Home Business IT Security Google Maps - we know what you're looking at

SSL traffic analysis is good enough to see exactly what location you're looking at on Google Maps.

As we all know, communication between Google Maps and any client is protected via SSL (secure socket layer) aka the browser padlock.  This means that the content of all communication via this session is completely hidden from view.

Well not entirely.  It's actually not immune to all kinds of cunning attacks. 

Today at Ruxcon (the computer security conference), Vincent Berg of scurity company IOactive demonstrated how so-called side-channel analysis can reveal far more than was intended.

What Berg found was that even though encrypted, the 256x256 pixel subsections used to build the map image on the client browser do not radically change their size compared to their un-encrypted cousins.  This meant that he was able to create a image-size map of potential locations and by capturing the data stream between Google and the user could identify the images and use nothing more than their size to re-create the map being viewed.

Currently Berg has built this as a simple proof-of-concept and has only pre-analysed a small number of European cities.  However there is no reason why this couldn't be extrapolated to the entire world at all resolutions, given enough disk storage and processing power.

It would probably be wise to assume every major government has already done this.

The author is attending Ruxcon as a guest of the organisers.

FREE REPORT - IT MONITORING TOOLS COMPARISON

Are you looking to find the most efficient IT Monitoring tool available?

IT Monitoring is an essential part of the operations of any organisation with a significant network architecture.

Multiple IT monitoring platforms are available on the market today, supporting the various needs of small, medium-sized, and large enterprises, as well as managed service providers (MSPs).

This new report studies and compares eight different IT monitoring products in terms of functionality, operations, and usability on the same server platform with 100 end devices.

Which product is easiest to deploy, has the best maintenance mode capabilities, the best mobile access and custom reporting, dynamic thresholds setting, and enhanced discovery capabilities?

Download your free report to find out.

DOWNLOAD!

David Heath

joomla statistics

David Heath has over 25 years experience in the IT industry, specializing particularly in customer support, security and computer networking. Heath has worked previously as head of IT for The Television Shopping Network, as the network and desktop manager for Armstrong Jones (a major funds management organization) and has consulted into various Australian federal government agencies (including the Department of Immigration and the Australian Bureau of Criminal Intelligence). He has also served on various state, national and international committees for Novell Users International; he was also the organising chairman for the 1994 Novell Users' Conference in Brisbane. Heath is currently employed as an Instructional Designer, building technical training courses for industrial process control systems.

Connect