[19171] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Palm Pilot - How to view hidden files

daemon@ATHENA.MIT.EDU (Peter W)
Tue Feb 13 00:18:42 2001

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-Id:  <20010212150948.A24954@usa.net>
Date:         Mon, 12 Feb 2001 15:09:48 -0500
Reply-To: Peter W <peterw@USA.NET>
From: Peter W <peterw@USA.NET>
X-To:         Paulo Cesar Breim <pbreim@CANALVIP.COM.BR>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <5.0.2.1.0.20010211171242.00a7b258@pop3.canalvip.com.br>; from
              pbreim@CANALVIP.COM.BR on Sun, Feb 11, 2001 at 05:15:53PM -0300

On Sun, Feb 11, 2001 at 05:15:53PM -0300, Paulo Cesar Breim wrote:

> The software Tiny Sheet, present in all versions of Palm Pilot,

http://www.iambic.com/pilot/tinysheet3/

To clarify: it's not included with PalmOS; it's 3rd-party software.

> has a function called IMPORT file.
> Well when this function is use ALL FILES, including the hidden files
> protetex with password, can be imported to a Sheet.

The "private" flag in PalmOS is advisory only. As has been noted in previous
discussions (most notably L0pht/@stake's PalmOS password recovery discovery),
the Palm platform is not designed to be secure. Physical access means access
to all its data.[0] So there's not much new about Tiny Sheet apparently not
following the guidelines. It's just another example of the limitations in PalmOS.

If you want to protect data stored on a PalmOS device, encrypt it. Hmm, I'd
be interested to see some work on PalmOS memory attacks, e.g. after you've
run a crypto app, can you run another app that scours the device's memory
for information left behind, e.g., passphrases or decrypted keys?

-Peter

[0] Unless the device is "locked" and has 3rd-party security extensions
    loaded that prevent non-destructive device resets.

home help back first fref pref prev next nref lref last post