<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Calvin</id>
	<title>Soma-notes - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Calvin"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php/Special:Contributions/Calvin"/>
	<updated>2026-04-30T14:05:52Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_7&amp;diff=21476</id>
		<title>SystemsSec 2018W Lecture 7</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_7&amp;diff=21476"/>
		<updated>2018-01-31T05:56:19Z</updated>

		<summary type="html">&lt;p&gt;Calvin: /* Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Audio==&lt;br /&gt;
&lt;br /&gt;
[http://homeostasis.scs.carleton.ca/~soma/systemssec-2018w/lectures/comp4108-2018w-lec07-29Jan2018.m4a Lecture 7 Audio]&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
- You want cryptography whenever your rival can mess with bits. i.e see, modify, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- If you&#039;re talking about an isolated device, i.e single terminal for one person.&lt;br /&gt;
	what does crypto do for you? almost nothing. (ex: what if someone steals the system? if they mess with hardware?)&lt;br /&gt;
&lt;br /&gt;
- TLS, SSH most common protocols nowadays for detection.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;- #1 Rule: Never do your own crypto, including implementation.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Most common use case on an individual system: file/file-systems encryption&lt;br /&gt;
&lt;br /&gt;
- You can encrypt a file and send it, but if you have to send it, someone has to do something on the reciever side to decrypt it.&lt;br /&gt;
&lt;br /&gt;
== Trusted Software (DRM): DRM: Digital Rights Management ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Almsot no scope for confidentiality, meant mostly for preventing messing with bits.&lt;br /&gt;
&lt;br /&gt;
- Trusted Boot:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== TPM: Trusted Platform Model ==&lt;br /&gt;
&lt;br /&gt;
- This is the portion of a chip that is meant to hold secrets and can do computations without giving away info.&lt;br /&gt;
&lt;br /&gt;
	As long as TPM is safe, all data is safe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- An attacker must do 1 of 3 things if they want data access: break TPM, break the crypto, or get the keys.&lt;br /&gt;
&lt;br /&gt;
- Arguably, getting the keys might be the easiest, even for a company like Apple or Microsoft (Trick one of the human(s) with the keys).&lt;br /&gt;
&lt;br /&gt;
- MalwareBytes: 2 bad updates, essentially acting as a dedicated denial of service. This is a breach of trust.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- How did MS sign my boot order even though I have linux? Because they&#039;re allowed to.&lt;br /&gt;
&lt;br /&gt;
- The reason you can&#039;t have linux on an Apple device is because of trusted boot; to startup linux, you would have to break the boot order, which would trigger security precautions.	But, get the keys, and you could probably do it.&lt;/div&gt;</summary>
		<author><name>Calvin</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_7&amp;diff=21475</id>
		<title>SystemsSec 2018W Lecture 7</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_7&amp;diff=21475"/>
		<updated>2018-01-31T05:55:35Z</updated>

		<summary type="html">&lt;p&gt;Calvin: /* Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Audio==&lt;br /&gt;
&lt;br /&gt;
[http://homeostasis.scs.carleton.ca/~soma/systemssec-2018w/lectures/comp4108-2018w-lec07-29Jan2018.m4a Lecture 7 Audio]&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
- You want cryptography whenever your rival can mess with bits. i.e see, modify, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- If you&#039;re talking about an isolated device, i.e single terminal for one person.&lt;br /&gt;
	what does crypto do for you? almost nothing. (ex: what if someone steals the system? if they mess with hardware?)&lt;br /&gt;
&lt;br /&gt;
- TLS, SSH most common protocols nowadays for detection.&lt;br /&gt;
&lt;br /&gt;
- #1 Rule: Never do your own crypto, including implementation.&lt;br /&gt;
&lt;br /&gt;
- Most common use case on an individual system: file/file-systems encryption&lt;br /&gt;
&lt;br /&gt;
- You can encrypt a file and send it, but if you have to send it, someone has to do something on the reciever side to decrypt it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Trusted Software (DRM): DRM: Digital Rights Management ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- Almsot no scope for confidentiality, meant mostly for preventing messing with bits.&lt;br /&gt;
&lt;br /&gt;
- Trusted Boot:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== TPM: Trusted Platform Model ==&lt;br /&gt;
