Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Forbidden Research - Snowden's MIT →

August 01, 2016 by Marc Handelman in All is Information, Cryptography, Espionage, Bombast

Anti-espionage bombast? Nothing more than diatribe-like vaporware? You be the judge...

August 01, 2016 /Marc Handelman
All is Information, Cryptography, Espionage, Bombast

Spycraft, 1776

June 16, 2016 by Marc Handelman in All is Information, Cryptography, Information Security, United States of America
June 16, 2016 /Marc Handelman /Source
All is Information, Cryptography, Information Security, United States of America

The Estonian Way, Cryptography and Trust

June 12, 2016 by Marc Handelman in All is Information, Estonia, Cryptography, Information Security
June 12, 2016 /Marc Handelman /Source
All is Information, Estonia, Cryptography, Information Security

Coil Whine

June 06, 2016 by Marc Handelman in All is Information, Cryptography, Information Security, Signals

Newly revealed discovery of coil whine exploitation, targeting the harvesting of cryptographic artifacts (in this case, keys) via wireless connectivity. More here.

June 06, 2016 /Marc Handelman /Source
All is Information, Cryptography, Information Security, Signals

Burners, The Tightening

June 02, 2016 by Marc Handelman in All is Information, Communications, Communications Governance, Cryptography, Demise of Privacy, Information Security, Mobile Networks, Mobile Security, Signals

Well wrought thought piece on the use, and misuse, of prepaid cellular telephony hardware, the so-call Burner, and the effort to enforce regulations thereto. Entitled Burner Phones: Will Tightening Restrictions on Prepaid Cell Phones Solve Anything? Certainly today's Must Read post...

June 02, 2016 /Marc Handelman
All is Information, Communications, Communications Governance, Cryptography, Demise of Privacy, Information Security, Mobile Networks, Mobile Security, Signals

EFF Analyzes Secure Messaging

April 25, 2016 by Marc Handelman in Communications, Communications Governance, Cryptography, EFF, Information Security

The Electronic Frontier Foundation has published an interesting look at secure messaging, as it exists today, including a super-handy scorecard. Yay!

April 25, 2016 /Marc Handelman /Source
Communications, Communications Governance, Cryptography, EFF, Information Security

Seventy Five Years Ago, The Bombe Girls

April 12, 2016 by Marc Handelman in All is Information, Cryptography, World Wide War

Bletchley Park pays homage to the popularly monikered Bombe Girls (Eight Wrens - Women’s Royal Naval Service), who had arrived at Bletchley Park seventy five years go, and focused on operating the Turing-Welchman Bombe Machine.

April 12, 2016 /Marc Handelman
All is Information, Cryptography, World Wide War

Petard Pinch →

January 12, 2016 by Marc Handelman in All is Information, Cryptography, World Wide War, War, United Kingdom, United States of America

Bletchley Park hosts the Petard Pinch in Hut 8 this month (prudently ensconced in beautiful Milton Kynes, UK - specifically at The Mansion, Sherwood Drive, Bletchley, Milton Keynes, MK3 6EB). In case you are unfamiliar with the story of The Petard Pinch, I highly recommend visiting Hut 8 to become rightly acquainted with this WWII Litany of Life, Death and Cryptography on th ehigh seas in His Majesty's service (before HRH Queen Elizabeth ascended the Throne).

January 12, 2016 /Marc Handelman
All is Information, Cryptography, World Wide War, War, United Kingdom, United States of America
Satoshi-Nakamoto-anonymity-is-online.jpg

NODE, The Viral Nakamoto Satoshi →

January 11, 2016 by Marc Handelman in Cryptocurrency, Cryptography

Interesting post at NODE, proffering advice to 中本哲史 Nakamoto Satoshi on the method to attain the penultimate viral outcome. Bitcoin users, rejoice...

January 11, 2016 /Marc Handelman
Cryptocurrency, Cryptography

Recycled Crypto, What Could Possibly Go Wrong? →

December 30, 2015 by Marc Handelman in All is Information, Cryptography

The ingenuity of sloth (not to be conflated with entropy) begins to creep in to the fundamentals. More here...

