<?xml version="1.0" encoding="utf-8" ?><transcript><text start="1.159" dur="6.16">uh my name is Sebastian and I would like</text><text start="3.72" dur="5.459">to tell you a story about crafting the</text><text start="7.319" dur="5.101">private phone</text><text start="9.179" dur="7.621">um it&amp;#39;s basically about the challenges</text><text start="12.42" dur="6.359">that are on the way to create such a</text><text start="16.8" dur="7.8">private phone</text><text start="18.779" dur="9.84">um and about how we as neo900 project uh</text><text start="24.6" dur="4.74">want to tackle those challenges</text><text start="28.619" dur="4.861">um</text><text start="29.34" dur="7.16">I also tell you a bit about uh current</text><text start="33.48" dur="5.82">status of neo900</text><text start="36.5" dur="4.02">where we are at the moment</text><text start="39.3" dur="3.2">so</text><text start="40.52" dur="4.359">to start</text><text start="42.5" dur="6.1">let&amp;#39;s talk</text><text start="44.879" dur="8.041">um a bit about what neo900 is</text><text start="48.6" dur="6.18">um is them it&amp;#39;s the match of GTA 04 that</text><text start="52.92" dur="6.42">was already presented earlier by</text><text start="54.78" dur="9">Nicolaus and Nokia and 900 that&amp;#39;s a</text><text start="59.34" dur="6.36">famous Nokia Linux based phone</text><text start="63.78" dur="6.54">um</text><text start="65.7" dur="6.56">that was running on a mymo platform</text><text start="70.32" dur="7.44">and we we actually</text><text start="72.26" dur="8.94">uh going beyond that match</text><text start="77.76" dur="6.96">um near 900 it&amp;#39;s it&amp;#39;s also found that</text><text start="81.2" dur="5.7">cares about your privacy what does it</text><text start="84.72" dur="2.18">mean</text><text start="87.96" dur="6.619">okay let&amp;#39;s start with</text><text start="91.04" dur="8.14">a bit of specs</text><text start="94.579" dur="11.68">neo900 will be a bit upgraded uh when</text><text start="99.18" dur="7.079">compared to uh GTA 04 or N900</text><text start="106.32" dur="6.619">um it&amp;#39;s going to contain an uh Texas</text><text start="110.7" dur="6.3">Instruments on map free</text><text start="112.939" dur="9.521">processor on working on one gigahertz</text><text start="117" dur="5.46">and one gigabyte of RAM</text><text start="123.06" dur="6.179">um</text><text start="124.7" dur="8.86">from the most important features</text><text start="129.239" dur="6.541">um I think an interesting one is a dual</text><text start="133.56" dur="5.06">touch resistive screen</text><text start="135.78" dur="6.72">there&amp;#39;s a lot of discussion going on</text><text start="138.62" dur="6.52">resistive and competitive screens and we</text><text start="142.5" dur="5.3">actually believe that a good resistive</text><text start="145.14" dur="2.66">screen is</text><text start="148.22" dur="6.48">better for</text><text start="151.879" dur="4.961">projects like that as a</text><text start="154.7" dur="6.64">hacker friendly phone when you can</text><text start="156.84" dur="5.58">actually launch any software you want</text><text start="161.34" dur="5.399">um</text><text start="162.42" dur="5">for near 900 will contain</text><text start="166.739" dur="4.14">um</text><text start="167.42" dur="5.44">specifically crafted modern sandbox and</text><text start="170.879" dur="4.281">monitoring solution and I&amp;#39;ll get back to</text><text start="172.86" dur="2.3">it later</text><text start="175.2" dur="7.8">um it&amp;#39;s also a very hacker</text><text start="178.28" dur="7.92">oriented phone uh what I mean is we&amp;#39;ll</text><text start="183" dur="6.78">uh we will have a lot of</text><text start="186.2" dur="9.039">additional interfaces that you as a user</text><text start="189.78" dur="8.28">can utilize to make some crazy projects</text><text start="195.239" dur="6.481">whatever you would like whatever you</text><text start="198.06" dur="8.759">imagine and you know how to do it you</text><text start="201.72" dur="5.89">we can stop you from from doing that all</text><text start="206.819" dur="2.121">of them</text><text start="207.61" dur="4.97">[Music]</text><text start="208.94" dur="8.1">specifications or documentation will be</text><text start="212.58" dur="4.46">available the project is</text><text start="217.2" dur="8.959">is run in open Hardware Spirits so</text><text start="221.159" dur="10.5">um that&amp;#39;s uh definitely a open platform</text><text start="226.159" dur="8.321">and one of the most open uh</text><text start="231.659" dur="5.121">mobile phone smartphones available on</text><text start="234.48" dur="2.3">the market</text><text start="239.04" dur="2.72">okay</text><text start="244.7" dur="4.14">let&amp;#39;s</text><text start="246.56" dur="6.28">compare the situation</text><text start="248.84" dur="4">of how</text><text start="253.86" dur="5.64">um</text><text start="255.56" dur="5.88">common commonly available phones on the</text><text start="259.5" dur="5.6">market</text><text start="261.44" dur="6.72">look like when compared to platforms</text><text start="265.1" dur="7">like open mock-up in front of</text><text start="268.16" dur="5.4">ones like the neo900s</text><text start="272.1" dur="4.76">um</text><text start="273.56" dur="7.18">we in common smartphones</text><text start="276.86" dur="5.98">like iPhones like Android ones maybe</text><text start="280.74" dur="2.88">Windows phones</text><text start="282.84" dur="4.799">um</text><text start="283.62" dur="7.32">there&amp;#39;s a progressing trend of locking</text><text start="287.639" dur="4.62">down and the software locking down the</text><text start="290.94" dur="2.16">user</text><text start="292.259" dur="3.44">um</text><text start="293.1" dur="9.24">what does it mean</text><text start="295.699" dur="9.641">the the device comes as</text><text start="302.34" dur="4.22">close the package of both hardware and</text><text start="305.34" dur="6.62">software</text><text start="306.56" dur="5.4">and the software is</text><text start="312.479" dur="8.361">um also highly tied up with</text><text start="315.479" dur="7.581">um lots of online services</text><text start="320.84" dur="6.16">provided by</text><text start="323.06" dur="5.44">Apple Google Microsoft and companies</text><text start="327" dur="3.12">like that</text><text start="328.5" dur="4.16">um</text><text start="330.12" dur="4.82">that&amp;#39;s not exactly how</text><text start="332.66" dur="7.9">how</text><text start="334.94" dur="9.94">our PCS operate what we are used to when</text><text start="340.56" dur="6">Computing on a desktop computers on</text><text start="344.88" dur="6.3">laptops</text><text start="346.56" dur="6.44">um where basically there we are admins</text><text start="351.18" dur="6.54">of our phones</text><text start="353" dur="7.78">I mean computers we decide what</text><text start="357.72" dur="5.84">operating system we want to use we</text><text start="360.78" dur="8.1">decide what software we want to use</text><text start="363.56" dur="7.72">we installed that that software or not</text><text start="368.88" dur="4.8">um however on mobile phones there&amp;#39;s</text><text start="371.28" dur="4.74">there&amp;#39;s a difference because</text><text start="373.68" dur="5.9">um and there</text><text start="376.02" dur="7.5">um nowadays more often than not</text><text start="379.58" dur="6.7">designed as a world guidance</text><text start="383.52" dur="4.04">that is uh closed</text><text start="386.28" dur="2.82">um</text><text start="387.56" dur="4.3">ecosystems</text><text start="389.1" dur="7.26">that&amp;#39;s uh I think</text><text start="391.86" dur="5.7">um uh 20 watt for that</text><text start="396.36" dur="3.619">um well</text><text start="397.56" dur="7.4">um a company that manages</text><text start="399.979" dur="9.28">that world Garden actually have uh has</text><text start="404.96" dur="7.9">in control what can be uh launched what</text><text start="409.259" dur="9.44">can be ran on that on that platform</text><text start="412.86" dur="5.839">um as you probably know there are</text><text start="419.22" dur="7.759">platforms like app stores</text><text start="421.88" dur="10.42">available on Android on on iOS and it&amp;#39;s</text><text start="426.979" dur="8.801">most visible on iOS actually where you</text><text start="432.3" dur="6.06">cannot even launch any</text><text start="435.78" dur="5.759">um any software that wasn&amp;#39;t accepted</text><text start="438.36" dur="5.76">that wasn&amp;#39;t permitted to to arrive on</text><text start="441.539" dur="4.641">Apple&amp;#39;s App Store</text><text start="444.12" dur="2.06">um</text><text start="446.52" dur="5.28">why is that why does the cell phone</text><text start="449.16" dur="4.379">really differ so much from your average</text><text start="451.8" dur="4.799">laptop or desktop</text><text start="453.539" dur="6.6">uh technically it doesn&amp;#39;t</text><text start="456.599" dur="6.121">it&amp;#39;s just smaller and more integrated</text><text start="460.139" dur="4.34">um technically there&amp;#39;s no reason to to</text><text start="462.72" dur="4.46">lock you down</text><text start="464.479" dur="5.101">and then</text><text start="467.18" dur="7.26">comments smartphones</text><text start="469.58" dur="10.179">have computing power comparable to</text><text start="474.44" dur="7.539">desktops from some years ago or</text><text start="479.759" dur="3.141">so</text><text start="481.979" dur="6.241">um</text><text start="482.9" dur="10.32">we can actually run the same software we</text><text start="488.22" dur="10.44">launched uh let&amp;#39;s say 10 or 15 years ago</text><text start="493.22" dur="9.34">on our compute test and now on on mobile</text><text start="498.66" dur="6.78">phones and that&amp;#39;s not how</text><text start="502.56" dur="3.539">there&amp;#39;s no problem with that</text><text start="505.44" dur="1.56">um</text><text