<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Posts on Gregory Alvarez</title>
		<link>https://www.alvarez.io/posts/</link>
		<description>Recent content in Posts on Gregory Alvarez</description>
		<generator>Hugo -- gohugo.io</generator>
		<language>en</language>
		<copyright>Gregory Alvarez - All Rights Reserved</copyright>
		<lastBuildDate>Fri, 19 Feb 2021 16:30:00 +0200</lastBuildDate>
		<atom:link href="https://www.alvarez.io/posts/index.xml" rel="self" type="application/rss+xml" />
		
		<item>
			<title>Living Like It&#39;s 99: No Social Media, No Smartphone</title>
			<link>https://www.alvarez.io/posts/living-like-it-s-99/</link>
			<pubDate>Fri, 19 Feb 2021 16:30:00 +0200</pubDate>
			
			<guid>https://www.alvarez.io/posts/living-like-it-s-99/</guid>
			<description>At the time of writing this article, I&amp;rsquo;ve been living without social media for 3 years and without a smartphone for 2 years. Everything started as an experiment motivated by my privacy concerns. I ended up living like that for an entire different reason: peace of mind. You can find a lot of people on internet that have tried this experiment, from a couple of days to an entire month.</description>
			<content type="html"><![CDATA[<p><img src="/img/color/l99.jpg" alt="Robot"></p>
<p>At the time of writing this article, I&rsquo;ve been living without social media for 3 years and without a smartphone for 2 years. Everything started as an experiment motivated by my privacy concerns. I ended up living like that for an entire different reason: peace of mind. You can find a lot of people on internet that have tried this experiment, from a couple of days to an <a href="https://www.youtube.com/watch?v=B0RVWU_nROk">entire month</a>. However I discovered that the brain dependencies created by social media and smartphones take a lot longer to go away (30 days for me). You can&rsquo;t really see the effects it has on your life unless you try this kind of experiment for a long time, because you will be stuck in the withdrawal phase that makes you crave dopamine.</p>
<p>Contrary to popular belief, I do not live in a cave where I spend my time coding without any social life, sorry guys ;) I did this experiment while having a busy professional and personal life: I traveled around the world, moved to a new city without knowing anyone, ran <a href="https://web.archive.org/web/20201218004325/https://www.duple.io/">my own software startup</a>, met new people and made new friends, etc&hellip; So it is possible to live your life the same way, or even better, without a smartphone or social media.</p>
<p>I will share with you my experience leaving social media and my smartphone, the tools I replaced them with, some tips and tricks, people’s reactions to my experiment, as well as some funny anecdotes.</p>
<h2 id="lets-start-with-why">Let&rsquo;s Start With Why</h2>
<h3 id="privacy">Privacy</h3>
<p>The original motivation behind this experiment was privacy. I&rsquo;m a professional hacker, the things I can do are scary and I&rsquo;m far from being the only one with these skills. <strong>Smartphones are a dream come true for people like me, little spy devices that are 24/7 on you, remotely accessible from anywhere around the world</strong>. Throw social media into the equation, and you can get inside the head of anybody, and make them do whatever you want. Yes, you should be scared. And that&rsquo;s even without mentioning all the other <a href="https://lithub.com/what-does-privacy-really-mean-under-surveillance-capitalism/">privacy</a> and <a href="https://the.ink/p/we-can-have-democracy-or-we-can-have">freedom</a> issues that come with <a href="https://techcrunch.com/2019/09/04/facebook-phone-numbers-exposed/">social media</a> and <a href="https://nrkbeta.no/2020/12/03/my-phone-was-spying-on-me-so-i-tracked-down-the-surveillants/">smartphones</a>.</p>
<h3 id="curiosity">Curiosity</h3>
<p>Another reason, which is less dark, was curiosity. I like to experiment and try new things in my life. I was curious about the idea of living without a smartphone and social media especially in a world more connected than ever. And if I didn&rsquo;t like the experiment, I could always go back to <a href="https://www.meta-nomad.net/avoiding-the-global-lobotomy/">zombieland</a>.</p>
<h3 id="planned-obsolescence">Planned Obsolescence</h3>
<p>The cherry on top was to stop paying each year for a new smartphone, that does nothing more than the previous one, just because the providers decided to <a href="https://en.wikipedia.org/wiki/Planned_obsolescence">sabotage old models</a> so they <a href="https://en.wikipedia.org/wiki/Batterygate">stop working</a>.</p>
<h3 id="peace-of-mind">Peace of mind</h3>
<p>This is for me the most important reason (even though I discovered it afterwards). The positive effects on your mind, being free from social media and smartphones, are incredible. More on it later.</p>
<h2 id="round-1-no-social-media">Round 1: No Social Media</h2>
<blockquote>
<p>&ldquo;Technology has solved old economics problems by giving us new psychological problems.&rdquo;<br>
Mark Manson, The Subtle Art of Not Giving a F*ck</p>
</blockquote>
<p>In 2018 I deleted my accounts from Twitter, Facebook, Instagram and WhatsApp. No coming back, no temptation to reactivate them later on. I kept LinkedIn on standby for professional use although it came close to being deleted as well. WhatsApp got replaced by <a href="https://signal.org/">Signal</a> because Facebook bought them, plus <a href="https://www.forbes.com/sites/parmyolson/2018/09/26/exclusive-whatsapp-cofounder-brian-acton-gives-the-inside-story-on-deletefacebook-and-why-he-left-850-million-behind/">they&rsquo;re not really big fan s of privacy</a>.</p>
