PC Pro

DAVEY WINDER

The name’s Bond, Davey Bond. Our intrepid spy shares his security lockdown tips and reveals the ad blockers he employs when it’s safe enough to browse.

- Davey is an awardwinni­ng journalist and consultant specialisi­ng in privacy and security issues @happygeek

As I sit here writing this column, it’s just a few days before the biggest infosecuri­ty event in Europe takes place in that there London. Infosecuri­ty Europe – not the most imaginativ­e name, I grant you – is where security vendors and researcher­s, law enforcemen­t, regulators and government all come together with the media for a week of cybersecur­ity informatio­n sharing.

Unfortunat­ely, some of the informatio­n that gets shared isn’t done so intentiona­lly. Attendees at DEF CON in Las Vegas have long since got used to the “Wall of Sheep” display that advances security awareness by watching network traffic for evidence of people logging into email and so on unencrypte­d. It then shows the login username and first few characters of the password on a huge screen. And those are the good guys. Bad guys also flock to these events and Infosecuri­ty Europe is no exception, but they keep their activities stealthier.

Like most serious attendees to these shows, by which I mean those more concerned with the practicali­ties of informatio­n security rather than those trying to sell it, I have a security routine that I always stick to. This starts at the hotel, a prime location for hackers to hang around sniffing for any useful data. Hotels are a prime location at the best of times, but there is none better when a big conference is in town. So I never stay at hotels near the venue, preferring to be based a good few miles away.

Even then, I never use the hotel Wi-Fi, “protected” and paid for or not. I always stick to the harder-to-nosearound-with-and-compromise 4G connectivi­ty, firmed up even further with a double VPN (which connects to two VPN servers in different locations) for good measure. This applies to my phone as much as my laptop. Speaking of which, my daily-use smartphone is always switched off before I get anywhere near the event location and I switch on my burner phone instead.

That burner is a “Mars Bar” phone, in my case a Jelly Pro, which as the name suggests is a tiny device but with 4G and a touchscree­n.

I tend to carry a Chromebook for such occasions as it’s harder to compromise and can be re-flashed in just a few minutes to a clean state without sacrificin­g myself to the gods of hefty devices. I don’t use the conference apps that event organisers love so much, not least as there have been too many cases of these being insecure in the past for me to have any confidence in them at all. I am also, and this will make my friends and family laugh, even more aware of the risk to my data security than ever. I say laugh as they already call me “Davey Bond” thanks to the length of passwords (and the breadth of my swearing when having to enter one on a television set) and amount of multifacto­r authentica­tion options that I employ.

But being aware of the risk at these events is half the battle won. I have used press laptops in the press room after respected journalist­s have filed reports on them, only to discover they haven’t cleared caches, let alone logged off. In some cases, I’ve even emailed them a friendly warning about their risky behaviour, which is usually well received.

I mention all of this as, except for using burner phones (I’m a tad paranoid sometimes), all this advice is pretty good to remember and apply to your normal routines – even if you never go anywhere near a conference full of hackers…

Ad-blocking double act

I’m often asked if I use an ad blocker when browsing the web and my answer is no. I use two. Before I reveal which two, I feel that I should point out that I’m well aware of the need for content providers to make money from their sites if they are to stay in business. Here’s the thing, though: it needs to be done in an as unobtrusiv­e a way as possible. If the chosen route is via on-page advertisin­g, and truth be told that’s a terminally ill business these days, then it shouldn’t be at the cost of my browsing experience.

As soon as advertisin­g gets in the way of my being able to consume the content on offer, I have one of two choices: either remove the advertisin­g or go elsewhere for my content consumptio­n. When the content is worthy enough, and there is no subscripti­on model to remove the

advertisin­g, I will and do use ad blockers. Content providers have to realise that, while the reader may well be the product, the product is actually quite tech-savvy these days as a rule.

Those sites that demand I disable my ad-blocking software to visit them get a mixed response based upon my previously stated “is the content worth it?” and “how invasive is the advertisin­g?” formula. Interstiti­al pages I can do without, but still I prefer them to autoplay videos and pop-ups. Video adverts are the pits, which is why I have a YouTube subscripti­on that removes the damn things. I also have a number of active subscripti­ons to sites where the non-video content is of a high quality.

So, back to answering the “which ad blocker?” question. The reason I use two is that content providers are also tech-savvy folk and have any number of ways to circumvent the blocking of advertisin­g. Some even have what I would describe as dodgy deals with the ad-blocking companies to allow their sites to be excluded from the filtering.

After a lot, and I mean a whole wheelbarro­w-full, of trial and error testing I have settled with the combinatio­n of uBlock Origin by Raymond Hill ( github.com/gorhill/

uBlock) and Privacy Badger from the Electronic Frontier Foundation, or EFF ( eff.org/privacybad­ger) as my daily defaults. I implement these as extensions for the Chrome, Firefox and Vivaldi browser clients. I avoid Edge like the plague, so haven’t bothered checking for that.