start="506.099" dur="2.461">okay</text><text start="507" dur="4.379">however</text><text start="508.56" dur="6.32">it&amp;#39;s really convenient for</text><text start="511.379" dur="3.501">um for the</text><text start="515.419" dur="7.12">companies that um on the platform</text><text start="519.719" dur="6.001">uh what&amp;#39;s them and the problem with such</text><text start="522.539" dur="5.281">platforms for for users</text><text start="525.72" dur="2.94">um there&amp;#39;s a lack of documentation there</text><text start="527.82" dur="5.699">are</text><text start="528.66" dur="7.58">um there is no information on how staff</text><text start="533.519" dur="6.44">in those devices really work</text><text start="536.24" dur="7.539">uh lots of components are closed</text><text start="539.959" dur="6.82">without any source code without drivers</text><text start="543.779" dur="4.861">for it so changing them if you would</text><text start="546.779" dur="2.841">like to install your own operating</text><text start="548.64" dur="4.199">system</text><text start="549.62" dur="6.3">you&amp;#39;re in trouble because you would have</text><text start="552.839" dur="8.541">to write your own drivers</text><text start="555.92" dur="7.72">even for common systems like Linux</text><text start="561.38" dur="3.76">when you don&amp;#39;t have documentation you</text><text start="563.64" dur="5.28">would have to invest engineer everything</text><text start="565.14" dur="5.28">and that&amp;#39;s a lot of effort a lot of</text><text start="568.92" dur="2.16">trouble</text><text start="570.42" dur="7.32">um</text><text start="571.08" dur="7.4">we would uh and that also connects with</text><text start="577.74" dur="6.18">um</text><text start="578.48" dur="7.299">with the next Point porting uh I uh well</text><text start="583.92" dur="5.94">that it&amp;#39;s never ending story because</text><text start="585.779" dur="7.281">even if there is some device available</text><text start="589.86" dur="9.36">let&amp;#39;s say Nexus</text><text start="593.06" dur="8.14">that allows some kind of freedom in uh</text><text start="599.22" dur="3.32">in</text><text start="601.2" dur="5.22">um</text><text start="602.54" dur="5.68">launching uh your custom operating</text><text start="606.42" dur="4.38">system</text><text start="608.22" dur="5.82">um it will quickly become obsolete there</text><text start="610.8" dur="7.02">will be never one never once</text><text start="614.04" dur="4.25">um that newer I mean and that</text><text start="617.82" dur="2.3">um</text><text start="618.29" dur="4.57">[Music]</text><text start="620.12" dur="3.76">will quickly</text><text start="622.86" dur="4.94">um</text><text start="623.88" dur="9.54">move your developers from your community</text><text start="627.8" dur="8.02">to the next device next targets and from</text><text start="633.42" dur="3.539">from practice I have noticed that lots</text><text start="635.82" dur="5.699">of</text><text start="636.959" dur="7.081">um projects to to Port some operating</text><text start="641.519" dur="5.641">system on uh platforms like that and</text><text start="644.04" dur="6.6">never never really ended there&amp;#39;s always</text><text start="647.16" dur="6.96">something that&amp;#39;s not working and it</text><text start="650.64" dur="5.96">becomes obsolete before it&amp;#39;s actually</text><text start="654.12" dur="2.48">finished</text><text start="657.12" dur="5.7">um that&amp;#39;s also a problem</text><text start="659.54" dur="6.66">with getting</text><text start="662.82" dur="6">um even if something is is already open</text><text start="666.2" dur="6.9">uh is</text><text start="668.82" dur="7.44">um shared with uh by the</text><text start="673.1" dur="5.979">creator of of the device let&amp;#39;s say some</text><text start="676.26" dur="6.259">candle drivers</text><text start="679.079" dur="6.2">um it more likely than</text><text start="682.519" dur="6.341">than that it won&amp;#39;t be</text><text start="685.279" dur="8.701">upstreamed it will be just</text><text start="688.86" dur="9.84">shared in some table on some website</text><text start="693.98" dur="8.56">and if you would like to uh to have that</text><text start="698.7" dur="7.98">driver managed some maintained somehow</text><text start="702.54" dur="7.799">you would have to either maintain it by</text><text start="706.68" dur="4.279">yourself or hope that the</text><text start="710.339" dur="3.18">um</text><text start="710.959" dur="5.861">the manufacturer will release updated</text><text start="713.519" dur="7.341">version somewhere in the future</text><text start="716.82" dur="9.9">um or you would have to</text><text start="720.86" dur="8.979">to invest a lot of work in getting that</text><text start="726.72" dur="6.239">drivers into shape that can be</text><text start="729.839" dur="4.101">upstreamed to</text><text start="732.959" dur="4.62">um</text><text start="733.94" dur="5.8">to them Upstream project</text><text start="737.579" dur="4.161">them</text><text start="739.74" dur="2">um</text><text start="742.74" dur="4.86">the big problem is also with a so-called</text><text start="745.86" dur="6.659">planned obsolescence</text><text start="747.6" dur="8.1">because this trend of building um the</text><text start="752.519" dur="5.101">devices that aren&amp;#39;t designed to to last</text><text start="755.7" dur="4.98">long</text><text start="757.62" dur="5.06">um your the other</text><text start="760.68" dur="2">um</text><text start="763.2" dur="6.02">encouraged to replace</text><text start="766.639" dur="5.981">your your device</text><text start="769.22" dur="8.22">let&amp;#39;s say each two or three or four</text><text start="772.62" dur="9.2">years rather than keeping it longer</text><text start="777.44" dur="8.56">the economical reasons are obvious</text><text start="781.82" dur="8.1">and the last point on this slide I think</text><text start="786" dur="6.3">the most important important one</text><text start="789.92" dur="4.12">when you have to break into your own</text><text start="792.3" dur="4.58">device in order to use it as you wish</text><text start="794.04" dur="7.56">something is completely wrong</text><text start="796.88" dur="9.639">it&amp;#39;s something that</text><text start="801.6" dur="8.88">kind of imaginable to me that under some</text><text start="806.519" dur="8.82">jurisdictions in the world there&amp;#39;s it&amp;#39;s</text><text start="810.48" dur="6.38">even illegal to just use your own both</text><text start="815.339" dur="6.421">device</text><text start="816.86" dur="6.88">in some specific way</text><text start="821.76" dur="4.28">um as far as I know in United States</text><text start="823.74" dur="6.36">there&amp;#39;s um</text><text start="826.04" dur="7.44">dmca exception for phones so you can</text><text start="830.1" dur="8.28">Jailbreak uh iPhone but</text><text start="833.48" dur="8.56">when you get an iPad it&amp;#39;s not covered by</text><text start="838.38" dur="6.24">that exception so you cannot legally use</text><text start="842.04" dur="5.96">iPad anywhere you you would like</text><text start="844.62" dur="3.38">so you buy a device</text><text start="848.18" dur="8.98">but when you want to do something with a</text><text start="852.779" dur="6.901">device you own you you can&amp;#39;t</text><text start="857.16" dur="4.859">let&amp;#39;s back to the main topic of this</text><text start="859.68" dur="5.339">presentation that is privacy</text><text start="862.019" dur="3">so</text><text start="865.079" dur="3.681">how can you privacy software</text><text start="869.42" dur="4.84">obviously uh can suffer from data data</text><text start="873.18" dur="6.12">leaks</text><text start="874.26" dur="7.139">and your data can get leaked via the</text><text start="879.3" dur="6.42">Internet or some other Wireless</text><text start="881.399" dur="9.62">technology or some immovable media</text><text start="885.72" dur="9.359">or if your life can be can be spied on</text><text start="891.019" dur="5.861">on location tracking on audio video If</text><text start="895.079" dur="4.081">shopping or logging your activities</text><text start="896.88" dur="4.5">collecting metadata</text><text start="899.16" dur="5.9">and</text><text start="901.38" dur="9.42">um obviously a mobile phone</text><text start="905.06" dur="6.959">which is a device that most of us are</text><text start="910.8" dur="3.14">um</text><text start="912.019" dur="7.741">uh</text><text start="913.94" dur="8.5">most of us have a new uh near us</text><text start="919.76" dur="3.84">for almost</text><text start="922.44" dur="6.899">um</text><text start="923.6" dur="11.5">whole life whole day at least</text><text start="929.339" dur="5.761">um that&amp;#39;s a very convenient device to to</text><text start="935.399" dur="5.281">to</text><text start="936.38" dur="8.94">get into some of your private data or</text><text start="940.68" dur="4.64">into Data details of your life</text><text start="946.56" dur="9">um so if we would like to build a device</text><text start="951.6" dur="6.38">that&amp;#39;s strong on privacy</text><text start="955.56" dur="5.1">it turns out that</text><text start="957.98" dur="8.64">great first step to do that is to build</text><text start="960.66" dur="5.96">a good open and hackable hackable device</text><text start="967.92" dur="6.2">um because that&amp;#39;s actually a kind of</text><text start="971.519" dur="6.18">device that can</text><text start="974.12" dur="7.26">be trustable that can</text><text start="977.699" dur="3.681">um be transparent to the user</text><text start="981.959" dur="4.56">um</text><text start="982.699" dur="7.2">but there&amp;#39;s a problem</text><text start="986.519" dur="10.141">even if we build a device like</text><text start="989.899" dur="8.981">GTA 04 or near 900 without using some</text><text start="996.66" dur="4.56">additional measures</text><text start="998.88" dur="5.34">there&amp;#39;s a big</text><text start="1001.22" dur="6.78">ugly property Black Box sitting inside</text><text start="1004.22" dur="6.179">it which is known to often be vulnerable</text><text start="1008" dur="5.279">and it&amp;#39;s a basement processor</text><text start="1010.399" dur="4.461">based on processor is a device that</text><text start="1013.279" dur="6.781">actually</text><text start="1014.86" dur="7.24">connects to the Via wireless network to</text><text start="1020.06" dur="5.58">to the base stations and do the</text><text start="1022.1" dur="5.78">communication with will provide</text><text start="1025.64" dur="6.96">there&amp;#39;s a nice presentation</text><text start="1027.88" dur="7.02">by Ralph Philippe weinman uh told on</text><text start="1032.6" dur="5.64">black hat con conference</text><text start="1034.9" dur="5.439">a few years ago named audio bass bands</text><text start="1038.24" dur="3.9">have belonged to us I highly recommend</text><text start="1040.339" dur="5.661">to look at it</text><text start="1042.14" dur="9.24">because it shows</text><text start="1046" dur="7.299">how easily a basement processors can be</text><text start="1051.38" dur="2.6">actually</text><text start="1053.299" dur="4.101">um</text><text start="1053.98" dur="3.42">targeted as</text><text start="1058.48" dur="5.699">targeted for attacks</text><text start="1061.179" dur="6.421">lots of those</text><text start="1064.179" dur="6.841">females on those devices</text><text start="1067.6" dur="7.72">have their roots</text><text start="1071.02" dur="7.96">in 80s or 90s and</text><text start="1075.32" dur="7.34">um they inherited the SEC all the</text><text start="1078.98" dur="8.22">security approach from from that time</text><text start="1082.66" dur="5.98">so there are lots of both overflows lots</text><text start="1087.2" dur="2.42">of</text><text start="1088.64" dur="4.2">um</text><text start="1089.62" dur="4.26">lots of basic</text><text start="1092.84" dur="5.699">um</text><text start="1093.88" dur="8.58">security problems that can be exploited</text><text start="1098.539" dur="7.441">by anyone malicious</text><text start="1102.46" dur="4.24">somewhere near your phone</text><text start="1105.98" dur="3.72">um</text><text start="1106.7" dur="5.66">and what&amp;#39;s more what&amp;#39;s most scary the</text><text start="1109.7" dur="6.66">basement processor</text><text start="1112.36" dur="4">often has</text><text start="1116.86" dur="5.98">uh has</text><text start="1119.44" dur="6.4">quite a lot of control over the the mine</text><text start="1122.84" dur="4.52">because the soil we trans the operating</text><text start="1125.84" dur="5.839">system of the user</text><text start="1127.36" dur="7.54">uh like you know Linux like Android like</text><text start="1131.679" dur="7.38">iOS so</text><text start="1134.9" dur="7.08">having control just under the</text><text start="1139.059" dur="5.221">that operating system that mine of a</text><text start="1141.98" dur="7.26">main operating system is not enough</text><text start="1144.28" dur="9.22">because the baseband can actually</text><text start="1149.24" dur="6">um influence that that OS</text><text start="1153.5" dur="4.74">that&amp;#39;s the main problem with projects</text><text start="1155.24" dur="6.319">like like black phone which</text><text start="1158.24" dur="7.1">um focused on shielding that</text><text start="1161.559" dur="5.401">android-based based operating system</text><text start="1165.34" dur="8.5">but</text><text start="1166.96" dur="12.16">totally forgot about uh how uh it how</text><text start="1173.84" dur="5.28">vulnerable basement process can be uh</text><text start="1180.7" dur="7.78">recently there&amp;#39;s a maybe not not as</text><text start="1184.82" dur="5.76">recently but there&amp;#39;s a trend of uh into</text><text start="1188.48" dur="4.199">tightly integrating the basement with</text><text start="1190.58" dur="6.12">the rest of the system it&amp;#39;s happening</text><text start="1192.679" dur="4.821">because of a lower costs mainly</text><text start="1196.7" dur="2.96">um</text><text start="1197.5" dur="6.94">and</text><text start="1199.66" dur="6.46">two main threats out from that are the</text><text start="1204.44" dur="5.099">direct connection to microphone and</text><text start="1206.12" dur="8.059">direct memory access the first one</text><text start="1209.539" dur="8.101">um causes the basement to be able to</text><text start="1214.179" dur="7.86">Simply listen to what happens around the</text><text start="1217.64" dur="8.24">fall without any consent of the main</text><text start="1222.039" dur="6.361">main system with a customer of user and</text><text start="1225.88" dur="5.679">the second one direct memory access</text><text start="1228.4" dur="6.12">actually allows basement to do whatever</text><text start="1231.559" dur="5.881">it wants with main</text><text start="1234.52" dur="6.399">main software main operating system that</text><text start="1237.44" dur="7.14">user launches with any application that</text><text start="1240.919" dur="5.221">that user uses on his phone</text><text start="1244.58" dur="3.66">um</text><text start="1246.14" dur="5.82">and</text><text start="1248.24" dur="9.6">um shielding gram the operating system</text><text start="1251.96" dur="8.459">that that user actually uses without</text><text start="1257.84" dur="7.579">um we&amp;#39;re taking care of the base band</text><text start="1260.419" dur="7.701">reminds me of of the way how</text><text start="1265.419" dur="6.221">cannibals on Monkey Island</text><text start="1268.12" dur="5.38">threaded a guy blast</text><text start="1271.64" dur="4.32">um if you have if you&amp;#39;re not familiar</text><text start="1273.5" dur="3.78">with the game I&amp;#39;ll explain it to you a</text><text start="1275.96" dur="3.38">bit</text><text start="1277.28" dur="2.06">um</text><text start="1280.46" dur="6.839">um at some moment in the game guy bash</text><text start="1282.38" dur="6.74">has to uh to land uh some bananas from</text><text start="1287.299" dur="6.12">the village and</text><text start="1289.12" dur="8.799">he gets cut caught by uh by cannibus</text><text start="1293.419" dur="7.74">which who imprisoned him uh and lock the</text><text start="1297.919" dur="5.161">door but there&amp;#39;s a hole uh in the floor</text><text start="1301.159" dur="4.921">which leads to</text><text start="1303.08" dur="3">um exit</text><text start="1306.62" dur="4.679">um</text><text start="1307.7" dur="6.26">and but there&amp;#39;s a gag in the game that</text><text start="1311.299" dur="2.661">you can actually</text><text start="1314.08" dur="8.32">go back and be caught again</text><text start="1319.34" dur="6.719">and they strengthen the the door</text><text start="1322.4" dur="7.32">and when you escape again and go back</text><text start="1326.059" dur="4.921">they straighten the door once again</text><text start="1329.72" dur="4.079">and</text><text start="1330.98" dur="5.939">you can do it once again and obviously</text><text start="1333.799" dur="4.981">now that should do it</text><text start="1336.919" dur="4.921">of course you have no problem with</text><text start="1338.78" dur="5.879">escaping once again so uh that&amp;#39;s just</text><text start="1341.84" dur="5.54">like with with the base band situation</text><text start="1344.659" dur="6.301">because when you just keep</text><text start="1347.38" dur="7.179">strengthening the the front door without</text><text start="1350.96" dur="4.94">doing anything with that hole in the</text><text start="1354.559" dur="5.821">floor</text><text start="1355.9" dur="8.139">simply not doing anything meaningful to</text><text start="1360.38" dur="5.82">to secure your your data to</text><text start="1364.039" dur="4.861">um or anything that happens on your</text><text start="1366.2" dur="4.74">phone that&amp;#39;s that&amp;#39;s not the way</text><text start="1368.9" dur="5.22">um</text><text start="1370.94" dur="7.02">so what can we do with that can we make</text><text start="1374.12" dur="4.679">a basement that is open that</text><text start="1377.96" dur="3.06">um</text><text start="1378.799" dur="3">can be</text><text start="1381.02" dur="5.639">um</text><text start="1381.799" dur="10.981">let&amp;#39;s say audited by anyone on the</text><text start="1386.659" dur="8.721">planet or uh can and which operation can</text><text start="1392.78" dur="2.6">be checked</text><text start="1395.72" dur="7.86">unfortunately it&amp;#39;s not that easy because</text><text start="1400.12" dur="7.48">creating a basement processor is a</text><text start="1403.58" dur="6.839">really hard task and there is a reason</text><text start="1407.6" dur="6.36">why there are only a few companies in</text><text start="1410.419" dur="4.701">the world that actually produce them</text><text start="1413.96" dur="3.959">that</text><text start="1415.12" dur="4.299">instead of just using some licensed</text><text start="1417.919" dur="5.661">technology</text><text start="1419.419" dur="5.88">and their code basis uh</text><text start="1423.58" dur="6.339">really</text><text start="1425.299" dur="5.961">um many years old so</text><text start="1429.919" dur="6.12">um</text><text start="1431.26" dur="7.06">and so starting such project to let&amp;#39;s</text><text start="1436.039" dur="3.741">say just just write the</text><text start="1438.32" dur="6.5">um</text><text start="1439.78" dur="10.06">competitive uh female that could be uh</text><text start="1444.82" dur="8.26">could be executed on some uh some</text><text start="1449.84" dur="4.02">basement pieces available</text><text start="1453.08" dur="4.2">um</text><text start="1453.86" dur="7.699">would be really hard there is</text><text start="1457.28" dur="4.279">um okay that&amp;#39;s next slide</text><text start="1461.96" dur="6.24">what&amp;#39;s more</text><text start="1463.76" dur="7.34">you can just write the the