, although few would call it a democratic society. Pakistan is a military dictatorship, yet I haven't heard of any attempts to take their nuclear weapons away. Of course, that might be me.
Sorry to point this out here. This is not a personal attack. It's the truth. Sadly.
Re:BioMetric User Identification (Score:1)
I don't particularly like Microsoft and I think I have good reason for it. But if they would implement some security feature that would actually give the security to the user, without having them intervening, then you will not hear me complain.
This device seems nice, keeping its data to itself (and of course to its owner). Some comments say it doesn't work. They're probably right. But there's nothing 1984 about it.
Re:BioMetric User Identification (Score:1, Offtopic)
And since when did slashdot become a place for slippery-slope knee-jerk microsoft bashing? ...
Oh, wait..
Two simple words: (Score:3, Insightful)
Button Pushing (Score:2)
Not-so-secure PDA (Score:5, Interesting)
-Kaos
Re:Not-so-secure PDA (Score:3, Insightful)
Re:Not-so-secure PDA (Score:2)
Re:Not-so-secure PDA (Score:2, Informative)
It's about time (Score:5, Funny)
Re:It's about time (Score:2)
I sent my old Palm IIIe to pasture, and stepped up to a hot young Sony Clié SJ30 [palminfocenter.com]. 8 times the memory, quadruple the resolution, 65,000 available colors, MemoryStick slot, Jog Wheel.. $250 bucks without cradle.
And I don't feel one bit guilty about it.
never work (Score:5, Insightful)
Secrets and Lies.
http://www.amazon.com/exec/obidos/tg/detail/-/0
Biometrics is not ready for prime time. When they hack it, are you going to be isssued a new thumb?
link (Score:1)
Re:never work (Score:2, Funny)
Re:never work (Score:3, Funny)
Re:never work (Score:4, Interesting)
Never work for what?
That's the question.
Biometrics are useful for some applications and not useful for others. As a mechanism for securing extremely sensitive data, they're only useful in extremely confined circumstances. As a key for casual protection of low-security data, they're excellent. As one of multiple factors used to protect moderately high-security data, they can also work well.
Blanket statements about any security technology are invariably false.
Re:never work (Score:4, Insightful)
In this case, IBM tends to market to sophisticated markets. They tend to, and are increasingly, trying to serve the sophisticated market in new ways so as not to lose to MS, Dell, and others. Hopefully we will not see these devices everywhere, because, as you say, once a thumbprint is compromised it is always compromised. I honestly do not know if this is a useful tool, but i can imagine some applications where it could be.
On the other hand if MS did this, your point might be valid because then the technology would be shoe-horned into general use. For instance, if the validation was in the OS and IE, and the reader were on the keyboard, thousands of merchants might use the fingerprint for sole verification. This would create a large incentive to hack the system, which, a you point out, would only require the capture of the digital signature of the fingerprint, which is not a replaceable token.
Re:never work (Score:1)
Bare Bones has a secure Personal Analog Device (Score:5, Funny)
Wot no CDMA? (Score:2, Interesting)
Re:Wot no CDMA? (Score:2, Informative)
Re:Wot no CDMA? (Score:1)
As any security conscious agency can tell you... (Score:3, Insightful)
The only true method of keeping confidential information safe is to keep it under lock and key, or in the possesion of a concerned person all the time.
Secure PDA is an oxymoron.
True, but PDA will exist (Utimaco SafeGuard PDA) (Score:3, Insightful)
Very true, but it's not going to stop the problem that PDA are potentially the largest outgoing 'leak' of information for companies and organisations. They contain so much valuable data...
One interesting product that is well worth a close look is Utimaco's SafeGuard PDA [utimaco.com] solution.
For one thing the pinpad screen, swaps the numbers around when you want to unlock the device. So even if you watch your neighboor use his fingers pattern when he unlocks his PocketPC, it won't help you. The product also has a lot of other interesting features...
Re:As any security conscious agency can tell you.. (Score:3, Insightful)
Secure PDA is an oxymoron.
No person is truly secure. Those in power are always corruptable.
Security, when it comes down to it, is simply the challenge making the price of breaking in greater than the beneift of breaking in.
If a crook has a 1% chance of being caught and sentenced for one year for breaking into my home, and we value his year of freedom at $50,000, he had had better get more than $500 from breaking in or the risk isn't worth the gain.
