{"id":386,"date":"2019-04-14T22:37:18","date_gmt":"2019-04-14T20:37:18","guid":{"rendered":"http:\/\/blog.unifr.ch\/cva\/?p=386"},"modified":"2019-04-16T14:07:55","modified_gmt":"2019-04-16T12:07:55","slug":"troopers-a-con-to-make-the-world-a-safer-and-funnier-place","status":"publish","type":"post","link":"https:\/\/blog.unifr.ch\/cva\/2019\/04\/14\/troopers-a-con-to-make-the-world-a-safer-and-funnier-place\/","title":{"rendered":"Troopers: a con to make the world a safer &#8211; and funnier &#8211; place"},"content":{"rendered":"\n<p>David Bozzini and I experienced another international security conference, taking a new step in our investigation of the customs and codes of the infosec community. The <a href=\"https:\/\/www.troopers.de\">Troopers conference<\/a>, that we attended between 18<sup>th<\/sup> to 22<sup>nd<\/sup> March, was organized by ERNW in Heidelberg. As always, since I still have tons of field notes to process, I will merely give a quick overview of what we got and \u2013 just the once will not hurt \u2013 I will proceed in a quantitative way.<\/p>\n\n\n\n<h4>2 days of hacking (or attempt of)<\/h4>\n\n\n\n<div class=\"is-layout-flex wp-container-3 wp-block-columns has-2-columns\">\n<div class=\"is-layout-flow wp-block-column\">\n<p>We first attended the \u201chacking 101\u201d training course and despite our lack of technical knowledge, we could at least become a little bit more familiar with some tools that are used to perform attacks on networks, web applications and software. We often couldn\u2019t do much more than simply replicate the instructions without understanding exactly what we were actually doing, but our challenge was probably not as big as our tutors\u2019 that were really surprised to see two anthropologists barge in there course!<\/p>\n<\/div>\n\n\n\n<div class=\"is-layout-flow wp-block-column\">\n<figure class=\"wp-block-image\"><img loading=\"lazy\" width=\"1024\" height=\"986\" src=\"http:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_4209-e1555090796801-1024x986.jpg\" alt=\"\" class=\"wp-image-387\" srcset=\"https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_4209-e1555090796801-1024x986.jpg 1024w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_4209-e1555090796801-300x289.jpg 300w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_4209-e1555090796801-768x739.jpg 768w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_4209-e1555090796801.jpg 1152w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Sylvain captured right in the midst of things<\/figcaption><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>Fortunately, they, and the other attendees, were kind enough not to run out of patience. Actually, the way they assist us resonates quite well with the whole atmosphere of this con where people have been very open and curious about our approach to the field. People we met were not solely excellent but also very open and willing to feed us with \u201ctranslations\u201d of technical stuff and deeply-engaged conversations. A remarkable openness, thus, that somehow contrasts with my initial apprehension when I read the agenda for the first time and realized that I could not understand at least half of the <a href=\"https:\/\/www.troopers.de\/troopers19\/agenda\/#agenda-day--2019-03-20\">titles of the talks<\/a>&#8230; <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" width=\"1024\" height=\"768\" src=\"https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_4211-1024x768.jpg\" alt=\"\" class=\"wp-image-389\" srcset=\"https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_4211-1024x768.jpg 1024w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_4211-300x225.jpg 300w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_4211-768x576.jpg 768w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_4211.jpg 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>David and Sylvain trying to communicate through a terminal&#8230;<\/figcaption><\/figure>\n\n\n\n<h4>2 days for 42 presentations<\/h4>\n\n\n\n<pre class=\"wp-block-preformatted\">Is that really a coincidence that 42 presentations were planned?<\/pre>\n\n\n\n<p>I genuinely admire the usual kind of poetical phrasings that can provide titles of presentations and papers in computer security. The basic arsenal is indeed composed of military vocabulary, unintelligible acronyms and figurative images such as cloud, sorcery, hex or even mimikatz (a world which I somehow naively connect to a lovely kitten \u2013 and which is in fact a powerful tool to extract login and password information on Windows). The whole usually constitutes an enigmatic headline (at least for me). The variation of those three ingredients provide a general orientation: in the case of troopers, it was clearly a very technical-oriented approach with a clear military terminology in line with the moto of the con: <em>make the world a safer place!<\/em><\/p>\n\n\n\n<p>All of that is to say that the three tracks of the conference, Attack &amp; Research, Defense and Management, and Active Directory Security, offered a coherent frame with 42 presentations that attracted around 500 experts from more than 20 different countries. I say experts because this is really an expert conference, in the sense that outsiders like me cannot really get into the presentation. Not at all because one wouldn\u2019t let me in but simply because the talks were deeply involved into technical details that are far beyond my understanding of IT. Luckily, I met a lot of great women and men, whose current positions and careers tend to confirm that this event is really a place for specialists to meet and learn from each others, and who were very keen to make me understand their research by decipher it into \u201cplain English\u201d!  <\/p>\n\n\n\n<p>There were however some talks that really got my full attention. A first one was the panel on ethics, preceded by a presentation of Enno Rey where he depicted three general approaches to solve ethical questioning (consequentialism, deontology and principlism), illustrating them with some (mostly-)true examples. As I often said, one interesting point for me as anthropologist is the fact that the people in the infosec field are generally quite reflexive and this panel was a good illustration of this. The discussion raised a lot of concrete issues and choices that the guests had faced during their careers. \u201cWhen there is a doubt, there is no doubts\u201d is a sentence that I heard several times and show how uncomfortable some situations might be.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" width=\"1024\" height=\"768\" src=\"https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2438-1024x768.jpg\" alt=\"\" class=\"wp-image-390\" srcset=\"https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2438-1024x768.jpg 1024w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2438-300x225.jpg 300w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2438-768x576.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>The roundtable on ethics<\/figcaption><\/figure>\n\n\n\n<p>Another interesting talk was a presentation of a new initiative : a bug hunting event for connected car. During two weeks, hackers gathered to hack components of smart cars, and the better and more dangerous their findings were, the higher their bounty! \u201cSeeing that this kind of security program occurs in the car industry is a sign that things are slowly evolving but there is still a lot of work to do\u201d, said a participant.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">And guess how many vulnerabilities they found in the car?<br>Well... 42, of course!<\/pre>\n\n\n\n<h4>A frightening 4-hour round-table on IoT and medical device security<\/h4>\n\n\n\n<p>Why frightening? Because of a terrible lack of security awareness regarding many connected devices that can demonstrably be hacked. Examples were given, but with a lot of caution not to disclose any identifying details. The Internet of Things (IoT) is a booming industry and, as a consequence, a rising source of preoccupation for security-focused person. Last year, one of the round tables was on surveillance through the IoT and it seems that the participants came to the somehow sad conclusion that people do not care enough about such an important topic, and the default settings are far from sufficient from a security and privacy-oriented perspective. The problems are numerous: these devices are made with cheap (cheaper, even the cheapest!) hardware components and engineered with a lack of awareness (or caution?) in regards to \u201cwhat could possibly go wrong\u201d. Moreover, there are not enough incentives to change the regulation in that domain, with \u201csecurity components\u201d often deemed as a feature that you can add on top of things, which made a participant say: \u00abSecurity is not a black box that you can put in your device, it has to be implemented from the beginning\u00bb.<\/p>\n\n\n\n<p>What I found interesting during this round table is that all the participants seemed to be quite aware of why IT security might not be a top priority preoccupation for medical doctors and why safety has always been prioritized both from the manufacturers and the practitioners. However, they were also quite aware of the risk that a lack of security could imply, leading at worst to death. Are there any deaths attributable to a lack of security in IoT medical device? Yes, very likely, even though the numbers cannot be easily estimated since it is very difficult to even notice such a hack. One participant also argued that a young teenager stuck in a hospital room could just want to have fun with his PC and then incidentally breaks some connected devices by \u201ckilling time with nmap\u201d, a tool used to scan the network \u2013 it happened to him!<\/p>\n\n\n\n<h4>1 IoT badge with 943 accepted tokens<\/h4>\n\n\n\n<p>Yes, the conference badge of trooper was an IoT device, and yes, you could hack it! Actually, we were exhorted to do so and 943 hacks were recorded! You could also play with it, weld \u201cshitty addons\u201d on it (see the fox head in the first picture below) and, even, write your name (or whatever else) on it! I believe this badge represents on its own such an indicative object of the spirit of the conference that it would deserve a whole post on its own.  <\/p>\n\n\n\n<ul class=\"is-layout-flex wp-block-gallery-4 wp-block-gallery columns-3 is-cropped\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"768\" height=\"1024\" src=\"http:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2450-e1555090242362-768x1024.jpg\" alt=\"\" data-id=\"391\" data-link=\"http:\/\/blog.unifr.ch\/cva\/?attachment_id=391\" class=\"wp-image-391\" srcset=\"https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2450-e1555090242362-768x1024.jpg 768w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2450-e1555090242362-225x300.jpg 225w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"839\" height=\"1024\" src=\"http:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2455-e1555090197201-839x1024.jpg\" alt=\"\" data-id=\"392\" data-link=\"http:\/\/blog.unifr.ch\/cva\/?attachment_id=392\" class=\"wp-image-392\" srcset=\"https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2455-e1555090197201-839x1024.jpg 