{"id":42,"date":"2008-01-11T22:26:57","date_gmt":"2008-01-12T06:26:57","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/01\/11\/security-review-parental-controls-for-tv\/"},"modified":"2008-01-11T22:26:57","modified_gmt":"2008-01-12T06:26:57","slug":"security-review-parental-controls-for-tv","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/01\/11\/security-review-parental-controls-for-tv\/","title":{"rendered":"Security Review &#8211; Parental Controls for TV"},"content":{"rendered":"<p><strong>Summary<\/strong><\/p>\n<p>Parental controls on television sets (or on the Internet, or mobile phones, etc.) allow parents to restrict the media to which their children have access to an age-appropriate level. Parental controls allow parents to restrict access to television based on a variety of different factors, including rating, the content that produced the rating (e.g., violence, language, nudity, etc.), and occasionally even the time that the shows are on (no movies after 11:00PM, kids). Of course, sometimes cartoons can get a little raunchy while still technically meeting none of the filter criteria, so parents can also block shows individually.<\/p>\n<p><!--more--><\/p>\n<p><strong>Assets<\/strong><\/p>\n<p><em>Children<\/em> could be considered the asset most in need of protecting by this system. The goal in protecting this asset would be to keep children from watching things that are deemed inappropriate.<\/p>\n<p><em>The Parents\u2019 money<\/em> could also be considered an asset, and the goal would be to limit the children\u2019s ability to purchase pay-per-view shows without the parents consent.<\/p>\n<p><strong>Adversaries\/Threats<\/strong><\/p>\n<p><em>The Children<\/em> are perhaps the most obvious adversary, as their goal is to watch R-rated movies and buy boxing matches on pay-per-view. The threat here is that they might overhear the parents mention the password, or look over their shoulder while they are typing it in (for the inevitable occasion when a Disney movie gets blocked overzealously).<\/p>\n<p><em>Neighborhood kids<\/em> are a little bit of a stretch, but it is not inconceivable that someone could break into the house (or climb through an open window) during the day and order explicit (read: X-rated) pay-per-view movies on the new HD projector. If the credit card number is stored on the device for easy ordering of movies, it gets even easier\u2026<\/p>\n<p><strong>Weaknesses<\/strong><\/p>\n<p><em>Access code:<\/em> Depending on how old the children (or delinquent neighbors) are, the code to access the blocked content might be a weakness, especially if it is not carefully chosen. This is especially true if the code is short, or if the length of the code maps nicely to a birthday (4 digits, 6 digits).<\/p>\n<p><em>Storage of content flags:<\/em> Depending on the device in use, a power outage might erase flags for blocked content, or the device might have a reset button that could achieve the same functionality. Either way, some sort of physical access to the device is required.<\/p>\n<p><em>System upgrades \/ new systems: <\/em>Buying a new system to replace the old one doesn\u2019t necessarily transfer settings and content blocks, which might leave an opening for a determined attacker to watch R-rated movies after bedtime.<\/p>\n<p><em>Storing credit card numbers:<\/em> Storing credit card numbers for easy purchasing of movies is good for business, but it also makes it very easy for someone malicious to purchase movies his\/her own devious ends.<\/p>\n<p><strong>Defenses<\/strong><\/p>\n<p><em>Password complexity:<\/em> if the system required a password of a certain minimum length and complexity, it could mitigate the usefulness of guessing, and even deter resourceful children from inferring passwords from parents&#8217; birthdays, etc.<\/p>\n<p><em>Don\u2019t store credit card info:<\/em> The system could simply not store credit card information, and require that the purchaser type it in every time. On a television, this doesn\u2019t seem very feasible. Another option might be to just charge money to your account to be paid at the end of the month (which makes the most sense from company and user perspective, but doesn\u2019t fix the problem of unauthorized people being able to purchase movies).<\/p>\n<p><em>Conte<\/em><em>nt flags\/filters<\/em> could be stored in hardware that survives power outages (on disk, for instance). This would mitigate the problem of someone unplugging the device and plugging it in again to remove the blocks on content. (This seems to be a very likely implementation choice).<\/p>\n<p><strong>Risks<\/strong><\/p>\n<p>The potential risk of neighborhood kids breaking in to watch pay-per-view movies while parents are at work can be mitigated pretty easily by closing windows and locking doors, and choosing a reasonable password for blocking content. The likelihood of anyone living next to kids like this is probably small to begin with, and simple steps can be taken to ensure that the house isn\u2019t presented as a likely candidate for intrusion.<\/p>\n<p>The risk of children living in the house is probably much greater. As the children get older, the potential for more complicated trickery to obtain the password and thus be able to watch explicit movies after bedtime increases. Over time, they will gain insight into the system (and perhaps into their parents\u2019 choices of passwords), and they might also notice things like their father buying a new satellite TV box, and intuitively understand that he will forget to turn the parental controls on for at least the first night. There is a good chance that they will take advantage of this. The risk of a child purchase a pay-per-view movie at some point without realizing that it costs his\/her parents money is probably very good; however, the cost of these accidents can be minimized by explaining to kids early on what \u201cpay-per-view\u201d means, and by punishing them if they do purchase a movie.<\/p>\n<p><strong>Conclusions<\/strong><\/p>\n<p>The parental control system is fairly straightforward, and on the whole seems to do a pretty reasonable job of protecting children from things their parents don\u2019t want them to see (or else companies would stop paying engineers money to write access-control software for their systems). Most of the weaknesses in the system require someone have physical access to the device, either to input a code, or to reset the system in some way. It just so happens that the biggest adversaries do, in fact, have physical access to the system. Luckily something as simple as a hard-to-guess password can keep younger children from accessing inappropriate content, and by the time the kids are old enough to use social-engineering techniques to get the password from their parents (or the younger siblings\u2019 babysitter, or the cousin who is spending the night), the necessity of having content-based access-control systems for the television will have probably passed by.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary Parental controls on television sets (or on the Internet, or mobile phones, etc.) allow parents to restrict the media to which their children have access to an age-appropriate level. Parental controls allow parents to restrict access to television based &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/01\/11\/security-review-parental-controls-for-tv\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":19,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,13,5],"tags":[],"class_list":["post-42","post","type-post","status-publish","format-standard","hentry","category-miscellaneous","category-physicalsecurity","category-security-reviews"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/42","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=42"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/42\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=42"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=42"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}