There’s a new 3D-printable biodegradable thermoplastic : Pennsylvania State University researchers have synthesized a biodegradable thermoplastic that can be used for molding, extrusion, 3D printing, as an adhesive, or a coating using structural proteins from the ring teeth on squid tentacles. Another article : The researchers took genes from a squid and put it into E
Tagged: schneier on security
This week we learned about an attack called “FREAK” — “Factoring Attack on RSA-EXPORT Keys” — that can break the encryption of many websites. Basically, some sites’ implementations of secure sockets layer technology, or SSL, contain both strong encryption algorithms and weak encryption algorithms. Connections are supposed to use the strong algorithms, but in many cases an attacker can force the website to use the weaker encryption algorithms and then decrypt the traffic.
New law journal article: ” A Slow March Towards Thought Crime: How the Department of Homeland Security’s FAST Program Violates the Fourth Amendment ,” by Christopher A. Rogers.
One of the problems with our current discourse about terrorism and terrorist policies is that the people entrusted with counterterrorism — those whose job it is to surveil, study, or defend against terrorism — become so consumed with their role that they literally start seeing terrorists everywhere . So it comes as no surprise that if you ask Tom Ridge, the former head of the Department of Homeland Security, about potential terrorism risks at a new LA football stadium, of course he finds them everywhere . From a report he prepared — paid, I’m sure — about the location of a new football stadium: Specifically, locating an NFL stadium at the Inglewood-Hollywood Park site needlessly increases risks for existing interests: LAX and tenant airlines, the NFL, the City of Los Angeles, law enforcement and first responders as well as the citizens and commercial enterprises in surrounding areas and across global transportation networks and supply chains.
Scientists are attaching cameras to Humboldt squid to watch them communicate with each other. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
New paper: ” Surreptitiously Weakening Cryptographic Systems ,” by Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, and Thomas Ristenpart. Abstract : Revelations over the past couple of years highlight the importance of understanding malicious and surreptitious weakening of cryptographic systems.
This is freaky: A new study showcases the first example of an animal editing its own genetic makeup on-the-fly to modify most of its proteins, enabling adjustments to its immediate surroundings. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
The Intercept has an extraordinary story : the NSA and/or GCHQ hacked into the Dutch SIM card manufacturer Gemalto, stealing the encryption keys for billions of cell phones. People are still trying to figure out exactly what this means, but it seems to mean that the intelligence agencies have access to both voice and data from all phones using those cards. Me in The Register : “We always knew that they would occasionally steal SIM keys