Hacker Newsnew | past | comments | ask | show | jobs | submit | elastine's commentslogin

From the article: "On average, the marijuana users who participated in the study consumed the drug three times per day."

^ Of course there's a brain decline if you smoke it 3 times a day. That's being perpetually high. If you drink alcohol heavily 3 times a day you'll also decline pretty rapidly.


Except there isn't....


Because only the rich can evade taxes in this way. Which means the middle class ends up paying a disproportionate amount of tax. Which is unfair.


If you think being fair is pulling those are better off down then I have nothing to argue with you.


Uber is proving to be one very shitty organization.


I think this is largely a hoax and they already have access to the said data.


https://datavibe.net/~sneak/20141023/wtf-icloud/

They do store drafts of documents transparently in iCloud and confirm that they will give content stored in iCloud to law enforcement.

http://images.apple.com/privacy/docs/legal-process-guideline...

If you look at the design of the Secure Enclave's Key Derivation Function it pulls in data from a unique ID burned in by the manufacturer and a small pin code provided by the customer. Apple claims it can not get the data because it knows neither the UID or the code.

However, the manufacturer of the Secure Enclave does/will know the UID and a user passcode can easily be brute forced. If law enforcement have enough leverage to get UIDs then the system is moot.


My impression of Apple's UID is that it's a physical unclonable function[1] whose output is directly connected to the key derivation circuitry. This means that there is, absent physically destructive attacks or side-channel vulnerabilities in the key derivation circuitry, no way to recover the UID/PUF output. Since PUFs typically get their values from random process variation, their values cannot be known before manufacturing. Since it can be used, in very well-defined operations with inherent rate limiting, but cannot be read out directly, there is no economically-feasible way to recover their values after manufacturing, either.

Of course, this is mostly speculation and would need some serious ChipWorks-style reverse engineering to determine if it's true, but that's my impression given what I've read from Apple's security documentation.

[1]: http://www.nxp.com/documents/other/75017366.pdf


> Since PUFs typically get their values from random process variation

How sure are we that this is the case, and how can we verify it? You can burn in whatever bits you want to the PUF. If there is a list, a product to UID mapping, a deterministic UID generation process or even PRNG that isn't strong enough the Secure Enclave falls.


Well, again, I can't be sure, and you can't verify without reverse engineering the chip.

But that's not how PUFs work. The whole point of a "physical unclonable function" is that it's not just a set of bits that can be programmed to an arbitrary value; it's a part of a circuit which, based on physical characteristics of the apparatus, deterministically generates a response to a given challenge. The idea is that there is no such list for the PUF internal values--they're not controllable, and it would be extremely difficult to read their internal state without destroying the chip. Making lists would be very awkward: according to the Apple iOS Security Guide[1], the KDF takes 80ms per passcode attempt. So, generating a list of PUF outputs for all 10,000 4-digit numeric passcode would take Apple ~14 minutes--and it must be done on each device.

So, it's theoretically possible that Apple spends 14 minutes per device making a list of PUF outputs given all 4-digit numeric passcodes. However, a user who uses any other passcode would be completely unaffected (except having the search space reduced by 10,000), and I consider it highly unlikely that Apple can afford 14 minutes per device just for potential nefarious use given the volumes they produce.

Also, note that almost all other keys are 'tangled' with the output of the PUF, so a PRNG failure is not likely to cause predictable keys, depending on the failure mode and what PUF stimuli Apple records.

Of course, this is all a moot point, as none of this is verifiable (at least, to me and you).

[1]: https://www.apple.com/ipad/business/docs/iOS_Security_Feb14....


Actually, it does not look like the UID is a PUF - although it's a very interesting idea!

"Unique ID (UID) - A 256-bit AES key that’s burned into each processor at manufacture. It cannot be read by firmware or software, and is used only by the processor’s hardware AES engine. To obtain the actual key, an attacker would have to mount a highly sophisticated and expensive physical attack against the processor’s silicon. The UID is not related to any other identifier on the device including, but not limited to, the UDID." - https://www.apple.com/ipad/business/docs/iOS_Security_Feb14....

