The Apple Catch 22

My son needed to book an appointment with a ‘genius’ at the local Apple Store to find out what’s wrong with his MacBook. So he went online to www.apple.com/uk/retail/ to book an appointment. The reservation system took him through the various steps and accepts a reservation for 09.20 tomorrow. But then the Apple system pops up an “Oops, there was an error” window. So we phone the phone number listed for the store (01223 253600) to check that the reservation actually got made and get the usual “For [this] press 1, for [that] press 2…” rigmarole. It then helpfully tells us that Apple “regrets” that it unable to discuss reservations on the phone. To do that we are advised to log into www.apple.com/uk/retail. Bah!

LATER: In the interests of fairness, I should report that (1) the system had registered the appointment, and (2) that the ‘genius’ was admirably efficient, courteous and helpful. The hard drive had scrambled itself and the machine was repaired under warranty within the hour.

STILL LATER: Kevin Cryan pointed me at this nice essay by Clive James on dealing with computer systems and automated call services.

How secure is the cloud?

Not as secure as the vendors might like to think — at least according to this useful and informative piece by David Talbot.

Computer security researchers had previously shown that when two programs are running simultaneously on the same operating system, an attacker can steal data by using an eavesdropping program to analyze the way those programs share memory space. They posited that the same kinds of attacks might also work in clouds when different virtual machines run on the same server.

In the immensity of a cloud setting, the possibility that a hacker could even find the intended prey on a specific server seemed remote. This year, however, three computer scientists at the University of California, San Diego, and one at MIT went ahead and did it. They hired some virtual machines to serve as targets and others to serve as attackers–and tried to get both groups hosted on the same servers at Amazon’s data centers. In the end, they succeeded in placing malicious virtual machines on the same servers as targets 40 percent of the time, all for a few dollars. While they didn’t actually steal data, the researchers said that such theft was theoretically possible. And they demonstrated how the very advantages of cloud computing–ease of access, affordability, centralization, and flexibility–could give rise to new kinds of insecurity. Amazon stressed that nobody has successfully attacked EC2 in this manner and that the company has now prevented that specific kind of assault (though, understandably, it wouldn’t specify how). But what Amazon hasn’t solved–what nobody has yet solved–is the security problem inherent in the size and structure of clouds.

Good article, worth reading in full. Also includes an interesting animation of how the exploit was carried out.