Return to Video

34C3 - DPRK Consumer Technology

  • 0:00 - 0:15
    34c3 preroll
  • 0:15 - 0:20
    Herald: The Democratic People's Republic
    of Korea—or, as most of you know it,
  • 0:20 - 0:25
    North Korea, is a topic which is
    already following us at congress
  • 0:25 - 0:31
    for four years. It all started
    in 31c3 with Will Scott,
  • 0:31 - 0:37
    one of our speakers today, giving a
    talk about teaching computer science in
  • 0:37 - 0:45
    North Korea. The topic was then gone on by
    Florian Grunow and Niklaus Schiess, who
  • 0:45 - 0:52
    talked about the Red Star OS and also the
    tablet PC called Woolim. Today, we will
  • 0:52 - 0:57
    hear the next episode—we will hear about
    consumer electronics in North Korea. We
  • 0:57 - 1:02
    will take a peek behind the curtain, learn
    about the Internet, and the current market
  • 1:02 - 1:09
    situation there. Our speakers today
    are Will Scott, a security postdoc, as
  • 1:09 - 1:16
    well as his friend Gabe Edwards, security
    consultant, and they will give us a peek
  • 1:16 - 1:23
    behind the curtain. So, please, welcome
    Will and Gabe with a big round of applause,
  • 1:23 - 1:32
    thank you for being here already.
    [Applause]
  • 1:32 - 1:40
    Will: Thank you, great. So just just to
    put this in perspective, right, one of the
  • 1:40 - 1:45
    disclaimers is that the words that get
    used, especially on this topic often have
  • 1:45 - 1:52
    a lot of meaning. There there is a reason
    of that we'll be calling this DPRK or
  • 1:52 - 1:56
    Korea throughout. That's often the words
    you'll hear of people who are dealing with
  • 1:56 - 2:00
    engagement with the country. North Korea
    is a term that the country does not call
  • 2:00 - 2:06
    itself, but rather is what typically more
    adversarial countries use to talk about it
  • 2:06 - 2:12
    as an occupying presence. So that that
    language is is this weird quirk that
  • 2:12 - 2:18
    exists here. So yeah, we're going to talk
    some about what consumer technology looks
  • 2:18 - 2:23
    like and how it's evolving and what's
    going on there. I think we're pretty
  • 2:23 - 2:31
    excited about this. I want to start by by
    setting a little bit of context. This is
  • 2:31 - 2:36
    the science of technology complex that
    opened in 2015. It's in an island in a
  • 2:36 - 2:40
    river to the south side of Pyongyang, it's
    still in the main city. There was a pretty
  • 2:40 - 2:44
    major construction project; it went on for
    about a year before they opened this. In
  • 2:44 - 2:48
    the lobby they've got this nice
    diorama of what the building looks like.
  • 2:48 - 2:53
    It actually … this is the rest of the
    lobby—it looks pretty modern.
  • 2:53 - 2:57
    They have this sort of plain pastel
    scheme that you actually see a lot in in
  • 2:57 - 3:03
    modern architectural construction there.
    So so if you go into the new water park or
  • 3:03 - 3:07
    the boat restaurant that they've opened in
    the last couple of years you see the same
  • 3:07 - 3:14
    design styling. This building is part
    Science Museum—it has a bunch of sort of
  • 3:14 - 3:21
    interactive exploratory exhibits that you
    might have a class of children come
  • 3:21 - 3:27
    through to learn. It also has lecture
    halls, and it also has a library. And and
  • 3:27 - 3:31
    when you look at parts of it are that are
    the library you see a ton of computers.
  • 3:31 - 3:37
    Right, this this is a … technically … there,
    there is technology here. And and the
  • 3:37 - 3:41
    thing that is really, I think, fascinating
    and revealing about where we are in terms
  • 3:41 - 3:44
    of our understanding of this country is
    you look at these computers and yet again
  • 3:44 - 3:50
    we see this thing that doesn't look
    familiar. This isn't Red Star, it's not
  • 3:50 - 3:53
    quite anything that looks like the tablets
    we've seen. That's that's a desktop
  • 3:53 - 4:01
    monitor. And it's not Windows or Mac. It's
    yet again something new. And in fact,
  • 4:01 - 4:06
    playing with this, you find that it's
    Android that's that's been put in this
  • 4:06 - 4:12
    custom bezel. It has a keyboard and mouse,
    but it's got an Android taskbar at the top
  • 4:12 - 4:17
    to let you know what apps are there and
    it's yet another … they have special cased
  • 4:17 - 4:23
    and customized a distribution that works
    for this purpose. And I think we … for
  • 4:23 - 4:29
    each one of these that maybe we have seen,
    there's there's many more that we haven't.