&lt;br /&gt;
- This is the portion of a chip that is meant to hold secrets and can do computations without giving away info.&lt;br /&gt;
&lt;br /&gt;
	As long as TPM is safe, all data is safe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- An attacker must do 1 of 3 things if they want data access: break TPM, break the crypto, or get the keys.&lt;br /&gt;
&lt;br /&gt;
- Arguably, getting the keys might be the easiest, even for a company like Apple or Microsoft (Trick one of the human(s) with the keys).&lt;br /&gt;
&lt;br /&gt;
- MalwareBytes: 2 bad updates, essentially acting as a dedicated denial of service. This is a breach of trust.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- How did MS sign my boot order even though I have linux? Because they&#039;re allowed to.&lt;br /&gt;
&lt;br /&gt;
- The reason you can&#039;t have linux on an Apple device is because of trusted boot; to startup linux, you would have to break the boot order, which would trigger security precautions.	But, get the keys, and you could probably do it.&lt;/div&gt;</summary>
		<author><name>Calvin</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_7&amp;diff=21474</id>
		<title>SystemsSec 2018W Lecture 7</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_7&amp;diff=21474"/>
		<updated>2018-01-31T05:54:33Z</updated>

		<summary type="html">&lt;p&gt;Calvin: /* Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Audio==&lt;br /&gt;
&lt;br /&gt;
[http://homeostasis.scs.carleton.ca/~soma/systemssec-2018w/lectures/comp4108-2018w-lec07-29Jan2018.m4a Lecture 7 Audio]&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
- You want cryptography whenever your rival can mess with bits. i.e see, modify, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- If you&#039;re talking about an isolated device, i.e single terminal for one person.&lt;br /&gt;
	what does crypto do for you? almost nothing. (ex: what if someone steals the system? if they mess with hardware?)&lt;br /&gt;
&lt;br /&gt;
- TLS, SSH most common protocols nowadays for detection.&lt;br /&gt;
&lt;br /&gt;
- #1 Rule: Never do your own crypto, including implementation.&lt;br /&gt;
&lt;br /&gt;
- Most common use case on an individual system: file/file-systems encryption&lt;br /&gt;
&lt;br /&gt;
- You can encrypt a file and send it, but if you have to send it, someone has to do something on the reciever side to decrypt it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Trusted Software (DRM): DRM: Digital Rights Management&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
- Almsot no scope for confidentiality, meant mostly for preventing messing with bits.&lt;br /&gt;
&lt;br /&gt;
- Trusted Boot:&lt;br /&gt;
&lt;br /&gt;
- TPM: Trusted Platform Model, this is the portion of a chip that is meant to hold secrets and can do computations without giving away info.&lt;br /&gt;
&lt;br /&gt;
	As long as TPM is safe, all data is safe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- An attacker must do 1 of 3 things if they want data access: break TPM, break the crypto, or get the keys.&lt;br /&gt;
&lt;br /&gt;
- Arguably, getting the keys might be the easiest, even for a company like Apple or Microsoft (Trick one of the human(s) with the keys).&lt;br /&gt;
&lt;br /&gt;
- MalwareBytes: 2 bad updates, essentially acting as a dedicated denial of service. This is a breach of trust.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- How did MS sign my boot order even though I have linux? Because they&#039;re allowed to.&lt;br /&gt;
&lt;br /&gt;
- The reason you can&#039;t have linux on an Apple device is because of trusted boot; to startup linux, you would have to break the boot order, which would trigger security precautions.	But, get the keys, and you could probably do it.&lt;/div&gt;</summary>
		<author><name>Calvin</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_7&amp;diff=21473</id>
		<title>SystemsSec 2018W Lecture 7</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_7&amp;diff=21473"/>
		<updated>2018-01-31T05:54:09Z</updated>

		<summary type="html">&lt;p&gt;Calvin: /* Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Audio==&lt;br /&gt;
&lt;br /&gt;
[http://homeostasis.scs.carleton.ca/~soma/systemssec-2018w/lectures/comp4108-2018w-lec07-29Jan2018.m4a Lecture 7 Audio]&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
- You want cryptography whenever your rival can mess with bits. i.e see, modify, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- If you&#039;re talking about an isolated device, i.e single terminal for one person.&lt;br /&gt;
	what does crypto do for you? almost nothing. (ex: what if someone steals the system? if they mess with hardware?)&lt;br /&gt;
