<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>schestowitz.com &#187; Security</title>
	<atom:link href="https://schestowitz.com/Weblog/archives/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://schestowitz.com/Weblog</link>
	<description>Reflections on Technology</description>
	<lastBuildDate>Tue, 17 Feb 2026 16:47:48 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=3.9.40</generator>
	<item>
		<title>You Can Hate Donald Trump and Object to Electronic Voting Machines at the Same Time</title>
		<link>https://schestowitz.com/Weblog/archives/2023/12/01/schismogenesis/</link>
		<comments>https://schestowitz.com/Weblog/archives/2023/12/01/schismogenesis/#comments</comments>
		<pubDate>Fri, 01 Dec 2023 03:36:19 +0000</pubDate>
		<dc:creator><![CDATA[Roy Schestowitz]]></dc:creator>
				<category><![CDATA[Politics]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>

		<guid isPermaLink="false">https://schestowitz.com/Weblog/?p=8067</guid>
		<description><![CDATA[Schismogenesis in Bill Gated-funded sites (those machines run Windows with back doors): NEED to clarify upfront I do not believe the 2020 election in the United States was &#8220;stolen&#8221; and I do not support Donald Trump. He disgusts me. The United States is still &#8220;using fraudulent voting machines&#8221; with back doors, a friend has reminded [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><a href="https://en.wikipedia.org/wiki/Schismogenesis">Schismogenesis</a> in <a href="https://www.theguardian.com/us-news/2023/nov/29/arizona-officials-charged-election-2022">Bill Gated-funded sites</a> (those machines run Windows with back doors): </p>
<p><a href="https://schestowitz.com/Weblog/wp-content/uploads/2023/12/straw-man.png"><img src="https://schestowitz.com/Weblog/wp-content/uploads/2023/12/straw-man.png" alt="Schismogenesis" width="520" class="aligncenter size-full wp-image-8068" /></a></p>
<p><img title="I" src="/IMG/Caps/i.png" alt="I" align="left" border="0" hspace="0" vspace="4" /> NEED to clarify upfront I do not believe the 2020 election in the United States was &#8220;stolen&#8221; and I do not support Donald Trump. He disgusts me.</p>
<p>The United States is still &#8220;using fraudulent voting machines&#8221; <a href="http://techrights.org/wiki/Microsoft_and_the_NSA/">with back doors</a>, a friend has reminded me. But the media giants aren&#8217;t talking about and &#8220;associating opposition to fraudulent voting technologies/products with crazies. Other crazies will defend fraudulent voting technologies/products for no other reason than those two crazies are opposed to them&#8230;&#8221;</p>
<p><em>Techrights</em> did at least 2 &#8220;statements&#8221; on this issue [<a href="http://techrights.org/o/2022/10/27/calling-everyone-nazis/">1</a>, <a href="http://techrights.org/o/2023/04/19/fox-news-straw-man/">2</a>] just to clarify voting machines are no good regardless of news sites&#8217; rhetoric.</p>
<p>Quit using opaque electronic voting machines and then lessen the likilohood of armed fanatics storming government buildings in an act of overt insurrection.</p>
]]></content:encoded>
			<wfw:commentRss>https://schestowitz.com/Weblog/archives/2023/12/01/schismogenesis/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Windows Needs to Disappear</title>
		<link>https://schestowitz.com/Weblog/archives/2023/11/28/windows-needs-to-disappear/</link>
		<comments>https://schestowitz.com/Weblog/archives/2023/11/28/windows-needs-to-disappear/#comments</comments>
		<pubDate>Tue, 28 Nov 2023 01:57:15 +0000</pubDate>
		<dc:creator><![CDATA[Roy Schestowitz]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows]]></category>

		<guid isPermaLink="false">https://schestowitz.com/Weblog/?p=8054</guid>
		<description><![CDATA[recently wrote about security crises associated with Windows deployments. &#8220;On the topic of Windows,&#8221; a friend told me (citing this one article): &#8220;The writers there (and elsewhere) conflate spending with results. Security is part of the design and not an aftermarket add-on. The latter is a pointless and futile waste of time and money, but [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><img title="I" src="/IMG/Caps/i.png" alt="I" align="left" border="0" hspace="0" vspace="4" /> recently wrote about <a href="https://news.tuxmachines.org/n/2023/11/27/Data_Breaches_and_Windows_TCO.shtml">security crises</a> associated with Windows deployments. &#8220;On the topic of Windows,&#8221; a friend told me (citing <a href="https://www.politico.eu/article/energy-power-europe-grid-is-under-a-cyberattack-deluge-industry-warns/">this one article</a>): &#8220;The writers there (and elsewhere) conflate spending with results.  Security is part of the design and not an aftermarket add-on.  The latter is a pointless and futile waste of time and money, but one which keeps Microsoft market share from bottoming out. [...] the Microsoft way of thinking permeates their design *and* implementation *and* especially their deployment.&#8221;</p>
<p>I still firmly believe that removing most Windows installations out there (ultimately all of them) would considerably improve computer security worldwide. <a href="http://techrights.org/wiki/Microsoft_and_the_NSA/">Microsoft designs things not for security but the very opposite (remote access by the state)</a>. <a href="#top">?</a></p>
]]></content:encoded>
			<wfw:commentRss>https://schestowitz.com/Weblog/archives/2023/11/28/windows-needs-to-disappear/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Forms for Reporting Data Breaches Exist to be Used and for Those Affected to Get Notified</title>
		<link>https://schestowitz.com/Weblog/archives/2023/07/19/forms-for-reporting-data-breaches/</link>
		<comments>https://schestowitz.com/Weblog/archives/2023/07/19/forms-for-reporting-data-breaches/#comments</comments>
		<pubDate>Wed, 19 Jul 2023 05:32:56 +0000</pubDate>
		<dc:creator><![CDATA[Roy Schestowitz]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://schestowitz.com/Weblog/?p=7957</guid>
		<description><![CDATA[Summary: One last note on the issue of Greater London Authority (London Municipality); even though forms exist to report security breaches or incidents of data breaches, Greater London Authority never seems to have bothered with this; the culmination of this in the media (a scandal which puts at risk victims of sex crimes) overlooks a [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><em><b>Summary</b>: One last note on the issue of Greater London Authority (London Municipality); even though forms exist to report security breaches or incidents of data breaches, Greater London Authority never seems to have bothered with this; the culmination of this in the media (a scandal which puts at risk victims of sex crimes) overlooks a history of repeat/recurring incidents</em></p>
<p>As far as I&#8217;m aware, this was never reported (to those impacted) except <em>internally</em>.</p>
<p>GLA staff (it wasn&#8217;t the first such issue, nor the last):</p>
<p align="center">
<a href="http://techrights.org/wp-content/uploads/2023/07/drupal-access.png"><img src="http://techrights.org/wp-content/uploads/2023/07/drupal-access.png" alt="GLA: Drupal access" width="480" class="aligncenter size-full wp-image-176671" /></a>
</p>
<p>So what good are such forms?</p>
<p><a href="http://techrights.org/wp-content/uploads/2023/07/gla-form-data-breach-1.png"><img src="http://techrights.org/wp-content/uploads/2023/07/gla-form-data-breach-1.png" alt="GLA form for data breach #1" width="480" class="aligncenter size-full wp-image-176831" /></a></p>
<p><a href="http://techrights.org/wp-content/uploads/2023/07/gla-form-data-breach-2.png"><img src="http://techrights.org/wp-content/uploads/2023/07/gla-form-data-breach-2.png" alt="GLA form for data breach #2" width="480" class="aligncenter size-full wp-image-176832" /></a></p>
]]></content:encoded>
			<wfw:commentRss>https://schestowitz.com/Weblog/archives/2023/07/19/forms-for-reporting-data-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Greater London Authority Fails to Meet GDPR Rules</title>
		<link>https://schestowitz.com/Weblog/archives/2023/07/17/greater-london-authority-gdpr/</link>
		<comments>https://schestowitz.com/Weblog/archives/2023/07/17/greater-london-authority-gdpr/#comments</comments>
		<pubDate>Mon, 17 Jul 2023 11:44:41 +0000</pubDate>
		<dc:creator><![CDATA[Roy Schestowitz]]></dc:creator>
				<category><![CDATA[Politics]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://schestowitz.com/Weblog/?p=7955</guid>
		<description><![CDATA[Data breaches&#8217; handling policies/stance of GLA were not followed when I was there. Here they are in their own words: Meanwhile in the news: Also this past weekend: Summary: This past weekend Greater London Authority’s managers came under fire for mishandling of data (this went on for months!) and it wasn&#8217;t even the first time; [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><a href="https://www.london.gov.uk/who-we-are/what-london-assembly-does/questions-mayor/find-an-answer/data-breaches-0" title="Data breaches">Data breaches&#8217; handling policies/stance of GLA</a> were not followed when I was there. Here they are in their <em>own</em> words:</p>
<p align="center">
 <a href="http://techrights.org/wp-content/uploads/2023/07/gdpr-gla.png"><img src="http://techrights.org/wp-content/uploads/2023/07/gdpr-gla.png" alt="GDPR, GLA, and Data Breaches" width="480" class="aligncenter size-full wp-image-176724" /></a>
</p>
<p> Meanwhile <a href="https://www.standard.co.uk/news/london/mopac-personal-data-breach-mayor-office-policing-crime-met-complaints-b1094424.html" title="Evening Standard: Complaints to Sadiq Khan’s Met police watchdog on public view in ‘data breach’">in the news</a>:</p>
<p align="center">
<a href="http://techrights.org/wp-content/uploads/2023/07/gla-data-scandal.png"><img src="http://techrights.org/wp-content/uploads/2023/07/gla-data-scandal.png" alt="Complaints to Sadiq Khan’s Met police watchdog on public view in ‘data breach’" width="480" class="aligncenter size-full wp-image-176725" /></a>
</p>
<p>Also <a href="https://metro.co.uk/2023/07/15/sexual-abuse-survivor-appalled-after-details-leaked-in-data-breach-19133690/" title="Sexual abuse survivor ‘appalled’ after personal details leaked in data breach">this past weekend</a>:</p>
<p align="center">
<a href="http://techrights.org/wp-content/uploads/2023/07/metro-gla.png"><img src="http://techrights.org/wp-content/uploads/2023/07/metro-gla.png" alt="Metro: Sexual abuse survivor ‘appalled’ after personal details leaked in data breach" width="480" class="aligncenter size-full wp-image-176726" /></a>
</p>
<p><em><b>Summary</b>: This past weekend Greater London Authority’s managers came under fire for mishandling of data (this went on for months!) and it wasn&#8217;t even the first time; usually they keep quiet about such things and hope nobody will notice while IT people &#8212; including <a href="http://techrights.org/wiki/Sirius_Open_Source" title="Sirius Open Source">Sirius &#8216;Open Source&#8217;</a> &#8212; are retroactively &#8216;fixing&#8217; these issues</em></p>
]]></content:encoded>
			<wfw:commentRss>https://schestowitz.com/Weblog/archives/2023/07/17/greater-london-authority-gdpr/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>On the Greater London Authority Data Breach With Sex Abuse Victims&#8217; Personal Details</title>
		<link>https://schestowitz.com/Weblog/archives/2023/07/16/greater-london-authority-data-breach/</link>
		<comments>https://schestowitz.com/Weblog/archives/2023/07/16/greater-london-authority-data-breach/#comments</comments>
		<pubDate>Sun, 16 Jul 2023 14:51:37 +0000</pubDate>
		<dc:creator><![CDATA[Roy Schestowitz]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://schestowitz.com/Weblog/?p=7946</guid>
		<description><![CDATA[Video download link &#124; md5sum 65e2f74fa8f4c609f78e27dd7bf22983 Greater London Authority (GLA) Breaches Not Surprising Creative Commons Attribution-No Derivative Works 4.0 Summary: The biggest clients of Sirius &#8216;Open Source&#8217; included Greater London Authority, or GLA for short; GLA is making some shy and bashful faces right now, as there&#8217;s negative publicity after a damning incident THE account [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><em><a href="http://techrights.org/videos/gla-breaches.webm" title="Video file of GLA Breaches Not Surprising">Video download link</a> | md5sum <code>65e2f74fa8f4c609f78e27dd7bf22983</code></em><br />
<b>Greater London Authority (GLA) Breaches Not Surprising</b><br />
Creative Commons Attribution-No Derivative Works 4.0</p>
<div style="width: 480px; max-width: 100%;" class="wp-video"><!--[if lt IE 9]><script>document.createElement('video');</script><![endif]-->
<video class="wp-video-shortcode" id="video-7946-1" width="480" height="340" poster="http://techrights.org/videos/gla-breaches.gif" preload="metadata" controls="controls"><source type="video/webm" src="http://techrights.org/videos/gla-breaches.webm?_=1" /><a href="http://techrights.org/videos/gla-breaches.webm">http://techrights.org/videos/gla-breaches.webm</a></video></div>
<p><em><b>Summary</b>: The biggest clients of <a href="http://techrights.org/wiki/Sirius_Open_Source" title="Sirius Open Source">Sirius &#8216;Open Source&#8217;</a> included Greater London Authority, or GLA for short; GLA is making some shy and bashful faces right now, as there&#8217;s negative publicity after a damning incident</em></p>
<p>THE account sharing (<em>mal</em>)practices at GLA were noted here before. We often shared usernames and passwords (one colleague even sent passwords in plain text by GMail) and last year I cautioned GLA that LastPass had been breached and that Sirius kept GLA passwords in there. The vault was never safe and I protested against the use of LastPass repeatedly for several years (the liar would not listen).  I habitually complained about bad security practices and only in 2022 or thereabouts we finally had individual UNIX accounts on the gateway machine rather than a shared account. Imagine the company bragging about ISO compliance while doing all that.</p>
<p>The video above focuses less on account sharing and instead talks about the site, including Drupal. In the distant past we already had severe permission issues (these were pointed out internally), but it remains rather baffling if not flabbergasting that names of sex crimes victims somehow ended on the public Web site. They should not be on any site at all. I explain the Microsoft-centric workflows and how they contribute to the risk. Poor security practices and a lack of proper protocols made the current blunder more or less inevitable. Cowboys shooting from the hip is no way to run a site of a city as important as London. </p>
]]></content:encoded>
			<wfw:commentRss>https://schestowitz.com/Weblog/archives/2023/07/16/greater-london-authority-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="http://techrights.org/videos/gla-breaches.webm" length="56132473" type="video/webm" />