December 30, 2015 /Marc Handelman
All is Information, Cryptography

Information Theoretic Security and One Time Pad →

December 15, 2015 by Marc Handelman in All is Information, Education, Information Security, Ciphers, Cryptography, Mathematics
December 15, 2015 /Marc Handelman
All is Information, Education, Information Security, Ciphers, Cryptography, Mathematics

Oops, Secure Credit Card Chips Defeated →

November 06, 2015 by Marc Handelman in All is Information, Cryptography, Crime, Information Security

Ars Technica's Megan Geuss reports the apparent defeat of security technologies associated with so-called 'secure chip-and-pin' credit cards. Today's Must Read.

November 06, 2015 /Marc Handelman
All is Information, Cryptography, Crime, Information Security

Symantec Certificate Authority Investigated →

November 05, 2015 by Marc Handelman in All is Information, Cryptography, Certificate Authority, Information Security, WebTrust

Google, Inc. (NasdaqGS:GOOG) has warned Symantec Corporation (NASDAQ:SYMC) of imposed requirements applied to the Symantec Certificate Authority due to apparent malfeasence in managing the company's Certificate Authority infrastructure and specifically Certificates issued without notifying the holders of same.

The implications of the action are range far both in scope (related to the specific certificates under scrutiny ("Symantec performed another audit and, on October 12th, announced that they had found an additional 164 certificates over 76 domains and 2,458 certificates issued for domains that were never registered. - posted by Ryan Sleevi, Software Engineer at Google, Inc.)), and in Google's efforts to enforce the WebTrust in the Digital Certificate realm. This is why I say, Trust - But Verify...

"It’s obviously concerning that a CA would have such a long-running issue and that they would be unable to assess its scope after being alerted to it and conducting an audit. Therefore we are firstly going to require that as of June 1st, 2016, all certificates issued by Symantec itself will be required to support Certificate Transparency. In this case, logging of non-EV certificates would have provided significantly greater insight into the problem and may have allowed the problem to be detected sooner." - Posted by Ryan Sleevi, Software Engineer at Google, Inc.

November 05, 2015 /Marc Handelman
All is Information, Cryptography, Certificate Authority, Information Security, WebTrust

Crypto 1100101 →

October 19, 2015 by Marc Handelman in All is Information, Cryptography, Information Security, Education
October 19, 2015 /Marc Handelman
All is Information, Cryptography, Information Security, Education

No Mandatory Decrypt... For Now →

October 16, 2015 by Marc Handelman in All is Information, Cryptography, Freedom, Le Gouvernement

Interesting source this time, coming from Roger Fingas, writing for Apple Insider, detailing the current Lame-Duck Administrations' decision to avoid forcing corporate entities to decrypt communications for Law Enforcement Agencies.

October 16, 2015 /Marc Handelman
All is Information, Cryptography, Freedom, Le Gouvernement

Stanford, Future of Bitcoin & Cyber Security →

October 14, 2015 by Marc Handelman in All is Information, Cryptography, Cryptocurrency, Information Security
October 14, 2015 /Marc Handelman
All is Information, Cryptography, Cryptocurrency, Information Security

Codebreaker Granddaughter →

October 13, 2015 by Marc Handelman in All is Information, Canada, World Wide War, United Kingdom, United States of America, Cryptography

Litany of the quiet heroism of William Gordon Welchman at Bletchley Park, his modern day connections (in this case his granddaughter's well-placed esteem). Today's Must Read.

October 13, 2015 /Marc Handelman
All is Information, Canada, World Wide War, United Kingdom, United States of America, Cryptography

Device Enrcyption, A Guide →

September 01, 2015 by Marc Handelman in All is Information, Cryptography, Encryption, Information Security

In a well-engineered screed, targeting both laptop and phone encryption modalities, Andrew Cunningham writing at Ars Technica's gadget section provides us with a tell-all discussion of how, in fact, to protect thyself from the evil that lurketh without. Today's Must Read.

September 01, 2015 /Marc Handelman
All is Information, Cryptography, Encryption, Information Security

Diffie, The Long View

August 07, 2015 by Marc Handelman in All is Information, Cryptography, Information Security, Security Opinion
August 07, 2015 /Marc Handelman
All is Information, Cryptography, Information Security, Security Opinion

Schneier, Conflict between Privacy and Security →

August 03, 2015 by Marc Handelman in All is Information, Ciphers, Cryptography, Education, Information Security, State of Israel
August 03, 2015 /Marc Handelman
All is Information, Ciphers, Cryptography, Education, Information Security, State of Israel
  • Newer
  • Older