<p>During that year I kept my smartphone, as I wanted to do the experiment gradually. This decision allowed me to discover something quite counter intuitive about social media and smartphones (more on it later).</p>
<p>From that point on I was reachable by SMS, call, email and Signal. I wasn&rsquo;t ready for what happened next. Fasten your seatbelts.</p>
<h3 id="people-thought-i-was-dead">People Thought I Was Dead</h3>
<p>The first reaction people had was to think something bad had happened to me, some of them even thought I was dead. Then something socially curious happened: everybody started speaking to each other on Facebook and WhatsApp to try to figure out what was wrong. Some of them even contacted my family multiple times. They all had my phone number, email address and other ways of contacting me. <strong>However, none of them did</strong>. It was like I had exited the matrix, and was living in another reality.</p>
<h3 id="trustworthiness">Trustworthiness</h3>
<p>I was told that I couldn&rsquo;t be trusted since people can&rsquo;t check online what I&rsquo;m doing when I&rsquo;m not around.</p>
<p>Yeah, you read that right.</p>
<p><strong>Society has been brainwashed to believe that privacy is something criminal. Sorry to disappoint, but privacy is a basic fundament of freedom and democracy. That&rsquo;s why the voting system is anonymous</strong> [1]. When people tell you &ldquo;<a href="https://write.privacytools.io/freddy/why-privacy-matters-even-if-you-have-nothing-to-hide">If you have nothing to hide, you have nothing to fear</a>&rdquo;, what they really mean is &ldquo;democracy is overrated, get over it&rdquo;.</p>
<p><em>[1] Privacy: you know who I am but not what I do. Anonymity: You know what I do but not who I am. The voting system uses both, privacy when you go vote, anonymity when they count the results.</em></p>
<h3 id="whatsapp">WhatsApp</h3>
<p>This was for me the biggest problem. <a href="https://seirdy.one/2021/01/27/whatsapp-and-the-domestication-of-users.html">Getting people out of WhatsApp</a> if they wanted to talk to me created a lot of friction. Some of them even stopped texting me because they had to open another app on their phone in order to write to me.</p>
<p>Yeah, you also read that right.</p>
<p>I don&rsquo;t miss WhatsApp, nor do I miss its endless group talks without anything useful. If you leave one of these groups people look at you as if you did something wrong. In the end I still had access to all the event&rsquo;s information I needed despite them being organized on WhatsApp. In regards to this, not having the app didn&rsquo;t change my life much.</p>
<p>A trick I’ve developed, when giving my contact info to new people, is to enter my phone number on their smartphone myself, and install Signal for them. This removed a lot of friction. I would then explain my experiment to them and tell them I can only be contacted via this app. I’ve always had a positive reaction. Everybody’s been curious and asking a lot of questions.</p>
<h3 id="and-then-nothing-happened">And Then Nothing Happened</h3>
<p>During the first weeks without social media, I felt off. As if I was missing out on something big that was happening. Like everybody was having fun except me. Once the <a href="https://joshcsimmons.com/quit-social-media/">withdrawal phase</a> went away, I realized that my life hadn’t changed that much. I was still doing the same things, talking to the same people, going to the same parties, etc&hellip; It was just more quiet and peaceful.</p>
<p><strong>I was no longer bombarded with pictures of everybody trying to fake a life they&rsquo;re not living for the sole purpose of impressing someone else: <a href="https://hbr.org/2017/04/a-new-more-rigorous-study-confirms-the-more-you-use-facebook-the-worse-you-feel">my life had just upgraded</a>.</strong></p>
<p>In the end, after everybody got over their initial shock and calmed down, it became normal for them to contact me using Signal, and life went on as usual.</p>
<h2 id="round-2-goodbye-smartphone">Round 2: Goodbye Smartphone</h2>
<p><img src="/img/color/l99-2.jpg" alt="Phone"></p>
<p>Unlike social media, smartphones are a lot harder to get rid off. They handle many more things than just simply communicating with people. I work all day long with a computer, most of what the smartphone was doing could be handled by my laptop. For the rest, I narrowed down my bare essential to Music, Pictures, GPS navigation and of course GSM calls.</p>
<h3 id="the-hardware">The Hardware</h3>
<p>You could solve these problems quite easily using multiple devices, however I wanted to be smart about it and not walk around with a luggage just to carry around all this stuff. After doing some research I figured out the perfect combination and I was even able to reduce the amount of things I had in my pockets.</p>
<p><img src="/img/color/l99-3.jpg" alt="Watch, GoPro and Card Phone"></p>
<h3 id="garmin-fenix-5-plus">Garmin Fenix 5 Plus</h3>
<p>For those of you who don’t know the Fenix, it’s one of the top sport smartwatches on the market. Full disclosure, this watch costs the price of an iPhone, and I’m not sponsored by anybody. The build quality is incredible, but the most impressive things are its features. It’s a standalone watch with full GPS navigation, Music, Audiobooks and much more. The keyword here is &ldquo;standalone&rdquo;, which means the watch is fully operational offline, without being connected to internet or a smartphone (which is quite rare).</p>
<p>Battery wise you can get 5-7 days out of the watch in normal use. GPS Navigation with Music over bluetooth costs 10% of battery per hour. It takes 2.5hrs to fully charge (15min for 10%). The battery can be <a href="https://www.youtube.com/watch?v=2o_F6NxtkAk">changed quite easily</a>, making the watch sustainable over the long run.</p>
<p>My Fenix is fully private because in the end <a href="https://www.businessinsider.fr/us/garmin-paid-multimillion-dollar-ransom-to-hackers-report-2020-8?op=1">everybody gets their data stolen</a>. It doesn’t connect to anything anymore and I transfer my <a href="http://garmin.openstreetmap.nl/">maps</a> and music via USB cable (don’t use the Garmin Maps, it works badly for long trips).</p>
<h3 id="music-and-audiobooks">Music and Audiobooks</h3>
<p>Having your music on the wrist is a new awesome experience, especially when you like to sing in the shower (the Fenix is 100m waterproof). The watch has multiple streaming apps such as Spotify and Deezer which automatically synchronize your playlists offline over WiFi. I started using the Fenix with Spotify but ended up using the integrated MP3 player. It consumes 50% less battery, doesn’t slow down the GPS navigation (probably due to Spotify’s DRM) and has a better interface.</p>
<p>The experience with audiobooks is also amazing, the watch can even handle podcasts.</p>
<h3 id="gps-navigation">GPS Navigation</h3>
<p><img src="/img/color/l99-4.jpg" alt="Fenix Navigation"></p>
<p>My only mode of transport is a motorcycle. I use the bicycle mount to secure the watch next to my mirror when I ride and I’ve done thousands of kilometers of road trips without any problem. Originally Garmin was a GPS brand so they know what they’re doing. When I configure the watch in motorcycle mode to use the backroads the results are incredible. Awesome roads lost in the wilderness,
tons of fun.</p>
<p><img src="/img/color/l99-5.jpg" alt="Fenix Turn Prompt"></p>
<p>The screen uses a <a href="https://en.wikipedia.org/wiki/Transflective_liquid-crystal_display">transflective memory-in-pixel</a>, the more sun there is the sharper you see the image. This is a very nice feature outdoor, however it makes the screen looks dull inside (not a problem for me). Contrary to what you may think, the size of the screen isn’t an issue while riding (there are models of the watch with a bigger screen like the 5X and the 6 line). The rare times I use a car I put my watch around the rearview mirror.</p>
<h3 id="its-not-google-maps">It&rsquo;s Not Google Maps</h3>
<p>The experience is not the same as using Google Maps and requires some time to adjust. You still have full turn by turn navigation that works fine, but using the watch as a main GPS requires you to be more aware of what you’re doing. This is good since using too much GPS navigation <a href="https://www.washingtonpost.com/opinions/ditch-the-gps-its-ruining-your-brain/2019/06/05/29a3170e-87af-11e9-98c1-e945ae5db8fb_story.html">destroys the spatial part of your brain</a>. <strong>Don’t surrender your life to the god of algorithms.</strong></p>
<h3 id="points-of-interests">Points of Interests</h3>
<p>The watch has an interface to search for points of interest. You can search by name or category, around you or in another location. You can access all <a href="https://wiki.openstreetmap.org/wiki/Points_of_interest">POIs</a> that come with the maps easily. I’ve traveled for leisure multiple times and I’ve only used the watch POIs. I was able to find everything I needed: the hotel I booked, bars, museums, etc&hellip;</p>
<h3 id="entering-an-address">Entering an Address</h3>
<p>The watch was designed to be used in combination with a smartphone. Garmin puts the interface to enter an address on the app, not on the watch. You can&rsquo;t search for an address on the Fenix itself (which with 5 push buttons would be painful anyway).</p>
<p>The original plan was to create an app on the watch for this, however I realized I didn’t need it. I found faster solutions to get to the same result:</p>
<ul>
<li>The first thing is I don’t enter an address that much. A lot of situations are handled by using the POIs. On multiple occasions my plans changed on the road and the search POIs was able to redirect me to the new location without any problem.</li>
<li>I plan my road trips in advance. I use GPS coordinates to transfer an address from <a href="https://www.openstreetmap.org/">open street map</a> to my watch before leaving. It is 10 times faster and simpler. You can see them as phone numbers for locations. The Fenix also supports GPX files for more complex road trips.</li>
<li>In 2 years I never had a situation where I needed to translate an address to a GPS coordinate on the road. However a simple solution is to ask somebody for a Google Map URL of the address, it includes the coordinates in it.</li>
<li>Just to be safe, I also built a service that converts an address to GPS coordinates via SMS. It took me 5 min to create (contrary to a Garmin App) in case I need it on the road one day. If you’re interested in using it, just shoot me an email.</li>
</ul>
<p>Overall the fact that Garmin didn’t include an interface on the watch to search for an address isn’t a problem. I can enter one on the Fenix in any circumstance with the hacks listed above. One day, if I find the time and energy to do it, I will make a Garmin App to add the address interface on the watch.</p>
<h3 id="fun-facts">Fun Facts</h3>
<p>Technology is amazing, but if you don’t know how it works behind the curtains it’s indistinguishable from magic. The GPS we use everyday combines a lot of complex technologies under the hood. The satellites use the <a href="https://en.wikipedia.org/wiki/Theory_of_relativity">Therory of Relativity</a> from Einstein to compensate for time dilation (time goes faster for the satellites than us). Without it the GPS system would <a href="https://en.wikipedia.org/wiki/Global_Positioning_System#History">drift 10km per day</a>.</p>
<p>The coordinates system was invented <a href="https://en.wikipedia.org/wiki/Geographic_coordinate_system#History">2000 years ago</a>, but the thing that impresses me the most is how people navigated around the world by looking at the stars, with just a <a href="https://www.youtube.com/watch?v=yioZhHe1i5M">sextant or astrolabe</a>. Today we can’t even find the Starbucks located 2 blocks away without using our smartphone.</p>
<h3 id="pictures">Pictures</h3>
<p><img src="/img/color/l99-6.jpg" alt="GoPro Hero Session 5"></p>
<p>The first thing you realize when you no longer have a smartphone is that you don’t feel the need to take pictures of everything. <a href="https://www.youtube.com/watch?v=JfjkiTB1fHQ">You just enjoy the moment</a>. Yes, I’m talking to you people who take pictures of all your meals&hellip; just eat your food.</p>
<p><strong>Life is a full contact sport, don’t watch it through a 5 inch screen.</strong></p>
<p>For the rest, I use a GoPro Hero5 Session. I chose this model (which was discontinued, but <a href="https://meetpolaroid.com/polaroid-cube/">similar things</a> exist) because of its size, waterproofing (10m) and minimalism. It’s just point and click. No screen to redo the shot if you missed something. It lets you enjoy the moment more.</p>
<p>It has 2-3 hours of battery, but I’ve never run out of it. Unfortunately <a href="https://www.ifixit.com/Teardown/GoPro+Hero4+Session+Teardown/44307">you can’t change the battery</a>, which makes it not that sustainable over the long run.</p>
<p>Quality wise the GoPro records very good video up to 4K in good light. The low light is bad and the pictures are average. I ended up recording videos more than taking pictures, after a while you get used to the camera and frame your shots accurately without a screen.</p>
<p>Even though it is really small, I don’t always carry the GoPro around.</p>
<h3 id="gsm-calls">GSM Calls</h3>
<p><img src="/img/color/l99-7.png" alt="Card Phone"></p>
<p>I started with a <a href="https://en.wikipedia.org/wiki/Nokia_100">Nokia 100</a> however this thing is enormous and I was always forgetting it everywhere. I switched to a card phone: a credit card size GSM phone. There are a lot of models out there. If you buy one, make sure that it doesn’t run on Android.</p>
<p>I use a <a href="https://www.youtube.com/watch?v=EhH-TBiqIsM">Aeku M5</a>. It fits inside my <a href="https://bellroy.com/products/slim-sleeve-wallet/leather_default/red_earth">slim wallet</a>, has 3 days battery, a kill switch and bluetooth. The sound quality is the same as any other smartphone. The battery on card phones is quite standard, you <a href="https://www.youtube.com/watch?v=JZemd3zOywk">can change it easily</a>.</p>
<p>Sometimes I forget that it’s not really common and I freak out everyone around me when I get my phone out of my wallet to answer a call. It’s quite funny.</p>
<p>I use the card phone more as a last resort, since I prefer to use Signal for my daily calls and messaging. The GSM network is quite bad for privacy. All the <a href="https://en.wikipedia.org/wiki/ECHELON">calls and SMS are analyzed</a>, can be <a href="https://computerangelgeeks.blogspot.com/2017/04/how-to-build-your-own-gsm-bts-with_8.html">intercepted</a> and <a href="https://homepage.divms.uiowa.edu/~comarhaider/publications/LTE-torpedo-NDSS19.pdf">triangulated</a> by anybody. <a href="https://syssec.kaist.ac.kr/~yongdaek/doc/fookune_ndss_gsm.pdf">Your position can be traced</a> when your phone is on (no call required contrary to what Hollywood taught you). This also applies to smartphones, they use the same GSM network.</p>
<h3 id="battery">Battery</h3>
<p>Since the batteries of the hardware listed above are so small and have a long autonomy, I can go weeks without a wall plug using a simple <a href="https://www.anker.com/products/variant/powercore-5000/A1109031">USB charger</a>. This has been quite nice and practical when traveling.</p>
<h2 id="social-and-psychological-effect">Social and Psychological Effect</h2>
<blockquote>
<p>&ldquo;Nothing vast enters the life of mortals without a curse.&rdquo;<br>
Sophocles</p>
</blockquote>
<p>When I first told people I was going to switch from a smartphone to a &ldquo;dumb phone&rdquo;, people looked at me as if I had just spoken Chinese: &ldquo;How are we going to communicate with you?&rdquo;. But what they really meant was &ldquo;How are you going to answer our 24/7 text messages instantly?&rdquo;.</p>
<h3 id="instant-access">Instant Access</h3>
<p>Technology has given us instant access to everything. From internet with all of humanity’s knowledge, to food delivery at our door, or even cat videos, you have an app for it. But technology has also given everybody access to you, and that’s bad. Not everything requires an instant response, nobody will die if you answer a text message later today or even tomorrow. Live your life.</p>
<h3 id="human-interaction">Human Interaction</h3>
<p>Texting was easy with the smartphone, so talking to people over messages was relatively simple. However when I switched to a &ldquo;dumb phone&rdquo;, texting became painful, unless I was on my computer (Signal has a desktop app).</p>
<p>So I started calling people&hellip; and quickly discovered that a lot of them have a call phobia, as if human interactions were toxic.</p>
<p>Not in the sense that they’d be busy and would call me later. But in the sense that they wouldn’t pick up, only to text me 5 seconds later to start the conversation. If I tried to call them back, same thing again. They don’t want to talk, they want to text.</p>
<p>We’ve reached a dangerous level in society where people are afraid of human interaction, refusing a phone call because it makes them interact more humanly and with less control. Texting gives you more reflection on what you’re gonna say than a real and instant conversation.</p>
<h3 id="its-not-social-media-fault">It&rsquo;s Not Social Media Fault</h3>
<p>Everybody blames social media for the psychological downsides of technology. But having experienced life without it for quite a while now, having used a smartphone and a &ldquo;dumb phone&rdquo;, I’ve discovered a big counter intuitive truth, that the real problem is being online: <strong>it’s the smartphone fault</strong>.</p>
<p>Social media are nice tools with real added benefits when you use it with moderation, like everything else in life. The problem is that having a smartphone in your pocket 24/7 connected to everything makes you overdose.</p>
<p>Don’t get me wrong, social media still has a lot of bad sides which for me outweigh the good it provides. I think <strong>this is a perversion due to the people who run them</strong> rather than due to the concept in itself. However <a href="https://www.cambridge.org/core/journals/business-ethics-quarterly/article/ethics-of-the-attention-economy-the-problem-of-social-media-addiction/1CC67609A12E9A912BB8A291FDFFE799">the economy of attention</a> can only get you if you are online, and that’s where the smartphone comes in.</p>
<p>And don’t try to kid yourself by blocking internet on your devices, it never works. I went through two withdrawal phases of 30 days each (social media and smartphone), and it was violent. At one point I was going through the settings on my watch looking for dopamine in the middle of a conversation sitting at a restaurant. Their systems have been designed by experts who study psychological and social behavior all day long, and they do a great job at keeping you in them. <strong>Like a drug addict, you are going to want your dopamine shot and turn internet back on.</strong></p>
<h2 id="peace-of-mind-1">Peace of Mind</h2>
<blockquote>
<p>&ldquo;All of humanity&rsquo;s problems stem from man&rsquo;s inability to sit quietly in a room alone.&rdquo;<br>
Blaise Pascal</p>
</blockquote>
<p>This was a discovery for me, as I didn’t expect that much life improvement before and after leaving the smartphone. And even if there was improvement with social media as well, it wasn’t the same. It’s in these little experiments that you realize the toxicity of things you use everyday. Technology and progress are awesome things, but they have their bad side too. <strong>The funny thing is that we are so <a href="https://www.vogue.com/article/parentings-new-frontier-no-smartphones">addicted to them</a> that it requires a tremendous effort just to realize it.</strong> A lot of people around me don’t understand how I can live my life like that, they tell me they will never do it. What they don’t realize is that we all used to do it, smartphones have only been mainstream these last 10 years. So unless you’re ten, you’ve lived your life just fine without it.</p>
<p>Life is not just more peaceful without a smartphone, it has great effects on your productivity too. More ideas, better results, memory, concentration&hellip; Most of the good ideas I have brainstorming are during these moments where everyone’s on their smartphone, waiting in line, commuting on the subway, etc&hellip; These &ldquo;waiting&rdquo; moments when you can instead <a href="https://www.theguardian.com/lifeandstyle/2014/jul/19/change-your-life-sit-down-and-think">let your mind go free and wonder</a>.</p>
<p>Opening your phone every time you are bored <a href="https://cognitiontoday.com/phone-addiction-coping-solutions-research-statistics/">kills your creativity and imagination</a>.</p>
<p>I’ve been on both sides of the mirror, and this side is better. Don’t take my word for it, just try and see for yourself. After 3 years without social media and 2 years without a smartphone, I can tell you that I may go back to social media one day, however I will never have a smartphone again.</p>
]]></content>
		</item>
		
		<item>
			<title>High Security, Plausible Deniability and Two Factor Encryption: You&#39;re the Weak Link</title>
			<link>https://www.alvarez.io/posts/two-factor-encryption/</link>
			<pubDate>Thu, 19 Nov 2020 16:30:00 +0200</pubDate>
			
			<guid>https://www.alvarez.io/posts/two-factor-encryption/</guid>
			<description>Security is an illusion, especially with computers. The systems are so complex, handled by so many different people that nobody really has a good idea of how everything works. Even the best specialists have knowledge gaps: software, hardware, etc&amp;hellip; This creates a security nightmare: breaking stuff is trivial, fixing the systems is nearly impossible.