		</item>
		<item>
		<title>Enhanced Worker Surveillance in Security Clothing?</title>
		<link>https://schestowitz.com/Weblog/archives/2023/01/27/enhanced-worker-surveillance/</link>
		<comments>https://schestowitz.com/Weblog/archives/2023/01/27/enhanced-worker-surveillance/#comments</comments>
		<pubDate>Fri, 27 Jan 2023 01:34:44 +0000</pubDate>
		<dc:creator><![CDATA[Roy Schestowitz]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://schestowitz.com/Weblog/?p=7495</guid>
		<description><![CDATA[Especially not when you send passwords and private keys to dodgy third parties that suffer security breaches and lie about it Summary: Sirius &#8216;Open Source&#8217;, emboldened by ISO &#8216;paperwork&#8217; (certification), lost sight of what it truly takes to run a business securely, mistaking worthless gadgets for &#8220;advancement&#8221; while compelling staff to sign a new contract [&#8230;]]]></description>
				<content:encoded><![CDATA[<p align="center">
<a href="http://techrights.org/wp-content/uploads/2023/01/2fa-phone.png"><img src="http://techrights.org/wp-content/uploads/2023/01/2fa-phone.png" alt="2FA with 'mobile phone' is not proper security" width="480" class="aligncenter size-full wp-image-169650" /></a><br />
<br />Especially not when you send passwords and private keys to dodgy third parties that suffer security breaches and lie about it
</p>
<p><em><b>Summary</b>: <a href="http://techrights.org/wiki/Sirius_Open_Source" title="Sirius Open Source">Sirius &#8216;Open Source&#8217;</a>, emboldened by ISO &#8216;paperwork&#8217; (certification), lost sight of what it <b>truly</b> takes to run a business securely, mistaking worthless gadgets for &#8220;advancement&#8221; while compelling staff to sign a new contract in a hurry (prior contract-signing scandals notwithstanding)</em></p>
<p>A part devoted <em>purely</em> to ISO was last week&#8217;s focus/work and this week we show some of the company&#8217;s awful practices when it comes to security. This is the most recent example. It&#8217;s from this past October and it&#8217;s likely what got me &#8220;flagged&#8221; for bollocking. In short, after the contract-signing scandals of 2019 I was apprehensive about signing another unknown contract and moreover consenting to a company-provided spying device (with camera and microphone) being inside my home. My wife was also hesitant; she expressed very strong opposition to this even before I did. &#8220;What next?&#8221; she said&#8230;</p>
<p>My E-mails about company &#8220;mobile phones&#8221; were discussed with a friend in IRC (personal channel), albeit only after careful redaction. Polite language was used. Facts were adhered to all along. At the bottom of this post the communications are reproduced in full, with clients&#8217; names and colleagues&#8217; names redacted.</p>
<p>This &#8220;mobile phones&#8221; strategy it is not about saving money; outsourcing <em>never</em> saves money, it adds a trap for short-term savings. The bills, in turn, gradually increase by a lot and services stop working or get shut down. They cannot even be debugged because they are proprietary (AWS and Google in mind).</p>
<p>As the communication below shows, first they sent some &#8216;enticing&#8217; message and later they sent an &#8220;ASAP&#8221; for a contract to sign (for &#8220;smart&#8221; &#8220;phone&#8221;). It was likely some sort of waiver. The messages were sent less than 10 minutes apart, obviously coordinated for effect, and there was no room for debate. If the company wants to buy brand new phones while deprecating existing Cisco phones of all staff &#8212; and it <em>won&#8217;t settle for low-cost phones while at the same time admitting to employees that the company is tight on budget</em> &#8212; then what gives?</p>
<p>But there are deeper, more profound issues at stake here. To give some background, consider <a href="https://www.eff.org/deeplinks/2022/12/eff-agrees-nlrb-workers-need-protection-against-bossware" title="EFF Agrees With the NLRB: Workers Need Protection Against Bossware">what the EFF published last month</a> in relation to NLRB (unions):</p>
<blockquote title="https://www.eff.org/deeplinks/2022/12/eff-agrees-nlrb-workers-need-protection-against-bossware">
<p>How does this work? The NLRB protects the right of workers under Section 7 of the National Labor Relations Act to organize and discuss joining unions with their coworkers without retaliation and the board’s General Counsel rightly suggests that surveillance of workers by their bosses can lead to unlawful retaliation, as well as a chilling effect on workplace speech protected by the NLRA.</p>
<p>“It concerns me that employers could use these technologies to interfere with the exercise of Section 7 rights … by significantly impairing or negating employees’ ability to engage in protected activity—and to keep that activity confidential from their employer,” General Counsel Jennifer Abruzzo said in her letter. She added she will urge the board to act to &#8220;protect employees from intrusive or abusive electronic monitoring and automated management practices&#8221; that interfere with organizing rights.  The general counsel&#8217;s memo serves as a marker for future cases considered by the NLRB. Traditionally, the opinion of the NLRB&#8217;s general counsel has a significant effect on how the board rules on cases it considers. This means that, should workers wish to file a claim with the NLRB along these lines, the board would take this opinion into account.</p>
<p>While worker privacy has been considered within general consumer privacy bills, workplace privacy rights function differently than those in many other contexts. A worker often cannot walk away from a camera pointed at their workstation. And while a consumer may feel they aren’t really “consenting” to data collection when they use a product or service, they generally have the option to go to a competing product. Workers don’t; saying “no” could cost them their livelihood. Therefore workers are set up to potentially lose certain rights during the workday.   </p>
</blockquote>
<p>                At the end of the month the EFF <a href="https://www.eff.org/deeplinks/2022/12/privacy-doesnt-stop-when-you-clock-2022-review" title="Privacy Shouldn't Clock Out When You Clock In: 2022 in Review">revisited this issue</a>:</p>
<blockquote title="https://www.eff.org/deeplinks/2022/12/privacy-doesnt-stop-when-you-clock-2022-review">
<p>Since then, EFF has joined with those in the labor community to learn more about surveillance in the workplace and on work devices, and the effect it has on employees. Particularly as regulators start to pay more attention, and legislators include workers’ privacy in general consumer privacy bills, it’s important to understand the ways that the workplace presents unique challenges in this arena.</p>
<p>Bossware has Real Effects on Workers</p>
<p>As white collar remote workers felt bossware breathing down their necks, there was more coverage than ever of how employers are monitoring the workforce, and the lasting effects it has on workers&#8217; health, safety, livelihood, and collective bargaining rights. Even for remote staff, these stresses affected their mental health and family responsibilities. But it is workers across all fields that have increasingly felt the heat of surveillance, and some of the coverage was propelled by blue collar workers who fought back, from meatpacking facilities to service workers to delivery drivers who experienced increased surveillance as a form of retaliation for wage demands. Neither the ineffectiveness nor the impact on real people calmed employers&#8217; desires for increasing means to monitor and control worker behavior, with some even floating a database on worker productivity. Courts and agencies in other countries, like the Netherlands, have been quicker to take on U.S. firms who they allege have violated the human rights of foreign remote workers with demands on their acquiescence to invasive monitoring.</p>
