![]() |
![]() |
#1 |
∂2ω=0
Sep 2002
República de California
2DEB16 Posts |
![]()
I think a thread documenting the numerous egregious failures by governments, big business and online sites to use even the most basic crypto/security tools to properly protect their customer/user data would be useful. As breaches dating back at least to the WW2 Enigma cracking program show, most of the time "it's not the crypto, it's the misuse or un-use thereof which is the problem."
======================== Troy Hunt: When children are breached -- inside the massive VTech hack |
![]() |
![]() |
![]() |
#2 |
Oct 2007
Manchester, UK
2·3·229 Posts |
![]()
Well this certainly seems like a government failure.
UK’s 'Government-Grade Encryption' For VoIP Calls Backdoored By Default |
![]() |
![]() |
![]() |
#3 | |
Undefined
"The unspeakable one"
Jun 2006
My evil lair
26·3·5·7 Posts |
![]() Quote:
Unless by "failure" you mean they failed to keep it a secret. In which case then I agree, a failure, but to be expected that eventually people would discover it. Makes one wonder what will be the next trick they are using that is yet to be discovered. Last fiddled with by retina on 2016-01-21 at 17:00 |
|
![]() |
![]() |
![]() |
#4 |
Oct 2007
Manchester, UK
55E16 Posts |
![]()
I think it's perfectly possible to fail even if you get exactly what you want.
|
![]() |
![]() |
![]() |
#5 | ||
∂2ω=0
Sep 2002
República de California
101101111010112 Posts |
![]()
New cloud attack takes full control of virtual machines with little effort | Ars Technica
Quote:
Quote:
Public-key cryptography relies on the assumption that it is computationally infeasible to derive the private key from the public key. For RSA, computing the private exponent d from the public exponent e is believed to require the factorization of the modulus n. If n is the product of two large primes of approximately the same size, factorizing n is not feasible. Common sizes for n today are 1024 to 2048 bits. In this paper we implement a fault attack on the modulus n of the victim: we corrupt a single bit of n, resulting in n'. We show that with high probability n' will be easy to factorize. We can then compute from e the corresponding value of d', the private key, that allows us to forge signatures or to decrypt. We provide a detailed analysis of the expected computational complexity of factorizing n... |
||
![]() |
![]() |
![]() |
#6 |
Dec 2012
The Netherlands
183010 Posts |
![]()
The VU paper is available here:
http://www.ieee-security.org/TC/SP20...s/0824a987.pdf It's a good fault injection attack. Yet again, optimization destroys security. |
![]() |
![]() |
![]() |
#7 | |
Sep 2003
3·863 Posts |
![]() Quote:
|
|
![]() |
![]() |
![]() |
#8 |
Tribal Bullet
Oct 2004
67528 Posts |
![]()
Paper reference for the Rowhammer attack
Edit: actually there is no exploit described in the paper, it characterizes what the errors induced in the DRAM look like. Really scary stuff. Last fiddled with by jasonp on 2016-09-03 at 22:57 |
![]() |
![]() |
![]() |
#9 |
∂2ω=0
Sep 2002
República de California
5·2,351 Posts |
![]() |
![]() |
![]() |
![]() |
#10 | |
∂2ω=0
Sep 2002
República de California
267538 Posts |
![]()
Cyber attacks disrupt PayPal, Twitter, other sites | Reuters
Widely reported last week, but much of (at least the early) reporting missed a crucial aspect: This was the latest Internet-of-Things-mega-botnet attack. Nice description of just how bad the problem is - and this is by design on the part of the manufacturers! - from Brian Krebs, who was victimized by a similar but smaller-scale such attack last month: Hacked Cameras, DVRs Powered Today's Massive Internet Outage | Krebs on Security Quote:
But hey, time to indulge in that wildly popular fad among U.S. officialdom (including, alas, experts with a big soapbox like Bruce Schneier): let's blame the Russians! How about something along the lines of 'Officials refused to comment on several eyewitness reports claiming to have seen a shadowy figure resembling The Putin lurking around Dyn headquarters in the days prior to the attacks'. |
|
![]() |
![]() |
![]() |
#11 |
∂2ω=0
Sep 2002
República de California
101101111010112 Posts |
![]()
Here in the US, the MSM-driven "Russians are coming!" hysteria continues apace - first the Rooskies allegedly hacked the US elections leading lame-duck Obama to "impose sanctions", now they allegedly hacked the NE US power grid.
Mike Shedlock has a good collection of propaganda-narrative-debunking links in More Bullsh*t Fake News from Washington Post. Most interesting to me about this manufactured hysteria is to compare it to the non-response to a genuinely damaging hack of an actual US government agency (note the Democratic National Committee is a private political party, not an organ of the government) which was credibly traced to a nation-state actor. To maximize the irony, here is a link to the WaPo story on it (but note the particulars were confirmed by multiple news outlets as well as skeptical-of-officialdom blogs, i.e. I didn't just take WaPo's word for it then, either): Chinese hack of federal personnel files included security-clearance database | 12 Jun 2015 Remember all the saber-rattling, tough sanctions and other punitive actions against China which that led to? Neither do I. Unlike Mish, I don't believe the folks setting the narrative at WaPo, NYT etc. are stupid at all - they appear to have a very clear set of objectives with their ongoing agitprop-disguised-as-news campaign, including but not limited to: o Maintain their own longstanding quasi-monopoly on 'news' (much of which is government propaganda) by smearing independent information sources as Commie-sympathizing peddlers of "fake news"; o Keep the populace in fear about "dark outside forces"; o Make excuses for the Dems blowing the election (and deflect from their blatant rigging of their own primary to install the designated NatSec/establishment/Wall-Street stooge as the party's nominee); o Delegitimize the incoming administration and pressure it to knuckle under to the Deep State. Edit: Here is an Ars piece on the weakness of the 'evidence' provided so far: White House fails to make case that Russian hackers tampered with election | Ars Technica Last fiddled with by ewmayer on 2017-01-02 at 06:12 |
![]() |
![]() |
![]() |
Thread Tools | |
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Cause this don't belong in the milestone thread | bcp19 | Data | 30 | 2012-09-08 15:09 |
GPU TF vs DC/LL data | bcp19 | GPU to 72 | 0 | 2011-12-02 16:41 |
Opinions/Suggestions for Data Collection thread | kar_bon | No Prime Left Behind | 19 | 2008-11-27 09:27 |
Data available? | Prime95 | LMH > 100M | 10 | 2007-06-22 23:55 |
Deutscher Thread (german thread) | TauCeti | NFSNET Discussion | 0 | 2003-12-11 22:12 |