TechHui2024-03-29T08:28:02ZJoe Segalhttp://www.techhui.com/profile/JoeSegalhttp://storage.ning.com/topology/rest/1.0/file/get/353346573?profile=RESIZE_48X48&width=48&height=48&crop=1%3A1http://www.techhui.com/group/cryptosecurity/forum/topic/listForContributor?user=3ea9x2bvofjz3&feed=yes&xn_auth=noAirforce: Crypto: FAILtag:www.techhui.com,2009-12-18:1702911:Topic:543742009-12-18T07:39:14.789ZJoe Segalhttp://www.techhui.com/profile/JoeSegal
<a href="http://www.cnn.com/2009/US/12/17/drone.video.hacked/index.html" target="_blank">Iraqi insurgents hacked Predator drone feeds, U.S. official indicates</a><br />
<br />
This level of incompetence is truly embarrassing. Just because the crypto you are using slows things down doesn't mean you switch to clear text! Switch ciphers, hardware accelerate, do <i>something</i>.<br />
<br />
Airforce - Tip: Have Ikayzo design your drone communication protocols. If they are cracked by Iraqi insurgents I'll eat my left…
<a href="http://www.cnn.com/2009/US/12/17/drone.video.hacked/index.html" target="_blank">Iraqi insurgents hacked Predator drone feeds, U.S. official indicates</a><br />
<br />
This level of incompetence is truly embarrassing. Just because the crypto you are using slows things down doesn't mean you switch to clear text! Switch ciphers, hardware accelerate, do <i>something</i>.<br />
<br />
Airforce - Tip: Have Ikayzo design your drone communication protocols. If they are cracked by Iraqi insurgents I'll eat my left shoe (serious offer - I'll put it in the contract.) Need Security Consultant for short projecttag:www.techhui.com,2009-09-21:1702911:Topic:498762009-09-21T23:44:05.022ZJoe Segalhttp://www.techhui.com/profile/JoeSegal
Aloha,<br />
We need a person to help us write a short white paper on the use of our Soundpaper technology in security applications. You should have a good working knowledge of encryption, digital signatures, security applications in both commerce and military. Also we will want to see a sample of your writing. Our need is immediate. Please contact Ken Berkun at berkun@LTTaloha.com.<br />
<br />
Ken
Aloha,<br />
We need a person to help us write a short white paper on the use of our Soundpaper technology in security applications. You should have a good working knowledge of encryption, digital signatures, security applications in both commerce and military. Also we will want to see a sample of your writing. Our need is immediate. Please contact Ken Berkun at berkun@LTTaloha.com.<br />
<br />
Ken Time.com 100 Most Influential People of 2009 Hacktag:www.techhui.com,2009-04-21:1702911:Topic:402462009-04-21T01:40:46.069ZJoe Segalhttp://www.techhui.com/profile/JoeSegal
I liked the movie "Contact", and I like the concept of pi.. but this <a href="http://musicmachinery.com/2009/04/15/inside-the-precision-hack/">hack on the Time.com 100 Most Influential People of 2009</a> is just hilarious.<br />
<br />
At the very least, please... let's not use HTTP GET for any non-idempotent operation. WebSec 101.
I liked the movie "Contact", and I like the concept of pi.. but this <a href="http://musicmachinery.com/2009/04/15/inside-the-precision-hack/">hack on the Time.com 100 Most Influential People of 2009</a> is just hilarious.<br />
<br />
At the very least, please... let's not use HTTP GET for any non-idempotent operation. WebSec 101. NSA History Documents on the National Security Archivetag:www.techhui.com,2008-11-15:1702911:Topic:259882008-11-15T05:25:59.724ZJoe Segalhttp://www.techhui.com/profile/JoeSegal
Dr. Thomas R. Johnson's American Cryptology During the Cold War, Books I, II and III have been recently released on the <a href="http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB260/">National Security Archive page</a>. While apparently quite a bit has been redacted by the NSA ("No Such Agency", to some), this is nevertheless an interesting treatment on the NSA's SIGINT signals intelligence and COMINT communications intelligence branches during perhaps the hottest period of the Cold War, the Cuban…
Dr. Thomas R. Johnson's American Cryptology During the Cold War, Books I, II and III have been recently released on the <a href="http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB260/">National Security Archive page</a>. While apparently quite a bit has been redacted by the NSA ("No Such Agency", to some), this is nevertheless an interesting treatment on the NSA's SIGINT signals intelligence and COMINT communications intelligence branches during perhaps the hottest period of the Cold War, the Cuban Missile Crisis.<br />
<br />
Books I, II, and III can be downloaded from the National Security Archive in PDF form. Key Duplication by Photograph?tag:www.techhui.com,2008-11-04:1702911:Topic:250232008-11-04T04:22:56.825ZJoe Segalhttp://www.techhui.com/profile/JoeSegal
Just saw a link to an interesting story on researchers at UC San Diego developing an impressive <a href="http://www.physorg.com/news144519246.html">proof-of-concept where they duplicate a physical key</a> with just only a photograph. (Saw this on Bruce Schneier's blog)<br />
<br />
This brings to mind an excellent bit of writing by <a href="http://www.crypto.com/masterkey.html">Matt Blaze on Master-Keyed Lock Vulnerabilities</a>.<br />
<br />
And I was so worried when I thought I inadvertently left my house keys at a…
Just saw a link to an interesting story on researchers at UC San Diego developing an impressive <a href="http://www.physorg.com/news144519246.html">proof-of-concept where they duplicate a physical key</a> with just only a photograph. (Saw this on Bruce Schneier's blog)<br />
<br />
This brings to mind an excellent bit of writing by <a href="http://www.crypto.com/masterkey.html">Matt Blaze on Master-Keyed Lock Vulnerabilities</a>.<br />
<br />
And I was so worried when I thought I inadvertently left my house keys at a nearby <a href="http://en.wikipedia.org/wiki/Onsen">onsen</a>. The key fob actually has got our home address on it, I will have to remove that immediately! NIST Contest to Find the New SHA-3tag:www.techhui.com,2008-11-01:1702911:Topic:248962008-11-01T02:09:58.662ZJoe Segalhttp://www.techhui.com/profile/JoeSegal
<a href="http://csrc.nist.gov/groups/ST/hash/sha-3/index.html">Submissions have or will be closing for proposals on a new hash algorithm to be called SHA-3</a> . Bruce Schneier and some other very significant others have got their Skein Hash Function family posted online <a href="http://www.schneier.com/skein.html">here</a>.<br />
<br />
The selection process and final results should be pretty interesting to observe...