</blockquote>
<p>One lingering concern was, those &#8220;phones&#8221; can be used for spying and we already know the company was spying on workers, as we&#8217;ve demonstrated for nearly 2 months already. </p>
<p>The manager did not bother explaining the decision or how it had been reached; he went completely silent. He was trying to force us to sign something in a rush. Yet again&#8230; like in 2019. He also sent us nothing and instead went on a fishing expedition in IRC logs (it seems like nobody gave him a heads-up, as we showed before), only to find nothing but gossip that mentions no names, not even &#8220;Sirius&#8221;. Such stalking by a &#8220;thug&#8221; isn&#8217;t acceptable and it&#8217;s easy to get the impression that it was an act of retaliation in a company where managers are immune or exempted from enforcement (like EPO management). A &#8220;phone&#8221; would likely become just a tool to &#8220;manage&#8221; people and there&#8217;s already years-old track record of bullying by management. A &#8220;phone&#8221; would be a blunt instrument of coercion by intimidation and humiliation. All the stalking further justifies workers being apprehensive about &#8220;mobile&#8221; phones at home. In retrospect, we made the right decision when we antagonised/rejected the proposal.</p>
<p>Here is the full correspondence:</p>
<blockquote class="evidence"><p>
<b>Introduction of Company Mobile Phones for the Support Team</b></p>
<p> Dear All,</p>
<p>This is just to update you that as part of our on-going development and improvement, we will imminently be introducing company mobile telephones for Support Team staff.</p>
<p>Whilst we are also constantly seeking cost savings and efficiency improvements and consequently as you know are looking at significant structural changes in the organisation, we also have significant security obligations for our own compliance and business requirement obligations to our clients.</p>
<p>However, as well as helping with our security compliance we believe this will be a very positive improvement in the ease of use for support telephony. xxxxx will distribute full details and instructions shortly.</p>
<p>Thank you in advance for helping with the smooth introduction of these devices!</p>
<p>Kind regards,</p>
<p>xxxx
</p></blockquote>
<p>9 minutes later another colleague wrote:</p>
<blockquote class="evidence"><p>
<b>Introduction of Company Mobile Phones for Support</b></p>
<p>Hello Support Team,</p>
<p>With more customers demanding tighter security, the upcoming ISO audit requirements being more strict this coming November, and a general need to ensure you have the right tools for the job, Sirius will now be issuing work mobile phones to Support staff.</p>
<p>This has been under consideration for several years pending the right combination of business, customer, and financial requirements being met for deployment. Whilst the company continues to need to make overall financial savings and to achieve better efficiency, a number of pressing factors have become primary drivers to make this change happen now. (For example, you will be aware of xxxx becoming an increasingly important client of late and the imminent expansion of the support contract with them is key.)</p>
<p>We expect this to be a very positive step for Support Staff and should make a number of key processes more straight forward whilst also enabling key business benefits and security improvements.</p>
<p>Key purposes/benefits of introducing support mobile phones:<br />
1. To enable 2FA and secure authentication for both Sirius and customer environments<br />
2. Separating work and personal devices as a benefit for both work (security) and life-balance (you can turn it off when not on shift)<br />
3. A step towards replacing the legacy Cisco handsets<br />
4. The devices will integrate with the native platform for Google Voice and be a backup/forwarding target for that<br />
5. A backup data connection to work from in case of local internet outage</p>
<p>The company policy on mobile devices and security is currently being updated to reflect this new tool, but please pay particular attention to the following key notes:<br />
* The devices will remain the property of the company<br />
* The devices must be used solely for work purposes and only by yourself<br />
* The devices will be controlled centrally by Sirius, usage will be visible to management<br />
* The devices must not leave the UK without prior specific permission from management</p>
<p>You have already agreed to abide by the Sirius IT policy and all usage of the device should be in accordance with this.</p>
<p>Devices will be distributed shortly and will include a Mobile Device Guide to allow a quick set-up. Please read through the Mobile Device Guide asap once available (which will be assigned to you in xxxx) and then agree to the contents and terms, after which your device will be sent out.</p>
<p>Warm regards,
</p></blockquote>
<p>To the first message I responded: &#8220;If this is about facilitating MFA, please provide phones with batteries that can be detached/removed in order to ensure the risk introduced isn&#8217;t greater than the risk lowered.&#8221;</p>
<p>The response was:</p>
<blockquote class="evidence"><p>
Hi Roy,</p>
<p>What risk are you suggesting we address by opting for mobile phones with a removable battery?</p>
<p>These devices are almost extinct, with only a few options. They also tend to be lower spec&#8217;d and poorer performing as you can see here: https://www.androidauthority.com/best-android-phones-removable-battery-697520/</p>
<p>Further to our discussion this morning, I cannot see a reason for us to make this a priority at this point.</p>
<p>Regards,<br />
xxxx
</p></blockquote>
<p>I responded to the longer message as follows:</p>
<blockquote class="evidence"><p>
> Hello Support Team,</p>
<p>Hi,</p>
<p>> With more customers demanding tighter security, the upcoming ISO audit<br />
> requirements being more strict this coming November, and a general need<br />
> to ensure you have the right tools for the job, Sirius will now be<br />
> issuing work mobile phones to Support staff.<br />
><br />
> This has been under consideration for several years pending the right<br />
> combination of business, customer, and financial requirements being met<br />
> for deployment. Whilst the company continues to need to make overall<br />
> financial savings and to achieve better efficiency, a number of pressing<br />
> factors have become primary drivers to make this change happen now. (For<br />
> example, you will be aware of xxxx becoming an increasingly<br />
> important client of late and the imminent expansion of the support<br />
> contract with them is key.)</p>
<p>We still need a wiki page for them. <img src="https://schestowitz.com/Weblog/wp-includes/images/smilies/icon_wink.gif" alt=";-)" class="wp-smiley" /> </p>
<p>> We expect this to be a very positive step for Support Staff and should<br />
> make a number of key processes more straight forward whilst also<br />