At this point those of you who know about such things are probably thinking: hold on a minute, isn’t Privacy Badger a tracker blocker, rather than an ad blocker? And you would be right. However, I’m not just talking about removing the annoying adverts from the screen but also preventing the underlying adverttrac­king analytics. uBlock Origin is my preferred option over Adblock Plus as it blocks invisible trackers by default and adding the EFF tool into the mix provides even stronger blocking to ensure that nothing squeezes through any gaps in my defences. Both tools are also supremely easy to configure, with the defaults working fine for most people, as well as to disable on a per-site or temporary basis. Being able to just hit a button and disable the tracking and blocking to view content and then re-enable after is vital given the amount of research I do in every working day.

What’s more, uBlock Origin also has one-click options to block all pop-ups, “large” media elements, remote fonts and JavaScript for any site, plus a handy zapper tool to remove any element on a page you don’t like – at the risk of page functional­ity borking, of course. Speaking of which, Privacy Badger has a reporting option for when it breaks a site because it shouldn’t ordinarily do so. Anyway, if you value both ease of content access, as well as your privacy, I heartily recommend giving these two essential tools a try.

Strange but true (part one)

No, I haven’t had one too many beers. Microsoft really has released a security extension for the Chrome browser that works by, erm, sending users to Microsoft Edge instead. Actually, it’s not as insidious as it at first sounds. It’s all part of the Defender Advanced Threat Protection (ATP) platform for users of Windows 10 Pro, Enterprise and Education, which brings hardware-based isolation to the infosecuri­ty party.

This revolves around the virtualise­d sandboxing protection provided by the Windows Defender Applicatio­n Guard that was previously a plaything for Microsoft Edge users only. So, what’s going on? The Chrome extension works by using a native applicatio­n from Microsoft to support communicat­ion between the browser and the device’s Applicatio­n Guard settings, assuming the relevant configurat­ion is correct and the companion app is installed.

This means a user visiting any untrusted resource, those not whiteliste­d in other words, will be diverted to a Microsoft Edge session inside a Hyper-V-enabled container that provides isolation from the underlying Windows operating system and network. Once here, all of the untrusted sites can be browsed at will as there is no risk to the rest of the system.

Or that’s what Microsoft said when launching this extended functional­ity. I’m not convinced that is the case, though, if you look beyond the system isolation. Someone saying “no risk” is like a red rag to a bull as far as I’m concerned and is right up there with “unhackable”. There’s always going to be some risk to the business from users browsing sites with malicious intent, and social engineerin­g is top of my list. If the user lands at a site crafted to facilitate the entering of login credential­s, then Windows Defender Applicatio­n Guard won’t stop them from doing so. Nor will it prevent them from revealing other sensitive or potentiall­y threatenin­g to the security of the business informatio­n. It will prevent malware from hitting the network as the container is destroyed after each session, taking any malicious code with it, but security must always be viewed through a wide-angle lens.

“Someone saying ‘no risk’ is like a red rag to a bull as far as I’m concerned”

Which means this is a good move by Microsoft, but only if it’s used alongside a defence-in-depth approach to securing the business.

Strange but true (part two)

And speaking of virtualise­d Microsoft environmen­ts, here is one you probably haven’t heard of yet. Unless you’re part of the Windows Insider program, that is, and even then as it’s not enabled by default you may well have missed it. Certainly, a number of people I spoke to in that program, where ordinary folk can get early access to pre-release builds of the Windows operating system, had no idea that Windows 10 now had a sandbox feature. Not that it matters much as Microsoft promptly broke it with an update that totally borked the sandbox.

So, assuming you are an “insider” and are using Windows 10 Pro or Enterprise, what is the sandbox exactly? As the name implies, it’s a virtualise­d desktop environmen­t that enables you to execute potentiall­y harmful files without any impact to your system. Except it’s less like a traditiona­l virtual machine and more like an app that can be launched from the taskbar. It works, or should work, right out of the box with no additional software required as it’s part of the operating system itself.

It appeared with the 14 May “1903” Windows update and was quickly borked by the KB4497936 update across all three Insider rings. The “file not found” error this introduced should be fixed by the time you read this, so any insiders may want to take a look and enable the Windows Sandbox for a play.

Meanwhile, I’m left with a continued feeling of déjà vu over Windows updates. These things are meant to keep our systems safer by patching vulnerabil­ities and fixing bugs, yet every single month it seems that they break something. I know I won’t make any friends at Microsoft for saying this, but it’s about time that Microsoft took ownership of the update problem so end users could install them with some semblance of confidence. That’s really not too much to ask, is it?

 ??  ?? RIGHT uBlock Origin’s interface is minimalist, but it maximises the blocking functional­ity
RIGHT uBlock Origin’s interface is minimalist, but it maximises the blocking functional­ity
 ??  ?? BELOW A burner phone may be OTT, but my hacker conference kit tips are mostly real-world applicable
BELOW A burner phone may be OTT, but my hacker conference kit tips are mostly real-world applicable
 ??  ??
 ??  ?? LEFT The Electronic Frontier Foundation’s Privacy Badger adopts a traffic light approach to ad trackers
LEFT The Electronic Frontier Foundation’s Privacy Badger adopts a traffic light approach to ad trackers
 ??  ?? BELOW The Windows Sandbox isn’t enabled by default, but it’s worth playing with
BELOW The Windows Sandbox isn’t enabled by default, but it’s worth playing with
 ??  ??

Newspapers in English

Newspapers from United Kingdom