![Page 1: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/1.jpg)
1
Exploring North Korea’s Surveillance Technology
Florian Grunow & Niklaus SchiessERNW GmbH
![Page 2: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/2.jpg)
2
Disclaimer
o We never visited DPRKo What we say about DPRK is mostly speculation oro based on publications of others.
o This is not about making fun of themo Not about the developers …o … and certainly not about the people of DPRK
o No focus on security in this talk -> Privacy
![Page 3: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/3.jpg)
33
Agenda
o Introductiono Surveillanceo Censorshipo Conclusions
![Page 4: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/4.jpg)
4
Motivation
o Shed some light on repressive technology, even in 2017o Overview of technical abilities to perform
o Surveillance of their citizenso Censorship on a large scale
o Lack of public, in-depth research about technology by DPRKo Disclosure to the public of potential surveillance and censorship
![Page 5: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/5.jpg)
5
Previous Research
o Research done by uso Lifting the fog on Red Star OS (32C3)o Woolim: Lifting the fog on DPRK’s latest tablet PC (33C3)
![Page 6: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/6.jpg)
6
Previous Research
o Research done by uso Lifting the fog on Red Star OS (32C3)o Woolim: Lifting the fog on DPRK’s latest tablet PC (33C3)
o Research done by otherso Multiple publications concerning Red Star OS security (@hackerfantastic)o Art based on our Red Star OS research: Inter Alias (www.interalias.org)o Compromising Connectivity: Information Dynamics between the State &
Society in a Digitizing North Korea - U.S.-Korea Institute (USKI) at SAIS
![Page 7: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/7.jpg)
7
Modern Devices in a Repressive State
o DPRK started at around ~2000o PCs, tablet PCs, mobile phoneso The problem: devices allow
o access to media (photos, videos, audio),o sharing of media files ando potentially access information from outside of DPRK.
o Potential solutions:o Surveillance: tracking the distribution of unwanted/impure mediao Censorship: prevent the distribution of unwanted/impure media
![Page 8: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/8.jpg)
8
Red Star OS
Tracking the distribution of media files
![Page 9: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/9.jpg)
9
Red Star OS
o Different leaked versionso Server (3.0) and Desktop (2.0 (and 2.5?) and 3.0)o We focused on Desktop 3.0
o General purpose desktop system based on Fedora and KDEo Look and Feel of Mac OS Xo Email client, calendar, word processor, media player…
o Latest package builds in 2013o Public leak in December 2014
![Page 10: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/10.jpg)
10
![Page 11: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/11.jpg)
11
![Page 12: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/12.jpg)
12
![Page 13: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/13.jpg)
13
![Page 14: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/14.jpg)
14
![Page 15: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/15.jpg)
16
Red Star OS Recap
Suspicious non-killable processes running
Integrity checking for core processes and files
Research revealed Red Star OS changes files
![Page 16: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/16.jpg)
17
Original
![Page 17: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/17.jpg)
18
Original
First UserWMAC9A58CDZ364C
Decryption tool: https://github.com/takeshixx/redstar-tools
![Page 18: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/18.jpg)
19
Original
Second User
WM8295FF513293A
First UserWMAC9A58CDZ364C
Decryption tool: https://github.com/takeshixx/redstar-tools
![Page 19: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/19.jpg)
20
User 1
Tracking the Distribution of Media Files
Troopers.jpg
![Page 20: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/20.jpg)
21
User 1 User 2
Tracking the Distribution of Media Files
Troopers.jpg
![Page 21: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/21.jpg)
22
User 1 User 3User 2
Tracking the Distribution of Media Files
Troopers.jpg
![Page 22: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/22.jpg)
23
User 1 User 3User 2 Government
Tracking the Distribution of Media Files
Troopers.jpg
![Page 23: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/23.jpg)
24
User 1 User 3User 2
Track down dissidents and traitors
Tracking the Distribution of Media Files
Troopers.jpg
Government
![Page 24: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/24.jpg)