> enabling key business benefits and security improvements.<br />
><br />
> Key purposes/benefits of introducing support mobile phones:<br />
> 1. To enable 2FA and secure authentication for both Sirius and customer<br />
> environments</p>
<p>When I saw the previous message I responded with &#8220;If this is about<br />
facilitating MFA, please provide phones with batteries that can be<br />
detached/removed in order to ensure the risk introduced isn&#8217;t greater<br />
than the risk lowered.&#8221;</p>
<p>It&#8217;s understandable that some of these schemes do not support a landline.</p>
<p>> 2. Separating work and personal devices as a benefit for both work<br />
> (security) and life-balance (you can turn it off when not on shift)</p>
<p>Not applicable to me as I don&#8217;t use such a device.</p>
<p>> 3. A step towards replacing the legacy Cisco handsets</p>
<p>The Cisco handsets have worked well for almost a decade. They were<br />
always more reliable than Google Voice.</p>
<p>> 4. The devices will integrate with the native platform for Google Voice<br />
> and be a backup/forwarding target for that</p>
<p>We already have a dedicated computer for Google Voice. Plus, it has<br />
several fallbacks in place.</p>
<p>> 5. A backup data connection to work from in case of local internet outage</p>
<p>I think we still have a USB dongle for this somewhere. A SIM card should<br />
be enough to facilitate it. Our connection has generally been reliable<br />
for years.</p>
<p>> The company policy on mobile devices and security is currently being<br />
> updated to reflect this new tool, but please pay particular attention to<br />
> the following key notes:<br />
> * The devices will remain the property of the company<br />
> * The devices must be used solely for work purposes and only by yourself<br />
> * The devices will be controlled centrally by Sirius, usage will be<br />
> visible to management</p>
<p>It seems like sole purpose of it will be 2FA. Any simple phone that can<br />
do SMS can handle robust 2FA. Anything &#8220;apps&#8221; can introduce more risks.</p>
<p>> * The devices must not leave the UK without prior specific permission<br />
> from management<br />
><br />
> You have already agreed to abide by the Sirius IT policy and all usage<br />
> of the device should be in accordance with this.<br />
><br />
> Devices will be distributed shortly and will include a Mobile Device<br />
> Guide to allow a quick set-up. Please read through the Mobile Device<br />
> Guide asap once available (which will be assigned to you in xxxx)<br />
> and then agree to the contents and terms, after which your device will<br />
> be sent out.</p>
<p>If, as stated above, I &#8220;already agreed to abide by the Sirius IT policy<br />
and all usage of the device should be in accordance with this,&#8221; then why<br />
do I need to sign an additional document? Anyway, I think this needs to<br />
be discussed with staff. I wasn&#8217;t told anything about this until today<br />
and it seems like a lot of resources are spent on just an MFA appliance.</p>
<p>Regards.
</p></blockquote>
<p>I tried to speak to them over the telephone, knowing from experience that they would likely not bother replying.</p>
<p>First colleague: Managed to get to him over the phone to discuss the matter.</p>
<p>Second colleague: Tried to avoid talking to me about it over the phone, using obviously fake excuses.</p>
<p>But the point isn&#8217;t about a &#8220;phone&#8221; per se. As we&#8217;ll show over the next few days, the company was failing at the very basics and putting not only its own systems at risks but also clients&#8217;.</p>
]]></content:encoded>
			<wfw:commentRss>https://schestowitz.com/Weblog/archives/2023/01/27/enhanced-worker-surveillance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to Buy ISO Certification (It&#8217;s Easy!)</title>
		<link>https://schestowitz.com/Weblog/archives/2023/01/24/buying-iso-certification/</link>
		<comments>https://schestowitz.com/Weblog/archives/2023/01/24/buying-iso-certification/#comments</comments>
		<pubDate>Tue, 24 Jan 2023 01:52:06 +0000</pubDate>
		<dc:creator><![CDATA[Roy Schestowitz]]></dc:creator>
				<category><![CDATA[Personal]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://schestowitz.com/Weblog/?p=7440</guid>
		<description><![CDATA[Summary: Before we proceed to showing how Sirius &#8216;Open Source&#8217; blatantly ignored security and privacy we wish to show how ISO (see ISO wiki) basically &#8216;sold&#8217; a certificate to Sirius &#8212; this is like a &#8220;diploma mill&#8221; but something that&#8217;s for businesses, not individuals THIS is today&#8217;s second article on this topic. We&#8217;ve found some [&#8230;]]]></description>
				<content:encoded><![CDATA[<p align="center">
<a href="http://techrights.org/wp-content/uploads/2023/01/iso-brag.png"><img src="http://techrights.org/wp-content/uploads/2023/01/iso-brag.png" alt="International Organization for Standardization (ISO) brag" width="441" class="aligncenter size-full wp-image-168466" /></a>
</p>
<p><em><b>Summary</b>: Before we proceed to showing how <a href="http://techrights.org/wiki/Sirius_Open_Source" title="Sirius Open Source">Sirius &#8216;Open Source&#8217;</a> blatantly ignored security and privacy we wish to show how ISO (see <a href="http://techrights.org/wiki/ISO" title="ISO">ISO wiki</a>) basically &#8216;sold&#8217; a certificate to Sirius &#8212; this is like a &#8220;diploma mill&#8221; but something that&#8217;s for businesses, not individuals</em></p>
<p>THIS is today&#8217;s <em>second</em> article on this topic. We&#8217;ve found some spare time for faster progression and <em>in-depth</em> coverage. As I noted yesterday, my wife had more direct and indirect experience (<em>decades</em> ago) with ISO being a bunch of meaningless hooey. So did I (having stumbled upon <em>classical</em> &#8216;box tickers&#8217;  or worse). Sirius is just <em>another</em> reminder of that. Hence this series and its relevance. It seems like a lot of people in technical fields separately and independently reached the conclusion that ISO is overhyped, overvalued, and mostly a waste of time and money (unless you have a &#8216;bullshit job&#8217; to justify).</p>
<p><span class="pullQuote" style="width:300px">&#8220;This isn&#8217;t science. It&#8217;s like calling &#8220;economics&#8221; a science. It is not. It&#8217;s more like religion.&#8221;</span>&#8220;My dad complained about the ISO in the 90s,&#8221; Ryan said in IRC an hour or so ago. &#8220;He constantly made fun of all of their &#8220;standards&#8221; for management of a company that didn&#8217;t mean anything but go on and on. It&#8217;s a sort of code so that managers sound smarter than they are. &#8220;We&#8217;re ISO-Whatever compliant with our handling of the TPS reports.&#8221; And the ISO standards can be wrong and never revised. Microsoft implemented the standard for MP3 and so did LAME, and then the result was they were both correct and Windows XP crashed. Part of the standard about what constituted the maximum size for a frame could be calculated one of two ways.Microsoft chose the more constrained way and it resulted in a buffer overflow with some files that crashed Windows Media Player. LAME had chosen the method that resulted in a slightly larger permissible frame size. The outcome was LAME had to be changed to use the Microsoft calculation to avoid crashing Windows, and that meant a reduction in audio quality under some circumstances, with padded bytes instead of data. Later, they changed to use the VBR bit allocator, even in a CBR file, and it mostly avoids the situation by its method of action.  It can cleverly use the bit reservoir in ways that the former bit allocator that was only for CBR files couldn&#8217;t.  Naturally, they never delete anything, so you can still demand the old model. It&#8217;s just an absolute nightmare of options switches. It&#8217;s the worst thing I&#8217;ve ever seen in a utility its size.  ISO is kind of the stuff of Pointy Haired Bosses when it comes to Management Theory being standardized.&#8221;</p>
<p>Well, this whole &#8220;Management Theory&#8221; is what we&#8217;re dealing with here.</p>
<p>This isn&#8217;t science. It&#8217;s like calling &#8220;economics&#8221; a science. It is not. It&#8217;s more like religion.</p>
<p>Here&#8217;s what happened in Sirius (in mostly logical/chronological order):</p>
<blockquote class="evidence"><p>
Subject: 	ISO<br />
Date: 	Mon, 29 Jul 2019 15:47:43 +0100<br />
From: 	xxxx<br />
To: 	xxxx</p>
<p>Hey All,</p>
<p>As you know we are going through the ISO processes &#8211; I have been asked to gather some information from everyone at Sirius to create a list of all assets used by employees of Sirius whether it belong to the company or the employee so if I can have the item name and serial number that would be great. They have also asked which anti virus you all use.</p>
<p>Are you all able to send me the required information ASAP please?</p>
<p>Thanks,</p>
<p>xxxx
</p></blockquote>
<p>Yes, because a bunch of serial numbers would mean so much! Of people devices at home&#8230; for the most part.</p>
<p><span class="pullQuote" style="width:200px">&#8220;They would nag us to do the same &#8216;course&#8217; every year, even though it is dumb and we &#8216;passed&#8217; it already.&#8221;</span>A month later came &#8220;You have been registered for a Training course &#8211; Information Security&#8221; (no, not really security but  this hoax instead). We&#8217;ll deal with that another day&#8230;</p>
<p>They would nag us to do the same &#8216;course&#8217; every year, even though it is dumb and we &#8216;passed&#8217; it already. This is compliance???</p>
<p>??&#8221;This is something that will be done annually for our ISO process,&#8221; I was told, &#8220;so please complete this on your next shift.&#8221;</p>
<p>??Way to waste people&#8217;s time, doing and passing a total hoax over and over again (details on why it&#8217;s a hoax were covered here before).</p>
<p>??Notice the threats being sent to <b>ALL</b> staff:</p>
<blockquote class="evidence">
<p>Hi All,</p>
<p>As you will all be aware we have been implementing new policies and procedures in order to become ISO 9001 and ISO 27001 compliant. Part of this entailed changing our HR company to xxxx who use the online portal Atlas to provide an easier method to roll out training. I have checked and there is still a substantial amount that has still not been completed.</p>
<p>ALL training sent out by myself needs to be passed and completed by the _*25th November 2019*_. This is to ensure we meet our deadline for the final stage of ISO audits.</p>
<p>Failure to comply with this request may result in disciplinary action. For those of you that have completed the training, please ignore this message and thank you.</p>
<p>Kind Regards,</p>
<p>xxxx
</p></blockquote>
<p>&#8220;Failure to comply with this request may result in disciplinary action,&#8221; it says. They kept making veiled and explicit threats. Sometimes this culminated in actual bullying, false accusations, and blame-shifting witch-hunts.</p>
<p>Of course the portals failed to even work properly. For instance:</p>
<blockquote class="evidence"><p>
> ALL training sent out by myself needs to be passed and completed by the<br />
> _*25th November 2019*_. This is to ensure we meet our deadline for the<br />
> final stage of ISO audits.</p>
<p>I was able to open all the documents and read them. The animated things,<br />
or training sessions, get stuck. I tried each one of them about 5 times<br />
(>each&lt;) and they get stuck somewhere along the way. I tried this on<br />
multiple machines. Rianne told she too had some difficulties.</p>
<p>I will try again on my next shift, but these technical issues do merit a<br />
mention. They also rely on plugins Adobe no longer supports, posing<br />
security risk (an issue aside from the bugs).</p>
<p>Kind regards,</p>
<p>[Roy]
</p></blockquote>
<p>Her answer was: &#8220;Have you tried using a different web browser?&#8221;</p>
<p>Of course she wasn&#8217;t using GNU/Linux or anything &#8220;Open Source&#8221;. This does not constitute an actual solution.</p>
<p>In 2020 the following was sent:</p>
<blockquote class="evidence"><p>
&#8212;&#8212;&#8211; Forwarded Message &#8212;&#8212;&#8211;<br />
Subject:     xxxx &#8211; Things to do<br />
Date:     Thu, 26 Nov 2020 11:38:01 +0000<br />
From:     xxxx<br />
To:     xxxx<br />
CC:     xxxx</p>
<p>Hi All,</p>
<p>In October I issued Linux Training via xxxx. Can you all please ‘acknowledge’ this on your portal to show that you have opened and read it.</p>
<p>I also need you to ensure ALL training modules issued on xxxx i.e information security and documents issued i.e IMS Awareness presentation have been completed by the end of your next shift.</p>
<p>It is essential these tasks are carried out prior to our ISO Audit next week.</p>
<p>Kind Regards,
</p></blockquote>
<p>Well, those training modules and ISO guidelines weren&#8217;t even followed by Sirius. We gave examples of this before. In some cases, there were efforts to meet standards only <b>after</b> a certificate had been granted.</p>
<p>Sheesh. I&#8217;m not supposed to say this in public, am I?</p>
<p>What did those audits mean anyway? What did the above &#8220;ISO Audit&#8221; actually check? That the cookie drawer is properly locked when Office staff goes to retrieve some hot chocolate milk from the machine?</p>
<p><span class="pullQuote" style="width:200px">&#8220;In the next few parts we&#8217;ll show what Sirius did in practice, not in theory, and what it told staff, not ISO auditors.&#8221;</span>Some other messages were banal. They indicated a certificate had been granted (in other words, Sirius basically bought one) after minimal so-called &#8216;audits&#8217; and staff sending a bunch of numbers from the back of computers (as if that means anything at all).</p>
<p>ISO is a joke. When it comes to this administrivia, ISO created just another &#8216;cash cow&#8217; for itself.</p>
<p>In the next few parts we&#8217;ll show what Sirius did in practice, not in theory, and what it told staff, not ISO auditors. It&#8217;s one heck of a clusterf**k with the company&#8217;s data scattered all over the place. That includes clients&#8217; data, even private keys and passwords.</p>
]]></content:encoded>
			<wfw:commentRss>https://schestowitz.com/Weblog/archives/2023/01/24/buying-iso-certification/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>ISO Certificates Are Junk (and Sirius Proves This)</title>
		<link>https://schestowitz.com/Weblog/archives/2023/01/23/iso-certificates-are-junk/</link>
		<comments>https://schestowitz.com/Weblog/archives/2023/01/23/iso-certificates-are-junk/#comments</comments>
		<pubDate>Mon, 23 Jan 2023 05:09:22 +0000</pubDate>
		<dc:creator><![CDATA[Roy Schestowitz]]></dc:creator>
				<category><![CDATA[Open Source]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://schestowitz.com/Weblog/?p=7422</guid>
