ACLU Warns About Government-Mandated Malicious Software Updates

The ACLU issued a warning to software developers that if they help the U.S. government send malicious software updates to their own users, many people could lose faith in software updates altogether. This wouldn't be unheard of: The U.S. government previously considered requiring companies to allow it to send malicious updates to targeted users.

Malicious Automatic Updates

The ACLU noted in a post that companies such as Google and Apple make public only a fraction of data demands from the U.S. government. We know from Microsoft’s now-cancelled lawsuit against the Department of Justice that the government was sending almost half of its data requests to large companies as “secret orders.”

The ACLU worries that some of these requests could include forcing developers to send users malicious updates that could steal data or bypass users’ encryption, track their location, or enable their cameras and microphones.

Automatic software updates are generally a good idea, and they make software ecosystems much more resilient against attacks. Without automatic updates, the users who aren’t aware that there is an update for their applications or don’t want to update are more vulnerable to attacks that exploit known vulnerabilities.

Normally, users trust the vendors from which they install the applications, otherwise they may not install them in the first place. This trust extends to any future updates the developer may send to the user. However, if the developers were to send malicious updates that steal user data, that trust would be broken.

Similarly, if people learned that the U.S. government was forcing multiple software vendors to send malicious updates to certain targets, then many more people could turn off automatic updates and may delay manual updates, too, until they are certain the update isn’t intended to cause that user harm. 

ACLU’s Recommendations To Developers

To help developers “plan ahead” just in case the U.S. government may come knocking on their door with a secret order to send users malicious software updates, ACLU and law students in the NYU Technology Law & Policy Clinic prepared a guide.

ACLU recommended developers to design their software in such a way that even if the government tried to force them to send malicious updates to users, it’s not possible to compromise the user’s application or communications. Apple has already won a lawsuit, in which it argued that the FBI was imposing undue burden on the company to create other means to bypass an iPhone user’s storage encryption.

One such tactic is implementing “mirrorable distribution” for software updates so users can get the updates from each other, rather than straight from the developer. This would make it more unpredictable for law enforcement to know exactly which version of the update will be delivered to a target.

Another new type of update mechanism, called “binary transparency,” could be used to ensure that every update has been verifiably logged in a global, irrevocable, auditable log. Therefore, if a government tried to send someone a malicious update, the attack would be seen in this log. The binary transparency system is similar to Google’s open Certificate Transparency system for certificate issuance, and Mozilla is leading the way in implementing it for Firefox.

Other suggestions from ACLU and the law students included preferring making the software open source, so that others can see the whole code and audit it, and implementing “reproducible builds.” Reproducible builds refer to “deterministic compilation” of software, which means a certain version of a program should compile in the exact same way for different users.

Beyond these technical measures, ACLU recommended developers to plan what their responses would be if the government asked them to send malicious updates to users and also to get a lawyer.

Lucian Armasu
Lucian Armasu is a Contributing Writer for Tom's Hardware US. He covers software news and the issues surrounding privacy and security.
  • x_elusiv_x
    The ACLU...sure, they are SUPER trustworthy.
    Reply
  • stdragon
    21076947 said:
    The ACLU...sure, they are SUPER trustworthy.

    They're also cowards. https://reason.com/blog/2018/06/21/aclu-leaked-memo-free-speech
    Reply
  • Non-Euclidean
    Don't Panic!

    The ACLU is on your side. That is, as long as you believe in censoring people who aren't PC, as long as you are are not white and as lonng as you don't own a firearm. Oh, and as long as you believe in men using the lady's bathroom also.
    Reply
  • stdragon
    I much prefer the message and leadership of these sorts of issues from the Electronic Frontier Foundation

    https://www.eff.org/
    Reply
  • Tanyac
    Regardless of whether the ACLU lack integrity there is a point here.

    I typically block all applications that don't need internet access just to work and disable automatic updates for several reasons. Poor development quality leads to updates that break the application(s) that were working fine. Developers love to change UIs just for the sake of change, creating confusion and loss of productivity, and finally, you never know what's in an update. There are no trustworthy software companies. Their motives for automatic updates are not honorable and never have been. Software developers should not be trusted. Telemetry is in everything now. Governments should be trusted even less.
    Reply
  • Sleepy_Hollowed
    That used to be a worry when auto update was in its infancy... certified updates could be a bit harder to detect if the government targets say enterprise versions or older versions of operating systems with paid custom patches.
    Reply
  • hotaru251
    jokes on them....i dont even have a cam or mic connected to my desktop!


    but for reals im more concerned about spectre updates slowing system down than being target of malicious updates :/
    Reply
  • faoimv4
    I love the comments from people "triggered" by the very existence of an organization founded to protect their rights.
    Reply
  • jabliese
    "One such tactic is implementing “mirrorable distribution” for software updates so users can get the updates from each other"

    Yea, that won't go wrong. Nice try ACLU, but you need better geeks.
    Reply
  • knightmike
    I only use automatic updates for games. I've been burned too many times allowing automatic updates. Never again.
    Reply