Tagged: schneier on security

Friday Squid Blogging: Biodegradable Thermoplastic Inspired by Squid Teeth 0

Friday Squid Blogging: Biodegradable Thermoplastic Inspired by Squid Teeth

There’s a new 3D-printable biodegradable thermoplastic : Pennsylvania State University researchers have synthesized a biodegradable thermoplastic that can be used for molding, extrusion, 3D printing, as an adhesive, or a coating using structural proteins from the ring teeth on squid tentacles. Another article : The researchers took genes from a squid and put it into E

FREAK: Security Rollback Attack Against SSL 0

FREAK: Security Rollback Attack Against SSL

This week we learned about an attack called “FREAK” — “Factoring Attack on RSA-EXPORT Keys” — that can break the encryption of many websites. Basically, some sites’ implementations of secure sockets layer technology, or SSL, contain both strong encryption algorithms and weak encryption algorithms. Connections are supposed to use the strong algorithms, but in many cases an attacker can force the website to use the weaker encryption algorithms and then decrypt the traffic.

Tom Ridge Can Find Terrorists Anywhere 0

Tom Ridge Can Find Terrorists Anywhere

One of the problems with our current discourse about terrorism and terrorist policies is that the people entrusted with counterterrorism — those whose job it is to surveil, study, or defend against terrorism — become so consumed with their role that they literally start seeing terrorists everywhere . So it comes as no surprise that if you ask Tom Ridge, the former head of the Department of Homeland Security, about potential terrorism risks at a new LA football stadium, of course he finds them everywhere . From a report he prepared — paid, I’m sure — about the location of a new football stadium: Specifically, locating an NFL stadium at the Inglewood-Hollywood Park site needlessly increases risks for existing interests: LAX and tenant airlines, the NFL, the City of Los Angeles, law enforcement and first responders as well as the citizens and commercial enterprises in surrounding areas and across global transportation networks and supply chains.

"Surreptitiously Weakening Cryptographic Systems" 0

"Surreptitiously Weakening Cryptographic Systems"

New paper: ” Surreptitiously Weakening Cryptographic Systems ,” by Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, and Thomas Ristenpart. Abstract : Revelations over the past couple of years highlight the importance of understanding malicious and surreptitious weakening of cryptographic systems.

NSA/GCHQ Hacks SIM Card Database and Steals Billions of Keys 0

NSA/GCHQ Hacks SIM Card Database and Steals Billions of Keys

The Intercept has an extraordinary story : the NSA and/or GCHQ hacked into the Dutch SIM card manufacturer Gemalto, stealing the encryption keys for billions of cell phones. People are still trying to figure out exactly what this means, but it seems to mean that the intelligence agencies have access to both voice and data from all phones using those cards. Me in The Register : “We always knew that they would occasionally steal SIM keys