&lt;br /&gt;
- TLS, SSH most common protocols nowadays for detection.&lt;br /&gt;
&lt;br /&gt;
- #1 Rule: Never do your own crypto, including implementation.&lt;br /&gt;
&lt;br /&gt;
- Most common use case on an individual system: file/file-systems encryption&lt;br /&gt;
&lt;br /&gt;
- You can encrypt a file and send it, but if you have to send it, someone has to do something on the reciever side to decrypt it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
**Trusted Software (DRM): DRM: Digital Rights Management**&lt;br /&gt;
&lt;br /&gt;
- Almsot no scope for confidentiality, meant mostly for preventing messing with bits.&lt;br /&gt;
&lt;br /&gt;
- Trusted Boot:&lt;br /&gt;
&lt;br /&gt;
- TPM: Trusted Platform Model, this is the portion of a chip that is meant to hold secrets and can do computations without giving away info.&lt;br /&gt;
&lt;br /&gt;
	As long as TPM is safe, all data is safe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- An attacker must do 1 of 3 things if they want data access: break TPM, break the crypto, or get the keys.&lt;br /&gt;
&lt;br /&gt;
- Arguably, getting the keys might be the easiest, even for a company like Apple or Microsoft (Trick one of the human(s) with the keys).&lt;br /&gt;
&lt;br /&gt;
- MalwareBytes: 2 bad updates, essentially acting as a dedicated denial of service. This is a breach of trust.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
- How did MS sign my boot order even though I have linux? Because they&#039;re allowed to.&lt;br /&gt;
&lt;br /&gt;
- The reason you can&#039;t have linux on an Apple device is because of trusted boot; to startup linux, you would have to break the boot order, which would trigger security precautions.	But, get the keys, and you could probably do it.&lt;/div&gt;</summary>
		<author><name>Calvin</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_7&amp;diff=21472</id>
		<title>SystemsSec 2018W Lecture 7</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_7&amp;diff=21472"/>
		<updated>2018-01-31T05:52:55Z</updated>

		<summary type="html">&lt;p&gt;Calvin: /* Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Audio==&lt;br /&gt;
&lt;br /&gt;
[http://homeostasis.scs.carleton.ca/~soma/systemssec-2018w/lectures/comp4108-2018w-lec07-29Jan2018.m4a Lecture 7 Audio]&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
- You want cryptography whenever your rival can mess with bits.&lt;br /&gt;
	i.e see, modify, etc.&lt;br /&gt;
- If you&#039;re talking about an isolated device, i.e single terminal for one person.&lt;br /&gt;
	what does crypto do for you? almost nothing. (ex: what if someone steals the system? if they mess with hardware?)&lt;br /&gt;
&lt;br /&gt;
- TLS, SSH most common protocols nowadays for detection.&lt;br /&gt;
- #1 Rule: Never do your own crypto, including implementation.&lt;br /&gt;
- Most common use case on an individual system: file/file-systems encryption&lt;br /&gt;
- You can encrypt a file and send it, but if you have to send it, someone has to do something on the reciever side to decrypt it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Trusted Software (DRM): DRM: Digital Rights Management&lt;br /&gt;
&lt;br /&gt;
- Almsot no scope for confidentiality, meant mostly for preventing messing with bits.&lt;br /&gt;
- Trusted Boot:&lt;br /&gt;
- TPM: Trusted Platform Model, this is the portion of a chip that is meant to hold secrets and can do computations without giving away info.&lt;br /&gt;
	As long as TPM is safe, all data is safe.&lt;br /&gt;
- An attacker must do 1 of 3 things if they want data access: break TPM, break the crypto, or get the keys.&lt;br /&gt;
- Arguably, getting the keys might be the easiest, even for a company like Apple or Microsoft (Trick one of the human(s) with the keys).&lt;br /&gt;
- MalwareBytes: 2 bad updates, essentially acting as a dedicated denial of service. This is a breach of trust.&lt;br /&gt;
&lt;br /&gt;
- How did MS sign my boot order even though I have linux? Because they&#039;re allowed to.&lt;br /&gt;
- The reason you can&#039;t have linux on an Apple device is because of trusted boot; &lt;br /&gt;
	to startup linux, you would have to break the boot order, which would trigger security precautions.&lt;br /&gt;
	But, get the keys, and you could probably do it.&lt;/div&gt;</summary>
		<author><name>Calvin</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_2&amp;diff=21416</id>
		<title>SystemsSec 2018W Lecture 2</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_2&amp;diff=21416"/>
		<updated>2018-01-16T20:05:48Z</updated>

		<summary type="html">&lt;p&gt;Calvin: /* Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Notes==&lt;br /&gt;
&lt;br /&gt;
openstack.scs.carleton.ca&lt;br /&gt;
&lt;br /&gt;
homeostasis.scs.carleton.ca/wiki&lt;br /&gt;
&lt;br /&gt;
nilofarmansourzadeh@cmail.carleton.ca (TA email)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate Grading Scheme:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
10% Participation&lt;br /&gt;
&lt;br /&gt;
20% Experiences&lt;br /&gt;
&lt;br /&gt;
20% Assignments&lt;br /&gt;
&lt;br /&gt;
20% Midterm&lt;br /&gt;
&lt;br /&gt;
30% Final&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Think Exercise:&#039;&#039;&#039; ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Secret to cold fusion, Need to keep secret and safe for 20 years. How do I do that?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Possible Solution:&#039;&#039;&#039;&lt;br /&gt;
: Minimal people (2) - both need to trust each other. Hard copy (clean print, paper and ink) locked away somewhere secure and dry. (safety deposit box in a bank, not hidden under a mattress). I have half of the documents, other guy has other half of the documents. Maybe I split my half of the documents again. Quarter in a safety deposit box, quarter in my house hidden away. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Need to know who wants this.&lt;br /&gt;
&lt;br /&gt;
Need to know how far they&#039;ll go to get it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Threat Modelling:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
	- Adversaries&lt;br /&gt;
&lt;br /&gt;
	- Their Capabilities&lt;br /&gt;
&lt;br /&gt;
	- Assume &amp;quot;reasonable&amp;quot; limits (nuclear weapon vs floods vs sledgehammer vs digital virus)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Threats/Adversaries: Oil Companies, Anarchists, Nation States, Militant Evironmentalists&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Capabilities:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
	- Who knows the secret exists? (If they don&#039;t know it exists, they won&#039;t come looking for it)&lt;br /&gt;
	i.e. once the mad scientist realized what he had, he started trying to hide it.&lt;br /&gt;
&lt;br /&gt;
	- Reverse Engineering: If you try to fake an &amp;quot;accident&amp;quot;, how do you falter reverse engineering from what you showed?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Defenses:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
	- Convince world secret doesn&#039;t exist.&lt;br /&gt;
&lt;br /&gt;
	- Splitting up the secret.&lt;br /&gt;
&lt;br /&gt;
	- Offline.&lt;br /&gt;
&lt;br /&gt;
	- Cryptography is not viable. 20 years down the line, computers may be able to break that encryption in seconds.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Risks:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
	- Disclosure.&lt;br /&gt;
&lt;br /&gt;
	- Loss of integrity (corrupted)&lt;br /&gt;
&lt;br /&gt;
	- Full Data Loss&lt;br /&gt;
&lt;br /&gt;
	- Is it better for it to be available (partial loss) on a corruption or completely unavailable (total loss)? &lt;br /&gt;
&lt;br /&gt;
- Should you even use digital storage? NO, too many risks.&lt;br /&gt;
&lt;br /&gt;
	- That being said, you can still use digital tools, so long as you completely destroy the tools used.&lt;br /&gt;
&lt;br /&gt;
	- What happens if you die? Is there a contingency plan?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security Tech:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
	- Lava Lamps for entropy (Cloudflare) (If I put a hidden camera in that room, and I get their source code, they&#039;re compromised)&lt;br /&gt;
&lt;br /&gt;
	- Anti Malware&lt;br /&gt;
&lt;br /&gt;
	- SE Linux&lt;br /&gt;
&lt;br /&gt;
	- Firewalls (It&#039;s designed to stop certain types of network traffic):&lt;br /&gt;
&lt;br /&gt;
: - Problems Arise: Sure bad guys might get stopped, but people may get angry since you blocked something they liked.&lt;br /&gt;
&lt;br /&gt;
: - Host&lt;br /&gt;
&lt;br /&gt;
: - Perimeter Defense (crunchy on the outside, chewy on the inside), once the perimeter gets bypassed (over, under, through), everything inside is wide open.&lt;br /&gt;
&lt;br /&gt;
: - Network&lt;br /&gt;
	&lt;br /&gt;
Security theater: All those vaults, bars, steel doors in a bank, just for show (there&#039;s probably nothing physical in there).&lt;br /&gt;
&lt;br /&gt;
: - Bank runs no longer exist. The banks are now government owned/protected. It&#039;s a confidence game.&lt;br /&gt;
&lt;br /&gt;
: - Security Theater is useless for computer/digital.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Homework: ==&lt;br /&gt;
CuLearn: List security techs you use/interact, and which ones do you not actually understand.&lt;/div&gt;</summary>
		<author><name>Calvin</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_2&amp;diff=21415</id>