  • 4:29 - 4:38
    So, I want to just get us up to speed on
    what we do know, to start with. We've seen
  • 4:38 - 4:43
    Red Star—this is version 3, it came out
    three years ago that we learned about Red
  • 4:43 - 4:47
    Star version 3; this this thing that sort
    of Mac-like. There's actually been a
  • 4:47 - 4:50
    couple other versions that have ended up
    on the Internet that we know stuff about.
  • 4:50 - 4:55
    And we we have at some level a better
    picture of what the desktop technology
  • 4:55 - 5:00
    looks like. We've seen version 2.5 which
    looks somewhat Windows like. There's been
  • 5:00 - 5:04
    a release of the server version that runs
    some of the web servers from the country.
  • 5:05 - 5:10
    And then two years ago, Florian and
    Niklaus' talk—they actually went in and
  • 5:10 - 5:14
    did a bunch of analysis of it, along
    with on the Internet there's been
  • 5:14 - 5:18
    blog posts of other people who've posted
    CVEs of various bugs that they found in
  • 5:18 - 5:23
    this, figured out how to make it run on
    the external Internet by changing firewall
  • 5:23 - 5:27
    rules, and really just like learning a lot
    about both the environment that this thing
  • 5:27 - 5:32
    was working in and the properties of it.
    We have a bit less on the mobile side - so
  • 5:32 - 5:37
    this is what a store in in Korea in
    Pyongyang sort of looks like: those are
  • 5:37 - 5:44
    laptops on the left, tablets and phones on
    the right for sale. We got a talk last
  • 5:44 - 5:49
    year, again from Niklaus and Florian, about
    the Woolim tablet. I think that's actually
  • 5:50 - 5:56
    maybe on the second row in this picture.
    And and we got a sense of some of the
  • 5:56 - 6:02
    information controls there in particular,
    right. So what they talked about was how
  • 6:02 - 6:08
    this thing prevents some types of file
    copies and transferring, and some of the
  • 6:08 - 6:13
    sort of surveillance things that are built
    into it. But again, we didn't get too much
  • 6:13 - 6:18
    in terms of hardware to bite our teeth
    into. Finally, there's this like next
  • 6:18 - 6:24
    layer up—the software ecosystem. This is
    an app store, again in Korea. You go to a
  • 6:24 - 6:28
    place and they have nice … this is this is
    a nice one where they've got pictures so I
  • 6:28 - 6:34
    can see which games it is that are for
    sale that they'll then plug this in my
  • 6:34 - 6:41
    device into a computer and transfer apps
    onto the device. And so we get all of this
  • 6:41 - 6:46
    and we have mostly anecdotes that are that
    are helping us sort of get small pictures,
  • 6:46 - 6:49
    and I think the real problem right is
    there's all these devices—this is an
  • 6:49 - 6:55
    example of a few, and and we really I
    think are quite far behind and having that
  • 6:55 - 7:02
    bar lowered for people to play and
    understand what these things are. So, what
  • 7:02 - 7:07
    what I want to do to like try and explain
    that situation that we're in is is talk
  • 7:07 - 7:12
    about why we're there and the different
    sort of general groups of where these
  • 7:12 - 7:16
    devices end up. I realize that
    that's talking about motives and that
  • 7:16 - 7:20
    is often like the way that you get
    people mad at you, if you try and
  • 7:20 - 7:23
    ascribe some motivation to them that
    they disagree with. So realize that these
  • 7:23 - 7:27
    are bread's … broad strokes and not really
    indicative of everyone. But this gives you
  • 7:27 - 7:32
    some sense of why we've still ended up in
    this world of not knowing much publicly.
  • 7:32 - 7:37
    Maybe … there's a quote from … this is
    from Kim Jong-il that's that's relevant, and
  • 7:37 - 7:42
    and says, you know, Koreans are quite an
    intelligent people and even in computer
  • 7:42 - 7:46
    technology we excel. I think this is
    something that we maybe don't appreciate
  • 7:46 - 7:50
    when we're thinking about this. It is
    rational for Korea to not want this stuff
  • 7:50 - 7:55
    to come out, right? They are worried about
    adversarial government's trying to
  • 7:55 - 7:59
    leverage whatever they can. It seems
    rational that it's in their best interest
  • 7:59 - 8:03
    to make it difficult for this stuff to get
    out and for people to be able to attack
  • 8:03 - 8:09
    them with it. That's what we've seen in,
    you know, against the threat model well
  • 8:09 - 8:17
    implemented copy control and and other
    sort of limitations on the on the devices.
