[Bloat] LWN article discussing the FCC blunder, as well a VW's (The Internet of criminal things)

David Collier-Brown davec-b at rogers.com
Fri Sep 25 08:20:48 EDT 2015


That's supposed to be a free link!  I tried it with an incognito browser 
and saw "The following subscription-only content has been made available 
to you by an LWN subscriber..."

Full text below (:-()

--dave


On 24/09/15 02:30 PM, Rich Brown wrote:
> Would you provide a link to the FCC article (for those of us who don't 
> have a LWN subscription)? Thanks.
>
>> On Sep 24, 2015, at 7:44 AM, David Collier-Brown <davec-b at rogers.com 
>> <mailto:davec-b at rogers.com>> wrote:
>>
>>   * http://lwn.net/SubscriberLink/658198/233be09044fdb1e5/
>>     -- 
>>     David Collier-Brown,         | Always do right. This will gratify
>>     System Programmer and Author | some people and astonish the rest
>>     davecb at spamcop.net            |                      -- Mark Twain
>>
>> _______________________________________________
>> Bloat mailing list
>> Bloat at lists.bufferbloat.net <mailto:Bloat at lists.bufferbloat.net>
>> https://lists.bufferbloat.net/listinfo/bloat
>

  The Internet of criminal things


    [LWN subscriber-only content]



Welcome to LWN.net
The following subscription-only content has been made available to you 
by an LWN subscriber. Thousands of subscribers depend on LWN for the 
best news from the Linux and free software communities. If you enjoy 
this article, please consider accepting the trial offer on the right. 
Thank you for visiting LWN.net!

Free trial subscription
Try LWN for free for 1 month: no payment or credit card required. 
Activate your trial subscription now and see why thousands of readers 
subscribe to LWN.net.

By Jonathan Corbet
September 23, 2015 We live in an increasingly software-defined world, a 
trend which has both good and bad aspects. The recent revelation [PDF] 
that Volkswagen has been selling cars that have been explicitly built to 
defeat emissions tests highlights one of the bad ones: software control 
makes the incorporation (and hiding) of antifeatures easy. We are, 
unfortunately, going to see many other incidents like this one, even 
though we have long had a vision of what at least a partial solution to 
this problem would look like.

Cars, at this point, can be thought of as a rolling network of computers 
with some interesting peripheral devices, some of which may involve 
internal combustion technology. The details of an engine's operation 
have been under software control for a long time, and replacement ROMs 
changing a car's performance characteristics have been commonplace for 
nearly as long. Modern "trusted execution" technology makes the creation 
of such ROMs more difficult, but that turns out not to be an obstacle if 
the company wanting to subvert an engine's control software is the 
manufacturer itself.

Volkswagen's hack must have been easily done: one could, for example, 
have the engine-control software apply a different set of parameters 
when a connection to the on-board diagnostic port is detected. No need 
for the attachment of a separate "defeat device" (as the press seems to 
like to call it) and no need for an elaborate company-wide conspiracy. A 
single commit by a single engineer at the behest of a single manager 
would suffice. In retrospect, the surprising part of this story is not 
that somebody at Volkswagen gave in to the temptation to engage in a bit 
of benchmark cheating; the surprise is that far more incidents of this 
nature have not yet come to light.

The consequences of this cheating are severe. Emissions testing is a key 
part of a strategy that has significantly improved air quality in 
American cities over the last several decades. Subverting that testing 
means more poison in the air, more health problems, and more 
environmental degradation. It is a criminal act on a massive scale. The 
consequences for Volkswagen are likely to be severe — but probably not 
severe enough.

As many others have pointed out, VW was certainly helped by the ease 
with which antifeatures can be hidden in software shipped to others. 
When we get into a car, we trust our lives and health to a large body of 
proprietary control software; the source is unavailable, so we cannot 
inspect it for bugs, vulnerabilities, or explicit evil. Legal regimes in 
much of the world make a crime out of reverse-engineering this software, 
so we cannot try to figure out how it operates even without the source. 
Digital rights management (DRM) mechanisms built into the hardware make 
that reverse engineering even harder; this DRM may even be mandated by 
government agencies fearful of individuals modifying their own 
engine-control software.

Those in favor of such DRM requirements should bear in mind that, by 
some counts, VW has shipped over 11 million cars with corrupt 
engine-control software in it. DRM has, in the end, enabled the crime it 
was meant to prevent, and on a far wider scale that would have otherwise 
been possible.

Cars are not the only vehicle (so to speak) for software that can hide 
user-hostile antifeatures. In the US, the Federal Communications 
Commission is currently pondering changes that would make it far harder 
to put free software onto WiFi devices. One need not even consider the 
damage such rules may do to free-software development, which has been 
the primary source of innovation and improvement in this area, to see 
where such rules could lead. We cannot expect corporations, many of 
which show levels of restraint inferior to that of a typical toddler, to 
resist the temptation to put spyware or malware into their widely 
distributed devices sitting in privileged positions on thousands of 
networks. We cannot really even trust them to adhere to the spectrum 
rules that are the motivation for the proposed restrictions; VW's lack 
of respect for emissions rules has made that clear.

Similar problems exist with voting machines, Internet-connected 
appliances, phone handsets, fitness monitors, set-top boxes, and more. 
Each of these devices is, at a minimum, in a position to spy on us. 
Keeping governmental fingers out of these devices is a challenge in its 
own right, but companies will often find a strong incentive to play 
games of their own. Companies that are struggling, or even those that 
fear a downturn in the next quarter's numbers, will often give in to 
that incentive; when all it takes is an easily hidden patch, why not?

This will not be the first time that somebody points out that it is hard 
to see a solution that doesn't involve making those patches harder to 
hide. That, of course, means moving toward something that looks a lot 
like free software. If VW's engine-control software were open (with 
reproducible builds so that the software running in a specific car could 
be verified), it would have been far harder for the company to get away 
with violating the rules for as long as it did. Source availability is 
far from a guarantee that the code will be reviewed or that any 
reviewers will actually find deliberately introduced antifeatures, but 
it improves the odds considerably. Many a company might find the 
backbone to resist temptation if it knew that its code would be reviewed 
by sharp-eyed outsiders. Said companies might just find the wherewithal 
to clean up the code and fix some of their bugs as well.
A free-software mandate for safety-critical (and privacy-critical) 
software seems unlikely to happen anytime soon, alas. Decriminalizing 
research into how these systems operate might be a more achievable goal, 
but there are challenges there too; the Electronic Frontier Foundation 
has run into significant opposition in its efforts to get a ruling that 
investigating automotive software is not a violation of the 
anti-circumvention provisions of the US Digital Millennium Copyright 
Act, for example. Hidden, proprietary software gives a lot of power to 
those who control it; they will not give it up willingly. As a result, 
we can, unfortunately, expect to continue to be subjected to 
surveillance and criminal behavior from the devices that we think we 
own. We can't say we weren't warned.


    *Did you like this article?*Please accept ourtrial subscription
    offer <https://lwn.net/Promo/sl-trial30-1/claim>to be able to see
    more content like it and to participate in the discussion.






-- 
David Collier-Brown,         | Always do right. This will gratify
System Programmer and Author | some people and astonish the rest
davecb at spamcop.net           |                      -- Mark Twain

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.bufferbloat.net/pipermail/bloat/attachments/20150925/e01c3100/attachment-0002.html>


More information about the Bloat mailing list