Skip to main content
Skip to content
Case File
efta-efta01735540DOJ Data Set 10Correspondence

EFTA Document EFTA01735540

Date
Unknown
Source
DOJ Data Set 10
Reference
efta-efta01735540
Pages
0
Persons
0
Integrity
No Hash Available
Loading PDF viewer...

Summary

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
The Board Room guide to hacking EFTA01735540 "GET YOUR FACTS FIRST, T DISTORT THEM AS YOU PI: MARK TWAIN Lifehack Quotes .0 EFTA01735541 Are you compromised? Yes EFTA_R1_00019494 EFTA01735542 Why is everyone compromised? 1 Your network is a replicable monoculture 2. Compromising is a one-way street: You can't "uncompromise" something 3. The internet and your network are a graph of trust: compromising is viral and exponential 4. Your defense is reactive and slow, it must be proactive and fast EFTA_R1_001,19495 EFTA01735543 •• f•• a •• • I 4.- *a' 4 * 4 „ • ' • t t • fa. OP• • •• •• fam-res Ana - ; ; - - - r .‘44 IF.. ti aa. 1. - • • ea a a • 'a 41110 eifffir [repeated 5 times] • 4. a a . ea a s a e _ - . a all a .aa • a . . a . a a - 111-•• 40. • -Mr .0, a. OK IN -t .41•• [repeated 3 times] THAT'S YOUR • MPET I caw'. - [repeated 3 times] V 49. 4 ••-a e'L • a aSeaSOO 0 _lb a ii ii. • ;. p. Lsea mite"r" [repeated 5 times] 41 • 463•1* .1 f . r. • . aft ' • [repeated 5 times] . alma • r ap "re I iv • ,f [repeated 3 times] a I # I [repeated 3 times] I I it ego I . ok [repeated 3 times] e w • - • 4. * # 4 .^ dr- • a • 41. _en• ..t•• gp I sob - S • 44 4 a. I a . • t EFTA R1 00019496 EFTA01735544 Monoculture • The attacker can download the same software you have and attack it until he finds a way in. • An attacker can replicate an almost-exact copy of your machine and go at it until he finds an "in" • Once the attacker is on a machine he can experiment and explore the trusted neighbors until he finds an "in" EFTA_R1_00019497 EFTA01735545 EFTA R1 00019498 EFTA01735546 "Un-compromise"-able • A maxim: there's always a deep enough level in a machine that is not defended/defendable • It used to be the kernel, now it's the bios, the firmware, the hardware, the secret co-processor, you name it • You can't "un-compromise" because it's impossible to know what's compromised EFTA_R1_00019499 EFTA01735547 EFTA R1 00019500 EFTA01735548 Graphs of trust • A lot of security today happens at the "perimeter", once you're in it's game over. This is called "lateral movement" • Implicit trust: we trust somebody else servers to download executables, we trust certificate authorities keys, we trust our partner servers • This means that your threat model is in large part outside of your control EFTA_R1_00019501 EFTA01735549 . en) . • ile4; err.. •re r i " ' ar t S . - p• P:(201,114. :• Q • ; r • / 11, iee l e 0; .41• 10 • 111•1, I .6 C b - 00 II vi k 4 , I ; ••. I . •• io cr'IJC: 1. •:• . A I-1 -1 • ,- J • -Pile, • •..(cas•- • • - • '114 .0° • Le 11/4 • A* . ei gOi • ( re ar/ t di ctith it •• ••• :2. • ‘Vt isto,c. r ; . : ;•7411:.••••.; • / • tY „„ • r , , -. . ,.. ^ . ...A•T 1,ii. • i •••• -4. of /1... ea. • i• fr.% . i I • 1 '14 .1 I ' .. . ., "roe," •II• - ' .• I I . ./• 1 it d. " i f I . Ph I . , •••• .'..‘ Via vie.i II/1"..A. I .. 1.... •• -1 • " ' ' i s i r e••••••%•-. I i• .1 f • • ' : •• PT •,•• •.siC VS l 'i Ct 1 •• e " * " l• i f 1')/ . I Al %. •• i A . y • [repeated 3 times] •• : ] I. il.te.•: . •5‘,..9 1.11t i ( 1 . • ‘ agt•ai •::$•4 1 1)4 4 • ; * . 1 1; . 4 I.'s'''. I . ,.-ke'r 1 EFTA01735550 Reactive and slow • Most security tools today work by identifying an attack somewhere else and then try to protect everyone else • This is reactive in nature and ineffective: most attacks stay latent for a very long time • Even with almost-real time detection, the attacker needs to beat you at the race just once EFTA_R1_00019503 EFTA01735551 EFTA_R1_00019504 EFTA01735552 The recursive guide to compromise anything 1. Compromise a machine (exploit, social engineering, backdoor, physical access) 2. The maxim: there's always a deep enough level in a machine that is not defended/defendable. Go there and stay put 3. For every node in the graph that trusts your machine, go to 1 and be fast EFTA _R1_0019505 EFTA01735553 Digital immune system EFTA01735554 Digital immune system • We have the technology to build 80% of the digital immune system • We need network effects and board-level decisions to make the remaining 20% true • This will not solve computer security but it will leap it ahead by a lot EFTA_R1_00019507 EFTA01735555 ) EFTA R1 00019508 EFTA01735556 "Shape-shifting" software • No two copies of the same app, (kernel, firmware, etc etc) should behave the same way at the micro level • Code should adapt to its users/owners, detect and log anomalous behavior on a distributed ledger EFTA_R1_00019509 EFTA01735557 "Accountability breeds responseability." -Stephen Covey QuoteAddicts EFTA01735558 Code Signing • Every piece of code that is executed on a machine should be signed by a trusted entity • We can't trust a single company/machine: create a distributed ledger of valid signatures for every piece of code EFTA_R1_00019511 EFTA01735559 I EFTA_R1_000,19512 EFTA01735560 Self-destructing machines • Every machine should have a "known-good" state to revert to • Every time a machine is thought to be compromised it should be destroyed immediately and reverted back to the "known-good" state EFTA_R1_001,19513 EFTA01735561 EFTA_R1_00019514 EFTA01735562 Adaptive network structure • The trusting neighbors of a machine must be able to shut down communication with the allegedly compromised machine • The trusting neighbors should be able to adapt their network topology to use a mirror copy of the compromised machine EFTA_R1_00019515 EFTA01735563 EFTA R1 00019516 EFTA01735564 The Al future • In the future a lot of offensive security will be Al/MLdriven • In the future security will be much faster and much more complicated • We can't have proper defense against that without these building blocks EFTA_R1_001,19517 EFTA01735565 O&A EFTA_R1_00019518 EFTA01735566

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.