[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] "Safeplug"
I bought an early pogoplug device.
It was advertised as a means to provide "safe and secure" file access.
This model allowed connecting one's external hard drive via a USB port 
and connecting via ethernet to WAN thru their infrastructure which 
ostensibly provided authentication and access control. The idea was you 
could generate a URL to their server which would, if authenticated than 
open the door to the files you wanted to share with others. Or you could 
access your own home files on that external drive from any outside WAN 
location.
For me, it was the ability to place files i wanted to share online 24/7 
and since the device used only 4 watts and the external HD perhaps 6-10 
watts more, it had a minimal cost for electricity. Leaving a PC online 
24/7 as a fileserver costs $15-25 per month in electricity where I live, 
so potential of saving 80% of that was a boon.
I started the mandatory device registration process to get it going, 
then, before clicking the final "OK", decided I'd like to look at the 
linked Terms of Service since they were quite vague about how all the 
magic happened. I was curious.
Turns out, this little device used a special version of Linux for which 
THEY had root access, not you. If you jumped through hoops, you could 
get root access but it was not a process for normal people. They still 
maintained control.
With the level of control they had, the TOS was a concern, because in it 
you had to grant them full legal permission to:
   monitor and log your bandwidth usage,
   the identity of who was accessing the files on your HD,
   the content of your files ("so they could index content and make it
   easily searchable"),
   AND they had your permission to copy all your files (for evidence
   purposes)
   AND...get this... even delete files from YOUR hard drive (should
   THEY determine them to be 'illegal' or otherwise inappropriate..
pogoplug is NOT your friend.
Some geeks figured out how to run a clean version of Linux that didn't 
connect to pogoplug's content monitoring management service but that is 
quite complicated. Were Raspberry Pi available back then, I wouldn't 
have wasted so much buying into pogoplugs lies and deception. Is it far 
to say I don't trust they? YUP!
BM
On 11/22/2013 3:21 PM, Yuri wrote:
On 11/22/2013 11:35, Roman Mamedov wrote:
Why can't it be?
Well, maybe not the whole device down to the CPU Verilog design 
level, but
they could post source-code for the firmware with the instructions to 
build
and flash it, and since most likely this contains at least the Linux 
kernel
and some GPLed tools like Busybox, they are legally obligated to provide
source to whoever they distribute the binary to, on their request. 
But many
router manufacturers don't bother limiting it to just that, and 
simply post
the source code for public download on their websites.
How can one be sure that firmware that is running on the router is 
built from this particular source code and not from some modified 
version or different revision? Also how can one be sure that one extra 
service wasn't added on top of this open source? I think the answer to 
both of these questions is "impossible". In addition, governments have 
the power to execute the secret order on the company to secretly add 
such back door.
Open source only makes sense when built and installed by the party 
interested in security, or maybe when it is built by some trustworthy 
organization, like some trusted linux distro, and not just some random 
commercial company without any reputation.
Yuri
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk