The ACLU issued a warning to software developers that if they help the U.S. government send malicious software updates to their own users, many people could lose faith in software updates altogether. This wouldn't be unheard of: The U.S. government previously considered requiring companies to allow it to send malicious updates to targeted users.
Malicious Automatic Updates
The ACLU noted in a post that companies such as Google and Apple make public only a fraction of data demands from the U.S. government. We know from Microsoft’s now-cancelled lawsuit against the Department of Justice that the government was sending almost half of its data requests to large companies as “secret orders.”
The ACLU worries that some of these requests could include forcing developers to send users malicious updates that could steal data or bypass users’ encryption, track their location, or enable their cameras and microphones.
Automatic software updates are generally a good idea, and they make software ecosystems much more resilient against attacks. Without automatic updates, the users who aren’t aware that there is an update for their applications or don’t want to update are more vulnerable to attacks that exploit known vulnerabilities.
Normally, users trust the vendors from which they install the applications, otherwise they may not install them in the first place. This trust extends to any future updates the developer may send to the user. However, if the developers were to send malicious updates that steal user data, that trust would be broken.
Similarly, if people learned that the U.S. government was forcing multiple software vendors to send malicious updates to certain targets, then many more people could turn off automatic updates and may delay manual updates, too, until they are certain the update isn’t intended to cause that user harm.
ACLU’s Recommendations To Developers
To help developers “plan ahead” just in case the U.S. government may come knocking on their door with a secret order to send users malicious software updates, ACLU and law students in the NYU Technology Law & Policy Clinic prepared a guide.
ACLU recommended developers to design their software in such a way that even if the government tried to force them to send malicious updates to users, it’s not possible to compromise the user’s application or communications. Apple has already won a lawsuit, in which it argued that the FBI was imposing undue burden on the company to create other means to bypass an iPhone user’s storage encryption.
One such tactic is implementing “mirrorable distribution” for software updates so users can get the updates from each other, rather than straight from the developer. This would make it more unpredictable for law enforcement to know exactly which version of the update will be delivered to a target.
Another new type of update mechanism, called “binary transparency,” could be used to ensure that every update has been verifiably logged in a global, irrevocable, auditable log. Therefore, if a government tried to send someone a malicious update, the attack would be seen in this log. The binary transparency system is similar to Google’s open Certificate Transparency system for certificate issuance, and Mozilla is leading the way in implementing it for Firefox.
Other suggestions from ACLU and the law students included preferring making the software open source, so that others can see the whole code and audit it, and implementing “reproducible builds.” Reproducible builds refer to “deterministic compilation” of software, which means a certain version of a program should compile in the exact same way for different users.
Beyond these technical measures, ACLU recommended developers to plan what their responses would be if the government asked them to send malicious updates to users and also to get a lawyer.
Stay on the Cutting Edge
Join the experts who read Tom's Hardware for the inside track on enthusiast PC tech news — and have for over 25 years. We'll send breaking news and in-depth reviews of CPUs, GPUs, AI, maker hardware and more straight to your inbox.
The ACLU...sure, they are SUPER trustworthy.Reply
21076947 said:The ACLU...sure, they are SUPER trustworthy.
They're also cowards. https://reason.com/blog/2018/06/21/aclu-leaked-memo-free-speech
The ACLU is on your side. That is, as long as you believe in censoring people who aren't PC, as long as you are are not white and as lonng as you don't own a firearm. Oh, and as long as you believe in men using the lady's bathroom also.
I much prefer the message and leadership of these sorts of issues from the Electronic Frontier FoundationReply
Regardless of whether the ACLU lack integrity there is a point here.Reply
I typically block all applications that don't need internet access just to work and disable automatic updates for several reasons. Poor development quality leads to updates that break the application(s) that were working fine. Developers love to change UIs just for the sake of change, creating confusion and loss of productivity, and finally, you never know what's in an update. There are no trustworthy software companies. Their motives for automatic updates are not honorable and never have been. Software developers should not be trusted. Telemetry is in everything now. Governments should be trusted even less.
That used to be a worry when auto update was in its infancy... certified updates could be a bit harder to detect if the government targets say enterprise versions or older versions of operating systems with paid custom patches.Reply
jokes on them....i dont even have a cam or mic connected to my desktop!Reply
but for reals im more concerned about spectre updates slowing system down than being target of malicious updates :/
I love the comments from people "triggered" by the very existence of an organization founded to protect their rights.Reply
"One such tactic is implementing “mirrorable distribution” for software updates so users can get the updates from each other"Reply
Yea, that won't go wrong. Nice try ACLU, but you need better geeks.
I only use automatic updates for games. I've been burned too many times allowing automatic updates. Never again.Reply