libera/#neo900/ Friday, 2019-05-10

* Oksana nods, the patent tries to cover both "AP and BB share memory" and "AP and BB don't share memory", without mentioning that if AP and BB do share memory, then malware could potentially override whatever detect-defense mechanisms are running on APE01:56
OksanaI still think that a "no AP, only BB" phone would be entirely outside the scope of this patent. But this would be a very strange device, to install applications on, to use, and whatever else01:58
OksanaRegarding November, yes, that would be difficult. Unless there is some earlier (Neo900 or not) documentation about the idea before the patent is filed, to show that their idea is not novel - that it has been thought of before.01:59
Joerg-Neo900Oksana: well, this very channel been founded 2013 Sep 1902:08
Joerg-Neo900and I wonder how far back tmo would reach02:09
Joerg-Neo900and if there are ,emtions of the sandboxing there prior to the patent filing date02:09
Joerg-Neo900mentions02:09
Joerg-Neo900anyway I think we wouldn't even need to fight the patent on timing hround, we got a more comprehensive, totally different, and way smarter approach02:12
OksanaAsking a good lawyer might be good. Because "monitoring, by dedicated baseband monitor software (can also be a hardware component), the behavior of the baseband processor by using features available on the respective mobile device" is scarily far-reaching.02:19
Joerg-Neo900indeed, and pretty nonsensical02:20
OksanaGranted, "monitoring, by a dedicated application monitor component (which can be implemented in either software or hardware), the behavior of the application processor by keeping a record of the parameters, execution time, and execution duration of legitimate software and user activities on the application processor that cause normal baseband activities as intended by the user" seems to be entirely irrelevant, as well as "correlating b02:20
Joerg-Neo900truncated02:20
Oksana"monitoring, by a dedicated application monitor component (which can be implemented in either software or hardware), the behavior of the application processor by keeping a record of the parameters, execution time, and execution duration of legitimate software and user activities on the application processor that cause normal baseband activities as intended by the user" seems to be entirely irrelevant02:20
Oksanaas well as "correlating by an evaluator component (which can be implemented in either software or hardware) the baseband processor behavior with application processor behavior in order to distinguish between legitimate and suspicious/illegitimate baseband activities"02:21
OksanaWhy would anybody want to monitor user processes when it's enough to just have one thing (like ofono? or something), and one thing only, speaking with the modem, and thus knowing when modem is supposed to be doing anything02:22
Joerg-Neo900android centric. They got no real concept of middleware02:24
OksanaIn short, if their Method has to have all a+b+c+d components, then it may be said that Neo900 apparently has neither B nor C (no need to monitor user processes) and thus has an entirely different algorithm (with certainty of when BB should be doing what, instead of fuzzy guesswork).02:27
Joerg-Neo900actually android seems to have implemented exactly this >>monitoring, by a dedicated application monitor component, the behavior of the application processor by keeping a record of the parameters, execution time, and execution duration of legitimate software and user activities on the application processor<< into their recent "hardware ( battery" settings02:28
OksanaIs this monitoring for the purpose of guessing when BB should or should not be active? Or is it more "power consumption" oriented?02:29
OksanaThe patent's writers are going to get benefits from ubiquitous Android phones, once such "BB monitoring" becomes popular.02:30
Joerg-Neo900no, this is totally unrelated to any BB behavior and indeed such monitoring is pointless to fight any BB/Smartphone-specific threats02:31
Oksana>> application monitor component (which can be implemented in either software or hardware) monitoring the behavior of the application processor by keeping a record of the parameters, execution time, and execution duration of legitimate software and user activities on the application processor that cause normal baseband activities as intended by the user <<02:33
OksanaTheir "and" is going to be their problem? Because if they had "and/or/any of", then "a record of the parameters of legitimate software and user activities on the application processor that cause normal baseband activities" might be possibly interpreted as "keeping the record of commands/data middleware exchanges with modem"?02:35
Joerg-Neo900they are monitoring the behavior of their cops to detect if they might cross path of a criminal02:41
Joerg-Neo900nonsensical02:41
Joerg-Neo900if you can't trust in integrity of your cops, you're between a rock and a very hard place02:42
Joerg-Neo900while our concept is a jail with a rogue Mr Modem being guarded by specialized forces we got absolute trust in, they have a bunch of unknown folks at this and the other side of river and they hope to implement wistleblowers on both sides02:45
Joerg-Neo900odds are their whistleblowers get overtaken before they even notice sth odd going on02:46
OksanaEspecially if somebody buys a phone with this monitor thingie and specifically tests their malware against this monitor thingie03:02

Generated by irclog2html.py 2.17.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!