  • 8:17 - 8:20
    In terms of foreigners who have access to
    these devices, I think there's sort of two
  • 8:20 - 8:24
    classes. What we saw in the talk last year
    was a device that came out through a
  • 8:24 - 8:30
    defector group. So you've got someone who
    left with this device and now he's trying
  • 8:30 - 8:35
    to figure out what what's on it. And that
    is this adversarial relationship where the
  • 8:35 - 8:40
    goal there is to do damage to the country.
    And so there's much more value in having
  • 8:40 - 8:46
    0-days than there is in releasing this
    because then the security gets fixed. And
  • 8:46 - 8:49
    so you'll see that you know for any device
    that comes out there there's really the
  • 8:49 - 8:53
    sensitivity both in terms of not wanting
    to identify people but also in; well if we
  • 8:53 - 8:58
    find anything that's buggy, we want to be
    able to do something with it. I think in
  • 8:58 - 9:03
    fact there's many more devices that don't
    come out that way but that are held by
  • 9:03 - 9:08
    foreigners who are working constructively
    with the country. And for them, the the
  • 9:08 - 9:13
    reason is somewhat different. And I think
    the reason for them is in many cases that
  • 9:13 - 9:17
    they're worried about sort of the unknown
    unknowns of “could someone get in trouble?
  • 9:17 - 9:21
    Will this result in my connection to the
    country getting disrupted? The people
  • 9:21 - 9:25
    I like and work with getting in trouble
    for having given me the device that I've
  • 9:25 - 9:29
    been done something reckless with.”
    Right, so we can see from like
  • 9:29 - 9:32
    a bunch of individual perspectives why
    we don't have more of this technology
  • 9:32 - 9:37
    out there. We can also understand
    that, you know, as the public, this
  • 9:37 - 9:40
    creates this weird thing where
    we're all fascinated but don't
  • 9:40 - 9:44
    have access. And and that I think
    also in the spirit of, you know,
  • 9:44 - 9:50
    for Korea, this isn't great. Because the
    bugs go unpatched and they don't get a
  • 9:50 - 9:57
    better security. So, this is the
    electronic goods store at the airport
  • 9:57 - 10:01
    which somewhat counter-intuitively doesn't
    actually sell the tablets to foreigners
  • 10:01 - 10:07
    but they do have some. What we're … what
    we're going to talk about for the rest of
  • 10:07 - 10:14
    this talk is an effort that I guess we're
    sort of putting out on the web called
  • 10:14 - 10:20
    computer … KoreaComputerCenter.org. Where
    we're going to try and release a bit more
  • 10:20 - 10:24
    of this technology. And I'm going to talk
    through the three initial things that
  • 10:24 - 10:28
    we're going to put up there that we hope
    people play with. And this is in the
  • 10:28 - 10:34
    spirit that this we think … this makes life
    better both for Korea and for the outside
  • 10:34 - 10:40
    world. For Korea, the same thing I was
    just saying—I think you get better
  • 10:40 - 10:44
    security in the long run. We we I think as
    a community understand the value of open-
  • 10:44 - 10:49
    source software, and in having many eyes
    audit and find the bugs. We've already
  • 10:49 - 10:53
    seen that on the artifacts that have
    gotten out. For us, I think it's a great
  • 10:53 - 11:01
    chance to … to do two things—one one,
    it spreads our understanding more
  • 11:01 - 11:04
    consistently so we actually understand
    what is going on in the country and can
  • 11:04 - 11:09
    make rational policy decisions at some
    high level. It's also fascinating and we
  • 11:09 - 11:15
    get to preserve this anthropological
    artifact of this really amazing parallel
  • 11:15 - 11:19
    development that has created … that
    that exists of of what technology is
  • 11:19 - 11:26
    like in Korea. So, in that spirit,
    let's talk about what's coming out.
