- Speaker: Florian Grunow (@0x79), Niklaus Schiess (@_takeshix)
- 32C3 Schedule: https://events.ccc.de/congress/2015/Fahrplan/events/7174.html
- Slides: https://github.com/takeshixx/redstar-tools/blob/master/RedStar_OS_32c3.pdf
- Code: https://github.com/takeshixx/redstar-tools
Angae means “Fog” in Korean. The term is widely used in parts of custom code used by the Red Star OS. We will lift the fog on the internals of North Korea’s operating system. Our talk will provide information about how privacy is invaded for all users of Red Star OS and how an operating system designed by a totalitarian dictatorship works.
In 2014 the version 3 of North Korea’s Red Star operating system was leaked. It is based on Linux and has the look and feel of a Mac. There is also a server version available. We will start the presentation by giving a general overview and presenting findings that already hit the net during the last year, like research on Red Star’s custom browser and its configuration.
The focus of the presentation is to explain in depth how the architecture of the components is made up and to give a detailed overview of the privacy invading custom code implemented into the OS.
The system is designed to defend and protect itself from changes made from user space. We will analyze the interaction of the components and the protection mechanisms and provide information on how to deactivate some of the malicious functionality of Red Star OS. North Korea abuses the principals of free software to provide an operating system that suppresses free speech. Therefore we think it is necessary to disclose this information to the public and present the audience on how to get around the limitations introduced by North Korea.
Investigating functionality that can be used to invade the privacy of users was our primary goal. We found that the features implemented in Red Star OS are the wet dream of a surveillance state dictator. It provides a set of surveillance features like the capabilities to watermark different types of files that can be used to track the distribution of documents and multi-media files. We will have an in depth look on how some of these features built the foundation for a suppressive state in a modern world.
Official YouTube mirror: