German Divers find Enigma machine at bottom of Balitc sea
In a Facebook post, the Enigma Museum in Poznań revealed: “The Enigma was deliberately THROWN into the sea on May 4th or 5th when U-boats were ordered by Karl Donitz to end the war and surrender to the English. It is clear that the crews did not want a top-secret code device to fall into the hands of the enemy, even when the war was already lost.”
However, this version is doubted by Dr Jann Witt, a historian from the German Naval Association. He told Deutsche Presse-Agentur that he believed the machine was thrown overboard from a German warship in the final days of the war.
He claimed that it is less likely to have come from a scuttled submarine as U-boats used the more complex four-rotor Enigma machines. This version, he says, only has three rotors.
“But the ISPs aren’t just using pro-competitive rhetoric to argue about ’concentration in #DNS.' They’re also claiming that DNS-over-HTTPS [#DoH] will put them at a competitive disadvantage in the market of spying on America and selling its secrets to all comers, a market that should not exist and that your ISP should not be in the business of.”
Switching from #bcrypt to SHA2 may save your CPU…and your sanity!
Here’s the reality, billions of credentials have been leaked or stolen and are now easily downloaded online by anyone. Many of these databases of identities include passwords in plain text, while others are one-way hashed. One-way hashing is better (we’ll get to why in a second), but it is only as secure as is mathematically feasible. Let’s take a look at one-way hashing algorithms and how computers handle them.HashingA hash by definition is a function that can map data of an arbitrary size to data of a fixed size. SHA2 is a hashing algorithm that uses various bit-wise operations on any number of bytes to produce a fixed sized hash. For example, the #sha-256 algorithm produces a 256 bit result. The algorithm was designed specifically so that going from a hash back to the original bytes is (...)
Why are we (still) sending so much web traffic unencrypted over the Internet?
Image credit: Bernard Hermant from UnsplashIt’s 2019 and, still, around 25% of websites on the Internet are visited without #encryption. Let’s look at why.This is Part 2 of a three-part series on public Wi-Fi insecurity. In Part 1, I showed how easily, even today, a hacker could victimize users of public Wi-Fi networks. I created a tool to catch a glimpse of how prevalent potentially-insecure activities occur on public Wi-Fi, and compared results to a similar report from Google.The results were consistently bleak: about a quarter of all website visits occur without the use of HTTPS.I was curious why there would be so much traffic over ol’ unencrypted HTTP, but that required actually inspecting packets at a deeper level. I decided jail didn’t sound like fun; so, back at home, I set up a little (...)
Can We End Data Exploitation in #google and #facebook?
One Company Believes They CanIn the age of WhatsApp, Signal, and other messaging apps, questions over data security or sharing have arisen. True, apps like WhatApp and Signal boast end to end #encryption, chances are your data is being used in a variety of ways.One indication that WhatsApp (owned by the now bad boy of user data -Facebook) utilizes its users’ data is that it has rolled out an ads platform. If data was not being culled from messages to enhance targeting I think I and many others would be shocked.But It’s Encrypted — So Why Are You Worrying?WhatsApp and Signal and Google may be encrypted between sender and receiver, but the data is actually stored on the phone and this data is not encrypted, which leaves a back door to either the app itself using the data to sell to others or (...)
What’s Shor’s Algorithm? (Quantum Computing Weekly News for Dec 11 2018)
What’s Shor’s Algorithm? | Quantum Computing Weekly Roundup Dec 11 2018This is a syndicated version of my weekly e-mail round-up of news about Quantum Computing. Visit the homepage to subscribe to updates and check out previous issues.? Hi there, and thank you for taking a look at lucky issue #7!Last week we had a great profile on Anastasia Marchenkova, and I highly recommend checking it out if you missed it, and I’m excited to say that we already have a new guest lined up for January! ?Looking for a particular area of quantum computing you’d like to see covered in the next issue? Ping me and let me know!Tiny Fact of the weekWhat’s this Shor’s algorithm thing I keep on hearing about? In short, it’s a quantum algorithm which is able to answer a very computationally difficult question relatively (...)
Source: Progress Software.Does paying a ransom sound like something from out of a movie? People may tend to associate ransoms with people being kidnapped. However, the threat of ransom malware, or ransomware, is a real one ravaging the web today.Ransomware is any dangerous virus which can attack and encrypt the files on a PC or within an entire network, transcoding the files so that they become inaccessible to the creators. At this point in the process, the victim knows something has happened, and the cybercriminal demands a ransom for allowing the victim access to his lost files which are being held hostage by the user of the malware.Once hacked, the odds for the victim reobtaining control of his files and/or device without paying the cybercrook are not too good. The dilemma is overly (...)
The default #OpenSSH #key #encryption is worse than plaintext
That’s a fair argument to say that standard password-encrypted keys are about as good as plaintext: the encryption is ineffective. But I made a stronger statement: it’s worse.
How do you fix this? OpenSSH has a new key format that you should use. “New” means 2013. This format uses bcrypt_pbkdf, which is essentially bcrypt with fixed difficulty, operated in a PBKDF2 construction. Conveniently, you always get the new format when generating Ed25519 keys, because the old SSH key format doesn’t support newer key types. That’s a weird argument: you don’t really need your key format to define how Ed25519 serialization works since Ed25519 itself already defines how serialization works. But if that’s how we get good KDFs, that’s not the pedantic hill I want to die on. Hence, one answer is ssh-keygen -t ed25519. If, for compatibility reasons, you need to stick to RSA, you can use ssh-keygen -o. That will produce the new format, even for old key types. You can upgrade existing keys with ssh-keygen -p -o -f PRIVATEKEY . If your keys live on a Yubikey or a smart card, you don’t have this problem either.
