Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Privacy Your Rights Online

Italian ISP Hides Data Acquisition by Police 23

jaromil writes "It happened recently in Italy: the provider Aruba lied to a customer calling "power loss" a police action to acquire all data contained in the harddisks of the AUT/INV collective, keeping it secret for a whole year, while more than 30.000 people used its encrypted services for private comunications."
This discussion has been archived. No new comments can be posted.

Italian ISP Hides Data Acquisition by Police

Comments Filter:
  • by Bishop ( 4500 ) on Sunday June 26, 2005 @02:52PM (#12915224)
    The submitted summary is an incoherent run on sentence. If the article is important the editors should have take the time to re-write the user submitted summary. When Slashdot started that is what the editors did.
  • I don't regularly use encrypted mail, but I will have a need to do so in the future. How can I assure privicy upstream? Are there US compnies or laws that will make me more secure?
    • The point of encrypted email is you don't have to trust your ISP, or anyone, except the intended recipient.

      If you are trusting some upstream service to do the encryption it sorta defeats the purpose, as this example points out.

      Are there US compnies or laws that will make me more secure?

      No one can make you secure, except yourself.
      • If you are trusting some upstream service to do the encryption it sorta defeats the purpose, as this example points out.

        No, this example points out nothing of the sort. Aruba was purely an ISP hosting a server machine. They shut down the server and stole the SSL keys used for encryption. In no way was Austici relying on them to do anything other than respect the privacy of the box. However, this example does instruct us to not use SSL keys without a passphrase, despite the inconvenience associated with t
        • You don't get it. Your encryption key should be on your computer, not your ISPs, or a "privacy oriented email" service's machine.

          So it is exactly what I said. People trusting an upstream provider, Autistici, to do the encryption for them, Autistici, in turn, trusted their hosting provider not to tamper with the machine. It backfired, as is to be expected, with that many people having access to the private key.

        • by Bishop ( 4500 ) on Sunday June 26, 2005 @04:22PM (#12915730)
          Even if Austici used SSL keys with a passphrase Aruba could have still compromised the SSL software to copy all of the unencrypted data.

          The ISP Aruba was much more then an ISP hosting a server machine. Aruba was also providing the physical security of the server. Aruba had physical access to the server, the encryption keys, the encryption software, and the clear text data. Austici had to trust Aruba for the security of the entire system. If Austici wants a secure system they must keep the encryption physically secure. Usually this requires that the servers are in a location that they control and monitor.
  • by Bishop ( 4500 ) on Sunday June 26, 2005 @03:06PM (#12915310)
    We always suspected that they [the isp Aruba] weren't trustworthy...

    Why did they think their system was secure?

    This article highlights why physical security is so important. Cryptography is a work around for poor physical security. It is not a replacement. As the server held encryption keys the security of the system was completely dependant on the physical security of that server.

    Unfortunately this group hasn't learned their lesson:

    We will, as soon as possible, reactivate all the services on a new server, cleaned and sanitized, hosted by a different provider.

    This service will still be susceptible to the very same attack.
    • by Anonymous Coward
      Not just physical security. Too many people think that encryption == secure. It means absolutely nothing if your "secure" shopping basket is submitted through HTTPS if the web application is vulnerable to an SQL injection attack. Encryption only keeps the data secure as it is being moved from one place to another. It doesn't magically make either of the end-points secure. It's like assuming that just because prisoners arrive at a prison in handcuffs that you don't need to bother with locks on the doors
  • physical security (Score:3, Insightful)

    by TheSHAD0W ( 258774 ) on Sunday June 26, 2005 @03:34PM (#12915442) Homepage
    Physical security is a potential worry for any person, organization or service; many major security breaches involve physical rather than algorithmic security. (See "social hacking" [wikipedia.org].) The only real solution is to have your own server on your own property, with sufficient safeguards to prevent a "sneak-and-peek" from being successful.

  • by kawika ( 87069 ) on Sunday June 26, 2005 @03:36PM (#12915458)
    If that isn't a "power loss" I don't know what is. This is an answer worthy of the Oracle at Delphi.

    • You must go NOW and seek the Oracle with My directions. Be not fooled by any clueless saps claiming to be the TRUE server of our knowledge. Report your Progres every hour.

      Query the Oracle, USING proper syntax, and retrieve from it the stored procedure which you must execute in ORDER to ALTER the WINDOW of your mind, and receive the true VIEW. Only the SELECT will learn the correct answer, the rest will be INSERTed headfirst to the DUMP.

      Now back up on your two-wheel tape drive, exit the door, turn around,
  • Genoa G8 (Score:3, Interesting)

    by Exitar ( 809068 ) on Sunday June 26, 2005 @07:11PM (#12916665)
    It seems that Autistici/Inventati server hosted files about a trial that involve italian police abuses during Genoa G8...

Say "twenty-three-skiddoo" to logout.

Working...