code and</text><text start="1468.2" dur="5.359">launch it on on the processor because</text><text start="1471.1" dur="5.1">they&amp;#39;re just locked</text><text start="1473.559" dur="6.181">they are um</text><text start="1476.2" dur="7.32">cryptographic signatures used by their</text><text start="1479.74" dur="7.48">presence to ensure that only the</text><text start="1483.52" dur="6.46">assigned versions of the software that</text><text start="1487.22" dur="6.62">were approved by a</text><text start="1489.98" dur="6.319">by the manufacturer will be executed on</text><text start="1493.84" dur="5.88">on that device</text><text start="1496.299" dur="8.62">and what&amp;#39;s more there&amp;#39;s um</text><text start="1499.72" dur="5.199">mandatory certification of of</text><text start="1505.52" dur="6.68">um those devices because they do</text><text start="1509.44" dur="5.34">communicate over the air</text><text start="1512.2" dur="6.66">and so that</text><text start="1514.78" dur="6.879">that of course has to comply with</text><text start="1518.86" dur="5.02">legal regulations</text><text start="1521.659" dur="3.561">and when you change anything in the</text><text start="1523.88" dur="4.039">software</text><text start="1525.22" dur="6.699">of such device</text><text start="1527.919" dur="7.721">in most jurisdiction in the world that</text><text start="1531.919" dur="5.76">voids the certification so it has to be</text><text start="1535.64" dur="5.34">done once again</text><text start="1537.679" dur="6.061">um and the device that that doesn&amp;#39;t have</text><text start="1540.98" dur="3.9">a valid certification is simply illegal</text><text start="1543.74" dur="3">to use</text><text start="1544.88" dur="5.82">there&amp;#39;s a project</text><text start="1546.74" dur="5.74">called osmoc on BB that actually</text><text start="1550.7" dur="3.38">implements</text><text start="1552.48" dur="6.199">[Music]</text><text start="1554.08" dur="6.699">free firmware that can be executed on</text><text start="1558.679" dur="7.561">such a basement processor</text><text start="1560.779" dur="8.52">but it&amp;#39;s it&amp;#39;s limited to one it&amp;#39;s</text><text start="1566.24" dur="6.24">limited to 2G Networks</text><text start="1569.299" dur="7.081">and second one it&amp;#39;s limited to Texas</text><text start="1572.48" dur="9.24">Instruments Calypso basements that were</text><text start="1576.38" dur="8.659">used in some old Motorola phones and in</text><text start="1581.72" dur="7.559">openmoco devices</text><text start="1585.039" dur="9.52">uh of course installing such um firmware</text><text start="1589.279" dur="9.301">on your phone and just trying to use it</text><text start="1594.559" dur="8.461">um is not that easy it&amp;#39;s illegal</text><text start="1598.58" dur="6.719">actually unless you get some government</text><text start="1603.02" dur="6.06">permissions to do that or you operated</text><text start="1605.299" dur="6.021">in fire like age and that&amp;#39;s not really</text><text start="1609.08" dur="5.82">the</text><text start="1611.32" dur="8.62">the basic use case you would expect from</text><text start="1614.9" dur="6.72">operating the mobile phone and so</text><text start="1619.94" dur="7.44">um and and</text><text start="1621.62" dur="11.039">um BB is actually not oriented to</text><text start="1627.38" dur="9.899">um to provide a firmware that can be</text><text start="1632.659" dur="6.541">used as um as a phone it&amp;#39;s more like</text><text start="1637.279" dur="5.421">um</text><text start="1639.2" dur="3.5">like a research project</text><text start="1644.9" dur="6.48">however even if we could</text><text start="1647.96" dur="7.5">um could produce an open basement and we</text><text start="1651.38" dur="5.96">should fix a lot of uh a lot of a lot of</text><text start="1655.46" dur="4.26">project problems</text><text start="1657.34" dur="4.12">it wouldn&amp;#39;t magically fix all the</text><text start="1659.72" dur="4.64">Privacy problems</text><text start="1661.46" dur="5.52">there are also other threats</text><text start="1664.36" dur="7.24">like tracking</text><text start="1666.98" dur="9.48">it can be either based on uh solely on</text><text start="1671.6" dur="7.74">the wireless network or assisted by GPS</text><text start="1676.46" dur="6.12">if dropping data leakage leakage</text><text start="1679.34" dur="6.959">security bugs in female or even SIM</text><text start="1682.58" dur="5.76">cards and of course direct access to to</text><text start="1686.299" dur="2.781">main Ram</text><text start="1688.34" dur="4.68">um</text><text start="1689.08" dur="5.86">which means that as I said before if one</text><text start="1693.02" dur="6.08">part of the system is compromised in the</text><text start="1694.94" dur="4.16">other is as well</text><text start="1699.86" dur="6.059">um there are links to uh to more details</text><text start="1703.039" dur="4.441">about those tracking</text><text start="1705.919" dur="5.521">um</text><text start="1707.48" dur="6.5">tracking methods uh I if you&amp;#39;re</text><text start="1711.44" dur="6.54">interested I recommend checking them out</text><text start="1713.98" dur="6.12">later from the PDF slides</text><text start="1717.98" dur="2.12">um</text><text start="1720.38" dur="5.36">of course there&amp;#39;s also a threat of</text><text start="1723.52" dur="6.159">GSM hacking</text><text start="1725.74" dur="4.74">because if</text><text start="1729.679" dur="4.441">um</text><text start="1730.48" dur="5.559">if staff is so vulnerable</text><text start="1734.12" dur="5.12">um it&amp;#39;s</text><text start="1736.039" dur="7.681">not really hard to do</text><text start="1739.24" dur="5.679">fun or actually argue stuff with with</text><text start="1743.72" dur="5.16">GSM</text><text start="1744.919" dur="6.86">anyone with a device</text><text start="1748.88" dur="8.1">um let&amp;#39;s say osmoc on VB</text><text start="1751.779" dur="6.181">or some more specialized devices</text><text start="1756.98" dur="6.179">um</text><text start="1757.96" dur="7.199">if he will if he ignored that</text><text start="1763.159" dur="2">um</text><text start="1765.7" dur="8.02">of such actions he can actually do he or</text><text start="1769.82" dur="7.7">she can do a lot of nasty stuff to the</text><text start="1773.72" dur="7.199">network the encryption used in GSM</text><text start="1777.52" dur="7.42">was actually broken long ago and it was</text><text start="1780.919" dur="8.461">deliberately weekend uh when the specs</text><text start="1784.94" dur="6.359">were were created to make a life of</text><text start="1789.38" dur="4.62">governmental surveillance agencies</text><text start="1791.299" dur="3.98">easier and if I remember correctly that</text><text start="1794" dur="6.059">was</text><text start="1795.279" dur="7.301">that request came from Britain</text><text start="1800.059" dur="6.141">and</text><text start="1802.58" dur="5.65">there was a discussion about that and</text><text start="1806.2" dur="3.9">Germany especially was</text><text start="1808.23" dur="6.429">[Music]</text><text start="1810.1" dur="6.179">was Far a stronger encryption</text><text start="1814.659" dur="5.861">because</text><text start="1816.279" dur="9.64">they were a bit afraid of</text><text start="1820.52" dur="8.159">um of countries uh well and that was a</text><text start="1825.919" dur="6.421">matter of countries it was so packed and</text><text start="1828.679" dur="7.701">the countries that didn&amp;#39;t need that</text><text start="1832.34" dur="7.559">weren&amp;#39;t neighbors of of that countries</text><text start="1836.38" dur="8.08">were actually more concerned about this</text><text start="1839.899" dur="7.681">stuff like surveillance so they</text><text start="1844.46" dur="4.88">um Wanted weaker encryption and there</text><text start="1847.58" dur="6.12">was a compromise</text><text start="1849.34" dur="10.18">reached which means that there there was</text><text start="1853.7" dur="6.599">actually a stronger method it chosen but</text><text start="1859.52" dur="7.159">um</text><text start="1860.299" dur="11.581">the last uh the last bites of the keys</text><text start="1866.679" dur="6.48">were in the specs set to zeros so</text><text start="1871.88" dur="5.96">actually</text><text start="1873.159" dur="4.681">that&amp;#39;s like that&amp;#39;s just like</text><text start="1877.96" dur="5.56">it wouldn&amp;#39;t be</text><text start="1881.08" dur="4">those those bits wouldn&amp;#39;t be there at</text><text start="1883.52" dur="3.96">all</text><text start="1885.08" dur="5">there&amp;#39;s also a threat of Daniel of</text><text start="1887.48" dur="6.84">service attacks which are very easy</text><text start="1890.08" dur="7.839">there&amp;#39;s also a link in this uh in this</text><text start="1894.32" dur="5.459">slide to the other presentation that</text><text start="1897.919" dur="4.341">shows how</text><text start="1899.779" dur="6.681">um how to use</text><text start="1902.26" dur="7.419">osmokom BB based phone uh to actually</text><text start="1906.46" dur="7.24">prevent any</text><text start="1909.679" dur="7.021">um any phone in the neighborhood or some</text><text start="1913.7" dur="6.12">specifically selected phone from doing</text><text start="1916.7" dur="7.699">any communication with with the</text><text start="1919.82" dur="9.5">PlayStation so we can easily just</text><text start="1924.399" dur="10">use our phone uh or some other device</text><text start="1929.32" dur="7.06">to make uh impossible to for others to</text><text start="1934.399" dur="5.841">to use their phones</text><text start="1936.38" dur="7.919">so actually the only protection</text><text start="1940.24" dur="7.059">from those kind of stuff is the</text><text start="1944.299" dur="3">illegality</text><text start="1948.679" dur="10.561">um the GSM standard is is pretty old and</text><text start="1953.72" dur="7.26">there&amp;#39;s