839w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2455-e1555090197201-246x300.jpg 246w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2455-e1555090197201-768x938.jpg 768w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2455-e1555090197201.jpg 1824w\" sizes=\"(max-width: 839px) 100vw, 839px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"768\" height=\"1024\" src=\"http:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_4237-768x1024.jpg\" alt=\"\" data-id=\"393\" data-link=\"http:\/\/blog.unifr.ch\/cva\/?attachment_id=393\" class=\"wp-image-393\" srcset=\"https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_4237-768x1024.jpg 768w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_4237-225x300.jpg 225w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_4237.jpg 1152w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"1024\" height=\"768\" src=\"http:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2462-1024x768.jpg\" alt=\"\" data-id=\"396\" data-link=\"http:\/\/blog.unifr.ch\/cva\/?attachment_id=396\" class=\"wp-image-396\" srcset=\"https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2462-1024x768.jpg 1024w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2462-300x225.jpg 300w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2462-768x576.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><\/ul>\n\n\n\n<h4>5 days of great food and Club Mate at will<\/h4>\n\n\n\n<p>As I heard it many times, this con is not only about hearing interesting talks, but mostly about meeting people and being part of the \u201cTROOPERS family\u201d. And what is the best way to boost interactions? Food, certainly! (At least it works with me!) It is undeniable that we have been spoiled during the numerous coffee breaks and meals, as much as it is undeniable that these moments were key to meet new people. Actually, it is during breaks that I had the most insightful discussions of the conference, be them on ethics, bug bounty programs or the future of infosec. Many thanks to all our interlocutors for sharing their views with us, and many thanks to the organizers for the great food!<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" width=\"1024\" height=\"962\" src=\"http:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2420-e1555090389322-1024x962.jpg\" alt=\"\" class=\"wp-image-394\" srcset=\"https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2420-e1555090389322-1024x962.jpg 1024w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2420-e1555090389322-300x282.jpg 300w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2420-e1555090389322-768x722.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>The Club Mate Altar<\/figcaption><\/figure>\n\n\n\n<h4>Thousands of jokes<\/h4>\n\n\n\n<p>Humor is a very interesting topic for me and I believe that it can really help to grasp others\u2019 worlds. In-jokes tell us about the sense of being part of a community while joking relationships can reveal structural power relationships among a group. Who is allowed to make what kind of jokes? How? With whom? When? Why? On what topic? For which purpose? Making a joke is a performance, but it is also performative: it affects the social reality by softening conflicts or on the contrary strengthening antagonism, by contesting power relationships or by undermining the burden of uncertainty or stress. It is also a very powerful rhetorical tool. Further, humor is a very delicate topic, since explaining a joke often kills it.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">A man disguised in a frog suit? A burning hat? 3 Nahuels? Some shining leds everywhere? Some Alka-Seltzer deposited on the table in the morning of the last day of the con? Some \"troopers-condoms\" to make the world a safer place? Again some Nahuels?<\/pre>\n\n\n\n<p>\u201cDid you have fun at Troopers?\u201d This is how Enno Rey begun his closing talk on Thursday. And indeed, Troopers was a lot of fun, for me, but obviously with many people I talked to. <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" width=\"1024\" height=\"768\" src=\"https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2461-1024x768.jpg\" alt=\"\" class=\"wp-image-395\" srcset=\"https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2461-1024x768.jpg 1024w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2461-300x225.jpg 300w, https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_2461-768x576.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>David Bozzini and I experienced another international security conference, taking a new step in our investigation of the customs and codes of the infosec community. &hellip; <\/p>\n","protected":false},"author":2,"featured_media":398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[15,16],"tags":[12,13],"jetpack_featured_media_url":"https:\/\/blog.unifr.ch\/cva\/wp-content\/uploads\/2019\/04\/IMG_4214.jpg","_links":{"self":[{"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/posts\/386"}],"collection":[{"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/comments?post=386"}],"version-history":[{"count":11,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/posts\/386\/revisions"}],"predecessor-version":[{"id":408,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/posts\/386\/revisions\/408"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/media\/398"}],"wp:attachment":[{"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/media?parent=386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/categories?post=386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.unifr.ch\/cva\/wp-json\/wp\/v2\/tags?post=386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}