  • 11:26 - 11:30
    Some of this I think is showing up on
    BitTorrent links that are on this site
  • 11:30 - 11:36
    koreacomputercenter.org as we speak. The
    first is a phone image—there's a system
  • 11:36 - 11:44
    partition and data partition recovery for
    this phon, a Pyongyang 2407. This phone
  • 11:44 - 11:51
    was chosen because it's made by a Chinese
    OEM, Jin Lee, which also creates the same
  • 11:51 - 11:58
    hardware in an Indian model. So if you've
    got a friend in India at least, you can
  • 11:58 - 12:04
    get the G&E v5—it's exactly the same
    hardware and so these images can load onto
  • 12:04 - 12:08
    one of these phones and then you will also
    be able to run this operating system. And
  • 12:08 - 12:12
    so rather than just doing static analysis
    of what's there you can actually see how
  • 12:12 - 12:17
    that fits together and what actually
    happens. How it works, that it does shut
  • 12:17 - 12:20
    down when a SIM card from a different
    operator gets plugged in, these sorts of
  • 12:20 - 12:27
    things. So this is this is just I guess
    I'll say the the basic phone system - it
  • 12:27 - 12:31
    doesn't include most apps but it's got a
    bunch of the sort of operating system-
  • 12:31 - 12:35
    level copy controls. You can get your
    hands on the the Red Star protection
  • 12:35 - 12:43
    things that we're talked about last year.
    The second thing for apps we're going to
  • 12:43 - 12:46
    turn to something a little bit older this
    is the Samjiyon tablet which is one of the
  • 12:46 - 12:54
    first tablets that came out 2011-2012 era.
    This was sort of at the beginning of
  • 12:54 - 12:58
    Korea's sort of introduction of widespread
    consumer electronics, so it got circulated
  • 12:58 - 13:03
    quite a bit. It was a larger run of
    devices than many of them. In fact so
  • 13:03 - 13:07
    widespread that there's there's one of
    these devices in the Stanford library. And
  • 13:07 - 13:10
    so I guess the other thing I'll stress is
    these devices are out there and it's a
  • 13:10 - 13:14
    matter of making sure that we're releasing
    these in a way where it's just like this
  • 13:14 - 13:18
    is software but we're not necessarily
    getting anyone in particular in trouble
  • 13:18 - 13:21
    because these devices we know are in a
    bunch of places and the attribution
  • 13:21 - 13:24
    becomes hard at that point for
    anyone to like, lose
  • 13:24 - 13:27
    contact or get in trouble. So there's
  • 13:27 - 13:34
    there's a basic set of apps that come
    there. These are some of the icons there -
  • 13:34 - 13:38
    there's a nice one that has a bunch of
    recipes. The the thing I'll say about
  • 13:38 - 13:43
    these - these were made for this specific
    device and this is a thing that you'll see
  • 13:43 - 13:47
    I think throughout all the software if you
    actually take a look at it. And so there's
  • 13:47 - 13:52
    a lot of hard-coded paths. So as well as
    the APKs themselves you'll find that they
  • 13:52 - 13:56
    reference things that they expect to be in
    specific parts of the SD card. Those files
  • 13:56 - 14:00
    are included, but it's unlikely that if
    you just copy the APK onto a Android phone
  • 14:00 - 14:06
    it will be able to show you much content.
    So it would be awesome if someone who
  • 14:06 - 14:10
    enjoys small.i wants to twiddle some paths
    so that those can look for internal
  • 14:10 - 14:14
    resources instead, and lower that bar
    further so that more people can play. I
  • 14:14 - 14:17
    think the other thing that's interesting
    here is pretty much all of these apps use
  • 14:17 - 14:22
    their own specific binary format that's
    like yet again this totally new thing
  • 14:22 - 14:29
    where it's like someone just coded some
    totally one-off thing. And that's weird.
  • 14:29 - 14:33
    And the final thing is we're gonna release
    a bunch of educational materials that seem
  • 14:33 - 14:37
    to sort of end up on these devices.
    Education is one of the big purposes,
  • 14:37 - 14:41
    right? You're you're giving these to the
    the children and teenagers who are
  • 14:41 - 14:45
    especially excited about technology and
    one of the useful things that they can do
  • 14:45 - 14:50
    is use that for for their course material.
    In getting a set of PDFs that are sort of
  • 14:50 - 14:55
    like usable, we ended up having to do some
    work. I'm gonna turn over to Gabe to
  • 14:55 - 14:59
    explain sort of the process we went
    through and getting this this last set of
  • 14:59 - 15:03
    the the textbooks that are
    going to come out.
  • 15:03 - 15:08
    Gabe: Thanks, Will. So basically when I
    got involved with this, the situation as
  • 15:08 - 15:14
    far as these textbooks was that we had
    quite a few of these files. And there are
  • 15:14 - 15:19
    two things you could tell on the surface -
    one is that they claim to be PDF files
  • 15:19 - 15:24
    based on the filename, and some of them
    have titles in English or Korean -
  • 15:24 - 15:25
    that sort of suggests
  • 15:25 - 15:28
    what's inside. But what you see on the
    screen is not what we saw because none of
  • 15:28 - 15:35
    these files were plain PDFs. So there's a
    bit of sort of custom DRM that's been
  • 15:35 - 15:41
    applied to these files and it's pretty
    rudimentary, but it's actually been kind
  • 15:41 - 15:48
    of remarkably decent job of what we think
    it was designed for. Which is that the the
  • 15:48 - 15:53
    textbooks that come with or that come with
    or that are added to one device are not
  • 15:53 - 15:58
    supposed to be able to be accessed on a
    different device. And as well so if you
  • 15:58 - 16:02
    pulled the these PDF files out of the
    device that you send off outside the
  • 16:02 - 16:07
    country, they're not readable. Now one
    thing I will say is that we know from some
  • 16:07 - 16:13
    of the previous talks on Red Star that
    developers in and for the DPRK have
  • 16:13 - 16:20
    implemented actual AES-like encryption.
    This is not that - it's fairly basic and
  • 16:20 - 16:26
    we did find some some holes in it. So talk
    a little bit about what we did. So when we
  • 16:26 - 16:31
    look at these files, the first thing we
    notice is that they don't have a PDF
  • 16:31 - 16:35
    header. The first eight bytes have this
    reference or this potential reference
  • 16:35 - 16:40
    anyway to what will might be a date in
    little-endian format. So this might be
  • 16:40 - 16:46
    either December 1st or January 12th in
    1978. If you have any idea what that
  • 16:46 - 16:51
    means, please let us know because we're
    kind of curious. The next thing is that
  • 16:51 - 16:56
    when we started to look at the devices,
    because we also had the the applications
  • 16:56 - 17:03
    that read these files, one of them has a
    hard coded reference to those first four
  • 17:03 - 17:08
    bytes. And so when you look at what that
    application was, we find that it's this
  • 17:08 - 17:14
    app called UDK.Android.Reader, which if
    you go to the Google Play Store it's just
  • 17:14 - 17:21
    a commercially available PDF Reader app
    for Android. But it's not really, because
  • 17:21 - 17:27
    it's been modified to implement the the
    DRM that we're looking at here. So
  • 17:27 - 17:33
    basically, we took the the copy of the
    reader that's available online, and one of
  • 17:33 - 17:38
    the copies on one of the devices, and
    we'll compare them we find that the
  • 17:38 - 17:44
    application calls out to a shared library
    when it wants to parse a PDF file. That
  • 17:44 - 17:47
    library looks kind of like this
    - these are the ELF sections in the file
  • 17:47 - 17:54
    and it's pretty normal. When we look at
    the copy that's on the DPRK version of the
  • 17:54 - 17:59
    app, there's this one section added that
    kind of jumps out - like it's literally
  • 17:59 - 18:08
    called dot-modified. So when you look into
    what's in that section, we see something
  • 18:08 - 18:12
    like this - and this is really not going
    to be legible both because of the size of
  • 18:12 - 18:18
    text and because it's decompiled from ARM.
    But we have the original decompiled code
  • 18:18 - 18:23
    on the left, and the DPRK version on the
    right. And the two things I just want to
  • 18:23 - 18:29
    highlight are - at the top the original
    function that would be filling a buffer to
  • 18:29 - 18:34
    read the file has been replaced by a stub
    that calls this sort of custom method in
  • 18:34 - 18:40
    the modified section. And this the version
    that's over in the modified section does
  • 18:40 - 18:44
    basically the exact same thing, except
    that in one case it will call another
  • 18:44 - 18:48
    function that does some decryption. And
    there's some other things as well in the
  • 18:48 - 18:54
    modified section this is just sort of one
    example. Now the reason that this is kind
  • 18:54 - 18:59
    of interesting to us is that it really
    shows us that these modifications were not
  • 18:59 - 19:04
    made by someone who had source code.
    Like this is kind of crazy low-level, not
  • 19:04 - 19:10
    crazy, but like it's it's really low-level
    modification of the binary itself. So when
  • 19:10 - 19:14
    we look into those functions and what they
    do, what we start finding is that the
  • 19:14 - 19:22
    shared library, the modified version of
    the shared library, has this 512 bytes pad
  • 19:22 - 19:26
    which basically gets used over and over
    again as part of the decryption process.