High Security Systems Still Exist There are systems that are protected against nearly all attacks. Their main philosophy is not to fix the security issues but to prevent an attacker from accessing the system in the first place.</description>
			<content type="html"><![CDATA[<p>Security is an illusion, especially with computers. The systems are so complex, handled by so many different people that nobody really has a good idea of how everything works. Even the best specialists have knowledge gaps: software, hardware, etc&hellip; This creates a security nightmare: breaking stuff is trivial, fixing the systems is nearly impossible.</p>
<h2 id="high-security-systems-still-exist">High Security Systems Still Exist</h2>
<p>There are systems that are protected against nearly all attacks. <strong>Their main philosophy is not to fix the security issues but to prevent an attacker from accessing the system in the first place.</strong> You can&rsquo;t hack something that&rsquo;s not there. However these systems are painful to use, especially for their lack of internet connection. Here are the main techniques used in a high security system:</p>
<ul>
<li>
<p><strong>Air Gapping</strong>: The device can&rsquo;t connect to anything that is not physically plugged into it. No internet, wifi, bluetooth, speaker, microphone, webcam. Anything that can communicate with the outside world is physically removed from the electronic device.</p>
</li>
<li>
<p><strong>Non Contamination Protocol</strong>: Air Gapping is not sufficient (<a href="https://en.wikipedia.org/wiki/Stuxnet">stuxnet</a> is a good example of why it isn&rsquo;t). Everything plugged into the air gapped device (like usb keys) can&rsquo;t be plugged anywhere else. No exceptions. This prevents any information from getting out. I would even recommend not to plug anything that comes from another device (stuff like stuxnet or ransomware can still make some damage).</p>
</li>
<li>
<p><strong>Physical Protection</strong>: Non-contaminated air gapped devices are impossible to attack remotely. The only way is to access them physically. Having the electronic device hidden in a place that is difficult to access (e.g. in a safe) will protect it better.</p>
</li>
<li>
<p><strong>Full Disk Encryption</strong>: Physical Protection is not foolproof. An attacker can still get access to it with enough resources. To protect the information inside your device, encrypt its entire content. Not all types of encryption are made equal, we will talk about it later in this article.</p>
</li>
<li>
<p><strong>Tamper Evident System</strong>: The last remaining attack on an electronic device, after you&rsquo;ve already used all of the above techniques, is to tamper it. The main goal is to access the encryption key when it is entered. Using tamper evident techniques (hardware and software) will alert you that somebody has modified your device to access your password (more about it in Two Layers of Encryption below).</p>
</li>
<li>
<p><strong>Backup</strong>: The last remaining problem is system failure. As long as your backups follow all of the above techniques, you can have as many as you want. Store them in a different location for increased safety.</p>
</li>
</ul>
<p><strong>Security is more about how you use the hardware/software rather than having a secure device in itself. It&rsquo;s more about protocol than technology.</strong></p>
<p>I have seen classified environment with less security than the one just presented. Using a device with all of the above techniques will guarantee an electronic fortress. However this creates a big problem: <strong>you become the information&rsquo;s weak link</strong>. It means that an attacker will no longer try to hack or decrypt your device, but instead will threaten you in order to access the information inside it.</p>
<h2 id="plausible-deniability">Plausible Deniability</h2>
<p><img src="/img/color/2FE.png" alt="Rubber-hose cryptanalysis">
<em><a href="https://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis">Rubber-hose cryptanalysis</a> from <a href="https://xkcd.com/538/">xkcd</a></em></p>
<p>To prevent being compelled to reveal your passwords, somebody invented <a href="https://en.wikipedia.org/wiki/Deniable_encryption">Deniable Encryption</a>. Basically you have two passwords: when you enter the first one the information decrypted is different than when you enter the second one. You use your device with the second password to work on the sensitive information (which can&rsquo;t be accessed using the first password). In case somebody threatens you, you give them the first password. They will decrypt your device and see that there is no information (or if there is, info that is not sensitive).</p>
<p>In practice Plausible Deniability is problematic:</p>
<ul>
<li>
<p>Tools and techniques exist to detect the presence of a secondary password (Deniable Encryption).</p>
</li>
<li>
<p>If your attacker sees that the system can use plausible deniability, they may not believe that there is only one password and therefore may continue to threaten you until you reveal the second one.</p>
</li>
<li>
<p>It will be harder for you to pass lie detection tests since you are still able to access the sensitive information using a secondary password.</p>
</li>
</ul>
<p>What you really want, if threatened, is not to be physically able to unlock your device. If you can&rsquo;t decrypt the information, nobody has a reason to threaten you.</p>
<h2 id="two-factor-encryption">Two Factor Encryption</h2>
<p>Two Factor Encryption uses your password in addition to something you possess to generate the encryption key of your device. In general these secondary factors look like USB keys. To decrypt the information, you need your password (50% of the key) and some information you don&rsquo;t know, stored/calculated by your secondary factor (the other 50% of the key).</p>
