kpwn, to infosec

If you're reading this, your last Diffie-Hellman-Merkle key exchange probably happened just seconds ago.

Have you ever wondered under what circumstances it is secure?

Me too, so let's take a look ⤵️

scandrof, to random

"In a suburban Brisbane garage, young women decoded radio transmissions that changed the course of World War II. For the first time, their top-secret work on a panicked Japanese cable about a new type of weapon can be revealed."

The Garage Girls and the secret war machine which uncovered Japanese secrets - ABC News https://www.abc.net.au/news/2023-06-03/garage-girls-world-war-2-spying-in-australia/102411022

kenji, to random German
@kenji@chaos.social avatar

Heute ging es an der TH Köln um das chinesische Spionage- und Cyberrecht - bei vollem Haus mit 170 angemeldeten Teilnehmer:innen! Wer nicht dabei sein konnte: Der Vortrag wurde aufgezeichnet, in Kürze gibt es hier den Link. #china #cyberlaw #cybersecurity #cryptography

pyperkub, to infosec
@pyperkub@mastodon.social avatar

Finished @pluralistic 's Red Team Blues over the weekend and loved it. Can't stop recommending it Here's a cryptographer's review - https://blog.cryptographyengineering.com/2023/04/24/book-review-red-team-blues/

mjgardner, to infosec
@mjgardner@social.sdf.org avatar

@Perl Good news, the module IO::Socket::SSL now defaults to using the cryptographic protocol version 1.2 or greater. (Earlier versions have been widely deprecated for a couple of years due to weaknesses found in the and hashing functions.)

Note that if you’ve updated recently you may also have to rebuild and reinstall Net::SSLeay from .

https://g0v.social/@gugod/110392435778885615

jeruyyap, to ChatGPT
@jeruyyap@hachyderm.io avatar

I will continue to refuse to call cryptocurrency "crypto" and refuse to call things like ChatGPT "AI".

I'm very disappointed in the rest of ya'll who have caved on this.

I tend to be very disappointed in general.

yossarian, to programming
0x58, to infosec

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #19/2023 is out! It includes, but not only:

‣ New Phishing-as-a-Service Platform Lets Cybercriminals Generate Convincing #Phishing Pages
#Netgear Routers' Flaws Expose Users to #Malware, Remote Attacks, and Surveillance
‣ 🇮🇹 🏎️ #WordPress Plugin Vulnerability Exposed #Ferrari Website to Hackers
‣ 🇯🇵 🚗 #Toyota Japan exposed data on millions of vehicles for a decade
‣ 📨 #Microsoft patches bypass for recently fixed Outlook zero-click bug
‣ 🇺🇸 🇺🇦 IRS gives #Ukraine tools to expose Russian oligarchs hiding riches in #crypto exchanges
‣ 🇨🇭 Multinational tech firm #ABB hit by Black Basta #ransomware attack
‣ 🐥 #Twitter Finally Rolling Out Encrypted Direct Messages — Starting with Verified Users
‣ 🇺🇸 Cybersecurity firm #Dragos discloses cybersecurity incident, extortion attempt
‣ 🇰🇵 North Korean hackers breached major hospital in Seoul to steal data
‣ 🇺🇸 #Google Now Lets US Users Search #DarkWeb for Their Gmail ID
‣ 🇺🇸 #IBM Delivers Roadmap for Transition to Quantum-safe #Cryptography
‣ 🇪🇸 Spanish police dismantle phishing operation linked to crime ring
‣ 🇺🇸 Microsoft #PatchTuesday: 40 Vulnerabilities, 2 Zero-Days
‣ 🇺🇸 🇷🇺 Justice Department Announces Court-Authorized Disruption of the Snake Malware Network Controlled by #Russia's Federal Security Service
‣ 🇺🇸 Feds seize 13 more DDoS-for-hire platforms in ongoing international crackdown
#MSI Data Breach: Private Code Signing Keys Leaked on the Dark Web
‣ 🇮🇷 Microsoft: Iranian hacking groups join #Papercut attack spree

📚 This week's recommended reading is: "The Pentester BluePrint: Starting a Career as an Ethical Hacker" by @phillipwylie and @crowgirl

#security #data #databreach #surveillance #hospital

Subscribe to the #newsletter to have it piping hot in your inbox every Sunday ⬇️

https://0x58.substack.com/p/infosec-mashup-week-192023

atoponce, to javascript
@atoponce@fosstodon.org avatar

The #LastPass password generator uses a userspace #RC4 generator.

Here's their #JavaScript:

dogenerate() -> lpCreatePass() -> get_random() -> rng_get_bytes() -> rng_get_byte() -> prng_newstate() -> ARC4init(); ARC4next()

As RC4 is insecure, you would be wise not to use their web-based password generator.