  • 19:26 - 19:30
    And one of the things about it is that for
    different files you will start using it at
  • 19:30 - 19:36
    a different point. And there's also a four
    byte key that's different for every file,
  • 19:36 - 19:41
    which comes from a combination of a few
    bytes in the file header itself, and a
  • 19:41 - 19:50
    per-device key. So that per-device key is
    kind of interesting. So they're taking,
  • 19:50 - 19:54
    well at the end of the day you want a four
    byte key, and they're generating it out of
  • 19:54 - 19:58
    a six byte MAC address and the code that
    they use kind of looks like this.
  • 19:58 - 20:03
    This is us reimplementing it
    in Go. One of
  • 20:03 - 20:07
    the weird things about it is that some of
    these devices may not actually have useful
  • 20:07 - 20:11
    MAC addresses so in some cases the MAC
    address that's using is actually just some
  • 20:11 - 20:17
    hard-coded value in a file. All the time
    when it reads these MAC addresses it's
  • 20:17 - 20:22
    really just reading some code or some some
    text out of that system etc MAC address
  • 20:22 - 20:29
    file. So if you have that key, the process
    to decrypt is really simple. You take that
  • 20:29 - 20:35
    key, you subtract some of the bytes - the
    ones marked with Y, and you get your four
  • 20:35 - 20:41
    bytes to do a decryption. And the point in
    the pad that I mentioned for this (tilaka)
  • 20:41 - 20:47
    starting offset is just that same value
    interpreted as an integer mod 512 because
  • 20:47 - 20:54
    that's the length of the pad. In all the
    examples we looked at, or as far as we
  • 20:54 - 21:01
    could tell, these headers only had keys
    for like one device. But looking at the
  • 21:01 - 21:06
    the compiled code it looks like it might
    be possible to have like one file that can
  • 21:06 - 21:10
    be decrypted by multiple different
    devices. We just haven't actually seen a
  • 21:10 - 21:16
    file that is like. So the way that
    actually does decryption is byte by byte
  • 21:16 - 21:23
    and this is a simplified view of what's
    going on. We're releasing a tool that will
  • 21:23 - 21:26
    do this correctly and has all the details
    in it but in a nutshell what you're doing
  • 21:26 - 21:30
    is you're doing a little bit of math to
    figure out where you are starting from for
  • 21:30 - 21:34
    all these operations. And then for each
    byte that you want to decrypt, you take
  • 21:34 - 21:40
    your encrypted byte, you subtract one of
    the per-file bytes, and then you XOR the
  • 21:40 - 21:47
    whole thing with one of the bytes from
    that 512 byte pad. So, the cool thing
  • 21:47 - 21:52
    about this from my point of view is that
    this process is totally reversible. So if
  • 21:52 - 21:57
    you don't know your per-file key but you
    do know what the plaintext should look
  • 21:57 - 22:06
    like, you can run this backwards. And it
    looks ound like that. So what if you just
  • 22:06 - 22:09
    get a bunch of these encrypted PDF files
    and you have no idea what device they came
  • 22:09 - 22:15
    from and you just want to look at them?
    You can also do it like. It's really
  • 22:15 - 22:19
    quick to do you basically
    brute-force all of the potentialial
  • 22:19 - 22:22
    positions to be starting from, which
    is really not that many many because the
  • 22:22 - 22:28
    pad is not very big. And it's kind of a
    plain text at a known plaintext attack.
  • 22:28 - 22:34
    The header a PDF file always looks like %
    PDF and then there's a version number. So
  • 22:34 - 22:39
    you take 4 bytes you calculate the per-
    file key that you would need to to make
  • 22:39 - 22:44
    that decrypt to % PDF and then you take
    the same per-file key and you see if it
  • 22:44 - 22:49
    would be able to decrypt the next section
    to a version number, and wind up with a
  • 22:49 - 22:59
    valid header. And so we've done this for
    all of the the files that we found, and
  • 22:59 - 23:05
    basically wound up with plain text for all
    these. One of the things that we noticed
  • 23:05 - 23:10
    after decrypting these files is that many
    of them have watermarks at the end - so if
  • 23:10 - 23:17
    we look back to the talks on Red Star OS
    from the past years, Florian and Niklaus
  • 23:17 - 23:22
    did some work on understanding what the
    watermark is. And if you want full details
  • 23:22 - 23:29
    look at those talks. But to summarize it -
    every time that a file passes through a
  • 23:29 - 23:34
    desktop system or sometimes a file gets
    modified the OS adds basically an
  • 23:34 - 23:40
    encrypted form of the hard drive serial
    number. Now when releasing these files we
  • 23:40 - 23:45
    want to sort of obscure their origins and
    not get any particular people into
  • 23:45 - 23:52
    trouble, so we remove all those watermarks
    before releasing these. And that's pretty
  • 23:52 - 23:56
    simple because the way that this works
    with PDF files is just that there's a
  • 23:56 - 24:00
    known line of text at the end of the file
    that represents the end of the PDF, and
  • 24:00 - 24:05
    the Red Star always puts these watermarks
    at the end so we just chop off the end. So
  • 24:05 - 24:10
    once we have this we have like over 300
    files of really different kinds of things,
  • 24:10 - 24:14
    and we've kind of looked at some of them
    but we're going to be releasing a torrent
  • 24:14 - 24:20
    with all of them and we'd really like to
    see what people come up with - just you
  • 24:20 - 24:22
    know that that's in these files that we
    have noticed.