<p>You can&rsquo;t open your device without these two elements: your password and the secondary factor.</p>
<p>The beautiful thing is that if you break the secondary factor, you won&rsquo;t be able to access your device and its backups. You can&rsquo;t be compelled to decrypt the information, because you simply can&rsquo;t: your password, which you can now freely communicate to your attacker, will not be enough.</p>
<p><strong>Using Two Factor Encryption creates a physical &ldquo;red button&rdquo; which, if pressed, will destroy all access to the information in your devices (even offline backups stored in different locations).</strong></p>
<p>This also has the side effect of preventing you from accessing your device&rsquo;s information ever again. This is one disadvantage of Two Factor Encryption over Plausible Deniability, which is that you can&rsquo;t access your data after the attacker is done with you. However if you&rsquo;re handling sensitive information, it is very likely that you&rsquo;d rather have it destroyed than letting it fall into the wrong hands.</p>
<h2 id="yubikey">YubiKey</h2>
<p><img src="/img/color/2FE-2.png" alt="YubiKey"></p>
<p>A nice, affordable second factor for your encryption is a <a href="https://www.yubico.com/">YubiKey</a>. However there is no straightforward manual on how to use it, and the key has quite complex modes and functionalities.</p>
<p>If you are not a technical person, I will recommend using the <a href="https://support.yubico.com/hc/en-us/articles/360016614980-Understanding-Core-Static-Password-Features">password mode</a>. It is not as safe as the challenge mode, but it will be simpler to use and to configure.</p>
<p><strong>Password Mode</strong></p>
<p>The YubiKey can act as a usb keyboard. When the button is pressed, it will send a combination of keys (a kind of password) as if someone was typing. This makes it compatible with everything that requires a typed password. However using this mode implies that the 50% of the key coming from your 2FE will be the same across all devices. If it is intercepted it will drastically reduce the security.</p>
<p>To use the password mode, when prompted to your login information, enter your password (the thing you know), then plug your YubiKey and press the button. It will &ldquo;type&rdquo; the rest of the &ldquo;password&rdquo; (the thing you possess but don&rsquo;t know). You can then access your device.</p>
<p>In this scenario the thing you know is 50% of the password, the other 50% of it (which you don&rsquo;t know) is stored on your YubiKey and typed for you when you press the button.</p>
<p><strong>Challenge Mode</strong></p>
<p>The challenge mode is safer than the password mode, however it is more complex to configure and use. The information received from the YubiKey (the 50% of the key that comes from the 2FE) is different for each device. If it is intercepted, it will not compromise the security of other devices.</p>
<p>To use the challenge mode, your encryption software has to be compatible with it (contrary to the password mode which works with everything). When prompted to your login information, enter your password, and then the software will send a challenge (a phrase or an id you pre-configured) to the YubiKey which will respond with the missing 50% of the encryption key. The combination of the two elements (your password and the 2FE response), creating the encryption key, will unlock your device.</p>
<p>The advantage of the challenge mode is that if you configure a different challenge (phrase or id) for each device you will have a different response each time, making your encryption key unique on all your devices and backups. This increases the security a lot in case one of them is compromised.</p>
<h2 id="not-all-encryptions-are-made-equal">Not All Encryptions Are Made Equal</h2>
<p>Cryptography may be the hardest thing in security. If you screw it up, nobody will come and tell you about it, and  you will pay the consequences later on.</p>
<p><strong>Serpent Encryption Algorithm</strong></p>
<p><a href="https://en.wikipedia.org/wiki/Serpent_(cipher)">Serpent</a> was part of the finalists of the <a href="https://en.wikipedia.org/wiki/Advanced_Encryption_Standard_process">AES competition</a>. It was judged to be the most secure algorithm of them all, but <a href="https://www.schneier.com/wp-content/uploads/2016/02/paper-twofish-final.pdf">was discarded due to its speed</a>. However 20 years later, the computational power of everything exploded. Today the difference in speed between AES and Serpent doesn&rsquo;t matter anymore, however the  difference in security still does. This is part of the reason why you should use Serpent everywhere ;)</p>
<p><strong>Truecrypt</strong></p>
<p>Truecrypt is an awesome tool that has been proved to be <a href="https://en.wikipedia.org/wiki/TrueCrypt#Legal_cases">complicated to break</a>. The tool was suddenly discontinued in 2014 in what seemed to be due to <a href="https://www.reddit.com/r/sysadmin/comments/26pxol/truecrypt_is_dead/">third party pressure</a>. An independent audit was financed by the <a href="https://www.opencryptoaudit.org/">community</a> in 2013. The <a href="https://opencryptoaudit.org/reports/TrueCrypt_Phase_II_NCC_OCAP_final.pdf">summary</a> was released in 2015, showing &ldquo;no evidence of deliberate backdoors, or any severe design flaws that will make the software insecure in most instances&rdquo;.</p>
<p>Given that it&rsquo;s complicated/impossible to break, that it&rsquo;s been audited without any security flaw found, and the pressure put on the developers to stop the project: <strong>it&rsquo;s safe to say that you should use it everywhere</strong>.</p>
<p>You can find Truecrypt <a href="https://github.com/DrWhax/truecrypt-archive">here</a>, the last version is 7.1a. Use the 3 ciphers cascade encryption mode.</p>
