Skip to main content

Encryption

Which Encryption Apps Are Strong Enough to Help You Take Down a Government?

posted onMarch 11, 2013
by l33tdawg

It seems like these days I can't eat breakfast without reading about some new encryption app that will (supposedly) revolutionize our communications — while making tyrannical regimes fall like cheap confetti.

This is exciting stuff, and I want to believe. After all, I've spent a lot of my professional life working on crypto, and it's nice to imagine that people are actually going to start using it. At the same time, I worry that too much hype can be a bad thing — and could even get people killed.

SpiderOak: Encrypting the cloud and foiling corporate hackers

posted onFebruary 11, 2013
by l33tdawg

I recently met with Ethan Oberman (above) CEO and co-founder of SpiderOak, a cloud based data storage service used for backups or syncing data. It promises a very high level of security because everything is encrypted -- SpiderOak has no idea what you are storing.

This is the same strategy that Kim Dotcom, the infamous founder of Megaupload has recently taken with his latest storage venture Mega. Megaupload was shut down by US authorities because it is alleged that it stored huge quantities of pirated movies and other copyrighted materials.

Quantum crypto still not proven, claim Cambridge experts

posted onFebruary 1, 2013
by l33tdawg

Two killjoy researchers from the University of Cambridge have cast doubt on whether quantum cryptography can be regarded as ‘provably secure’ – and are asking whether today’s quantum computing experimentation is demonstrating classical rather than quantum effects.

Computer scientists Ross Anderson and Robert Brady have published their discussion at Arxiv, here. In the paper, they examine two key issues in quantum research. As well as looking at the cryptography question, they also examine why quantum computing research is finding it hard to scale beyond three qubits.

Crypto collisions cause denial of service in major hashes

posted onJanuary 30, 2013
by l33tdawg

Denial of service vulnerabilities have been found in cryptographic systems underpinning host of web applications including those offered by Google, Microsoft, Yahoo and those based on Java among scores of others.

The attacks target weaknesses in the hash algorithms that permit multiple hash collisions to take place. This can quickly overload any application using a vulnerable hash algorithm.

Mega Explains Its Encryption Dismissing Some of the Fears and Criticism

posted onJanuary 23, 2013
by l33tdawg

Mega's high-profile launch was under a lot of scrutiny, for obvious reasons, with many curious to see how the fabled encryption features would work. Mega boasted client-side encryption to ensure total privacy over the uploaded files.

But Mega also made it possible to share those files and didn't require users to actually remember or store any key, things which could mean weaker security.