  • 24:22 - 24:25
    Will: Have we looked at all of them?
    Gabe: I mean yeah, we've had like a quick
  • 24:25 - 24:30
    look at some of them. We don't, I don't
    speak Korean, you know some. There's
  • 24:30 - 24:36
    probably more to be found in that archive.
    So quick a look at just a couple of
  • 24:36 - 24:42
    examples of things we found. There's many
    different kinds of books on these devices
  • 24:42 - 24:46
    many of them are like computer science
    books, there's general-purpose knowledge
  • 24:46 - 24:51
    kids textbooks. But because we want to
    understand the state of technology in in
  • 24:51 - 24:56
    the DPRK, the part that's most interesting
    to us right now is computer science
  • 24:56 - 25:01
    textbooks. So like two of the examples we
    have are this Java programming book and
  • 25:01 - 25:07
    this computer science book. They've got
    some awesome covers and really neat art in
  • 25:07 - 25:12
    some of them. But yeah, I'll hand that
    back to to Will to actually talk about the
  • 25:12 - 25:21
    analysis of what we we found in these
    books and sort of where they came from.
  • 25:21 - 25:24
    Will: Cool. Yeah, so maybe another quote
  • 25:24 - 25:28
    from from Kim Jong-il is appropriate,
    saying that we need to be aware of the
  • 25:28 - 25:32
    information technology industry and we
    need to meet the needs of the information
  • 25:32 - 25:38
    technology industry. And so I think one of
    the things that that comes out of these
  • 25:38 - 25:42
    text books that that I think is sort of
    interesting and this is the first benefit
  • 25:42 - 25:46
    is that this can help us understand sort
    of where Korea is in terms of how much
  • 25:46 - 25:53
    emphasis its placing on this aspect. For a
    lot of the educational materials, they
  • 25:53 - 25:57
    seem to be organically created, they seem
    to be about the specific environment
  • 25:57 - 26:03
    there's a lot of training kids how to use
    Red Star of various versions that you see.
  • 26:03 - 26:10
    The textbooks, many of them are translated
    or follow a curriculum and a layout of
  • 26:10 - 26:14
    foreign external materials that have been
    translated. So for some of the ones where
  • 26:14 - 26:18
    we could identify what the original source
    was, we tried to calculate how long that
  • 26:18 - 26:21
    had taken, because we were actually
    surprised sometimes this was a pretty
  • 26:21 - 26:28
    quick. So I'll show this waterfall graph -
    each of these bars represents one book.
  • 26:28 - 26:32
    Some of the titles at the bottom they're
    quite small and the the y-axis is the
  • 26:32 - 26:37
    year. The bottom is when the original
    English version that was used seemed to
  • 26:37 - 26:42
    come out and and the top is when the
    translation was released. And so what's
  • 26:42 - 26:45
    interesting here is you
    see order of even the
  • 26:45 - 26:50
    same year sometimes a couple years
    throughout this whole period of 2000 to
  • 26:50 - 26:56
    2010 where they're putting a bunch of
    effort into taking four-hundred, five-
  • 26:56 - 27:03
    hundred page books. The the torrent of
    these text books is four-some gigs, and
  • 27:03 - 27:09
    doing good translations fairly quickly.