<p>If you use the hidden volume feature, be careful with older backup versions of your file container. The difference between the older version of the container and the newer version will reveal the use of an hidden volume (bytes will change where there is supposedly no data). Try to backup the content of your container inside a new one, so  that there is no match at all between the backups and the original container.</p>
<p><strong>Password</strong></p>
<p>The last line of defense for your data is your password. Depending on the system you are using, the encryption key will be encrypted using your password, or directly derived from it. This means that even if you are using an unhackable electronic fortress, your security will drop to zero if you use a password like &ldquo;1234&rdquo;.</p>
<p>The short answer is to use a unique and long passphrase for each of your device/account. You can find more details on password safety in our podcast episode &ldquo;<a href="https://www.conversationwithahacker.com/episodes/episode-1-your-password-is-not-that-safe/">Your Password Is Not That Safe</a>&rdquo;.</p>
<h2 id="two-layers-of-encryption">Two Layers of Encryption</h2>
<p>A Tamper Evident System will warn you that your device has been modified to steal the encryption key (or your password). However most of them will not block the attack and will warn you once it&rsquo;s already too late.</p>
<p>Practically speaking, having a Tamper Evident System will probably compromise your encryption key. That&rsquo;s why you need 2 layers of encryption: the first one is a full disk encryption for the Tamper Evident System, the second one is a file container (like a Truecrypt container) for your data (unlocked once everything is notified as normal). From a user&rsquo;s perspective it means entering two passwords instead of one.</p>
<p>In case of a breach, you will be notified by the system before entering the second password and therefore you will be able to stop before doing so. The attacker will be left with an encrypted file container (which if you use Truecrypt, has a better security than the full disk encryption). Your data will remain safe and inaccessible.</p>
<h2 id="2fe-subtilities">2FE Subtilities</h2>
<p>Using Two Factor Encryption may be tricky. The security of the entire system relies on a small USB device and a password. Handled wrongly, it may have devastating consequences.</p>
<p><strong>Train To Break It</strong></p>
<p>Breaking the 2FE device may be difficult (YubiKeys are quite solid). When you will need to split the device in half, you may not have a lot of time. It may be a good idea to practice doing it with another device.</p>
<p><img src="/img/color/2FE-3.png" alt="YubiKey Circuit">
<em>YubiKey Circuit from <a href="http://www.hexview.com/~scl/neo5/">hexview.com</a></em></p>
<p>Depending on which model you have, you may need to break it at a different place. What you want is to snap the microchip containing the information. If the 2FE isn&rsquo;t broken correctly, your attacker will still be able to access it.</p>
<p><strong>Always On You</strong></p>
<p>Always have the 2FE device on you. In case there&rsquo;s a problem (e.g. kidnapping), you will have a small window of time to break it. Between the stress and adrenaline from a difficult event, it will be hard to focus. Train mentally to have the reflex to break the 2FE.</p>
<p><strong>Don&rsquo;t Back It Up</strong></p>
<p>The entire security of the Two Factor Encryption resides in the single point of failure. If you backup your 2FE device, it will severely affect the security.</p>
<p>YubiKeys are quite reliable. However if you are afraid of a malfunction, you can have a duplicate as long as it follows the same rules. It means having your 2 devices always side by side. Take into consideration that in case there&rsquo;s a problem, you will need to break two devices instead of one (this will take twice as long in a situation where time is crucial). Alternate their use to check regularly that both are in working condition.</p>
<p><strong>Scripting</strong></p>
<p>If your encryption system is not compatible with 2FE (like Truecrypt) you can always interface its use using a script. You can also use the password as a challenge for the 2FE, leaving less trail.</p>
<h2 id="bonus-points-emails-and-clouds">Bonus Points: Emails And Clouds</h2>
<p>Although Two Factor Encryption doesn&rsquo;t protect you from being hacked over the internet (that&rsquo;s why we use air gapped devices), nonetheless it&rsquo;s always a good idea to have it on your less secure devices. One cool thing about Two Factor Encryption is that it can be used with anything online that has end-to-end encryption (with password protected/derived keys).</p>
<p>2FE is not the same thing as OTP (<a href="https://www.conversationwithahacker.com/episodes/episode-2-use-2fa-your-password-needs-a-friend/">Two Factor Authentication</a>), which these services also offer. You should enable OTP everywhere, the YubiKey is compatible with it.</p>
<p><strong>Email</strong></p>
<p><a href="https://protonmail.com/">ProtonMail</a> is an email provider that offers end-to-end encryption. Using 2FE with their service allows you to protect your email communications in case of threats to access your data.</p>
<p><strong>Cloud</strong></p>
<p><a href="https://tresorit.com">Tresorit</a> and <a href="https://mega.nz">Mega</a> are online cloud solutions for your files that offer end-to-end encryption. Using 2FE with them will protect your files from being accessed if you are being threatened.</p>
<p>If you install E2EE apps on your smartphones, be careful, as some may store the encryption keys on the phone. Securing a smartphone is a lot more difficult, these stored keys have more probability to be accessed by your attacker.</p>
]]></content>
		</item>
		
	</channel>
</rss>
