-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security Leftovers


Posted by Roy Schestowitz on Sep 11, 2022


today's leftovers

FLAC 1.4.0 released


↺ Ukraine


Ukraine Warns Russian Cyber Onslaught Is Coming [iophk: Windows TCO]


↺ Ukraine Warns Russian Cyber Onslaught Is Coming


> The attacks, according to an assessment shared Friday by a top Ukrainian cyber official, are expected to include precision cyber strikes, combining virtual efforts against key systems with physical action targeting critical infrastructure as winter approaches.


> "We saw this scenario before,” Deputy Minister of Digital Transformation Georgii Dubynskyi told reporters on the sidelines of a cybersecurity conference in Washington.



OpenVPN is Open to VPN Fingerprinting


↺ OpenVPN is Open to VPN Fingerprinting


> VPN adoption has seen steady growth over the past decade due to increased public awareness of privacy and surveillance threats. In response, certain governments are attempting to restrict VPN access by identifying connections using "dual use" DPI technology. To investigate the potential for VPN blocking, we develop mechanisms for accurately fingerprinting connections using OpenVPN, the most popular protocol for commercial VPN services. We identify three fingerprints based on protocol features such as byte pattern, packet size, and server response. Playing the role of an attacker who controls the network, we design a two-phase framework that performs passive fingerprinting and active probing in sequence. We evaluate our framework in partnership with a million-user ISP and find that we identify over 85% of OpenVPN flows with only negligible false positives, suggesting that OpenVPN-based services can be effectively blocked with little collateral damage. Although some commercial VPNs implement countermeasures to avoid detection, our framework successfully identified connections to 34 out of 41 "obfuscated" VPN configurations. We discuss the implications of the VPN fingerprintability for different threat models and propose short-term defenses. In the longer term, we urge commercial VPN providers to be more transparent about their obfuscation approaches and to adopt more principled detection countermeasures, such as those developed in censorship circumvention research.



Investor lawsuit against SolarWinds over breach dismissed


↺ Investor lawsuit against SolarWinds over breach dismissed


> Investors sued the directors of the company, claiming they were aware of the risks that the firm's software posed, but failed to act to prevent devastating attacks that came to light in 2020. The attacks were given the moniker SUNBURST.


> The suit was filed on 4 November 2021 in the Delaware Chancery Court, by the Construction Industry Labourers Pension Fund, the Central Labourers' Pension Fund, and two individual investors.



Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction


↺ Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction


> Generative machine learning models have made convincing voice synthesis a reality. While such tools can be extremely useful in applications where people consent to their voices being cloned (e.g., patients losing the ability to speak, actors not wanting to have to redo dialog, etc), they also allow for the creation of nonconsensual content known as deepfakes. This malicious audio is problematic not only because it can convincingly be used to impersonate arbitrary users, but because detecting deepfakes is challenging and generally requires knowledge of the specific deepfake generator. In this paper, we develop a new mechanism for detecting audio deepfakes using techniques from the field of articulatory phonetics. Specifically, we apply fluid dynamics to estimate the arrangement of the human vocal tract during speech generation and show that deepfakes often model impossible or highly-unlikely anatomical arrangements. When parameterized to achieve 99.9% precision, our detection mechanism achieves a recall of 99.5%, correctly identifying all but one deepfake sample in our dataset. We then discuss the limitations of this approach, and how deepfake models fail to reproduce all aspects of speech equally. In so doing, we demonstrate that subtle, but biologically constrained aspects of how humans generate speech are not captured by current models, and can therefore act as a powerful tool to detect audio deepfakes.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Sat Jun 1 10:14:01 2024