<a href="http://csrc.nist.gov/groups/ST/hash/sha-3/index.html">Submissions have or will be closing for proposals on a new hash algorithm to be called SHA-3</a> . Bruce Schneier and some other very significant others have got their Skein Hash Function family posted online <a href="http://www.schneier.com/skein.html">here</a>.<br />
<br />
The selection process and final results should be pretty interesting to observe... PGP, IBM working to save Bletchley Parktag:www.techhui.com,2008-09-09:1702911:Topic:216862008-09-09T00:50:11.905ZJoe Segalhttp://www.techhui.com/profile/JoeSegal
<a href="http://news.cnet.com/8301-1009_3-10034884-83.html">CNET reports that PGP and IBM</a> are among a handful of corporations looking to raise money to help Bletchley Park from falling into disrepair. Bletchley Park is the home of what is arguably the world's first programmable computer, Colossus, which was vital in Great Britain's code-breaking efforts in World War II.<br />
<br />
Quote:<br />
<i>A campaign will be launched on Tuesday to ask U.S. tech companies to help save Bletchley Park, whose wartime…</i>
<a href="http://news.cnet.com/8301-1009_3-10034884-83.html">CNET reports that PGP and IBM</a> are among a handful of corporations looking to raise money to help Bletchley Park from falling into disrepair. Bletchley Park is the home of what is arguably the world's first programmable computer, Colossus, which was vital in Great Britain's code-breaking efforts in World War II.<br />
<br />
Quote:<br />
<i>A campaign will be launched on Tuesday to ask U.S. tech companies to help save Bletchley Park, whose wartime work helped lay the foundations of modern computing and crytography.<br />
<br />
The fund-raising campaign will be led by cryptography provider PGP, together with IBM and other technology firms. Phil Dunkelberger, chief executive of PGP, told ZDNet UK in a video interview that the group of companies would be making donations to repair the buildings at Bletchley Park, including the National Museum of Computing, and would be calling for other organizations to get involved.</i> Guide to OpenVPN on The Registertag:www.techhui.com,2008-09-02:1702911:Topic:210322008-09-02T01:15:40.619ZJoe Segalhttp://www.techhui.com/profile/JoeSegal
Great guide on using <a href="http://openvpn.net/">OpenVPN</a> to <a href="http://www.theregister.co.uk/2008/09/01/openvpn_primer/">secure your transmission when at public hotspots and cafes</a>.<br />
<br />
This looks very interesting and I am looking forward to setting this up this weekend when I have more time.<br />
<br />
Has anyone any experience using this kind of open-source security ware?
Great guide on using <a href="http://openvpn.net/">OpenVPN</a> to <a href="http://www.theregister.co.uk/2008/09/01/openvpn_primer/">secure your transmission when at public hotspots and cafes</a>.<br />
<br />
This looks very interesting and I am looking forward to setting this up this weekend when I have more time.<br />
<br />
Has anyone any experience using this kind of open-source security ware? Preventive security measures?tag:www.techhui.com,2008-08-21:1702911:Topic:200992008-08-21T21:51:29.963ZJoe Segalhttp://www.techhui.com/profile/JoeSegal
Link to article on <a href="http://news.yahoo.com/s/nm/20080821/tc_nm/mexico_crime_chips_dc_3" title="Satellites track Mexico kidnap victims with chips (Reuters)">the wealthy in Mexico implanting chips</a> in themselves so that they can be located via satellite in case of kidnapping. Even some middle-class people are opting for this.<br />
<br />
But... "preventive"?<br />
<br />
If you find yourself "tied up in a safe house or stuffed in the trunk of a car", then I don't think a "preventive" measure like this will…
Link to article on <a href="http://news.yahoo.com/s/nm/20080821/tc_nm/mexico_crime_chips_dc_3" title="Satellites track Mexico kidnap victims with chips (Reuters)">the wealthy in Mexico implanting chips</a> in themselves so that they can be located via satellite in case of kidnapping. Even some middle-class people are opting for this.<br />
<br />
But... "preventive"?<br />
<br />
If you find yourself "tied up in a safe house or stuffed in the trunk of a car", then I don't think a "preventive" measure like this will help. At least they can find your body, eh?<br />
<br />
This is fear at work here, driving business. It would be far more effective to deal with the problem of crime, wouldn't it? XKCD on Cryptographytag:www.techhui.com,2008-08-20:1702911:Topic:199202008-08-20T04:59:45.371ZJoe Segalhttp://www.techhui.com/profile/JoeSegal
<p style="text-align:left"><img src="http://imgs.xkcd.com/comics/cryptography.png"/></p>
<p style="text-align:left"><img src="http://imgs.xkcd.com/comics/cryptography.png"/></p>