		<description><![CDATA[Video download link &#124; md5sum 07a2f3b98615ee2d67a59e46c7ac4f8e ISO as Meaningless Certificates Mill Creative Commons Attribution-No Derivative Works 4.0 Summary: Sirius &#8216;Open Source&#8217; has used &#8220;ISO&#8221; as a catch-all talking point since 2019 in spite of doing illegal, unethical and truly dubious things while failing really badly at security IN OUR last post we started the first [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><em><a href="http://techrights.org/videos/iso-facade.webm" title="Video file of ISO as Meaningless Certificates Mill">Video download link</a> | md5sum <code>07a2f3b98615ee2d67a59e46c7ac4f8e</code></em><br />
<b>ISO as Meaningless Certificates Mill</b><br />
Creative Commons Attribution-No Derivative Works 4.0</p>
<div style="width: 480px; max-width: 100%;" class="wp-video"><video class="wp-video-shortcode" id="video-7422-2" width="480" height="340" poster="http://techrights.org/videos/iso-facade.gif" preload="metadata" controls="controls"><source type="video/webm" src="http://techrights.org/videos/iso-facade.webm?_=2" /><a href="http://techrights.org/videos/iso-facade.webm">http://techrights.org/videos/iso-facade.webm</a></video></div>
<p><em><b>Summary</b>: <a href="http://techrights.org/wiki/Sirius_Open_Source" title="Sirius Open Source">Sirius &#8216;Open Source&#8217;</a> has used &#8220;ISO&#8221; as a catch-all talking point since 2019 in spite of doing illegal, unethical and truly dubious things while failing <b>really</b> badly at security</em></p>
<p>IN OUR last post we started the first part of <em>several parts</em> about ISO, commencing a separate (sub)series of posts that may take about a week to finish.</p>
<p>Sirius &#8216;Open Source&#8217; disregards security advice, deems commentary that it lacks security staff to be &#8220;defamatory&#8221; (actually it&#8217;s perfectly factual), and moreover it is ignoring advice from technical people who do have a clue &#8212; all this while failing to do basic things like change passwords after a major breach.</p>
<p>If <a href="http://techrights.org/wiki/ISO" title="ISO">ISO</a> considers that to be &#8220;OK&#8221;, then that says <b>a lot</b> about ISO.</p>
<p align="center">
<a href="http://techrights.org/wp-content/uploads/2023/01/ISO-reality.png"><img src="http://techrights.org/wp-content/uploads/2023/01/ISO-reality.png" alt="ISO perception; ISO reality" width="349" height="229" class="aligncenter size-full wp-image-169515" /></a></p>
]]></content:encoded>
			<wfw:commentRss>https://schestowitz.com/Weblog/archives/2023/01/23/iso-certificates-are-junk/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="http://techrights.org/videos/iso-facade.webm" length="67809786" type="video/webm" />
		</item>
		<item>
		<title>When ISO Becomes Meaningless Paperwork</title>
		<link>https://schestowitz.com/Weblog/archives/2023/01/03/iso-paper-mill/</link>
		<comments>https://schestowitz.com/Weblog/archives/2023/01/03/iso-paper-mill/#comments</comments>
		<pubDate>Tue, 03 Jan 2023 02:48:44 +0000</pubDate>
		<dc:creator><![CDATA[Roy Schestowitz]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://schestowitz.com/Weblog/?p=7182</guid>
		<description><![CDATA[What if ISO knew the truth? Summary: There are no proper and truly compliance-driven procedures that are being followed, actively used, or even vaguely specified by poor leadership at Sirius ‘Open Source’; it&#8217;s all improvised, hugely deficient, not even remotely compliant, and changes are sometimes made retroactively due to lapses and mistakes (compliance or merely [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><em>What if ISO knew the <strong>truth</strong>?</em></p>
<p align="center">
<a href="http://techrights.org/wp-content/uploads/2023/01/iso-brag.png"><img src="http://techrights.org/wp-content/uploads/2023/01/iso-brag.png" alt="International Organization for Standardization (ISO) brag" width="441" class="aligncenter size-full wp-image-168466" /></a>
</p>
<p><em><b>Summary</b>: There are no <b>proper</b> and truly <b>compliance-driven</b> procedures that are being followed, actively used, or even vaguely specified by poor leadership at <a href="http://techrights.org/wiki/Sirius_Open_Source" title="Sirius Open Source">Sirius ‘Open Source’</a>; it&#8217;s all improvised, hugely deficient, <b>not even remotely compliant</b>, and changes are sometimes made retroactively due to lapses and mistakes (compliance or merely appearance thereof, albeit only &#8220;after the act&#8221;); eventually there are attempts to shoot the messengers &#8212; those who have actually cautioned about those concerning things for several years already</em></p>
<p>THE <em>&#8220;Conclusion&#8221;</em> part of the report (a document we&#8217;ll publish tomorrow as PDF) is included at the bottom of this post. Worry not, it&#8217;s not the end of the series, only the end of this report; we have <b>plenty</b> left to show and to explain after that. We&#8217;re eager to show to the world what  Sirius ‘Open Source’ Inc./Limited/Corporation truly is.</p>
<p>As a teaser of sorts, consider how poorly the company was handling data and information. It was getting worse over time because skilled people were leaving the company, making way for the <em>&#8220;Google is your friend&#8221;</em> mantra. This aforementioned mantra was something along the lines of, &#8220;trust big companies&#8221;, you can give them any data we have. Trust them, they&#8217;re big! Sure, they also spy for a government.</p>
<p>Data of high-profile clients, <b>both past and present</b>, was naturally left scattered all over the place, sometimes even outside the country. And to give just one example (there are so many; some will be covered later this month and next month), colleagues have cognition reports and incremental/full load reports on <b>local</b> &#8212; as in personal and offsite &#8212; machines (this is indirectly related to patients&#8217; data) with no protocol or guidelines for removing these. There&#8217;s potentially sensitive data on people&#8217;s machines at home and we&#8217;ve already witnessed mistakes made by the clients themselves (like patients&#8217; names or similar data showing up by mistake/accident).</p>
<p><b>THIS SHOULD NEVER HAPPEN!</b></p>
<p>In a saner world, everything would be uploaded to a firewalled file server located on the client&#8217;s own network, accessible in some secure fashion, without the data ever leaving the network, not even metadata. But when a company like Sirius handles its E-mail via AWS and AWS is also the host of OTRS (ticketing), one is expected to just upload files to AWS and transmit the stuff over E-mail (i.e. open relays). <b>No encryption</b>. I was repeatedly <em>told off for using PGP in my E-mails</em>.</p>
<p>There are serious ramifications for data protection and adherence to law, as there are unpatched old machines and perhaps backups that contain such files &#8212; a ticking time bomb. And even way after they&#8217;re no longer a client (<em>years</em> later), the example above serves to show that the problem does not go away. Not even when the contract ends (or gets terminated). </p>
<p>The sad reality is that the company, Sirius (so-called &#8216;open source&#8217;), is terrified about clients finding out how reckless and incompetent the company gradually became. Clients simply come to assume the reputation earned in <b>past</b> decades persists to date. They&#8217;re trusting a company run by a person divorced twice, whose kids refuse to even speak to him. How can deep trust be established with people who (if they get caught) simply pretend nothing bad happened and instead of apologising would rather get aggressive, even <em>combative</em>, to cover up the abuse?</p>