    These are like solid translations the code
  • 27:09 - 27:15
    examples have been often changed, there's
    comments in Korean in there. Like, this is
  • 27:15 - 27:18
    this is a solid effort that we should be
    understanding and I think maybe partially
  • 27:18 - 27:22
    sort of fills this gap of like, what is
    this disconnect between this very isolated
  • 27:22 - 27:34
    country and the fact that it has a really
    strong computer capability. Cool, to end,
  • 27:34 - 27:38
    I just want to sort of give an anecdote
    that maybe goes to the other side of this
  • 27:38 - 27:42
    anthropological value that we get out of
    this sort of work. So you've heard about
  • 27:42 - 27:48
    Kwangmyong - this is the internal network
    or Internet. And so from these educational
  • 27:48 - 27:52
    textbooks you start to get I think more
    insight into sort of how this thing has
  • 27:52 - 27:58
    progressed over over time. Here's pictures
    from 2001, I apologize for quality, this
  • 27:58 - 28:03
    was what was there of an early version of
    Kwangmyong. This is Kwangmyong 5.1 which
  • 28:03 - 28:10
    looks sort of like AOL. It was a dial-up
    application that would get you documents
  • 28:10 - 28:15
    and information. You also see at that same
    time that there was an email sort of
  • 28:15 - 28:22
    corresponding app called "hey son" - I
    think I got that pronunciation not too bad
  • 28:22 - 28:25
    that was used for messaging. We've heard
    that there was a messaging system, we
  • 28:25 - 28:31
    didn't really have that connected to sort
    of where that fit in to the puzzle. A
  • 28:31 - 28:35
    picture that seems to be that same sort of
    Internal network ended up on the South
  • 28:35 - 28:40
    Korean internet around 2005. It got reused
    by anonymous in 2013 when they claimed to
  • 28:40 - 28:46
    attack the Korean government servers, but
    but then sort of that that turned out to
  • 28:46 - 28:51
    be false in that it was this original 2005
    post that someone made. That seems to be a
  • 28:51 - 28:56
    similar system. And even in that 2005 post
    they they had sort of also their web
  • 28:56 - 29:00
    component - that's the same logo
    in the upper left as they moved
  • 29:00 - 29:02
    to sort of a web site
    that we've now seen
  • 29:02 - 29:07
    evolved. It's worth noting here right
    Kwangmyong is a single site - it's a
  • 29:07 - 29:12
    service for generally technical document
    retrieval. Here's that same site now up to
  • 29:12 - 29:19
    the 2010-era looking a little bit nicer at
    least at higher quality in the picture.
  • 29:19 - 29:22
    And so I think what we're starting to do
    is we're getting these insights through
  • 29:22 - 29:25
    through seeing some of these more
    documents coming out about what this
  • 29:25 - 29:29
    internal ecosystem actually looks like.
    There are these these services that we can
  • 29:29 - 29:34
    start to link over time, understand what
    sorts of files are available and the
  • 29:34 - 29:39
    specialties of these different groups, and
    and preserve some of this internal network
  • 29:39 - 29:45
    that, you know, in this fairly unstable
    environment, we're at in danger of losing.
  • 29:45 - 29:50
    To bring us up to current time, this is
    from 2015 - a sort of blurry picture from
  • 29:50 - 29:56
    a Koryolink office. Koryolink's the the
    mobile telephony provider and to call out
  • 29:56 - 30:01
    that they now have a same set of services
    on a poster advertising mobile service
  • 30:01 - 30:06
    with internal IPs to them. And so we're
    seeing now that this is being introduced
  • 30:06 - 30:09
    at a wider availability and advertised to
    people on their mobile devices. So we're
  • 30:09 - 30:14
    moving beyond just wire desktop
    connections but this is now a thing that
  • 30:14 - 30:19
    more people are going to have access to on
    personal devices. And so I think you know,
  • 30:19 - 30:26
    internally, we're in this really exciting
    transitionary phase. I'm happy that that
  • 30:26 - 30:31
    more of this ends up in the public. So,
    there's this site, koreacomputecenter - it
  • 30:31 - 30:36
    should already have some links, more will
    show up very soon. If you are interested
  • 30:36 - 30:41
    we encourage you to go grab that stuff try
    and make it the bar lower. If you have
  • 30:41 - 30:45
    DPRK artifacts, info@
    koreacomputercenter.org - we'd love to
  • 30:45 - 30:51
    talk to you, help make stuff safe, and get
    more stuff out for public consumption. I
  • 30:51 - 30:57
    think we are about that time - are you
    coming kicking us off; so we will take
  • 30:57 - 31:03
    questions across the hall in
    the tea room. Thank you.
  • 31:03 - 31:08
    Applause
  • 31:08 - 31:13
    34c3 postroll
  • 31:13 - 31:28
    subtitles created by c3subtitles.de
    in the year 2018. Join, and help us!
Title:
34C3 - DPRK Consumer Technology
Description:

more » « less
Video Language:
English
Duration:
31:28

English subtitles

Revisions