25
Tracking the Distributionof Media Files
o Create social networkso Construct connections between
dissidentso Track down sources that
create/import media fileso Shutdown dissidents/traitors
Source: https://i.stack.imgur.com/xWMRJ.jpg
![Page 25: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/25.jpg)
26
Problems with Red Star OS Watermarking
o Only affects media fileso No binaries/applications -> users can install software
o Not really sophisticatedo Can be removed/bypassed easily
o “AntiVirus” could prevent distribution of certain fileso Watermarking only allows to track the distribution of media
o Does not prevent distribution of media
![Page 26: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/26.jpg)
27
Woolim
Prevent the distribution of media files
Source: http://bilder4.n-tv.de/img/incoming/crop10413391/8721322747-cImg_16_9-w1200/RTR3EQ0B.jpg
![Page 27: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/27.jpg)
28
Woolim
o Name of a waterfall in DPRKo Manufacturer: Hoozo (Z100) from Chinao Similar products sell for ~180€ to ~260€ onlineo Software from/modified by DPRKo Android 4.4.2 with Kernel 3.4.39o System Information
o Allwinner A33 (ARMv7) SoC o 8GB SK Hynix flasho MicroSD and power plug
o Connectivity only available via dongles (no WIFI/Bluetooth built-in)
![Page 28: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/28.jpg)
29
Exploring “This is not signed file.”
o Introduces file signatureso Using asymmetric cryptography (RSA)o Goal: PREVENT the distribution of media files
Source: http://www.hoozo.cn/uploads/140908/1-140ZR24925135.jpg
![Page 29: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/29.jpg)
30
Exploring “This is not signed file.”
o Introduces file signatureso Using asymmetric cryptography (RSA)o Goal: PREVENT the distribution of media files
o Government has full control over signatureso Absolute control over media sources
Source: http://www.hoozo.cn/uploads/140908/1-140ZR24925135.jpg
![Page 30: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/30.jpg)
31
Exploring “This is not signed file.”
o Introduces file signatureso Using asymmetric cryptography (RSA)o Goal: PREVENT the distribution of media files
o Government has full control over signatureso Absolute control over media sources
o Explicit signature checks on Woolimo Apps have to take care of checkso Unlike Red Star OS’s kernel module
Source: http://www.hoozo.cn/uploads/140908/1-140ZR24925135.jpg
![Page 31: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/31.jpg)
32
Signature Checking
o Java interface with native JNI libraryo Called by apps e.g. during file opening/savingo Sometimes concealed as “license checks”
![Page 32: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/32.jpg)
33
Signature Checking
o Java interface with native JNI libraryo Called by apps e.g. during file opening/savingo Sometimes concealed as “license checks”
o Multiple ways of signingo NATISIGN: Files signed by the governmento SELFSIGN: Files signed by the device itself
![Page 33: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/33.jpg)
34
Signature Checking
o Java interface with native JNI libraryo Called by apps e.g. during file opening/savingo Sometimes concealed as “license checks”
o Multiple ways of signingo NATISIGN: Files signed by the governmento SELFSIGN: Files signed by the device itself
o Files without proper signatures cannot be openedo By apps that do signature checks
![Page 34: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/34.jpg)
35
Java Native Interface Libraries
o Check if file has a proper signatureo Used by various applications, e.g.:
o FileBrowser.apko Gallery2.apko Music.apko PackageInstaller.apko PDFViewer.apko RedFlag.apko SoundRecorder.apko TextEditor.apk
![Page 35: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/35.jpg)
36
NATISIGN
o Files that have been approved by the governmento Also referred to as “gov_sign”
o Files are signed with a 2048 bit RSA keyo Device holds the public key to verify signatures
o Deployed on the device (0.dat)
o Code does some additional obfuscationo Probably to make manual signing harder
Source: https://en.wikipedia.org/wiki/North_Korea#/media/File:Emblem_of_North_Korea.svg
![Page 36: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/36.jpg)
37
SELFSIGN’ing
o Combination ofo Symmetric encryption (Rijndael 256)o Asymmetric signatures (RSA)o Hashing (SHA224/SHA256)
o Device identity stored in legalref.dato Comprised of IMEI and IMSIo Each device‘s „legal reference“
o Files created on the device itself can be openedo Camera images, office documents, PDFs, etc.