even if things change in the</text><text start="1959.24" dur="7.64">newest and that&amp;#39;s there&amp;#39;s always a way</text><text start="1960.98" dur="8.699">to to just uh download downgrade the</text><text start="1966.88" dur="4.659">communication to to that old GSM</text><text start="1969.679" dur="2.821">standard</text><text start="1971.539" dur="2.461">um</text><text start="1972.5" dur="4.38">so</text><text start="1974" dur="5.899">in order to to make a phone that would</text><text start="1976.88" dur="3.019">be really private</text><text start="1979.94" dur="7.14">um it&amp;#39;s necessary for it to be trustable</text><text start="1983.24" dur="7.319">and in order to to make a phone that is</text><text start="1987.08" dur="5.04">trustable or any other device it has to</text><text start="1990.559" dur="2.541">be open</text><text start="1992.12" dur="5.159">um</text><text start="1993.1" dur="8.799">notice that those arrows are directed</text><text start="1997.279" dur="7.5">that means you can have a device that is</text><text start="2001.899" dur="5.361">open but not trustable and stable but</text><text start="2004.779" dur="7.221">not private uh</text><text start="2007.26" dur="7.48">but on the other way around</text><text start="2012" dur="4.96">when you have a private phone it has to</text><text start="2014.74" dur="2.88">be testable and open</text><text start="2016.96" dur="3.199">um</text><text start="2017.62" dur="2.539">foreign</text><text start="2022.86" dur="8.5">when it comes to all those threats that</text><text start="2027.48" dur="7.72">are waiting for us and over there</text><text start="2031.36" dur="6.12">we cannot really fix</text><text start="2035.2" dur="4.979">um if dropping of calls if the opening</text><text start="2037.48" dur="4.919">of internet connection and through that</text><text start="2040.179" dur="6.72">relation while connected to the network</text><text start="2042.399" dur="6.62">that is a method of positioning</text><text start="2046.899" dur="2.12">um</text><text start="2049.419" dur="5.901">um that those kind of stuff happen</text><text start="2053.139" dur="4.46">outside of the device</text><text start="2055.32" dur="4.599">and</text><text start="2057.599" dur="6.181">territoration is actually necessary for</text><text start="2059.919" dur="9">it to function that&amp;#39;s how gsm network</text><text start="2063.78" dur="8.22">works it&amp;#39;s the cellular after all and so</text><text start="2068.919" dur="8.541">the only way to actually</text><text start="2072" dur="5.46">do something with that is to encrypt</text><text start="2078.159" dur="8.041">so what&amp;#39;s our idea to to deal with all</text><text start="2083.139" dur="6.441">of this stuff we believe in a contest</text><text start="2086.2" dur="6.26">surveillance rather than audit and Trust</text><text start="2089.58" dur="6.46">uh why</text><text start="2092.46" dur="7.379">this it&amp;#39;s simply not feasible to to</text><text start="2096.04" dur="8.22">actually audit everything to the</text><text start="2099.839" dur="8.141">level that we can safely trust stuff</text><text start="2104.26" dur="6.54">like that let&amp;#39;s say a basement but so</text><text start="2107.98" dur="5.34">just simply overly complicated that&amp;#39;s</text><text start="2110.8" dur="5.94">why and the second thing is that we</text><text start="2113.32" dur="4.98">simply don&amp;#39;t have access uh to to all</text><text start="2116.74" dur="5.76">the information about it</text><text start="2118.3" dur="6.24">so in order to deal with it somehow we</text><text start="2122.5" dur="5.46">need to consider it actually review</text><text start="2124.54" dur="5.36">because we don&amp;#39;t have a full control</text><text start="2127.96" dur="7.02">over it</text><text start="2129.9" dur="8.52">so it sounds a bit crazy to to put stuff</text><text start="2134.98" dur="9">considered to argue in a phone that</text><text start="2138.42" dur="7.179">strikes to be private or trustable</text><text start="2143.98" dur="3.859">um but</text><text start="2145.599" dur="4.101">um there is a way in this madness</text><text start="2147.839" dur="3.78">because</text><text start="2149.7" dur="5.74">we</text><text start="2151.619" dur="7">actually want to sandbox and constantly</text><text start="2155.44" dur="7.98">monitor that okay stuff that black boxes</text><text start="2158.619" dur="6.861">that we uh that we put into the device</text><text start="2163.42" dur="2.06">um</text><text start="2166.3" dur="3.84">so</text><text start="2168.04" dur="4.76">the basement processor is basically</text><text start="2170.14" dur="6.5">locked into a cage</text><text start="2172.8" dur="6.58">we carefully select</text><text start="2176.64" dur="7.979">and then</text><text start="2179.38" dur="5.239">all the signals that are</text><text start="2184.98" dur="7.92">transferred from their main processor to</text><text start="2188.44" dur="11.48">the basement processor and vice versa</text><text start="2192.9" dur="10.74">and we don&amp;#39;t allow uh any</text><text start="2199.92" dur="9.159">direct access that would could happen</text><text start="2203.64" dur="8.68">without any no adding content of</text><text start="2209.079" dur="6.121">um of the main system that&amp;#39;s controlled</text><text start="2212.32" dur="6.9">by the user so</text><text start="2215.2" dur="10.379">there is uh obviously no direct</text><text start="2219.22" dur="7.7">connection to microphones or speakers</text><text start="2225.579" dur="6.54">um</text><text start="2226.92" dur="10.26">that&amp;#39;s all controlled by the CPU</text><text start="2232.119" dur="10.201">um all of the stuff like the power lines</text><text start="2237.18" dur="7.3">like antennas like integrated GPS</text><text start="2242.32" dur="5.34">um are a monitored</text><text start="2244.48" dur="7.2">so we can tell if uh if modem actually</text><text start="2247.66" dur="4.74">does something and</text><text start="2251.68" dur="3">um</text><text start="2252.4" dur="5.459">the most critical</text><text start="2254.68" dur="8.52">staff actually has a Vehicles integrated</text><text start="2257.859" dur="7.201">in it so we can for instance block the</text><text start="2263.2" dur="7.139">uh</text><text start="2265.06" dur="9.539">GPS antennas that so that the modem even</text><text start="2270.339" dur="5.961">if basement even if you would like to uh</text><text start="2274.599" dur="5.48">to use it</text><text start="2276.3" dur="3.779">it won&amp;#39;t be able to</text><text start="2281.32" dur="7.259">so thanks to such design design</text><text start="2285.94" dur="5.159">if the modem is compromised the main</text><text start="2288.579" dur="3.981">system remains safe</text><text start="2291.099" dur="3.081">so</text><text start="2292.56" dur="6.299">if</text><text start="2294.18" dur="8.76">we use the encryption then</text><text start="2298.859" dur="7.921">and follow all of the other</text><text start="2302.94" dur="9.159">good practices of being</text><text start="2306.78" dur="9.22">favored and secure we should be fine</text><text start="2312.099" dur="8.041">and in case the modem uh is supposed to</text><text start="2316" dur="6.119">be off but it isn&amp;#39;t we know that and</text><text start="2320.14" dur="5.58">what&amp;#39;s the most important we can react</text><text start="2322.119" dur="5.581">accordingly before anything bad happens</text><text start="2325.72" dur="5.46">um</text><text start="2327.7" dur="4.2">the the same applies to GPS</text><text start="2331.18" dur="2.22">um</text><text start="2331.9" dur="4.52">so</text><text start="2333.4" dur="10.14">if we notice that</text><text start="2336.42" dur="9.22">that GPS antenna is used in a moment</text><text start="2343.54" dur="7.26">that</text><text start="2345.64" dur="10.56">um user haven&amp;#39;t launched any GPS based</text><text start="2350.8" dur="6.319">application or nothing really is</text><text start="2356.2" dur="5.639">um</text><text start="2357.119" dur="6.341">GPS related is working on on the main</text><text start="2361.839" dur="5.301">system</text><text start="2363.46" dur="10.92">we know that something is is fishy</text><text start="2367.14" dur="10.18">but here we don&amp;#39;t even have to uh to act</text><text start="2374.38" dur="6.66">quick because the antenna will be</text><text start="2377.32" dur="6.18">disabled anyway so modem won&amp;#39;t be really</text><text start="2381.04" dur="6.079">able to to use the GPS</text><text start="2383.5" dur="10.26">and the same with audio</text><text start="2387.119" dur="9">we can tell that modem tries to to use</text><text start="2393.76" dur="7.56">the microphone</text><text start="2396.119" dur="6.421">but as it won&amp;#39;t be directly connected</text><text start="2401.32" dur="4.019">um</text><text start="2402.54" dur="7.319">into the modem</text><text start="2405.339" dur="8.941">then it simply won&amp;#39;t be able you can</text><text start="2409.859" dur="8.821">control by your own operating system</text><text start="2414.28" dur="10.38">um what exactly goes into the modem so</text><text start="2418.68" dur="10.32">you if you want and if you really uh</text><text start="2424.66" dur="7.76">if you both paranoid and uh</text><text start="2429" dur="5.76">and you like jokes you can</text><text start="2432.42" dur="7.78">simply just</text><text start="2434.76" dur="9.4">put uh Rick Astley on on that line and</text><text start="2440.2" dur="7.379">play it all the time and wonder if some</text><text start="2444.16" dur="6.98">NSA what some NSA agent will think about</text><text start="2447.579" dur="3.561">you or something like that</text><text start="2451.54" dur="5.28">so</text><text start="2454.3" dur="4.44">um so yes when one modem when basement</text><text start="2456.82" dur="5.64">acts badly</text><text start="2458.74" dur="5.54">user is notified and either