Skip to main content

Encryption

Hungarian start up says 'crack our military-grade encryption and we'll give you 5% of our firm'

posted onNovember 5, 2013
by l33tdawg

Vulnerability testing is commonplace these days, and a lucrative business for some, but a Hungarian biz is offering an unusual prize for anyone who manages to crack its email encryption system – a five per cent stake in the company.

Majority is not Enough: Bitcoin Mining is Vulnerable

posted onNovember 5, 2013
by l33tdawg

The Bitcoin cryptocurrency records its transactions in a public log called the blockchain. Its security rests critically on the distributed protocol that maintains the blockchain, run by participants called miners. Conventional wisdom asserts that the protocol is incentive-compatible and secure against colluding minority groups, i.e., it incentivizes miners to follow the protocol as prescribed.

Crypto boffins propose replacing certification authorities with ... Bitcoin?

posted onNovember 4, 2013
by l33tdawg

Whatever your opinion of Bitcoin, it does stand as a high-quality intellectual achievement. Now, a group of researchers from Johns Hopkins are suggesting its cryptographic implementation could help solve the “certificate problem” for ordinary users.

Apart from whether or not they might be universally compromised by the spooks, a problem with Public Key Infrastructure – PKI – certificates is that they depend on users' trust of the certification authority (CA) that sits at the top of the trust hierarchy.

Crypto protocols mostly crocked says euro infosec think-tank ENISA

posted onOctober 31, 2013
by l33tdawg

It's past time to plan the abandonment of legacy crypto, warns the European Union Agency for Network and Information Security (ENISA) in a new 96-page study providing recommendations for crypto designers that also says most protocols are hard to install in a secure fashion.

The good news, however: behind the huge amount of detail that you'd have to work through if you were actually implementing crypto, ENISA says (PDF) there are only two decisions that have to be made at the high level:

Buffer encrypts access tokens after spammer hack

posted onOctober 28, 2013
by l33tdawg

Buffer, a service for scheduling social media posts, said Sunday it has strengthened its security after spammers gained access to its network.

On Saturday, Buffer halted all social media postings after a raft of spam coming from Buffer accounts hit Facebook and Twitter. Later that day, service was restored, but Buffer advised users to access their accounts from its main URL rather than from its mobile applications.

Hackers: Here's video of how Apple's iMessage surveillance flaw works

posted onOctober 18, 2013
by l33tdawg

Hackers this week showed security conference attendees findings and demonstrations directly contradicting Apple's public claim that it can't read iMessages.

Even though the messages are encrypted end-to-end as Apple claims, according to QuarksLab researchers showed a packed room at Hack In The Box Kuala Lumpur, due to the lack of certificate pinning, "Apple can technically read your iMessages whenever they want."

Experts: Yes, Apple and the NSA Can Read Your iMessages

posted onOctober 18, 2013
by l33tdawg

Security experts have long suspected that iMessage is not as safe and impenetrable as Apple claims. But a group of researchers says it has proof that Apple can indeed eavesdrop on your iMessages — and the NSA can, too.

The researchers, through a careful and thorough study of the iMessage protocol, conclude that Apple has the ability to intercept and decrypt iMessages. Even though the messages are encrypted end-to-end, Apple manages the keys needed to encrypt and exchange the messages, the researchers found.

John McAfee Selling A $100 NSA Blocking Gadget?

posted onOctober 2, 2013
by l33tdawg

Part-time fugitive and antivirus software founder John McAfee has a new invention he's working on. After spending some of his time filming a drug-fueled video tutorial to uninstall the antivirus program he helped create, McAfee now believes he can outsmart the NSA. Speaking at the C2SV Technology Conference on Saturday, McAfee unveiled his grand plan to create a "D-Central" gadget that communicates with smartphones, tablets, and laptops to create decentralized networks that can't be accessed by government agencies.