Profile

Scrapbook photo 1
Daniel Franke
Attended University of Florida
Lived in Acton, MA
78 followers|10,432 views
AboutPostsPhotosVideos

Stream

Daniel Franke

Shared publicly  - 
 
Ever wonder what a tiling window manager can do with 16,588,800 pixels? Now you know.

(Full-size image at http://i.imgur.com/1bSEwP7.png)
1
Add a comment...

Daniel Franke

Shared publicly  - 
 
I normally hold on to hardware a lot longer than three years, but I'm embarking on another high-performance crypto project and my current Opteron system was a serious disappointment to me while I was developing EARWORM. So it's time for a new workstation. +Eric Raymond might find some of my hardware selections a little familiar.

CPU: Intel Xeon E5-1650 (6-core, 3.5GHz)
Mobo: ASRock EPC612D8A
Memory: 4x16GB Kingston DDR4-2133 ECC
SSD: Intel 750 Series SSDPEDMW400G4R5 (400GB, PCIe)
Case: Fractal Design Define R4 Black Pearl (identical to my current one)
PSU: SeaSonic X-1250
CPU Fan: Noctua NH-U12DXi4

Resemblance to the Great Beast of Malvern is, amazingly, not the result of any direct influence. It wasn't until I had all these parts already picked out that I went back and look at Eric's specs and realized that we even picked the same damn obscure brand of after-market CPU fan.

You might notice that there's no GPU in the above specs. I'm planning to put in an R9 Fury in a month or two, but since those just hit the market last week and the Linux driver situation is still a bit chaotic, I'll be borrowing the 7850 from my old system for the time being. I'll also be (permanently) stealing the 4x1.5TB platter array from the old box.

If I weren't naming all my boxen after Adirondack peaks, I'd be tempted to name this one "perfectly-normal-beast".
2
Add a comment...

Daniel Franke

Shared publicly  - 
 
 
Sad But True

I found this in an image search and couldn't help but share.

#NotACrook   #SadButTrue  
1
Add a comment...

Daniel Franke

Shared publicly  - 
 
 
A personal story from a very white hat: What if Weev had just read one record and done “responsible disclosure”?
-------------------
One thing I’m hearing, as Andrew Auernheimer was yesterday sentenced to 3.5 years in prison for scraping and publishing private data incorrectly exposed via a public API, is that if he had only downloaded a single record and done “responsible disclosure”, everything would have been OK.  That might be true, but it might not be true.  I’m as squeaky-clean a white hat as they come, but here’s a story for some context:

A little over a year ago, when the BEAST attack on TLS was released, I did some research on why TLS 1.1 (immune to the attack) wasn’t more widely deployed, nearly ten years after it has become a standard.  It turns out that some sites are “intolerant”; if a client reports that it supports TLS 1.1, the server will fail the connection.  I figured that, surely, the number and importance of such sites must be small relative to the concrete threats now facing TLS 1.0, and asked Twitter for references to some specific sites showing this intolerance.  

One contact privately gave me the name of a major site for a large US government agency.  I reached out to their security team in an email, informing them of the issue, the context (BEAST and helping the entire Internet move to a more secure set of protocols) and offering to help them diagnose and repair it, and even work with their vendor to help other impacted customers get fixed.

The response?  Based solely on my email, the head of that agency reported me to the Department of Homeland Security and started an investigation where I was accused of performing “unauthorized testing” on and possibly attacking their servers.  The “testing” I’d done?  I typed the name of the site into my browser once and saw the home page load.  Then I turned on TLS 1.1 support, typed it again and watched it not load.  

Now, it happens that some important people stood up for me, and their and my reputations helped convince DHS that I wasn’t a threat.  I dropped the issue entirely, and as far as I know the site is still TLS 1.1 intolerant.  But as I read about cases like Aaron Swartz and Andrew Auernheimer, I shudder to think how easily the consequences of my intended act of goodwill could’ve spiraled out of control.  If I was an independent researcher, worked for a little-known security firm, or had any minor wrongdoing in my past, my career and life could’ve easily have been ruined by this harmless act of positive outreach.

Do I support what Weev did?  No.  Do I think he even remotely did the right thing? No.  Did he make his own situation much worse than it needed to be, up to and including his attitude and actions at his sentencing hearing? Yes.  But all these can be true, and the prosecutorial culture of paranoia, zero-tolerance, fear and political “message sending” around all things “cyber” can still be frighteningly out of control.  I think it is.   The prosecution wanted to “send a message”, and the message was received.  There are ways, big and small, that this white hat researcher has already stopped trying to help out the security of the Internet.  I know I will never report even an incidentally discovered vulnerability in an online service again; the risks are just too great.  

The primary beneficiaries of this culture of fear are powerful organizations who think silence and threats are a better solution to Internet insecurity than engineering, and the real criminals that routinely and successfully disregard the threat of prosecution and exploit the systems that silence allows to remain vulnerable.   The biggest losers are consumers, who will be deprived of any objective information on the relative security posture and history of online services when making important choices like where to bank, shop, get email service, or work with their health care information online.