automatic</text><text start="2462.46" dur="5.46">had reset</text><text start="2464.28" dur="5.86">or had shut down by cutting power can be</text><text start="2467.92" dur="5.4">applied</text><text start="2470.14" dur="5.12">um and what&amp;#39;s important it can be</text><text start="2473.32" dur="4.68">applied</text><text start="2475.26" dur="5.56">it&amp;#39;s all in the control of the user</text><text start="2478" dur="4.4">because user can choose to to actually</text><text start="2480.82" dur="5.279">ignore that</text><text start="2482.4" dur="5.219">depending on on the situation he or she</text><text start="2486.099" dur="4.041">is in</text><text start="2487.619" dur="5.801">in some cases</text><text start="2490.14" dur="8.16">uh when let&amp;#39;s say someone is really</text><text start="2493.42" dur="11.1">worried about uh about being tracked and</text><text start="2498.3" dur="6.22">uh is in some situation that that</text><text start="2504.579" dur="6.441">um</text><text start="2505.599" dur="5.421">requires him to or how to think about it</text><text start="2511.06" dur="5.779">um it can be chosen to to actually</text><text start="2514.78" dur="2.059">um</text><text start="2517.359" dur="6.361">um Leaf stuff working because</text><text start="2521.4" dur="5.5">cutting it out would be let&amp;#39;s say</text><text start="2523.72" dur="6.06">suspicious but what&amp;#39;s the most important</text><text start="2526.9" dur="6">the user is notified so there is a nose</text><text start="2529.78" dur="8.1">what&amp;#39;s going on and the user can</text><text start="2532.9" dur="5.64">um can adjust his or her behavior</text><text start="2537.88" dur="3.62">um</text><text start="2538.54" dur="2.96">accordingly</text><text start="2542.099" dur="5.801">yes so</text><text start="2544.66" dur="5.58">um for instance by removing the battery</text><text start="2547.9" dur="6.66">destroying the device hiding the other</text><text start="2550.24" dur="8.7">deceit in bus and leaving but thanks to</text><text start="2554.56" dur="6.38">um to so things like external power</text><text start="2558.94" dur="6.54">switch</text><text start="2560.94" dur="9.34">we use a that does not really have to to</text><text start="2565.48" dur="4.8">go into such drastic measures</text><text start="2572.26" dur="6.18">um and the basement can be just turned</text><text start="2575.8" dur="4.88">off and never turned on again for</text><text start="2578.44" dur="2.24">instance</text><text start="2581.2" dur="6.6">um so uh</text><text start="2583.859" dur="8.321">leaving uh just uh external power switch</text><text start="2587.8" dur="5.779">without any monitoring uh would be</text><text start="2592.18" dur="6.38">um</text><text start="2593.579" dur="8.921">problematic in a sense that it wouldn&amp;#39;t</text><text start="2598.56" dur="5.559">be able to tell the user that</text><text start="2602.5" dur="3.72">um that something is going something</text><text start="2604.119" dur="6.141">wrong is going on</text><text start="2606.22" dur="8.34">um and actually that knowledge is</text><text start="2610.26" dur="6.48">I think much more important that being</text><text start="2614.56" dur="6.18">just being able to</text><text start="2616.74" dur="7.2">to shut down the device and be sure that</text><text start="2620.74" dur="7.4">it won&amp;#39;t do anything</text><text start="2623.94" dur="4.2">we see behind our back</text><text start="2629.5" dur="4.5">um yes</text><text start="2631.66" dur="3.32">um also</text><text start="2634" dur="4.14">um</text><text start="2634.98" dur="5.859">I found some time ago um interesting</text><text start="2638.14" dur="5.24">article about answer that&amp;#39;s not really</text><text start="2640.839" dur="7.321">article that was there was comments</text><text start="2643.38" dur="6.82">under sabbatical that mentioned uh</text><text start="2648.16" dur="4.159">interesting</text><text start="2650.2" dur="2.119">um</text><text start="2652.48" dur="7.379">um interesting thing that can happen on</text><text start="2656.079" dur="7.5">some airports and</text><text start="2659.859" dur="6.861">there was actually I think someone who</text><text start="2663.579" dur="7.081">tried something similar than like our</text><text start="2666.72" dur="8.619">monitoring and notice that</text><text start="2670.66" dur="9.72">um on the airport his phone is</text><text start="2675.339" dur="7.561">um simply attacked by a storm of of pay</text><text start="2680.38" dur="3.66">cut of packets</text><text start="2682.9" dur="4.919">um</text><text start="2684.04" dur="6.14">it turns out that lots of airports</text><text start="2687.819" dur="6.721">actually</text><text start="2690.18" dur="8.52">works somehow like a father cage and</text><text start="2694.54" dur="8.46">isolate then the people inside</text><text start="2698.7" dur="6.1">from the networks and it&amp;#39;s the networks</text><text start="2703" dur="4.74">outside so</text><text start="2704.8" dur="5.16">um they have their own base stations</text><text start="2707.74" dur="3.3">instead so</text><text start="2709.96" dur="4.08">um</text><text start="2711.04" dur="4.98">so the tracking on the airports can be</text><text start="2714.04" dur="3.36">more effective</text><text start="2716.02" dur="5.88">um</text><text start="2717.4" dur="6.48">so the monitoring like that can reveal</text><text start="2721.9" dur="3.86">uh</text><text start="2723.88" dur="5.18">some activities</text><text start="2725.76" dur="3.3">like that</text><text start="2732.099" dur="5.821">so yes what&amp;#39;s what matters is that in</text><text start="2736.42" dur="3.78">the end it&amp;#39;s the user who gets the full</text><text start="2737.92" dur="6.96">control over how the device works and</text><text start="2740.2" dur="6.48">how it reacts uh to to threats and while</text><text start="2744.88" dur="5.699">staying secure might need some effort</text><text start="2746.68" dur="4.86">from the user because obviously even</text><text start="2750.579" dur="2.601">them</text><text start="2751.54" dur="5.539">the most</text><text start="2753.18" dur="3.899">uh secure most</text><text start="2757.74" dur="8.56">well-designed device won&amp;#39;t</text><text start="2761.579" dur="8.26">want to do anything for you if you</text><text start="2766.3" dur="7.44">simply don&amp;#39;t use the common sense who</text><text start="2769.839" dur="6.78">while you&amp;#39;re communicating with others</text><text start="2773.74" dur="6.18">um but</text><text start="2776.619" dur="5.301">um when you actually</text><text start="2779.92" dur="2">um</text><text start="2783.099" dur="9.541">I got lost Okay so</text><text start="2788.339" dur="6.961">when you use a device that claims to to</text><text start="2792.64" dur="5.64">do all the work for you</text><text start="2795.3" dur="6.88">it can only give you a false sense of</text><text start="2798.28" dur="9.12">security uh because</text><text start="2802.18" dur="8.76">um because it&amp;#39;s not hard to to reveal</text><text start="2807.4" dur="5.939">accidentally even some some things about</text><text start="2810.94" dur="4.44">you so</text><text start="2813.339" dur="3.721">um giving a false sense of security is</text><text start="2815.38" dur="3.979">can be actually worse than no security</text><text start="2817.06" dur="7.32">at all because when you feel confident</text><text start="2819.359" dur="7.901">you can do different things that when</text><text start="2824.38" dur="4.459">you don&amp;#39;t feel confident that you when</text><text start="2827.26" dur="3.66">you&amp;#39;re careful</text><text start="2828.839" dur="7.721">so it&amp;#39;s</text><text start="2830.92" dur="7.919">it&amp;#39;s important to to remember that we</text><text start="2836.56" dur="2.96">cannot simply</text><text start="2838.839" dur="4.381">um</text><text start="2839.52" dur="7.299">simply forget about everything and hope</text><text start="2843.22" dur="6.42">that uh private secured intestable</text><text start="2846.819" dur="5.661">device will do all the work for us it&amp;#39;s</text><text start="2849.64" dur="2.84">not like that</text><text start="2854.079" dur="5.641">I have collected uh some interesting</text><text start="2858.04" dur="2.48">resources</text><text start="2859.72" dur="3.899">um</text><text start="2860.52" dur="5.38">that I found when preparing to preparing</text><text start="2863.619" dur="4.801">to this presentation</text><text start="2865.9" dur="5.699">um there are interesting things about</text><text start="2868.42" dur="5.24">wilting SIM cards</text><text start="2871.599" dur="7.161">um it&amp;#39;s</text><text start="2873.66" dur="10.62">pretty fun stuff and fun and scary</text><text start="2878.76" dur="9.52">uh when you consider that not only</text><text start="2884.28" dur="6.28">the stuff that&amp;#39;s inside the the phone</text><text start="2888.28" dur="6.26">that you use can be compromised but also</text><text start="2890.56" dur="8.22">that little SIM card that you</text><text start="2894.54" dur="7.38">would most likely switch to the other</text><text start="2898.78" dur="3.14">phone if you would</text><text start="2902.74" dur="6.119">for instance</text><text start="2905.22" dur="5.859">suspect that your previous one was</text><text start="2908.859" dur="3.26">somehow come from myself that would be a</text><text start="2911.079" dur="3.601">SIM card</text><text start="2912.119" dur="4.96">because they</text><text start="2914.68" dur="5.639">um their encryption is also pretty weak</text><text start="2917.079" dur="5.941">for today&amp;#39;s standards uh with new newest</text><text start="2920.319" dur="4.76">SIM cards it&amp;#39;s a bit better</text><text start="2923.02" dur="4.799">um but</text><text start="2925.079" dur="8.141">the situation is constantly changing</text><text start="2927.819" dur="6.441">there so even if something new is</text><text start="2933.22" dur="5.099">um</text><text start="2934.26" dur="5.859">is introduced it pretty quickly gets</text><text start="2938.319" dur="3.981">broken</text><text start="2940.119" dur="6.72">um there&amp;#39;s an interesting project</text><text start="2942.3" dur="9.539">called GSM map that uses data collected</text><text start="2946.839" dur="9.121">by people with osmo con BB devices</text><text start="2951.839" dur="7.74">that shows on a map how secure or</text><text start="2955.96" dur="7.7">insecure are networks</text><text start="2959.579" dur="7.721">in different parts of the world</text><text start="2963.66" dur="6.22">because it&amp;#39;s not only phone it&amp;#39;s also</text><text start="2967.3" dur="5.36">the the network that can be configured</text><text start="2969.88" dur="6.78">in different ways more or less secure</text><text start="2972.66" dur="7.38">network can demand some authentication</text><text start="2976.66" dur="3.38">or can just</text><text start="2980.579" dur="7.301">just accept anything or there&amp;#39;s also</text><text start="2985.359" dur="7.441">um I think one of those links also talks</text><text start="2987.88" dur="8.76">about it and uh thing about uh how</text><text start="2992.8" dur="7.92">anyone on the world could with access to</text><text start="2996.64" dur="5.42">the gsm network could actually uh find</text><text start="3000.72" dur="8.34">out where</text><text start="3002.06" dur="10.12">the recipient of his SMS is located by</text><text start="3009.06" dur="5.94">analyzing how which</text><text start="3012.18" dur="3.5">um SMS Center</text><text start="3015" dur="2.839">um</text><text start="3015.68" dur="6.46">is</text><text start="3017.839" dur="6.361">was receiving the message and nowadays</text><text start="3022.14" dur="5.219">as far as I know</text><text start="3024.2" dur="5.02">some protection against that was Upland</text><text start="3027.359" dur="4.801">or applied on most of the networks but</text><text start="3029.22" dur="5.58">that was nevertheless very interesting</text><text start="3032.16" dur="5.699">thing that something like that was</text><text start="3034.8" dur="4.16">functioning in this way for quite a long</text><text start="3037.859" dur="6.301">time</text><text start="3038.96" dur="7.32">there&amp;#39;s an interesting uh report from</text><text start="3044.16" dur="2.12">um</text><text start="3046.339" dur="5.921">of open BSC on osmocom projects</text><text start="3051.599" dur="3.181">um</text><text start="3052.26" dur="3.5">about</text><text start="3054.78" dur="4.62">um</text><text start="3055.76" dur="5.079">how they operated a test Network</text><text start="3059.4" dur="4.699">um</text><text start="3060.839" dur="7.5">in the field and</text><text start="3064.099" dur="6.401">that&amp;#39;s an interesting part uh in it</text><text start="3068.339" dur="4.881">about</text><text start="3070.5" dur="5.88">um GPS assistant</text><text start="3073.22" dur="8.879">assisted tracking</text><text start="3076.38" dur="8.219">um that the base station of the network</text><text start="3082.099" dur="5.821">there&amp;#39;s a specification that allows the</text><text start="3084.599" dur="7.52">base station of the network to ask the</text><text start="3087.92" dur="10.179">the phone the user phone to</text><text start="3092.119" dur="9.121">provide a GPS data for instance to</text><text start="3098.099" dur="7.321">um for uh to better</text><text start="3101.24" dur="7.079">location while calling for an ambulance</text><text start="3105.42" dur="6.84">or stuff like that but what</text><text start="3108.319" dur="6.941">what they found out is that when they</text><text start="3112.26" dur="6.72">started to send those packets on their</text><text start="3115.26" dur="5.299">own test Networks actually</text><text start="3118.98" dur="4.619">um none of them</text><text start="3120.559" dur="5.161">devices that were used by participants</text><text start="3123.599" dur="6.781">of that conference</text><text start="3125.72" dur="7.72">informed the users that the exact</text><text start="3130.38" dur="6.26">location from GPS was requested and sent</text><text start="3133.44" dur="7.32">to to the network so it all happened</text><text start="3136.64" dur="4.78">completely transparently and</text><text start="3140.76" dur="3.96">um</text><text start="3141.42" dur="6.179">and turned out that most a lot of those</text><text start="3144.72" dur="4.5">devices implemented that feature</text><text start="3147.599" dur="3.181">um</text><text start="3149.22" dur="4.859">okay</text><text start="3150.78" dur="5.88">there&amp;#39;s also an interesting project also</text><text start="3154.079" dur="7.821">from osmokom guys</text><text start="3156.66" dur="7.62">um named Sim Trace which is a system for</text><text start="3161.9" dur="5.4">tracing Sim communication between the</text><text start="3164.28" dur="6.9">SIM card and the mobile phone</text><text start="3167.3" dur="9">it can be used for implementing some</text><text start="3171.18" dur="5.12">kind of sim firewalls or stuff like that</text><text start="3176.76" dur="6.599">um unfortunately it&amp;#39;s it would be a bit</text><text start="3179.22" dur="4.8">problematic to to implement that</text><text start="3183.359" dur="4.74">um</text><text start="3184.02" dur="7.14">inside the phone because uh</text><text start="3188.099" dur="6.841">the Sim interface is actually part of</text><text start="3191.16" dur="6.12">the certification so anything that can</text><text start="3194.94" dur="4.86">tamper with it will probably not be</text><text start="3197.28" dur="5.339">allowed but nevertheless it&amp;#39;s a very</text><text start="3199.8" dur="5.7">interesting concept and uh interesting</text><text start="3202.619" dur="5.641">stuff to play with</text><text start="3205.5" dur="5.099">um Okay so</text><text start="3208.26" dur="3.42">surname</text><text start="3210.599" dur="3.061">um</text><text start="3211.68" dur="4.8">that&amp;#39;s almost almost the end of the</text><text start="3213.66" dur="5.899">presentation I would like to tell you</text><text start="3216.48" dur="6.96">about the current status of our project</text><text start="3219.559" dur="5.741">almost 400 devices were already been</text><text start="3223.44" dur="4.919">impaired</text><text start="3225.3" dur="5.36">and that&amp;#39;s already twice as much as we</text><text start="3228.359" dur="6">needed to proceed at the beginning we</text><text start="3230.66" dur="8.32">assumed that if we won&amp;#39;t get at least</text><text start="3234.359" dur="8.181">200 uh of the device to build and then</text><text start="3238.98" dur="6.06">that won&amp;#39;t be worth it and</text><text start="3242.54" dur="5.62">we managed to</text><text start="3245.04" dur="6.36">to reach a figure that&amp;#39;s twice as much</text><text start="3248.16" dur="6.48">and that&amp;#39;s awesome and most of the</text><text start="3251.4" dur="5.699">design is actually finished right now</text><text start="3254.64" dur="4.08">and the schematics are catching up with</text><text start="3257.099" dur="3.201">the design</text><text start="3258.72" dur="6.24">um</text><text start="3260.3" dur="6.36">uh what&amp;#39;s important as sourcing matter</text><text start="3264.96" dur="5.7">is tough</text><text start="3266.66" dur="5.399">as components that we need slowly fade</text><text start="3270.66" dur="4.62">away in the market</text><text start="3272.059" dur="4.901">and we will have to do something with</text><text start="3275.28" dur="3.059">that soon</text><text start="3276.96" dur="5.06">um</text><text start="3278.339" dur="6.441">we have an amazing uh blog inter</text><text start="3282.02" dur="4.62">interactive block diagram</text><text start="3284.78" dur="6.819">that</text><text start="3286.64" dur="9.76">was prepared by Vanessa okay</text><text start="3291.599" dur="7.881">um it&amp;#39;s under the the link uh here uh</text><text start="3296.4" dur="8.58">which can show you the architecture of</text><text start="3299.48" dur="9.46">neo900 and when you uh when you hover</text><text start="3304.98" dur="5.359">your mouse pointer above any component</text><text start="3308.94" dur="3.96">you&amp;#39;ll get</text><text start="3310.339" dur="5.321">more specific information links to</text><text start="3312.9" dur="7.64">documentation and stuff like that so if</text><text start="3315.66" dur="9.6">you plan to to do some very</text><text start="3320.54" dur="8.019">hackish stuff with your neo900 you can</text><text start="3325.26" dur="6.47">already start preparing reading all the</text><text start="3328.559" dur="4.8">schematics and documentation and</text><text start="3331.73" dur="3.81">[Music]</text><text start="3333.359" dur="2.181">Etc</text><text start="3336.54" dur="5.819">so</text><text start="3338" dur="7.859">what are the next steps we soon will</text><text start="3342.359" dur="7.401">have to start sourcing the risk Parts</text><text start="3345.859" dur="7.98">the one gigabyte RAM is</text><text start="3349.76" dur="6.72">the I think the biggest</text><text start="3353.839" dur="6.48">one of them</text><text start="3356.48" dur="5.92">and there&amp;#39;s also uh</text><text start="3360.319" dur="7.601">issue of</text><text start="3362.4" dur="8.71">um the cases original and 900 ones</text><text start="3367.92" dur="4.699">as some of them</text><text start="3371.11" dur="5.09">[Music]</text><text start="3372.619" dur="8.5">of the pre-orders uh</text><text start="3376.2" dur="6.78">uh will be also for the complete devices</text><text start="3381.119" dur="6.901">with the case not only the the</text><text start="3382.98" dur="7.079">replacement board for uh for N900</text><text start="3388.02" dur="7.079">so</text><text start="3390.059" dur="7.701">um we will have to to order all these uh</text><text start="3395.099" dur="8.601">stuff rather sooner than later</text><text start="3397.76" dur="8.44">so we will have to actually start uh</text><text start="3403.7" dur="6.82">start uh</text><text start="3406.2" dur="5.52">getting the the money for for it so if</text><text start="3410.52" dur="3.559">you</text><text start="3411.72" dur="5.66">um if you</text><text start="3414.079" dur="8.381">pay the that minimal 100</text><text start="3417.38" dur="9.459">error that was necessary that is still</text><text start="3422.46" dur="12.24">necessary to uh to get you on the board</text><text start="3426.839" dur="9.861">um in then soon we will ask you to uh to</text><text start="3434.7" dur="2">um</text><text start="3436.859" dur="6.96">to add something in order to to secure</text><text start="3440.579" dur="4.801">to actually buy the parts for you for</text><text start="3443.819" dur="6">your device</text><text start="3445.38" dur="8.179">and what&amp;#39;s the the most important and</text><text start="3449.819" dur="7.221">the big bot and based prototype</text><text start="3453.559" dur="6.601">is progressing is expected</text><text start="3457.04" dur="6.579">in February to arrive it will be out</text><text start="3460.16" dur="4.3">already able to</text><text start="3463.619" dur="3.96">um</text><text start="3464.46" dur="4.04">took quite well</text><text start="3467.579" dur="4.74">um</text><text start="3468.5" dur="5.94">simulate the the final device so any</text><text start="3472.319" dur="5.941">work on</text><text start="3474.44" dur="4.72">on software and system integration can</text><text start="3478.26" dur="1.14">be</text><text start="3479.16" dur="1.679">[Music]</text><text start="3479.4" dur="5.939">um</text><text start="3480.839" dur="6.201">quite well done already on with this</text><text start="3485.339" dur="5.76">prototype</text><text start="3487.04" dur="8.559">so that would be it thank you for for</text><text start="3491.099" dur="8.46">listening and there&amp;#39;s the first link uh</text><text start="3495.599" dur="7.98">goes to to the slides and also check the</text><text start="3499.559" dur="6.661">the second one for other resources we</text><text start="3503.579" dur="3.321">have on</text><text start="3506.22" dur="4.04">um</text><text start="3506.9" dur="6.1">we prepared earlier and</text><text start="3510.26" dur="6.22">schematic papers visibility study and</text><text start="3513" dur="5.599">recently there was also a paper on</text><text start="3516.48" dur="6">um on</text><text start="3518.599" dur="7.561">infrared connection how it will work on</text><text start="3522.48" dur="7.28">on neo900 you can join the ISC channel</text><text start="3526.16" dur="7.02">on free note neo900</text><text start="3529.76" dur="7.359">and ask the</text><text start="3533.18" dur="4.98">ask some questions we&amp;#39;ll be glad to to</text><text start="3537.119" dur="5.761">answer</text><text start="3538.16" dur="7.32">and I think that that&amp;#39;s all</text><text start="3542.88" dur="2.6">thanks</text><text start="3560.4" dur="2.12">thank you</text><text start="3566.059" dur="4.421">we now wait for</text><text start="3569.23" dur="2.41">[Music]</text><text start="3570.48" dur="7.16">um</text><text start="3571.64" dur="6">for stuff in managed to announce that</text><text start="3581.16" dur="5">so um can you turn out the sound on that</text><text start="3583.859" dur="2.301">laptop</text><text start="3590.88" dur="4.38">so Sebastian can you hear me</text><text start="3593.22" dur="3.3">yes yes I can hear you</text><text start="3595.26" dur="3.26">so</text><text start="3596.52" dur="2">um</text><text start="3598.98" dur="3.319">thank you very much for your talk</text><text start="3603.059" dur="3.721">um maybe we can do a few questions if</text><text start="3605.7" dur="2.58">there are some</text><text start="3606.78" dur="3.12">I think we are a little bit behind the</text><text start="3608.28" dur="3.12">schedule so maybe two or three questions</text><text start="3609.9" dur="3.12">if</text><text start="3611.4" dur="5.959">we have some questions in the audience</text><text start="3613.02" dur="4.339">you can come here to the microphone and</text><text start="3625.619" dur="3.96">so this is life and this is delayed but</text><text start="3627.96" dur="4.139">if you can hear your inbox</text><text start="3629.579" dur="6">hi my name is Marcus and thank you for</text><text start="3632.099" dur="6.061">your work on the neo900 I&amp;#39;m a huge fan</text><text start="3635.579" dur="4.321">um just want to raise up the point that</text><text start="3638.16" dur="4.08">as soon as you do</text><text start="3639.9" dur="4.74">the issue that the modem is connected to</text><text start="3642.24" dur="5.099">the microphone directly is to see if</text><text start="3644.64" dur="5.34">safe CPU power while you&amp;#39;re running a</text><text start="3647.339" dur="4.621">phone call so each monitoring solution</text><text start="3649.98" dur="4.94">that you might come up with will raise</text><text start="3651.96" dur="2.96">your power consumption</text><text start="3655.14" dur="5.88">foreign</text><text start="3657.319" dur="6.341">it&amp;#39;s actually quite easy to uh to deal</text><text start="3661.02" dur="3.72">with that because there are solutions</text><text start="3663.66" dur="4.56">like</text><text start="3664.74" dur="7.5">um audio codecs it was actually already</text><text start="3668.22" dur="7.139">implemented in uh all the</text><text start="3672.24" dur="5.94">um open mocha and open phonics devices</text><text start="3675.359" dur="7.94">it&amp;#39;s it was also like that in Nokia and</text><text start="3678.18" dur="8.04">900. uh you can just root the audio</text><text start="3683.299" dur="7.54">configure the routing of the audio in a</text><text start="3686.22" dur="8.839">way you like some moment so when you</text><text start="3690.839" dur="8">don&amp;#39;t want to use the</text><text start="3695.059" dur="7.841">modem to to have a call</text><text start="3698.839" dur="7.78">you just keep them the connection to the</text><text start="3702.9" dur="6.959">microphone disabled and in the moment</text><text start="3706.619" dur="6.361">you start the call you enable that of</text><text start="3709.859" dur="5.181">course the software does it for you so</text><text start="3712.98" dur="2.06">um</text><text start="3717.079" dur="5.081">that&amp;#39;s enough I&amp;#39;ll look it up</text><text start="3720.24" dur="3.839">the second point is I&amp;#39;d like to teach</text><text start="3722.16" dur="3.6">you a bit how often have you changed</text><text start="3724.079" dur="6.441">your estimation</text><text start="3725.76" dur="4.76">for the layout of the board yet</text><text start="3730.799" dur="4.82">how often well well the way</text><text start="3734.64" dur="3.979">um</text><text start="3735.619" dur="9.7">there were delays</text><text start="3738.619" dur="7.48">it changed uh a bit already a few times</text><text start="3745.319" dur="4.141">um</text><text start="3746.099" dur="5.541">it&amp;#39;s actually had to had to tell</text><text start="3749.46" dur="5.18">we don&amp;#39;t have a</text><text start="3751.64" dur="3">exact</text><text start="3754.7" dur="8.98">exact estimated time of arrival right</text><text start="3759.599" dur="6.561">now we will we are playing it a bit safe</text><text start="3763.68" dur="6.3">now as we</text><text start="3766.16" dur="5.88">noticed as well that our estimations</text><text start="3769.98" dur="6.9">aren&amp;#39;t really</text><text start="3772.04" dur="6.42">great but well that&amp;#39;s pretty common in</text><text start="3776.88" dur="6.86">projects like that</text><text start="3778.46" dur="9.22">please notice that in most of them</text><text start="3783.74" dur="8.28">the hardware project and where some</text><text start="3787.68" dur="8.58">phone is developed by by some company</text><text start="3792.02" dur="6.12">the project is announced publicly pretty</text><text start="3796.26" dur="5.339">late in the</text><text start="3798.14" dur="9.179">development process so</text><text start="3801.599" dur="8.881">um any delays any iterations</text><text start="3807.319" dur="6.821">situations where where</text><text start="3810.48" dur="6.5">um already prepared stuff is scrapped</text><text start="3814.14" dur="7.219">and done from scratch</text><text start="3816.98" dur="7.3">which happen from time to time</text><text start="3821.359" dur="3.601">are simply not</text><text start="3824.28" dur="4.16">um</text><text start="3824.96" dur="7.3">not known to the public so</text><text start="3828.44" dur="7.06">while the neo900 was actually announced</text><text start="3832.26" dur="7.319">at the very beginning where nothing was</text><text start="3835.5" dur="7.26">there it just had to to raise the</text><text start="3839.579" dur="7.861">support and just then any work could</text><text start="3842.76" dur="7.2">could start so that&amp;#39;s them that&amp;#39;s the</text><text start="3847.44" dur="4.399">downside of being completely open that</text><text start="3849.96" dur="4.08">we can update</text><text start="3851.839" dur="5.801">sound like</text><text start="3854.04" dur="6.539">um vaporware or something like that but</text><text start="3857.64" dur="6.5">rest assured that the work is going on</text><text start="3860.579" dur="6.74">and we&amp;#39;re progressing and uh eventually</text><text start="3864.14" dur="6.04">this all of this stuff will</text><text start="3867.319" dur="5.221">see the light</text><text start="3870.18" dur="5.06">well thank you for your comments</text><text start="3872.54" dur="6.299">thank you for the question</text><text start="3875.24" dur="3.599">we have another question</text><text start="3883.22" dur="5.859">no more questions</text><text start="3885.72" dur="5.82">okay so once again thank you very much</text><text start="3889.079" dur="5.961">thank you have a nice evening</text><text start="3891.54" dur="3.5">bye bye</text></transcript>