Further, it seems likely they're using the same code in their password manager. You would be wise not to use it there also.

#cryptography #passwords

https://www.lastpass.com/features/password-generator

Screenshot of LastPass JavaScript source code highlighting the "lpCreatePass" function.
Screenshot of LastPass JavaScript source code highlighting the "rng_seed_int", "rng_seed_time", "rng_get_byte", "rng_get_bytes", and "get_random" functions.
Screenshot of LastPass JavaScript source code highlighting the "prng_newstate", "ARC4init", and "ARC4next" functions.

TunnelJanitor, to science

Anyone know the plural for maths?

0xor0ne, to infosec
tcely, (edited ) to random
@tcely@fosstodon.org avatar

Are you confused by what end-to-end encryption means?

I've found a few videos that explain this topic in plain language.

https://youtube.com/playlist?list=PLMItfTVgwEAvTX4-sZkcF5s3-l1JDocY0

Great work, @kelseyahe!

https://www.kelseyhoustonedwards.com/


0x58, to infosec

IBM has introduced a quantum-safe roadmap to help the complex organizational transition to post-quantum cryptography at this year’s annual Think conference.

“This roadmap serves as a commitment to transparency, predictability, and confidence as we guide industries along their journey to post-quantum cryptography. There’s a lot happening at once — new algorithms, standards, best practices, and guidance from federal agencies. We hope that this roadmap will serve as a navigational tool through this complex landscape,”

https://www.securityweek.com/ibm-delivers-roadmap-for-transition-to-quantum-safe-cryptography/

atoponce, to random
@atoponce@fosstodon.org avatar

I just learned that will automatically and correctly clamp any private 32-byte key.

For example:

$ openssl rand -base64 32
tx6Kwv9L17ARq8WOd0M3sjm8gKU8bmdoSeBoGTzyEyY=

Even though the first and last bytes are not properly clamped above, when generating the public key, the wg(8) tool will clamp it. Further, when bringing up the interface, Wireguard will also clamp it.

See https://git.zx2c4.com/wireguard-tools/tree/src/genkey.c and https://git.zx2c4.com/wireguard-linux/tree/drivers/net/wireguard/noise.c (search for "curve25519_clamp_secret")

thisismissem, to random
@thisismissem@hachyderm.io avatar

Just saw someone implementing user authentication for an #E2EE application by taking the users password, running it through libsodium's crypto_pwhash with a fixed salt derived from the user's email address, before sending the (email, hash) pair to the remote server.. and I'm just like "is this secure?"

I'd always thought you'd want a construct like SRP6a for conducting the authentication between client & server (without the server learning the user's password)... #security #cryptography

strypey, to random
@strypey@mastodon.nzoss.nz avatar

The #IEFT were warning of this in the 90s:

"Export controls and usage controls [on cryptographic software] are slowing the deployment of security at the same time as the Internet is exponentially increasing in size and attackers are increasing in sophistication. This puts users in a dangerous position as they are forced to rely on insecure electronic communication."

https://datatracker.ietf.org/doc/html/rfc1984

#HatTip to @onepict for pushing us to read this.

#cryptography #security #privacy

strypey, to random
@strypey@mastodon.nzoss.nz avatar

"We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions. Our cost model assumes that the attack is run on a surface code based fault-tolerant quantum computer. Our estimates rely on a time-area metric that costs the number of logical qubits times the depth of the circuit in units of surface code cycles."

#MatthewAmy et al, 2016

https://eprint.iacr.org/2016/992

#papers #cryptography #QuantumComputing

mnutty, to politics

1/ Today the kicks off in earnest with ’s re-election bid announcement

There is 560 days to the . Much will happen, conditions will change but it as suggests a continuation of the battle for the soul of America

I’ll use this thread to comment periodically on the election over the next 80 weeks. It’s a long road to , but the stakes couldn’t be higher

https://youtu.be/ChjibtX0UzU

volkris,

@mnutty

For years I’ve been beating a drum that we should normalize the cryptographic signing of mainstream content, for example politicians signing with their own identities to certify that a quote or video clip is real and accurate.

Not only would that help assure that a quote wasn’t taken misleadingly out of context, but in this new age it would help protect against outright deepfakes.

Unfortunately, I’ve often heard journalists respond that such a norm would interfere with journalistic independence, and lead to people being skeptical of journalists.

I think such responses get it exactly backwards.

