Tenshinai wrote:
You haven´t thought it through enough. Having the face emulation software allowed internally is an enabling technology. You don´t need any kind of special access to exploit it.
Absolutely correct. If your operating environment is one MickeySoft Winblows. Stop dicking around and being screwed by MickeySoft. Move up to the most secure environment in the world. I have no doubt that Manticore's OS is Unix based. Where Haven's was, cough, blowing in the Win-blows.
Being a Linux guru. I assure you, I can lock the system down tighter than a witches cat. And I ain't talking about her feline.) And it wouldn't matter whether the program was installed "internally" or "externally." And I caution, that I am attempting to use the phrases 'internal' and 'external' in the sense that you do, admitting that I have absolutely no idea what you mean. I can intuit it, but that requires assumptions. In my world, regarding security, 'internal' and 'external' are ideas describing the nature and source of threats. For instance, an attacker originating from inside the company/environment (employees, officers, guests...) or an 'external' cyber attack (foreign terrorists, hackers). What I 'assume' you mean is what the security industry calls open and closed. Open/closed in a security sense, and not in the physical design sense. These are two very different concepts.
All of my important personal computer data, or my system, never becomes exposed to this type threat, because it is a completely closed system. What can be achieved from the inside is quite limited, lest 'physical' access.
Worse however, is that if someone is using a more advanced emulator, or something similar, the person on the receiving end cannot nearly as easily realise something is being used for spoofing rather than for convenience, if it´s "ok" to use it for convenience.
I am not quite sure I know what you mean here. Vulnerability to spoofing is possible from an open or closed system
if at any point the systems are connected. Soft or hard connected. The software that we are discussing is already onboard ship. If security can be compromised 'externally' then you've already lost the game (if at any point (widely encompassing) your external system communicates with your internal system)
If it´s not "ok" to use it at all internally, then instantly if someone see that something like that IS being used, it will cause alarms to go off, personal or tech-based or both.
These same alarms can be implemented on your internal system as well, if someone other than those with proper clearance, or in Linux-ese, permissions, initiate the program.
But alas, I think I know what you are considering. Being fooled by the emulation software is a real possibility. Even in the Honorverse it is often referenced that you don't know if someone is sending you real imagery. Remember Cerberrus?
This is why you NEVER EVER install certain types of software in a secure environment.
Tenshinai, you and I both know that there is no such animal existing with the nomenclature of 'secure environment,' unless it's closed, except to a single user.
And on a Windows system, any program can easily be exploited. But, as a part of your secure system, you only install software that was designed, in-house, from the outset as part of this secure system. vs third party software.
The problem with a program like this is that the normal use of the program by itself is a security risk, it doesn´t matter if in itself it has zero vulnerabilities.
Again, that's a limitation of both your OS, SA and system design.
If you were to use this in "your" ships, ok, then i aquire a copy. Then make an alternate version of that which mimics the original software enough that internal comm software wont see the difference, then i either need a few moles or someone to stuff some extra automated software onboard, doesn´t need to be in any of the high security areas of the systems even.
After that, i can wreak havoc in your fleets.
At least once, and probably a few times.
I don´t need more than that.
And that´s just the most blatant exploit.
What if i had those programs "fixed" to suddenly start switching people with uniforms out for nude pornstars(many options for various replacements here)? Set to do it at the right time and action, the amount of annoyance and/or temporary confusion it could cause is quite major.
Or it could be used for personal attacks on the most competent enemy leaders.
I also have a fair idea how such a program could be used for transmitting information covertly. I´ll keep the "how" for that to myself though.
And i already know that it´s "not that easy", but the point here isn´t that it easy, but that YOU are making it POSSIBLE for your enemies to exploit your own software.
Granted, I saw the possibility of miscreant use. Circumventing the effects of the emulator and Honor is appearing as she really is...naked. However, you only employ on a secure line, and others with proper clearance have more of an opportunity to circumvent, but that same clearance allows that possibility regardless of
any installed program.
If you've got moles, you've got rats. And any one particular piece of software would be your least worry.
Now, there are limitations to my knowledge regarding the ship's systems because obviously I do not know the ship's overall system design. And I would really enjoy discussing this with you, but
not in a public forum. I feel quite uncomfortable talking security in a public forum. It seems you do too...
I also have a fair idea how such a program could be used for transmitting information covertly. I´ll keep the "how" for that to myself though.
You have quite a few ideas of how it can be done! I won't say that I do too.