Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
Crypto, Security, Privacy

Crypto, Security, Privacy

Cryptography, Security, Privacy
imabonehead
DailyTech - Appalling Negligence: Decade-Old Windows XPe Holes Led to Home Depot Hack - http://www.dailytech.com/Appalli...
DailyTech - Appalling Negligence: Decade-Old Windows XPe Holes Led to Home Depot Hack
"In the wake of a stunning data breach at America's largest home improvement retail chain, The Home Depot, Inc. (HD), a stunning picture of negligence is slowly emerging. Both Home Depot and Target Corp. (TGT) -- whose registers were compromised last December -- appear to have fallen victim to a decade-old exploit of Windows XPe." - imabonehead from Bookmarklet
"What's more, these losses -- which may total as many as 100 million customer credit and debit card numbers -- could have likely been prevented by simply paying to upgrade to a more modern Microsoft Corp. (MSFT) operating system, such as Windows 7 for Embedded Systems. But since Target, Home Depot, and others have refused to protect customers, customers are now paying the price. Banks... more... - imabonehead
imabonehead
New Firefox offers MITM protection via public key pinning - http://www.net-security.org/secworl...
New Firefox offers MITM protection via public key pinning
"Mozilla has released the latest version of Firefox (v32) for Windows, Mac, Linux, and Android, and the new browser sports some notable security improvements. For one, the new version has public key pinning support enabled." - imabonehead from Bookmarklet
""Public Key Pinning is a mechanism for sites to specify which certificate authorities have issued valid certs for that site, and for user-agents to reject TLS connections to those sites if the certificate is not issued by a known-good CA. Public key pinning prevents man-in-the-middle attacks due to rogue CAs not on the site's list," the company explained, and added that the fact that... more... - imabonehead
imabonehead
Mozilla accidentally left email addresses, passwords of 97k Bugzilla users out in the open | PCWorld - http://www.pcworld.com/article...
Mozilla accidentally left email addresses, passwords of 97k Bugzilla users out in the open | PCWorld
"Email addresses and encrypted passwords of around 97,000 users who tested early builds of the Bugzilla bug tracking software were left exposed for three months following a server migration. This is the second accidental data disclosure incident reported this month that affects one of the projects supported by the Mozilla Foundation." - imabonehead from Bookmarklet
Oops. - Kevin Johnson from Android
imabonehead
"The past few weeks have seen new releases of FreeOTP on both of our supported platforms." - imabonehead from Bookmarklet
Crypto, Security, Privacy
Power & Accountability - http://benlog.com/2014...
imabonehead
New “TCP Stealth” tool aims to help sysadmins block spies from exploiting their systems — Tech News and Analysis - http://gigaom.com/2014...
New “TCP Stealth” tool aims to help sysadmins block spies from exploiting their systems — Tech News and Analysis
"Systems administrators who aren’t down with spies commandeering their servers might want to pay attention to this one: A Friday article in German security publication Heise provided technical detail on a GCHQ program called HACIENDA, which the British spy agency apparently uses to port-scan entire countries, and the authors have come up with an Internet Engineering Task Force draft for a new technique to counter this program." - imabonehead from Bookmarklet
Crypto, Security, Privacy
Deja Q: Using Dual Systems to Revisit q-Type Assumptions, by Melissa Chase and Sarah Meiklejohn - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Reducing Communication Overhead of the Subset Difference Scheme, by Sanjay Bhattacherjee and Palash Sarkar - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Simple AEAD Hardware Interface (S{\AE}HI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor, by Markku-Juhani O. Saarinen - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
How to manipulate curve standards: a white paper for the black hat, by Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas H\"ulsing and Tanja Lange and Ruben Niederhagen and Christine van Vredendaal - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Security Analysis of Multilinear Maps over the Integers, by Hyung Tae Lee and Jae Hong Seo - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
A new public key system based on Polynomials over finite fields GF(2), by Gurgen Khachatrian - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings, by Rafael Pass and Karn Seth and Sidharth Telang - http://eprint.iacr.org/2013...
Crypto, Security, Privacy
Vernam Two, by Dan P. Milleville - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
On the Optimality of Differential Fault Analyses on CLEFIA, by Juliane Krämer and Anke Stüber and Ágnes Kiss - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Toward Robust Hidden Volumes using Write-Only Oblivious RAM, by Erik-Oliver Blass and Travis Mayberry and Guevara Noubir and Kaan Onarlioglu - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
The Exact PRF-Security of NMAC and HMAC, by Peter Gazi and Krzysztof Pietrzak and Michal Rybár - http://eprint.iacr.org/2014...
imabonehead
"The idea behind CV dazzle is simple. Facial recognition algorithms look for certain patterns when they analyze images: patterns of light and dark in the cheekbones, or the way color is distributed on the nose bridge—a baseline amount of symmetry. These hallmarks all betray the uniqueness of a human visage. If you obstruct them, the algorithm can’t separate a face from any other swath of pixels." - imabonehead from Bookmarklet
Crypto, Security, Privacy
3-sentence summary of what’s happening in Israel and Gaza - http://www.scottaaronson.com/blog...
Crypto, Security, Privacy
New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC, by Masao KASAHARA - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Fast Lattice Point Enumeration with Minimal Overhead, by Daniele Micciancio and Michael Walter - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Publicly Auditable Secure Multi-Party Computation, by Carsten Baum and Ivan Damgård and Claudio Orlandi - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes, by Daniel Augot and Matthieu Finiasz - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation, by Hiroaki Anada and Seiko Arita and Kouichi Sakurai - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
“How Might Quantum Information Transform Our Future?” - http://www.scottaaronson.com/blog...
Crypto, Security, Privacy
Exact Smooth Projective Hash Function based on LWE, by Olivier Blazy and Céline Chevalier and Léo Ducas and Jiaxin Pan - http://eprint.iacr.org/2013...
Crypto, Security, Privacy
Kangaroos in Side-Channel Attacks, by Tanja Lange and Christine van Vredendaal and Marnix Wakker - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Sealing the Leak on Classical NTRU Signatures, by Carlos Aguilar Melchor and Xavier Boyen and Jean-Christophe Deneuville and Philippe Gaborit - http://eprint.iacr.org/2014...
Crypto, Security, Privacy
Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency, by Kwangsu Lee and Dong Hoon Lee - http://eprint.iacr.org/2013...
Crypto, Security, Privacy
Calculating Cryptographic Degree of an S-Box, by Prasanna Raghaw Mishra - http://eprint.iacr.org/2014...
Other ways to read this feed:Feed readerFacebook