In any case, yep, I’m still beating the drum, but sadly I think the ship has sailed and we’re now entering the more dangerous waters without that protection in place.

pluralistic, to Signal
@pluralistic@mamot.fr avatar

They’re still trying to ban #cryptography

https://doctorow.medium.com/theyre-still-trying-to-ban-cryptography-33aa668dc602

#backdoors #ukpoli #signal #CryptoMeansCryptography #GameTheory #censorship #surveillance #FourHorsemenOfTheInfocalypse

Call this the “enforcement nexus” — for a government to enforce a law, it needs something to seize. Governments have broad latitude to seize things and people within their territorial borders (though this is not absolute, as I’ll discuss below). But when it comes to conduct outside a government’s territory, enforcement depends upon the cooperation of another government — this is why so many crime dramas turn on a desperate dash for countries that don’t have extradition treaties. Governments can project enforcement power into any territory that will allow it to seize the people or property of its adversaries. When the Argentinian government defaulted on its bonds, it failed to reckon with the fact that its US dollar holdings were stashed in the US Federal Reserve Bank in New York. That meant that the vulture capitalists seeking to squeeze Argentina could argue their case in their home court in the USA, seeking a judgment that could be enforced domestically — that is, by seizing the Argentinian government’s assets held on US soil.
National firewalls are everywhere today. Sometimes, they’re sold as turnkey solutions — by both Chinese and western firms — to poor countries with very little technical capacity of their own. Spy agencies from large, powerful countries love it when poor countries install foreign-made national firewalls, as these are key to “third-party collection” (when a spy agency taps into another spy agency’s files) and “fourth-party collection” (when a spy agency taps into another spy agency that has tapped into another spy-agency’s files). As national firewalls proliferate, so too do enforcement nexuses. After Edward Snowden revealed that US tech giants were allowing US spy agencies to plunder their user data, the EU imposed a (perfectly reasonable) data localization regulation that required US tech companies to keep Europeans’ data on servers within the EU (this regulation remains contentious and fragile). The EU doesn’t have a regional or national firewall, so tech giants who don’t want to comply with the regulation could simply withdraw their sales offices and engineering departments and lobbyists from the EU and ignore the rule — at least to the extent that they could convince US courts not to enforce EU judgments against them. But the EU has other enforcement nexuses it could rely upon. It could order European banks and payment processors to block payments to tech firms that ignore the localization rule. Payment processing remains a
Enter American culture-war nonsense. In Texas, they want to ban websites that explain how to get an abortion, as well as sites that ship the pills for a medication abortion. In Florida, they want to force bloggers who write about the state government to pay a fee and register with the state, prohibiting anonymous commentary about the state legislature and its actions. Florida has also required that online providers cease permitting their users to display pronouns other than the ones they were assigned at birth. Of course, online services have no way to know what pronouns any of their users were assigned at birth, so sites like Github are complying with Florida law by simply not displaying pronouns to Floridian users. The biggest barrier to enforcing these laws is the US Constitution, which these laws assuredly violate. It’s entirely possible that a lower court will uphold these laws. It’s conceivable that an appeals court will do so as well. It’s not outside the realm of possibility that the current Supreme Court — illegitimately stacked with far-right partisan hacks lacking any shred of principle — will follow suit. But it’s far from a sure thing. It’s not even clear whether the legislatures that passed these laws and the governors who signed them want them to be enforced. After all, if these policies do come into force, large numbers of corporations are likely to shutter their offices and move out of state (especially in Florida, an increas

Pixdigit, to random German
@Pixdigit@layer8.space avatar

I had an idea for an anonymous, authenticated, zero-trust voting system. But probably somebody else already had the same idea. Any cryptographers around who might know?

sarahjamielewis, to privacy
@sarahjamielewis@mastodon.social avatar

Hello Everyone! I'm Sarah. Executive Director of Open Privacy (https://openprivacy.ca/) - a Canadian non-profit society dedicated to researching & building privacy enhancing tools (like https://cwtch.im) that empower people.

I spend most of my days conducting #cryptography and #privacy research, and a fair amount of time disclosing security issues in a variety of systems.

#introduction

mupan, to random German
@mupan@digitalcourage.social avatar

Summary: #Kryptographie verdient den Namen erst dann, wenn alle ihre Nutzer den Vorgang informiert kontrollieren. Meine Bankkarte bietet zwar formal, technologisch #Verschlüsselung, aber eben nur formal. #Cryptography deserves its name only when all their informed users control the process. My bank card offers formal, technological #encryption, but just: formal.

https://wordsmith.social/westphalianspunk/kryptographie

Edent, to twitter
@Edent@mastodon.social avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • magazineikmin
  • Youngstown
  • khanakhh
  • ngwrru68w68
  • slotface
  • ethstaker
  • mdbf
  • everett
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • cisconetworking
  • rosin
  • JUstTest
  • Durango
  • GTA5RPClips
  • anitta
  • tester
  • tacticalgear
  • InstantRegret
  • normalnudes
  • osvaldo12
  • cubers
  • provamag3
  • modclub
  • Leos
  • lostlight
  • All magazines