Attention, gnome-keyring (version inférieur à 3.28) ne gère pas ce type de clé, cf :
Exploring Decentralization With Homomorphic #encryption
We live in a world where data is the new oil, distributed systems and heterogeneous networking are becoming the norm of modern software industry. It is estimated that on average we generate around 2.5 quintillion bytes of data per day. A report by Cisco predicts the following:● By 2020, the gigabyte (GB) equivalent of all movies ever made will cross the global Internet every 2 minutes.● Globally, IP traffic will reach 511 terabits per second (Tbps) in 2020, the equivalent of 142 million people streaming Internet high-definition (HD) video simultaneously, all day, every day.● Global IP traffic by 2020 will be equivalent to 504 billion DVDs per year, 42 billion DVDs per month, or 58 million DVDs per hour.Cisco also updated their Global consumer web, email, data traffic prediction for (...)
French goverment will use Matrix Riot to replace Whatsapp
According to a recent report, the French government is currently developing an end-to-end encrypted alternative to WhatsApp and Telegram that its officials could use without worrying about foreign spying. Although the French government’s spokesperson said that the government’s app will be ...
Managing #encryption Keys With #aws KMS In Node.js
itsgoingdown.orgSecurity is very important when developing applications. How do you encrypt data and manage encryption keys in your application? Successful key management is critical to the #security of a cryptosystem. This is where KMS’s come into play. Let’s first see what a KMS really is.Key Management System (KMS)According to Wikipedia,A key management system (KMS), also known as a crytographic key management system (CKMS), is an integrated approach for generating, distributing and managing cryptographic keys for devices and applications. Compared to the term key management, a KMS is tailored to specific use-cases such as secure software update or machine-to-machine communication. In an holistic approach, it covers all aspects of security — from the secure generation of keys over the (...)
What does #privacy mean on a public blockchain?
Strict new laws have come into effect for organisations dealing with personal data. What does that mean for businesses that store information on transparent, open and permanent ledgers?News of Cambridge Analytica’s misappropriation of data from some 87 million Facebook users has brought the issue of data protection squarely back into the spotlight. For years, consumers have effectively traded personal data for online services: data is considered the ‘oil’ of the internet, and the users of social networks, e-commerce platforms and almost every other free service have upheld this tacit bargain.In the last few weeks, we have seen where this leads — where, in fact, it was always and inevitably going to lead. It has become abundantly clear what the price of our personal data might be: freedom and (...)
I am creating a social network to replace #facebook
No, really. I’m serious.When I tell my friends and family that I am working on a social network to replace Facebook, the most common response I get is: “Oh, well, that’s modest!” It’s definitely not a modest goal, but I believe this is what is needed in the world today. And it’s one thing I actually know how to do to, which I believe will help make the world better. How can I not try?Note written to myself on the bulletin board by my desk. (CC BY-SA Robert Guinness)Let me give you a bit of background. I became a Facebook user sometime in the spring of 2004 when it was still in its early days. At the time, I was Facebook’s biggest fan. Well, one of its biggest fans, at least. Actually, before I could even join, I emailed Zuckerberg and asked him what I could do to help bring a Facebook site to (...)
Any trust we ever had in the network is gone - pervasive #encryption is now the norm. The network is deprived of user data but users are still beholden to third parties: in practice they now trust the endpoints, who are subject to the same temptations that the network once was.
IBM want to encrypt everything
Data breaches and exposures all invite the same lament: if only the compromised data had been encrypted. Bad guys can only do so much with exfiltrated data, after all, if they can’t read any of it. Now, IBM says it has a way to encrypt every level of a network, from applications to local databases and cloud services, thanks to a new mainframe that can power 12 billion encrypted transactions per day.
The IBM Z mainframe locks data down with public 256-bit AES encryption—the same robust protocol used in the ubiquitous SSL and TLS web encryption standards, and trusted by the US government for protecting classified data. But the company’s breakthrough lies less in quality than it does quantity. Thanks to some proprietary on-chip processing hardware, IBM Z can encrypt up to 13 gigabytes of data per second per chip, with roughly 24 chips per mainframe, depending on the configuration.
You and your contacts keep complete control your data, but you needn’t setup your own computer server in order to do so. Plus, you can send messages without even connecting to the internet. Using Briar, you can send messages over Bluetooth, a shared WiFi connection, or even a shared USB stick. That could be a big advantage for people in places where internet connections are unreliable, censored, or non-existent.
Briar is the work of computer scientist Michael Rogers, security expert Eleanor Saitta, interaction designer Bernard Tyers, software engineer Ximin Luo, and a few other volunteers.
Five Eyes nations stare menacingly at tech biz and its encryption • The Register
Officials from the United States, the United Kingdom, Canada, Australia and New Zealand will discuss next month plans to force tech companies to break #encryption on their products.
Y’aura du monde au #Fosdem 2017 ce WE ?
#Bruxelles #Brussels #logiciel #libre #Architectures #Building #Cloud #Documentation #Security #Encryption #Kubernetes #Lua #Ruby #Python #Qt #Go #Valgrind #Perl #Linux #BSD #Java #MySQL #Mozilla #GNU