top | item 41327783

Facebook Helped the FBI Exploit Vulnerability in a Secure Linux Distro (2020)

60 points| paravirtualized | 1 year ago |gizmodo.com

23 comments

order

neilv|1 year ago

> But they did so quietly and without notifying the developers of Tails afterwards of the major security flaw,

I don't immediately see an ethical problem with developing a zero-day exploit to catch a suspected/presumed very bad person like that, so long as: (1) it's used only for that one target; (2) you promptly start the responsible disclosure to upstream, and later public.

Unfortunately, the nice, clean ethics gets more complicated when that zero-day is temporarily in the hands of an organization that would presumably also use it for other targets.

Historically, some good and important government organizations have had complications, such as some personnel not believing in the rules and checks&balances under which they're supposed to operate, or personnel acting under direction of leadership or outside politicians who're misaligned with national laws and values.

If someone with the ability to develop a zero-day wanted to catch the very bad people, while not compromising all the lawful civil rights leaders and journalists who bother some questionable politician, how would they do that?

benterix|1 year ago

The vulnerable code was scraped in later releases so I don't think they could use this exploit against other people anyway.

2OEH8eoCRo0|1 year ago

I disagree with number 2 but otherwise agree with you. I'd prefer they do this but it's not a moral imperative IMO.

evgpbfhnr|1 year ago

Please add a "(2020)" to the title, only noticed after reading this and looking for details about the actual vuln to check if I had something to update...

jmclnx|1 year ago

Seems they sent a video with a trap in it, nice work by the FBI and Facebook and of course the victim who worked with the FBI to do this.

I think this is a better and easier way of finding these criminals then trying to pass laws to allow back-doors in the OS.

Interesting read

lucasRW|1 year ago

As usual, very hard to take a stance on that kind of stuff.

Yes, satisfactory to see the FBI being able to catch that type of scum.

But at the same time I can't help thinking that next, it's going to be the UK governement hacking distros to find out from which IP you posted a meme on Twitter.

mingus88|1 year ago

For every feel good story we hear of the bad guys getting caught, you bet there are dozens of stories in that murky grey area where we really don’t think either side are the good guys.

big-green-man|1 year ago

Well as others have pointed out, it's one thing to deliberately engineer a backdoor, its another to find an exploit in an existing system and then use it to stop a scumbag from hurting people. One is a total violation of someone's privacy and expectation, another is simply good ol police work.

So I'm happy with this outcome and even not opposed to the procedure, but I'm very much against deliberately engineering backdoors in systems. I think that position is pretty consistent and sound.

Malidir|1 year ago

As said, this is a very old article that has done the rounds on all the forums and social before.

All the major governments and the companies are known to have zero day exploits saved up for a rainy day.

Hence why countries like China ban Windows from government staff, and why USA ban Huwaei/hikvision etc in kind.

username81|1 year ago

I wonder how this is possible. As far as I understand, tails uses two VMs, so the entire VM uses tor without running the tor service. So how did it send the real IP if all the system's traffic is routed through an external Tor router? It's also quite surprising to me that the FBI spends so much resources on catching ordinary paedophiles, I'd expect such a high level of operations to be used to find high-level ransomware groups or something.

bauruine|1 year ago

Tails is a single machine that runs Tor you are mixing it up with Whonix which uses a gateway VM with Tor on it and a workstation VM that gets routed via the gateway.

dazld|1 year ago

You are confusing Tails with Whonix.

mingus88|1 year ago

Yeah I’d love to read the details of the exploit.

There’s a chance it became classified, if for example the exploit depends on the existence of FBI managed tor nodes, and we aren’t ready to let everyone know that the feds are all over the onion network infra.

firesteelrain|1 year ago

Kudos to Facebook for identifying a novel way to capture this criminal.

But every time I read these types of articles, I am not shocked to learn about the folks working at these tech companies seemingly against working with law enforcement whatsoever.

If it was your child, wouldn’t you want to help rather than stand on principles?

That’s what gets me every time.

richardwhiuk|1 year ago

- Which law enforcement agencies do you choose to work with?

- All of them?

- Just the US ones?

- What about employees who aren't US citizens?

- Which crimes are you happy to help enforce?

- To what extent are you happy to be used as a tool of the US criminal justice system?

- Do you want to enable the US government to have dragnet surveillance of the entire world?

Bear in mind, the US government is very keen on using it's power for economic advantage, and not just for criminal enforcement.

In some cases it's clear cut - it's clearly in Meta's interest to safeguard children on their platform.

In some cases it's clear that not co-operating is probably the right thing to do - e.g. protecting a journalist reporting on North Korea.

janice1999|1 year ago

You are surely not naive enough to think they will use this surveillance tool just against child predators, right?