[wp-trac] [WordPress Trac] #5066: Anonymize update checking
WordPress Trac
wp-trac at lists.automattic.com
Sun Dec 13 23:19:06 UTC 2009
#5066: Anonymize update checking
-------------------------------------------+--------------------------------
Reporter: zamoose | Owner: anonymous
Type: enhancement | Status: reopened
Priority: normal | Milestone: 3.0
Component: Administration | Version:
Severity: normal | Resolution:
Keywords: has-patch 2nd-opinion privacy |
-------------------------------------------+--------------------------------
Comment(by zamoose):
Reposting a forum entry I penned over at WPTavern. Reposting it here for
the "if it isn't in Trac, it doesn't exist" factor.
A common complaint from those in favor the the status quo is: what harm
could there possibly be in storing your URL? Allow me to give two examples
to illustrate potential for harm.
'''Military/Gov't Contractor blogging environment'''
I don't know how many of you have worked for a military or US gov't
contractor in the past, but one of their concerns when it comes to
information disclosure is the revelation of employee names to third
parties. Foreign intelligence officers (FIOs) from e.g. Syria, North
Korea, China, Iran, etc. are always on the lookout for employee
names/identifiable information so that they can potentially exploit that
person as an intelligence asset, either via compromising their home (or
work) machines with spear-phishing attacks or via direct physical
surveillance. The vast majority of proprietary/classified information
leaks come not through direct technological hacks/cracks but through
social engineering and careful use of human factors (see Mitnick, et al.)
In the event that a contractor is using WordPress internal to the company
and employing custom themes or plugins whose authors (as is a good
practice in the WP community) have identified themselves, the .org site is
potentially storing said information in a way directly tied to the
company. If WordPress.org inadvertantly discloses the information in
question, either through human error on their part or through a security
breach by FIOs, you now have exploitable humint on discrete employees
working for said contractors.
If it was widely known, this fact alone is enough to make most
contractors' IT departments ban WordPress outright. At the very least,
they will disable update checking in its entirety. Neither of these
situations is particularly a good thing.
'''Political Dissident blogging environment'''
I referred to FIOs above. For hostile/totalitarian regimes, FIOs generally
serve two purposes: exploitation of information from gov't interests and
observation/intimidation of political dissidents.
As in the gov't contractor example I gave above, if dissidents are using
any custom themes or plugins, their information could be accidentally
disclosed to FIOs which could either lead to direct physical danger for
themselves (if they are living within the borders of an oppressive state)
or, in the case of ex-pats with families that remain behind, danger for
their families still under the sway of these states.
Or, say a plugin was written that made your stylesheet go green in support
of the protestors in Iran. If WP.org's data was compromised, Iranian IOs
would have access to a comprehensive list of folks running said plugin
(and a list of everyone using the Farsi locale) and thus be able to narrow
their intelligence-gathering and intimidation efforts based solely upon an
installed plugin.
If you think I'm being paranoid here, please see the recent examples of
Egypt and Cuba jailing political bloggers and the Iranian intelligence
services threatening expats
(http://online.wsj.com/article/SB125978649644673331.html?mod=WSJ_hpp_LEFTTopStories)
(I'm not even going to get into the area of compulsory legal disclosure of
the info -- i.e., a third party brings suit or attempts to get law
enforcement to retrieve .org's data based upon discovery or a warrant.)
It's not "just" a URL in these situations, it's real people whose real
lives stand to be substantively affected in the event of a disclosure,
unintentional or otherwise.
--
Ticket URL: <http://core.trac.wordpress.org/ticket/5066#comment:34>
WordPress Trac <http://core.trac.wordpress.org/>
WordPress blogging software
More information about the wp-trac
mailing list