{"id":2509,"date":"2017-08-21T22:11:50","date_gmt":"2017-08-21T22:11:50","guid":{"rendered":"http:\/\/blog.paranoidprofessor.com\/?p=2509"},"modified":"2017-08-21T22:11:50","modified_gmt":"2017-08-21T22:11:50","slug":"airplane-data-security","status":"publish","type":"post","link":"https:\/\/blog.paranoidprofessor.com\/index.php\/2017\/08\/21\/airplane-data-security\/","title":{"rendered":"airplane data security"},"content":{"rendered":"<p>When I think about airlines I think about a lot of things but I don&#8217;t think of high tech. That isn&#8217;t very realistic as jet engines\u00a0are pretty high tech devices and the ability to book reservations over the internet is high tech &#8211; simply search by date and city and presto you can select (and pay for) flight within minutes.<\/p>\n<p>It is a pretty clever but all of this &#8220;internet access&#8221; is just a thin layer over the real backbone of the airlines. \u00a0The airlines and travel agencies have had their own legacy system in place to allow for booking of flights. \u00a0This system, a so called\u00a0global distribution system, created to coordinate between the airlines and the travel agencies to prevent selling a seat twice.<\/p>\n<p>However, the older the system the less likely it is to have been programmed to withstand a concentrated external attack by a dedicated attacker.<\/p>\n<p>The neat thing about the internet age is not only the various technologies that exist but also the various white hat hacker groups that exist to investigate these technologies and cast light on these important issues. \u00a0One of the oldest such groups involved in this is the <a href=\"https:\/\/www.ccc.de\/en\/\" target=\"_blank\">chaos computer club<\/a>\u00a0which has existed since the early eighties.<\/p>\n<p>The chaos computer club does some amazing clarifications of the weaknesses that they investigated. \u00a0A few months ago, they had a\u00a0Karsten Nohl give a speech about the security or lack of security of this very important system for anyone who flys.<\/p>\n<p>This speech is both an amazing speech on the\u00a0clarity of how the system works but terrifying how poorly such an important system is protected.<\/p>\n<p><iframe loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/n8WVo-YLyAg?feature=oembed\" frameborder=\"0\" allowfullscreen><\/iframe><\/p>\n<p>One of the most worrisome parts of this speech, especially for privacy advocates, is where Karsten points out that there is no access logs for this system. \u00a0(at 44:20) \u00a0This means that either a person or government can track a person and it would be impossible to know that someone has been checking out your itinerary.<\/p>\n<p>There are a lot of things to take away from this speech but one of the surprising for most people is that the luggage tags and boarding passes need to be securely disposed of.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When I think about airlines I think about a lot of things but I don&#8217;t think of high tech. That isn&#8217;t very realistic as jet engines\u00a0are pretty high tech devices and the ability to book reservations over the internet is &hellip; <a href=\"https:\/\/blog.paranoidprofessor.com\/index.php\/2017\/08\/21\/airplane-data-security\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[14,61,19],"_links":{"self":[{"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/posts\/2509"}],"collection":[{"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/comments?post=2509"}],"version-history":[{"count":3,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/posts\/2509\/revisions"}],"predecessor-version":[{"id":2533,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/posts\/2509\/revisions\/2533"}],"wp:attachment":[{"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/media?parent=2509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/categories?post=2509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/tags?post=2509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}