Varanoid.com

Clever System of Secure Distributed Computation 0

Clever System of Secure Distributed Computation

This is really clever: Enigma’s technique — what cryptographers call “secure multiparty computation” — works by mimicking a few of the features of bitcoin’s decentralized network architecture: It encrypts data by splitting it up into pieces and randomly distributing indecipherable chunks of it to hundreds of computers in the Enigma network known as “nodes.” Each node performs calculations on its discrete chunk of information before the user recombines the results to derive an unencrypted answer. Thanks to some mathematical tricks the Enigma creators implemented, the nodes are able to collectively perform every kind of computation that computers normally do, but without accessing any other portion of the data except the tiny chunk they were assigned.

One More Flash Exploit in the Wild 0

One More Flash Exploit in the Wild

Fortinet has detected a new Flash exploit(MD5:db5df99de775af285e7f1b5355a6bee5) that leverage a vulnerability patched with Flash 17.0.0.188. This exploit uses the classic Flash Player vector corruption technique.

Details of the NSA’s X-KEYSCORE 0

Details of the NSA’s X-KEYSCORE

The Intercept has published a highly detailed two – part article on how the NSA’s X-KEYSCORE works , including a huge number of related documents from the Snowden archive. So much to digest. Please post anything interesting you notice in the comments

Details of the NSA’s XKEYSCORE 0

Details of the NSA’s XKEYSCORE

The Intercept has published a highly detailed two – part article on how the NSA’s XKEYSCORE works , including a huge number of related documents from the Snowden archive. So much to digest. Please post anything interesting you notice in the comments.