Most criminals (and hackers) don't think in these terms directly, but there is, AFAIK, an pseudo-concious awareness of it. ('course, the whole bit is thrown when non-cash values, like Thrill or Political Activism are factored in...)
First, but only for a few weeks (Score:2, Informative)
Looks fairly similiar to the Zaurus SL-5500 (Score:5, Interesting)
this machine does not feature the slide out keyboard, and while it is quite small on the zaurus, I'd say I use it about half the time (hey, you ever get drunk and try to use graffiti? ;) )
the machine [looks] very large! Like a Jornada or something! ;)
I'd rather see 802.11b than bluetooth...
If you disagree, don't post anonymously :)
Re:Looks fairly similiar to the Zaurus SL-5500 (Score:1)
Yes, accidentally : I was testing my Zaurus Wine management program [eqlab.org]!
Secure?? how? (Score:4, Interesting)
Re:Secure?? how? (Score:3, Insightful)
Re:Secure?? how? (Score:4, Interesting)
fingerprinting is easy to defeat.
Okay, e-mail me an image of my fingerprint. I don't care which, any of them will do. Right now, please.
I agree that biometrics are just moderately low-security passwords except in tightly-controlled environments (e.g. an armed guard checks your finger closely before allowing you to place it on the sensor), but they have the advantage that they're fantastically simple to use, which makes it reasonable to use authentication where you would otherwise use none.
For example, the CDA device has most of the standard PIM applications fingerprint-protected. It would be a real pain in the butt to have to enter a password every time I wanted to check my calendar, but it's quite reasonable to place my thumb on the scanner for a fraction of a second. Actually, I'd like to see a small enhancement so that rather than tapping on an app and then putting a finger on the scanner, I'd prefer to just place a finger on the scanner and have the device start a different app depending on which finger I use -- app selection *and* authentication in one step!
Further, biometrics have the advantage that, from the average user's point of view, they're not shareable. The inability of users to give their fingerprints to someone else goes a long way to ensuring that access to systems won't be passed around.
Biometrics are not, generally-speaking, good tools for strong security, but they *do* have exceptionally useful security characteristics that can be used to enhance security, when applied appropriately.
Re:Secure?? how? (Score:2)
As far as defeating the fingerprint scanner, for the starting point, you need the fingerprint of the owner. Now unless you hold the PDA with gloves all the time, or wipe it off regularly, chances are a little dusting will get the fingerprints off the PDA itself. So what's the point of locking something and keeping the key next to it? Once you have the fingerprint, it's been shown that a fingerprint scanner can be defeated by a dummy rubberised finger with your fingerprint embedded in it.
I agree, biometrics is a novel idea in security. I do not agree that it is ready for primetime and that it is ready to be touted as a secure system.
Re:Secure?? how? (Score:1)
My point is that you cannot call biometrics secure. You forget one thing - when people tout something as secure, that usually means it will keep your information from getting into the wrong hands.
You forget one thing: When people tout something as secure, with no qualifications, explanations as to what the term means in this context or other waffling, you can be pretty sure they have no idea what security is.
I recall one time few years back I recommended that an in-house application be developed in C++, rather than in Java (for a variety of good engineering reasons). The project manager looked at me, nodding knowingly and said "Right, because Java isn't secure."
Now unless you hold the PDA with gloves all the time, or wipe it off regularly, chances are a little dusting will get the fingerprints off the PDA itself. So what's the point of locking something and keeping the key next to it?
Because (a) the alternative is to use *no* security whatsoever, (b) the number of people in the world who could successfully get that fingerprint off of the scanner and use it is tiny and (c) the odds that you'll actually get enough detail off of that lifted print to fool a 500 dpi electrical-conductivity scanner are also very slim.
Further, if I were to find your biometrically-protected PDA I wouldn't bother with the fingerprint crap at all, I'd just get break into the device as a whole and steal your data right out of where its stored.
The key is to understand precisely what security the biometric authentication does and does not give you and to decide whether that fits the needs of your application. "Is it secure?" is a meaningless question without a defined threat model.
Re:Secure?? how? (Score:2)
I guess you would call this app-get (apologies to debian linux)
Actually, this sounds much more useful - better patent the idea right away!!!
And we all know which member to use for all your pr0n!
Re:Secure?? how? (Score:2)
Locks only keep honest people honest.
Biometrics just another kind of lock. Sure it can be defeated. Does that mean that your diary is still safe from your brother/sister? Probably.