![Page 37: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/37.jpg)
38
SELFSIGN Signatures
o RSA signature of file hasho Encrypted device identity
o Rijndael 256 (key and blocks)o IMEI and IMSI
o Trailero Signature sizeo ASCII suffix “SELFSIGN“
o Fixed size of 792 bytes
![Page 38: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/38.jpg)
39
Files Types Affected by Signing
o All kinds of media fileso Text and HTML fileso Even APKs…
![Page 39: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/39.jpg)
40
Absolute Control of Woolim’s Media Sources
![Page 40: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/40.jpg)
41
Absolute Control of Woolim’s Media Sources
NATISIGN
Approved by the government
![Page 41: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/41.jpg)
42
SELFSIGN
Created on the device itself
Absolute Control of Woolim’s Media Sources
NATISIGN
Approved by the government
![Page 42: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/42.jpg)
43
SELFSIGN
Other Woolimtablet PCs
Rest of the world
Other devices in DPRK
Absolute Control of Woolim’s Media Sources
Created on the device itself
NATISIGN
Approved by the government
![Page 43: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/43.jpg)
44
SELFSIGNNATISIGN
Approved by the governmentOther Woolim
tablet PCs
Absolute Control of Woolim’s Media Sources
Created on the device itself
Other devices in DPRK
Rest of the world
![Page 44: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/44.jpg)
45
Network-level Surveillance and Censorship
o Network is controlled by the governmento No Internet access for most userso Route all traffic over central nodes/proxieso Only a few government-owned Certificate Authorities
![Page 45: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/45.jpg)
46
Human-level Surveillance?
![Page 46: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/46.jpg)
47
Human-level Surveillance
o Woolim includes TraceViewero Take screenshots of appso Records browser history
o Random physical inspections of mobile deviceso Ranging from school teachers to members of special security unitso Could identify inappropriate usage within minutes
o Prevents hiding impure files in removable mediao Detecting inappropriate use is still possible if media will be removed
o Recorded histories and screenshots cannot be removed
![Page 47: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/47.jpg)
48
Conclusions
Surveillance and Censorship
Source: https://www.zdf.de/assets/kim-jong-un-104~1920x1080
![Page 48: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/48.jpg)
49
Surveillance and Censorship on Multiple Levels
o Network levelo Government-controlled network
o Device levelo Track distribution of media files via watermarks and signatureso Prevent distribution of media files with signatures
o Human levelo Take screenshots and record browser historieso Make them easily accessible for random inspections via TraceViewer
![Page 49: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/49.jpg)
50
Thanks for Supporting our Research
o slipstream/RoL (@TheWack0lian)o For leaking the Red Star OS ISOs
o Will Scott (@willscott)o For translations and other information
o Iltaeko Translations
o ISFINK (www.isfink.org)o Freedom of Information in North Koreao Provided the tablet(s) -> Big thank you!
![Page 50: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/50.jpg)
51
Future Work
o Dump of multiple devices (tablets and smartphones)o We don’t have access to these devices
o AntiVirus software
o Anybody got a smartphone from DPRK?o Anybody got software from DPRK?o “signed XP”?
We would love to take a look at more technology from DPRK!
![Page 51: Florian Grunow & Niklaus Schiess - ERNW · Exploring “This is not signed file.” o Introduces file signatures o Using asymmetric cryptography (RSA) o Goal: PREVENT the distribution](https://reader033.vdocument.in/reader033/viewer/2022052000/6012f7b191d455096d3a9739/html5/thumbnails/51.jpg)
52
www.ernw.de
www.insinuator.net
Thank you for your Attention!
{fgrunow,nschiess}@ernw.de
@0x79@_takeshix