		<title>SystemsSec 2018W Lecture 2</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_2&amp;diff=21415"/>
		<updated>2018-01-16T19:59:39Z</updated>

		<summary type="html">&lt;p&gt;Calvin: /* Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Notes==&lt;br /&gt;
&lt;br /&gt;
openstack.scs.carleton.ca&lt;br /&gt;
&lt;br /&gt;
homeostasis.scs.carleton.ca/wiki&lt;br /&gt;
&lt;br /&gt;
nilofarmansourzadeh@cmail.carleton.ca (TA email)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate Grading Scheme:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
10% Participation&lt;br /&gt;
&lt;br /&gt;
20% Experiences&lt;br /&gt;
&lt;br /&gt;
20% Assignments&lt;br /&gt;
&lt;br /&gt;
20% Midterm&lt;br /&gt;
&lt;br /&gt;
30% Final&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Think Exercise:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Secret to cold fusion, Need to keep secret and safe for 20 years&lt;br /&gt;
&lt;br /&gt;
Minimal people (2) - both need to trust each other. Hard copy (clean print, paper and ink) locked away somewhere secure and dry.&lt;br /&gt;
(safety deposit box in a bank, not hidden under a mattress). I have half of the documents, other guy has other half of the documents.&lt;br /&gt;
Maybe I split my half of the documents again. Quarter in a safety deposit box, quarter in my house hidden away.&lt;br /&gt;
Need to know who wants this. Need to know how far they&#039;ll go to get it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Threat Modelling:&lt;br /&gt;
&lt;br /&gt;
	- Adversaries&lt;br /&gt;
&lt;br /&gt;
	- Their Capabilities&lt;br /&gt;
&lt;br /&gt;
	- Assume &amp;quot;reasonable&amp;quot; limits (nuclear weapon vs floods vs sledgehammer vs digital virus)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Threats/Adversaries: Oil Companies, Anarchists, Nation States, Militant Evironmentalists&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Capabilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
	- Who knows the secret exists? (If they don&#039;t know it exists, they won&#039;t come looking for it)&lt;br /&gt;
	i.e. once the mad scientist realized what he had, he started trying to hide it.&lt;br /&gt;
&lt;br /&gt;
	- Reverse Engineering: If you try to fake an &amp;quot;accident&amp;quot;, how do you falter reverse engineering from what you showed?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Defenses:&lt;br /&gt;
&lt;br /&gt;
	- Convince world secret doesn&#039;t exist.&lt;br /&gt;
&lt;br /&gt;
	- Splitting up the secret.&lt;br /&gt;
&lt;br /&gt;
	- Offline.&lt;br /&gt;
&lt;br /&gt;
	- Cryptography is not viable. 20 years down the line, computers may be able to break that encryption in seconds.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Risks:&lt;br /&gt;
&lt;br /&gt;
	- Disclosure.&lt;br /&gt;
&lt;br /&gt;
	- Loss of integrity (corrupted)&lt;br /&gt;
&lt;br /&gt;
	- Full Data Loss&lt;br /&gt;
&lt;br /&gt;
	- Is it better for it to be available (partial loss) on a corruption or completely unavailable (total loss)? &lt;br /&gt;
&lt;br /&gt;
- Should you even use digital storage? NO, too many risks.&lt;br /&gt;
&lt;br /&gt;
	- That being said, you can still use digital tools, so long as you completely destroy the tools used.&lt;br /&gt;
&lt;br /&gt;
	- What happens if you die? Is there a contingency plan?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security Tech:&lt;br /&gt;
&lt;br /&gt;
	- Lava Lamps for entropy (Cloudflare) (If I put a hidden camera in that room, and I get their source code, they&#039;re compromised)&lt;br /&gt;
&lt;br /&gt;
	- Anti Malware&lt;br /&gt;
&lt;br /&gt;
	- SE Linux&lt;br /&gt;
&lt;br /&gt;
	- Firewalls (It&#039;s designed to stop certain types of network traffic):&lt;br /&gt;
&lt;br /&gt;
: - Problems Arise: Sure bad guys might get stopped, but people may get angry since you blocked something they liked.&lt;br /&gt;
&lt;br /&gt;
: - Host&lt;br /&gt;
&lt;br /&gt;
: - Perimeter Defense (crunchy on the outside, chewy on the inside), once the perimeter gets bypassed (over, under, through), everything inside is wide open.&lt;br /&gt;
&lt;br /&gt;
: - Network&lt;br /&gt;
	&lt;br /&gt;
Security theater: All those vaults, bars, steel doors in a bank, just for show (there&#039;s probably nothing physical in there).&lt;br /&gt;
&lt;br /&gt;
: - Bank runs no longer exist. The banks are now government owned/protected. It&#039;s a confidence game.&lt;br /&gt;
&lt;br /&gt;
: - Security Theater is useless for computer/digital.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Homework: CUlearn: List security techs you use/interact, and which ones do you not actually understand.&lt;/div&gt;</summary>
		<author><name>Calvin</name></author>
	</entry>
</feed>