Re:Secure?? how? (Score:2)
The CDL website [cdlusa.com] makes vagues claims that their security chip is FIPS 140 rated, but I have not been able to find it [nist.gov]. For that matter, it is not clear that the Paron MPC is actually built using the CDL-82, or some variant of it.
TRUE biometric security (Score:4, Funny)
Re:TRUE biometric security (Score:4, Funny)
--
NSA working on secure BlackBerry (Score:4, Informative)
my electronic wallet (Score:3, Interesting)
Re:my electronic wallet (Score:2)
Really what you want are cryptographic certificates with at least 1024-bit (preferably 2048-bit) signature keys if you're going to be buying stuff. These "secure" PDAs don't really offer much over regular PDAs (with IPSEC-enabled bluetooth) for use as digital wallets. It all depends on the wallet software on the PDA.
I think I may have read something about a faster way to break the GSM crypto, but 2^40 to 2^44 are the estimates for Ross Andersen's original attack, IIRC.
Too late for this guy! (Score:4, Interesting)
San Jose police have broken up an alleged identity theft crime ring using search warrants to seize and examine the suspects' PDAs.
According to the New York Times the alleged ringleader had the names of more than 20 victims along with their social security, bank account and credit card numbers and other personal information stored on his Sony Clie handheld device.
Included in the To Do list were tasks such as picking up materials at the local office supply store to make fake cheques.
A police spokesman said that it was difficult for the suspect to deny that the Clie was his, as it had his parents' details stored in it under the name 'Mom and Dad'.
letter to ed. (Score:1, Offtopic)
Can we please change the handheld story picture to at least a palm V, which is dead sexxy?
Thanks
nege
Re:letter to ed. (Score:2)
Music to my ears (Score:2)
CDL selected Linux because "it is an open source and open platform," said Dr. Cuong Do, CDL's chief executive officer.
Price & Availability (Score:1)
Sla$hca$h (Score:1)
take care,
Lispy
Cool but what about my current needs.. (Score:3, Interesting)
Having Biometrics is neat-o but I need tools that work with what I have already have in place. I need to generate my S/KEY on my laptop when/if my Visor dies (can we say PalmOS Emulator). No what happens in you Biometric PDA dies, hope they will provide software and readers I can uses on my laptop or workstation for those days that PDA just doesn't want to work.
silly (Score:2)
Digital copy of your fingerprint stored? (Score:2, Insightful)
Does anyone think this can be hacked off the pda. If a digital copy was released to the net you would have to get new fingerprints made.
err and which (Score:3, Insightful)
Why why why? (Score:2, Insightful)
And why save important/sensitive information on PDA (so easy to loose one) a person with enough knowledge will be able to get the info out with or without encryption.. and any other guy, just won't know what the hell to do with that sensitive info.. probably won't even know that this is sensitive information. So why bother?
Best thing, don't save any important data on PDAs..
Paron MPC's (Score:1, Funny)
I sure hope this description is a bad one (Score:3, Insightful)
Instead of swiping a badge through a reader, the employee would place his/her thumb on the Paron's small fingerprint recognition screen, and a wirelessly connected server would read the fingerprint, identify the person, and grant access if a match is found between the person making the request and the data in the server.
Uh, this is just using the fingerprint as a password to authenticate the user. Dumb dumb dumb. If they really are doing this, then anybody who can get the user's fingerprint can get access. What they should be doing:
Instead of swiping a badge through a reader, the employee would place his/her thumb on the Paron's small fingerprint recogniction screen to activate the embedded crypto processor. The processor would then use the employee's private key to authenticate to a wirelessly connected server.
Why is this different? For one, the actual authentication to the building is being done with a private key. Private keys are much easier to replace if compromised. Most people also don't routinely leave copies of their private keys on everything they touch.
Second, the fingerprint is only being used to activate the crypto processor. It only needs to be valid from the fingerprint sensor into the bowels of the PDA. But more importantly, it's not good for much. All it does is allow the crypto processor to be activated. An adversary still needs to first steal the PDA itself and then defeat the fingerprint sensor. And then they can only use the public key until it's revoked.
But trusting a wireless device to send the server the fingerprint is just plain silly. That's worse than a cleartext password. It's like authenticating on the username alone. Hopefully, this device doesn't actually work this way and the article is just simplifying for the reader.
Last Post! (Score:1)
don't call it destiny; call it injustice, treachery, or simple bad luck.
-- Joseph Heller, "God Knows"
- this post brought to you by the Automated Last Post Generator...