[OLPC Security] Grey Markets: differentiation of legitimately purchased laptops

Mike C. Fletcher mcfletch at vrplumber.com
Mon Oct 15 19:26:26 EDT 2007


C. Scott Ananian wrote:
> On 10/15/07, Ka-Ping Yee <ping at zesty.ca> wrote:
>   
>> On Mon, 15 Oct 2007, C. Scott Ananian wrote:
>>     
>>> I believe the current plan is to only sell G1G1 machines to countries
>>> we are *not* targetting for actual deployment.  If you see an XO in
>>> the USA, you're a friend of the project.  If you see an XO in an
>>> adult's hands in Nigeria, you're a thief.
>>>       
>> But that's not the point.  The concern expressed at the security summit
>> was that someone would steal a shipment of laptops intended for Nigeria
>> in order to resell them at a profit in the United States.  It might
>> even be profitable to buy or barter for laptops that have already been
>> distributed, and ship them to the United States for resale.
>>     
>
> First boot activation prevents this attack.
>   
Certainly not in total.  See other thread today on migratory fraud.  
Consider also village-level corruption where the village (elders, school 
principal) decides that selling the laptops along with their keys is 
sufficiently profitable that they are willing to sell off the laptops 
along with their activation keys and just keep quiet about them 
disappearing.

Faced with, for instance, $100 * 1000 students, many villages might very 
well say "scr*w education" and sell off the units to throw a magnificent 
party, to pay for an important retirement fund for the local war-lord, 
or what have you.  Similarly if armed men are telling you to hand over 
the shipment of laptops and all of the activation keys, and tell you 
they will come back and kill you all if you ever report them stolen, you 
will likely hand over the shipment and keep quiet.  As long as the 
profit motive exists, you will have people try to exploit the resource.

The potential existence of signed images which allow for unlocking any 
laptop (proposed for the country-level repair centres) means that with a 
simple leak of those images, any stolen laptop becomes entirely 
untraceable and thus valuable.  With that leak, a simple insertion of a 
USB key makes any laptop resalable.  Even without those images, the leak 
of a country's signing key would have the same effect.  Organised crime 
could, without much difficulty, acquire country-level keys, if doing so 
would open up millions of dollars in salable goods.

What we are suggesting here is a means to reduce the *motive* to steal 
the laptops.  While first-boot activation erects another hurdle (and we 
want that hurdle), we have potentially millions of dollars available for 
determined thieves.  Having a physical difference in the laptop 
introduces a per-unit cost to grey-marketeers, each laptop now has to be 
physically altered with a reasonable degree of care to avoid being 
easily spotted.

If physical differentiation can be done with minimal impact, I would 
*strongly* suggest that we do so.

Hope that helps,
Mike

-- 
________________________________________________
  Mike C. Fletcher
  Designer, VR Plumber, Coder
  http://www.vrplumber.com
  http://blog.vrplumber.com



More information about the Security mailing list