TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

VPN by Google One security assessment

189 点作者 campuscodi超过 2 年前

10 条评论

bri3d超过 2 年前
The actual pentest findings here are pretty boring, but the architecture details are quite interesting, as are the identified risk models for the attempt at &quot;anonymity.&quot;<p>The fundamental anonymity model Google have employed is that the VPN tunnel is authenticated using &quot;blind tokens&quot; which are signed by an authorization service &quot;Zinc.&quot; The Zinc service validates OAuth credentials passed in from the client app to verify a user&#x27;s subscription, then signs the blind token created by the client app to authorize the user&#x27;s session with the actual VPN backend &quot;Copper.&quot; Ostensibly, this will separate the user&#x27;s Google identity from the VPN identity since the VPN service only knows that it got a valid, signed user token, not what user that token belongs to.<p>Ultimately, as pointed out in the report, this is IMHO not that useful. Google could still trivially re-correlate traffic inside of the VPN service by using packet inspection combined with a crafted (or accidental!) plaintext sidechannel from an authenticated Google client application (unencrypted DNS requests to a special subdomain, port&#x2F;IP knocking style requests to a specific list of IPs in a specific order, etc.).<p>Also, if there&#x27;s timestamped logging in both the Zinc and Copper services, the attempt at blinding between the two sides of the system is also quite meaningless since the flow to Zinc and the flow to Copper could just be back-correlated back into a user identity using timing by a Google employee with access to logs.
评论 #33947188 未加载
评论 #33946256 未加载
评论 #33945048 未加载
评论 #33945132 未加载
评论 #33945606 未加载
xnx超过 2 年前
Google One VPN is a big deal, and potentially as big a nightmare for shady data brokers as the iOS cookie apocalypse was for Facebook and others. Google One was available to paid subscribers on Android, then on Windows, and Mac. Now some Pixel owners can use it. Imagine if they turn it on for all Chrome OS users, or all Chrome mobile users, or all Chrome users period. You can have your suspicions about Google, but I&#x27;d trust them over any other tech company or VPN provider.
评论 #33945671 未加载
评论 #33948032 未加载
评论 #33948822 未加载
评论 #33947308 未加载
评论 #33947399 未加载
quotemstr超过 2 年前
Some of the findings are ridiculous. To highlight the lack of binary obfuscation as a threat (albeit a &quot;low-severity&quot; one) is absurd. Kerckhoff&#x27;s principle [1] applies. Security through obscurity (or obfuscation) is no security at all. To highlight the lack of binary obfuscation (which, in its maximal form, would be the client being open source software) as a security threat is the &quot;demand&quot; for security vulnerabilities exceeding the &quot;supply&quot;.<p>If you, as a business, make money from identifying security vulnerabilities in applications, then you have every incentive to invent vulnerabilities where not exist. And if you&#x27;re a client of such a service, then no matter how conscientious you are, no matter how much attention you pay to security, someone, somewhere, will be able to claim that he&#x27;s discovered a vulnerability if he&#x27;s able to make arbitrarily hostile assumptions about the underlying platform.<p>In the limit: &quot;Attack: Program fails to defend against an attack in which Intel specially and secretly recognizes this program&#x27;s machine code and sends the contents of its memory space to the NSA. Recommendation: Program ceases to exist.&quot;. Give me a break!<p>[1] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Kerckhoffs%27s_principle" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Kerckhoffs%27s_principle</a>
评论 #33951228 未加载
评论 #33947792 未加载
评论 #33948677 未加载
SXX超过 2 年前
I guess it would be super easy to verify whatever Google VPN have any privacy in it at all. Just start using their VPN to agressively parse Google own services and look if it get&#x27;s your VPN account banned.
javajosh超过 2 年前
Starting on page 13, where they talk about the broadcast receiver issues, the report mentions &quot;tiktok libraries&quot; several times. What&#x27;s going on there? Is Google&#x27;s VPN solution dependent on tiktok in some way?
评论 #33952271 未加载
Izmaki超过 2 年前
Writing that report must have been hell with - I bet - all the attention from Sr. management.
评论 #33945159 未加载
jokowueu超过 2 年前
I hope they audit outline next
svet_0超过 2 年前
Really boring report, nothing of real essence. Either G&#x27;s product is bullet-proof or the research quality from NCC has deteriorated.
评论 #33946388 未加载
oars超过 2 年前
What is Google&#x27;s long term strategy with this product? Or will it be another thing they deprecate in a few years...
jmclnx超过 2 年前
&gt; “With VPN by Google One, we will never use the VPN connection to track, log, or *sell* your online activity.<p>This can be expanded to: &quot;And by using Google VPN, only Google can see your search history and WEB Sites you visit. Apple will not see anything they do not need to see.&quot; :)