The ISO has rejected two symmetric encryption algorithms: SIMON and SPECK. These algorithms were both designed by the NSA and made public in 2013. They are optimized for small and low-cost processors like IoT devices. The risk of using NSA-designed ciphers, of course, is that they include NSA-designed backdoors. Personally, I doubt that they’re backdoored. … Read More “Two NSA Algorithms Rejected by the ISO” »
Info on the coded signals used by the Colorado Rockies. Powered by WPeMatico
“Do Not Disturb” is a Macintosh app that send an alert when the lid is opened. The idea is to detect computer tampering. Wire article: Do Not Disturb goes a step further than just the push notification. Using the Do Not Disturb iOS app, a notified user can send themselves a picture snapped with the … Read More “Computer Alarm that Triggers When Lid Is Opened” »
Russia has banned the secure messaging app Telegram. It’s making an absolute mess of the ban — blocking 16 million IP addresses, many belonging to the Amazon and Google clouds — and it’s not even clear that it’s working. But, more importantly, I’m not convinced Telegram is secure in the first place. Such a weird … Read More “Russia is Banning Telegram” »
This acoustic technology identifies individuals by their ear shapes. No information about either false positives or false negatives. Powered by WPeMatico
In Japan: Last year’s haul sank 15% to 53,000 tons, according to the JF Zengyoren national federation of fishing cooperatives. The squid catch has fallen by half in just two years. The previous low was plumbed in 2016. Lighter catches have been blamed on changing sea temperatures, which impedes the spawning and growth of the … Read More “Friday Squid Blogging: Squid Prices Rise as Catch Decreases” »
Police in the UK were able to read a fingerprint from a photo of a hand: Staff from the unit’s specialist imaging team were able to enhance a picture of a hand holding a number of tablets, which was taken from a mobile phone, before fingerprint experts were able to positively identify that the hand … Read More “Lifting a Fingerprint from a Photo” »
Interesting idea: …we present Oblivious DNS (ODNS), which is a new design of the DNS ecosystem that allows current DNS servers to remain unchanged and increases privacy for data in motion and at rest. In the ODNS system, both the client is modified with a local resolver, and there is a new authoritative name server … Read More “Oblivious DNS” »
Turns out it’s easy to hijack emergency sirens with a radio transmitter. Powered by WPeMatico
The Center for Democracy and Technology has a good summary of the current state of the DMCA’s chilling effects on security research. To underline the nature of chilling effects on hacking and security research, CDT has worked to describe how tinkerers, hackers, and security researchers of all types both contribute to a baseline level of … Read More “The DMCA and its Chilling Effects on Research” »