<p>The text below mentions <a href="http://techrights.org/wiki/ISO" title="ISO">ISO</a>, security incidents, and then the company&#8217;s attempts to shoot the messenger (who cautioned about those issues along with many other issues). The in-depth analysis of the witch-hunt will follow after this report is published in full (some time tomorrow).</p>
<hr />
<h4>Conclusion</h4>
<p>To summarise, Sirius should simply admit out in the open: &#8220;we&#8217;ve deviated away from our mission,&#8221; and moreover Sirius ignores warnings about security (ISO deserves to know about phonies and posers at security).</p>
<p>Roy internally cautioned about this several times over the years. Later, when some providers suffers security breaches (as Roy predicted) Sirius neither reset the passwords nor left the compromised providers.</p>
<p>To reiterate what was stated at the start, what&#8217;s alleged here is factually correct and evidence-backed. No URLs are provided, but URLs can be provided shall they be requested. Brevity still matters and much remains to be told.</p>
<p>In regards to the weak accusations leveraged to avoid paying compensation to Roy and Rianne, here again is the gist of the underlying issue/s:</p>
<p>1. no due process<br />
2. no evidence presented (or claims merely alluded to without context/link)<br />
3. gross accusation inflation<br />
4. guilt by association (identical letter, too)<br />
5. the company has a history doing this to couples, e.g. one blind colleague based in Germany; it was very serious and it went to court (cost the company or its Directors &#8212; the founder and his wife &#8212; a lot of money, went on for a long time, settled at the end)</p>
<p>The document is far from complete. Roy and Rianne have documents, have screenshots, links to official documents from Companies House etc.</p>
]]></content:encoded>
			<wfw:commentRss>https://schestowitz.com/Weblog/archives/2023/01/03/iso-paper-mill/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>In Sirius Open Source You Get Told Off &#8212; and Even Threatened! &#8212; for Minding Security and Privacy</title>
		<link>https://schestowitz.com/Weblog/archives/2022/12/20/security-and-privacy-sirius-open-source/</link>
		<comments>https://schestowitz.com/Weblog/archives/2022/12/20/security-and-privacy-sirius-open-source/#comments</comments>
		<pubDate>Tue, 20 Dec 2022 16:35:15 +0000</pubDate>
		<dc:creator><![CDATA[Roy Schestowitz]]></dc:creator>
				<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">https://schestowitz.com/Weblog/?p=7106</guid>
		<description><![CDATA[Summary: The Sirius ‘Open Source’ management made the decision (without any consultation with the staff affected) to outsource key operations to foreign, third-party entities that are subjected to the US government&#8217;s prying eyes and several of the National Security Agency&#8217;s programs; this affected clients as well (usually without their awareness, let alone consent) THIS is [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><a href="http://techrights.org/wp-content/uploads/2022/12/putin-koala.png"><img src="http://techrights.org/wp-content/uploads/2022/12/putin-koala.png" alt="Putin koala: I got all of his passwords! Not my fault!" width="480" class="aligncenter size-full wp-image-167834" /></a></p>
<p><em><b>Summary</b>: The <a href="http://techrights.org/wiki/Sirius_Open_Source" title="Sirius Open Source">Sirius ‘Open Source’</a> <b>management</b> made the decision (without any consultation with the staff affected) to outsource key operations to foreign, third-party entities that are subjected to the US government&#8217;s prying eyes and several of the National Security Agency&#8217;s programs; this <b>affected clients as well</b> (usually without their awareness, let alone consent)</em></p>
<p>THIS is the last part of the third section of a report I left with the company before leaving at the start of this month. There will be a lot more information about this scandal next month. Recent E-mails are appended below (with certain stuff redacted for privacy&#8217;s sake). </p>
<p><b>I cautioned about this repeatedly (for about 4 years) and suffered retribution, threats, and more</b>. <u>Nothing</u> has improved since then.</p>
<p>As just a little sample, please see the E-mails at the bottom (recent); shared in the future  will be some longer E-mails about this issue.</p>
<p>But first&#8230; the report.</p>
<hr />
<p>The morale around that time was low, set aside COVID-19 becoming a growing problem, along with lock-downs. Roy noted that in order to comply with the law he cannot post clients&#8217; details on the Slack network. So he chose to obey the regulations and the law, in line with security standards. Stuff like &#8220;hi&#8221; is probably considered OK and safe enough for Slack, but not addresses, passwords etc. Things have not improved since, as the final section notes again (with examples).</p>
<p>This long section, along with written messages as evidence, is very important. Bad leadership worsened the corporate climate and changed how people viewed the company from within, if not from the outside as well.</p>
<p>This document now proceeds to a discussion about the latest and maybe the final blow. The company already had capacity issues (not enough staff to cover shifts) and now it&#8217;s even worse.</p>
<p>Roy and Rianne hoped to prevent a &#8216;death spiral&#8217; and ironically enough it seems like the company wants to accelerate its own &#8216;death spiral&#8217;, due to tactless, insensitive remarks.</p>
<hr />
<p>One of <b>many</b> messages to that effect &#8212; messages which I was sending <u>for years</u> to highlight the problem. Of course nothing was done about this; usually there was not even as much as a reply. Hush hush as a company-wide policy&#8230;</p>
<p>This one is from August of this year:</p>
<blockquote>
<pre>
Date: Tue, 30 Aug 2022 09:00:50 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.6) Gecko/20050317
 Thunderbird/1.0.2 Mnenhy/0.7.4.0
From: Roy Schestowitz
Subject: Handover to Shift 2 (30/08/22)
To: [whole team]

[...]

https://www.darkreading.com/cloud/lastpass-data-breach-source-code-stolen

users need to change all the passwords they have there and not keep them
there if they value real security not paper mills.
</pre>
</blockquote>
<p>Another one from August of this year:</p>
<blockquote>
<pre>
Date: Thu, 11 Aug 2022 03:10:53 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.6) Gecko/20050317
 Thunderbird/1.0.2 Mnenhy/0.7.4.0
Content-Language: en-US
From: Roy Schestowitz
Subject: Slack admits to leaking hashed passwords for five years
To: [whole team]
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

https://nakedsecurity.sophos.com/2022/08/08/slack-admits-to-leaking-hashed-passwords-for-three-months/

Does not surprise me at all. They only admit this because they got
caught, hence they need to spin this somehow, belittling the severity,
just as LastPass did after several blunders (it had suffered a breach).
The way forward is self-hosting and encrypting things (on server one
controls, not leasing).
</pre>
</blockquote>
]]></content:encoded>
			<wfw:commentRss>https://schestowitz.com/Weblog/archives/2022/12/20/security-and-privacy-sirius-open-source/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