Meanwhile, I applaud companies that have affirmatively provided permission for security research on their online services on the condition that such research not harm users and be responsibly disclosed. Last year, Dan Kaminisky compiled a small list of such companies here:  http://dankaminsky.com/2012/02/26/review/ , and I am happy to see that there are today many more doing the same through various kinds of bug bounty programs.  It is my personal opinion that it would be good to see this kind of policy enshrined in law, just as many states already have “Good Samaritan” laws eliminating liability against people who, with good intent, give first aid to injured strangers.  We've decided we don't want a culture in the physical world where people walk past an accident scene because they are afraid of the consequences of offering help, we ought to do the same online.
So one of the core aspects of my mostly-kidding-but-no-really White Hat Hacker Flowchart is that, if the target is a web page, and it's not running on your server, you kind of need permission to ac......
1
1
Kyle Rose's profile photo
Add a comment...

Daniel Franke

Shared publicly  - 
 
The trouble when I do code reviews:
2
Add a comment...
In his circles
84 people
Have him in circles
78 people
Javin Paul's profile photo
Erik Benoist's profile photo
Cheryl Franke's profile photo
Arthur Franke's profile photo
Mary Pat Campbell's profile photo
Xiaoyou Lu (卢小友)'s profile photo
Cain Norris's profile photo
Kyle Rose's profile photo
Thomas Ptacek's profile photo

Daniel Franke

Shared publicly  - 
 
The Perfectly Normal Beast is on stampede! Final specs:

CPU: Intel Xeon E5-1650 V3 3.5GHz 6-Core
Motherboard: ASRock EPC612D8A
CPU Cooler: Noctua NH-U12DXi4 55.0 CFM
Memory: Kingston 64GB (4 x 16GB) Registered DDR4-2133
SSD: Intel 750 Series 400GB PCI-E Solid State Drive
Platters: 5x HGST Ultrastar 7K3000 2TB 3.5" 7200RPM
Video Card: Gigabyte Radeon R9 390X 8GB SOC Video Card
Case: Fractal Design Define R4 (Black Pearl) ATX Mid Tower
Power Supply: SeaSonic X Series 1250W
Case Fans: 3x Noctua NF-A14 PWM
TPM: ASRock TPM

Accompanied by already-owned:
Optical Drive: Lite-On iHAS124-04 DVD/CD Writer
Monitor: ViewSonic VX2880ml (28", 3840x2160)
Keyboard: Das Keyboard Model S Professional
Speakers: Logitech Z323 30W 2.1ch

The SSD is so fast that full-disk encryption, even with AES-NI, is actually a slight bottleneck on read performance. I can fetch bits from it at 2.7GiB/s, but can only decrypt them at 2.5GiB/s. 

I stepped down from the originally-planned R9 Fury to a 390X for mechanical reasons: although the Fury would have fit in my case, it would have been very tight and unwieldy and probably blocked another PCIe slot. I also decided to get a new set of platters rather than taking them out of my old system, because I already did that for my last build so those things are getting pretty old.
1
Add a comment...

Daniel Franke

Shared publicly  - 
 
 
The anthropologists decided that this tribe was to remain “uncontacted”.
1
Add a comment...

Daniel Franke

Shared publicly  - 
 
I signed the FSF's petition opposing Encrypted Media Extensions in HTML5. The FSF's delivery of the petition was accompanied by a juvenile stunt with which I'm slightly embarrassed to have my name associated. I've communicated my feelings on this to the FSF and to the W3 HTML WG.
1
Add a comment...

Daniel Franke

Shared publicly  - 
1
1
David Gerard's profile photo
Add a comment...

Daniel Franke

Shared publicly  - 
 
The bank's closing attorney got them a mortgage binder on my homeowner's insurance today. This is in spite of the fact the mortgage doesn't close until Wednesday. The insurance company didn't contact me either before or after. So apparently, all you need to do in order to make yourself the payee on a six-figure insurance claim is to call the insurance company and ask to be.

Quoth a coworker: "It's scary how many bureaucratic processes are secured by nothing besides 'Why would anybody want to do that?'"
1
Add a comment...
People
In his circles
84 people
Have him in circles
78 people
Javin Paul's profile photo
Erik Benoist's profile photo
Cheryl Franke's profile photo
Arthur Franke's profile photo
Mary Pat Campbell's profile photo
Xiaoyou Lu (卢小友)'s profile photo
Cain Norris's profile photo
Kyle Rose's profile photo
Thomas Ptacek's profile photo
Work
Occupation
Security Researcher
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Previously
Acton, MA - Hudson, MA - San Francisco, CA - Somerville, MA - Gainesville, FL - Parkland, FL
Story
Introduction
I keep the internet safe for anarchy.
Education
  • University of Florida
    Computer Science, Mathematics, 2004 - 2007
Basic Information
Gender
Male