Counting squid is not easy. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Powered by WPeMatico
Month: July 2017
This teapot has two chambers. Liquid is released from one or the other depending on whether an air hole is covered. I want one. Powered by WPeMatico
The Intelligence Advanced Research Projects Activity (IARPA) is soliciting proposals for research projects in secure multiparty computation: Specifically of interest is computing on data belonging to different — potentially mutually distrusting — parties, which are unwilling or unable (e.g., due to laws and regulations) to share this data with each other or with the underlying … Read More “DNI Wants Research into Secure Multiparty Computation” »
The website key.me will make a duplicate key from a digital photo. If a friend or coworker leaves their keys unattended for a few seconds, you know what to do. Powered by WPeMatico
It’s hard to tell how much of this story is real and how much is aspirational, but it really is only a matter of time: About the size of a child’s electric toy car, the driverless vehicles will patrol different areas of the city to boost security and hunt for unusual activity, all the while … Read More “Dubai Deploying Autonomous Robotic Police Cars” »
Good commentaries from Ed Felten and Matt Blaze. Both make a point that I have also been saying: hacks can undermine the legitimacy of an election, even if there is no actual voter or vote manipulation. Felten: The second lesson is that we should be paying more attention to attacks that aim to undermine the … Read More “Commentary on US Election Security” »
I don’t have anything to say — mostly because I’m otherwise busy — about the malware known as GoldenEye, NotPetya, or ExPetr. But I wanted a post to park links. Please add any good relevant links in the comments. Powered by WPeMatico
This is nice work: “The Password Reset MitM Attack,” by Nethanel Gelerntor, Senia Kalma, Bar Magnezi, and Hen Porcilan: Abstract: We present the password reset MitM (PRMitM) attack and show how it can be used to take over user accounts. The PRMitM attack exploits the similarity of the registration and password reset processes to launch … Read More “A Man-in-the-Middle Attack against a Password Reset System” »