Category: Bruce Schneier

Clever System of Secure Distributed Computation 0

Clever System of Secure Distributed Computation

This is really clever: Enigma’s technique — what cryptographers call “secure multiparty computation” — works by mimicking a few of the features of bitcoin’s decentralized network architecture: It encrypts data by splitting it up into pieces and randomly distributing indecipherable chunks of it to hundreds of computers in the Enigma network known as “nodes.” Each node performs calculations on its discrete chunk of information before the user recombines the results to derive an unencrypted answer. Thanks to some mathematical tricks the Enigma creators implemented, the nodes are able to collectively perform every kind of computation that computers normally do, but without accessing any other portion of the data except the tiny chunk they were assigned.

Details of the NSA’s XKEYSCORE 0

Details of the NSA’s XKEYSCORE

The Intercept has published a highly detailed two – part article on how the NSA’s XKEYSCORE works , including a huge number of related documents from the Snowden archive. So much to digest. Please post anything interesting you notice in the comments.

Details of the NSA’s X-KEYSCORE 0

Details of the NSA’s X-KEYSCORE

The Intercept has published a highly detailed two – part article on how the NSA’s X-KEYSCORE works , including a huge number of related documents from the Snowden archive. So much to digest. Please post anything interesting you notice in the comments

Tracking the Psychological Effects of the 9/11 Attacks 0

Tracking the Psychological Effects of the 9/11 Attacks

Interesting research from 2012: ” The Dynamics of Evolving Beliefs, Concerns, Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal Analysis of Representative Archival Samples “: Abstract: September 11 created a natural experiment that enables us to track the psychological effects of a large-scale terror event over time. The archival data came from 8,070 participants of 10 ABC and CBS News polls collected from September 2001 until September 2006.

TEMPEST Attack 0

TEMPEST Attack

There’s a new paper on a low-cost TEMPEST attack against PC cryptography: We demonstrate the extraction of secret decryption keys from laptop computers, by nonintrusively measuring electromagnetic emanations for a few seconds from a distance of 50 cm. The attack can be executed using cheap and readily-available equipment: a consumer-grade radio receiver or a Software Defined Radio USB dongle.