> "To obtain the actual key, an attacker would have to mount a highly sophisticated and expensive physical attack against the processor’s silicon."

This is not true if the UID is generated in some way that allows pilfering by the manufacturer.

> So, generating a list of PUF outputs for all 10,000 4-digit numeric passcode would take Apple ~14 minutes--and it must be done on each device.

The threat model here is not Apple, but the manufacturer. In this case the options I mentioned earlier would allow very fast attacks that could be launched selectively at target devices later on.

> Of course, this is all a moot point, as none of this is verifiable (at least, to me and you).

Definitely not verifiable of falsifiable by you or by me. I would suggest however that the claims and reputation of the Secure Enclave is not deserved. Finally, in crypto, skepticism is a feature.


@xnull: interesting, my download of that file has slightly different text:

    The device’s unique ID (UID) and a device group ID (GID) are AES 256-bit keys *fused* into the application processor during manufacturing. No software or firmware can read them directly; they can see only the results of encryption or decryption operations performed using them. The UID is unique to each device and is not recorded by Apple or any of its suppliers.
(emphasis added)

That language, along with this gem later:

    The passcode is “tangled” with the device’s UID, so brute-force attempts must be performed on the device under attack
lead me to believe they're describing a PUF. By the way, can you save a local copy of that file? My SHA256 is b9d1f5290ebe56780af692e2b12037d6b7e085ef1f6050c1e27ea8426f94bfcc, what's yours?

>The threat model here is not Apple, but the manufacturer. In this case the options I mentioned earlier would allow very fast attacks that could be launched selectively at target devices later on.

Right, I understand. No matter what Apple says, you can't verify, so you can't trust.

>Definitely not verifiable of falsifiable by you or by me. I would suggest however that the claims and reputation of the Secure Enclave is not deserved. Finally, in crypto, skepticism is a feature.

Well, who am I to say whether Secure Enclave lives up to its hype? But definitely agreed about skepticism...


My digest agrees.

B9D1F5290EBE56780AF692E2B12037D6B7E085EF1F6050C1E27EA8426F94BFCC

I found the quote you've posted in my copy as well. The definition I selected was from the glossary at the bottom.

> "Tangled"

Seems to me to be referring to PBKDF2.


That's hardly surprising. Those who sold Africans into slavery were often other Africans.


The UK does not tax worldwide income. In fact, if you hold your money in an offshore account, you can declare yourself a "non-domiciled" UK person. This special category exempts you from all tax on foreign income in exchange for a small fee.

It is not for no reason that every corrupt Russian oligarch and oil baron and African dictator flocks to London.


>The UK does not tax worldwide income.

UK does not tax worldwide income based on UK citizenship, but it does tax worldwide income for all UK domiciled residents, which includes all citizenship-seeking immigrants.

Your trivia on the non-domicile status is interesting, but both the grandparent and myself have already mentioned it, and I specifically said that it's "irrelevant to this analysis".


It is hard to justify this prize as anything but a popularity prize.


It is fundamentally oppressive and undemocratic to deny free men the chance to voluntary come together to collectively bargain for their rights.

This collective bargaining is called a union.

What is your problem with a group of people choosing to organize this way?


It is fundamentally oppressive and undemocratic to deny free men the chance to voluntary come together to collectively set the prices for the services they're selling.

This collective bargaining is called price-fixing.*

This isn't a clear-cut issue of rights that can be settled on principle. Workers have been given the right to collectively fix prices through unions not because it's a fundamental freedom, but because it has been recognised that employees negotiate from a position of relative weakness to their employer.


Yes, but at the same time there are many more hedge funds canceling out the relative advantage of each trader.


Yes, but that makes the market as a whole more effective.


In what sense "more efficient"? There is nothing that says that just because some people have become better at making money the market as a whole is working better.


Your argument is predicated on the assumption that the rich use their wealth only for the "important forms" you mention. What you don't mention is how they are able to influence the political arena with their wealth. The influence of politics by a few is a very natural consequence of massive inequality, and is a zero-sum game. More political influence of the wealthy means less political influence of the poor.

You cannot divorce the economy from politics.


I don't disagree with your analysis, but this is not relevant to Krugman's argument nor my objections to it.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: