Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/6/2020
02:00 PM
Jimmy Tom
Jimmy Tom
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

The Oracle-Walmart-TikTok Deal Is Not Enough

The social media deal raises issues involving data custodianship and trusted tech partnerships.

The Oracle-Walmart-TikTok deal has stoked significant interest among security practitioners, and the impact of this partnership is already casting a long shadow of doubt over security best practice.

What was initially anticipated to be a full sale of TikTok's US operations to an American company has morphed into the somewhat less fulfilling "trusted tech partnership" under which Oracle will have "the authority to check the source code of TikTok USA." Unfortunately, that falls well short of full visibility into the source code compilation, deployment, and implementation of any new versions of the TikTok software or its underlying recommendation algorithm. Because a key underlying rationale for this deal was to secure the data of American users of the app, the fact that full visibility into the code is now out-of-scope calls into question who benefits from this seemingly incomplete arrangement.

Which largely explains why I felt compelled to write this piece: To expand upon the concept of data custodianship, best practices for implementation, and why it's critical — especially for a deal that originated due to lack of data trust/security.

Related Content:

Banning TikTok Won't Solve Our Privacy Problems

2020 State of Cybersecurity Operations and Incident Response

New on The Edge: Teach Your Employees Well: How to Spot Smishing & Vishing Scams

Speculation has been rampant around what the Oracle-TikTok deal means, and how it addresses concerns around the privacy of US customer information. I'm but one of countless analysts who's been scrutinizing each release, and I'm troubled by what I've seen. Based on everything I've read so far, the deal comes nowhere near ensuring that US consumer data and national security are safeguarded. In fact, this rather diluted arrangement offers a false sense of security and control that could further imperil end users and their data as it establishes a dangerous precedent for future security-centric deals in the space.

The arrangement falls well short of the originally proposed buyout of ByteDance's American assets by an American company. Instead, Oracle would host US consumer data in its cloud, and Walmart would be the "commercial partner." Oracle and Walmart would own 20% of the newly formed TikTok USA. The software, including the artificial intelligence-driven recommendation algorithm and source code, would remain proprietary and under the ownership of ByteDance. Oracle would, however, have the authority to review the source code.

That last piece causes great concern for me because the process as it currently stands seems to lack chain of custody. And in security circles, that is a huge omission.

"Chain of custody" refers to the chronological or sequential events around the control of information. It's often seen in law enforcement, in the handling of evidence from a crime scene, but it's evident across everyday life, as well. If you've ever ordered a bottle of wine at a restaurant, you've also experienced it: The server brings you the sealed bottle for your inspection, the bottle is opened, and your initial sniff and taste of the poured sample is all done right in front of you. The bottle never leaves your table — or your sight.

False Sense of Security
To illustrate the false sense of security and control that Oracle is facing, let's head into the kitchen. Suppose the chef brings out a cut of meat for you to inspect. You nod your approval, and the chef takes the cut back to the kitchen to prepare for you. A little later, your server brings out your dish, which you accept as being prepared with the cut of meat you inspected, without second thought.

Can Oracle afford to make the same assumption? Can the trusted American partner be absolutely certain that the source code it inspected is the same, unadulterated code that has been compiled and released in a TikTok update? How can it be 100% sure without having full visibility into the actual development process? What about the additional libraries that are referenced in the code? Can Oracle ensure that a function call to an external library is the same that it has reviewed? And what about any incremental code revisions that regularly occur in the course of software development, the minor corrections to fix an issue discovered in the debugging process?

Without this level of visibility and scrutiny, it would be impossible for Oracle to certify that the code can be trusted, and that there aren't any surprises lurking inside it. While I agree Oracle being the US data custodian is certainly a good start, this is nowhere near enough. Oracle needs to know what happens with the data when it is processed by the software, and that data is only going where it is supposed to.

Remember that the original premise for China-based ByteDance's need to divest TikTok was due to the lack of trust that US consumer data and national security was being protected. The Oracle-Walmart-TikTok deal doesn't go far enough to change that.

Simply put, Oracle needs to be in the kitchen with TikTok USA and ByteDance for all of this to be truly effective in safeguarding US customer information and national security. "Trust but verify" means little in a deal originally founded on mistrust, and structured without verification.

For security professionals, the concern around data security is nothing new. If anything, those charged with maintaining security must remain vigilant and ensure that the digital assets of their organization are protected and secure. All social networking applications, regardless of where the company originates or where the data is hosted, present their own serious security concerns. Oracle's trusted partnership status notwithstanding, this deal does little to allay some very pertinent fears.

This is Oracle's first foray into the world of social networking, and its control over processing of the data will be very limited due to the proprietary nature of the technology. Any reassurance that Oracle offers on the security of end-user TikTok data needs to be considered in the same light as with any social networking service. Stay on your guard and ensure that your end users are in the know!

Jimmy Tom is a Research Advisor at Info-Tech Research Group with extensive experience managing the full spectrum of IT operations, infrastructure, and security in diverse industries, in both public and private sectors.Prior to joining Info-Tech, Jimmy spent twelve years in ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
cdweis
50%
50%
cdweis,
User Rank: Apprentice
11/9/2020 | 2:06:21 PM
Oracle review of source code
This article is very insightful, and the points are not well covered in the press.  It would appear (cynically perhaps) that this was a solution that saved face for some, and allowed others to buy into a company they wanted a part of.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25159
PUBLISHED: 2020-11-24
499ES EtherNet/IP (ENIP) Adaptor Source Code is vulnerable to a stack-based buffer overflow, which may allow an attacker to send a specially crafted packet that may result in a denial-of-service condition or code execution.
CVE-2020-25654
PUBLISHED: 2020-11-24
An ACL bypass flaw was found in pacemaker before 1.1.24-rc1 and 2.0.5-rc2. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went throu...
CVE-2020-28329
PUBLISHED: 2020-11-24
Barco wePresent WiPG-1600W firmware includes a hardcoded API account and password that is discoverable by inspecting the firmware image. A malicious actor could use this password to access authenticated, administrative functions in the API. Affected Version(s): 2.5.1.8, 2.5.0.25, 2.5.0.24, 2.4.1.19.
CVE-2020-29053
PUBLISHED: 2020-11-24
HRSALE 2.0.0 allows XSS via the admin/project/projects_calendar set_date parameter.
CVE-2020-25640
PUBLISHED: 2020-11-24
A flaw was discovered in WildFly before 21.0.0.Final where, Resource adapter logs plain text JMS password at warning level on connection error, inserting sensitive information in the log file.