Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

via the respected security expertise of Robert M. Lee and the superlative illustration talents of Jeff Haas at Little Bobby Comic

Robert M. Lee's & Jeff Haas' Little Bobby Comic - 'WEEK 388’ →

July 05, 2022 by Marc Handelman in Robert M. Lee, Jeff Haas, Security Humor, Security Satire, Security Commentary, Satire, Sarcasm, Encryption, Homeomorphic Encryption
July 05, 2022 /Marc Handelman
Robert M. Lee, Jeff Haas, Security Humor, Security Satire, Security Commentary, Satire, Sarcasm, Encryption, Homeomorphic Encryption

Black Hat USA 2019, Marie-Sarah Lacharite's 'Breaking Encrypted Databases: Generic Attacks On Range Queries' →

October 01, 2019 by Marc Handelman in Black Hat USA 2019, Conferences, Education, Information Security, Encryption, Database Security

Thanks to Black Hat for publishing the Black Hat 2019

tremendous conference videos on their YouTube Channel

October 01, 2019 /Marc Handelman
Black Hat USA 2019, Conferences, Education, Information Security, Encryption, Database Security

KNOB(d)

August 20, 2019 by Marc Handelman in Bad News Bluetooth, Network Security, Encryption, Information Security

via the inimitable Dan Goodin, Security Editor at Ars Technica, comes this troubling blog post detailing the deep flaws in Bluetooth radio communications. Monikered KNOB (Key Negotiation of Bluetooth), the flaw permits interception of data in transit due to forced utilization of weak encryption. Today's MustRead!

"KNOB doesn't require an attacker to have any previously shared secret material or to observe the pairing process of the targeted devices. The exploit is invisible to Bluetooth apps and the operating systems they run on, making the attack almost impossible to detect without highly specialized equipment." - via Dan Goodin, Security Editor at Ars Technica

August 20, 2019 /Marc Handelman
Bad News Bluetooth, Network Security, Encryption, Information Security

eSNI Image Courtesy of Cloudflare

The Fix Is In: Clodflare's eSNI

October 02, 2018 by Marc Handelman in SNI, eSNI, Encryption, Internetwork Security

Another fix is in the works for one of the more hidden aggravations of internetworking security, the so-called Server Name Indication (SNI) extension debacle. The fix - an Encrypted Server Name Indication has been crafted by Clouflare and evidenced by the service itself - eSNI - is an indication of a Company-Doing-The-Right-Thing and enrypting-all-the-things. Additional work is currently underway targeting a IETF Draft RFC. Simply Outstanding Work, Cloudflare.

October 02, 2018 /Marc Handelman
SNI, eSNI, Encryption, Internetwork Security

Larry Seltzer's 'Data encryption: How To Avoid Common Workarounds'

July 12, 2018 by Marc Handelman in Data Security, Encryption

via the inimitable Larry Seltzer, comes this superlative post over at HPE; in which, Mr. Seltzer details data encryption workarounds, and a method to avoid same. Definately, today's Must Read.

July 12, 2018 /Marc Handelman
Data Security, Encryption

EnclaveDB, The Proposition

July 10, 2018 by Marc Handelman in Database Security, DBMS Security, Information Security, Encryption, Enclaves, IACR

via Christian Priebe of Imperial College London, Manuel Costa and Kapil Vaswani both from Microsoft Research, comes a tour dé force of database security, ostensibly monikered EnclaveDB (published this past May 2018, in the Proceedings of the 39th IEEE Symposium on Security & Privacy, in co-operation with the International Association for Cryptologic Research). The interesting functionality descibed in the trio's paper - pursuant to a secure database (if there possibly could be such a thing) is not the security of data in-motion or at-rest, but the addition of encrypted in-memory data. More here...

July 10, 2018 /Marc Handelman
Database Security, DBMS Security, Information Security, Encryption, Enclaves, IACR

Telegram Updated, Amidst Kremlin Capers, Apple Angst →

June 04, 2018 by Marc Handelman in Encryption, Communications, Communication Security, Must Read

News from over the weekend - via 9to5Mac writer Michael Potuck, focusing on Telegram; of which, the encrypted messaging iOS app has been permitted to publish the latest update to their bits - via Apple Inc. (Nasdaq: AAPL) iTunes App Store. This, despite the declaration of illegality by Kremlin Apparatchiki. Today's Must Read.

June 04, 2018 /Marc Handelman
Encryption, Communications, Communication Security, Must Read

Image via Fraunhofer AISEC

Hardware Envelope, A Secure Conveyance →

May 18, 2018 by Marc Handelman in Hardware Security, Information Technology, Information Security, Information Sciences, Encryption

via Samuel H. Moore, writing at the IEEE's Spectrum Magazine, comes word of the 'Unhackable Envelope'. The Fraunhofer team (developers of the Unhackable Envelope) comprised of Vincent Immler - Fraunhofer Institute for Applied and Integrated Security (AISEC), Martin König - Fraunhofer Research Institution for Microsystems and Solid State Technologies (EMFT), Johannes Obermaier - Fraunhofer Institute for Applied and Integrated Security (AISEC), Matthias Hiller - Fraunhofer Institute for Applied and Integrated Security (AISEC) and Georg Sigl - Fraunhofer Institute for Applied and Integrated Security (AISEC) & Technical University of Munich (TUM) appeared at the IEEE International Symposium on Hardware Oriented Security and Trust in Washington, D.C. last week. Additionally, the group's paper 'B-TREPID: Batteryless Tamper-Resistant Envelope with a PUF and Integrity Detection' won the 2018 Best Paper Award at the confrenece (Kudo's are certainly in order!).

May 18, 2018 /Marc Handelman
Hardware Security, Information Technology, Information Security, Information Sciences, Encryption

Ray Ozzie Points His Magic Wand At Mobile Encryption →

April 30, 2018 by Marc Handelman in Encryption, Mobile Telephony, Mobile Security, Poor Architecture

Ray Ozzie's (the former CTO of Microsoft Corporation (Masdaq: MSFT) that created Lotus Notes...) patented encryption plan is clearly not indicative of a tenable solution to the encryption problems governement agencies, and vendors like (Nasdaq: AAPL) are grapplig with like two behemoth Olympic wrestlers on a greased floor. In answer to this rigamarole comes in the form of a particularly interesting post hand-crafted by the inimitable Dan Goodin, at ArsTechnica, in which, the Good Mr.Goodin tells all. Today's MustRead. 20180506 Update: Read El Reg's Thomas Claburn's take on the Ray Ozzie crypto-solution, such as it is...

April 30, 2018 /Marc Handelman
Encryption, Mobile Telephony, Mobile Security, Poor Architecture

New S3 Encryption Feature, Is Amazon's Encryption Move Enough? →

November 08, 2017 by Marc Handelman in Cloud Security, Cloud Data Storage, Cybersecurity, Encryption, Data-At-Rest, Data-In-Motion

You be the judge... Essentially, all are targeted at data-and-objects-at-rest, rather than in-motion (except, perhaps the new cross-region replication feature with KMS).

Regardless, all of the annouced new features are welcome (in my currently rather jaded opinion). Now, if we can just overcome human error (not to mention blatant developer and data-owner lack-of-attention-to-detail, read about that here)...

  • Default Encryption – You can now mandate that all objects in a bucket must be stored in encrypted form without having to construct a bucket policy that rejects objects that are not encrypted.
  • Permission Checks – The S3 Console now displays a prominent indicator next to each S3 bucket that is publicly accessible.
  • Cross-Region Replication ACL Overwrite – When you replicate objects across AWS accounts, you can now specify that the object gets a new ACL that gives full access to the destination account.
  • Cross-Region Replication with KMS – You can now replicate objects that are encrypted with keys that are managed by AWS Key Management Service (KMS).
  • Detailed Inventory Report – The S3 Inventory report now includes the encryption status of each object. The report itself can also be encrypted. - via Jeff Barr, writing at the AWS Blog

And, thanks for the H/T go out to Trey Blalock over at rapidly growing Firewall Consultants!

November 08, 2017 /Marc Handelman
Cloud Security, Cloud Data Storage, Cybersecurity, Encryption, Data-At-Rest, Data-In-Motion

Basic Encryption, In Small(ish) Words →

March 01, 2017 by Marc Handelman in All is Information, Encryption, Confidentiality, Integrity, Information Security

Ed Felten, Ph.D., has written a superb encryption primer - specifically targeting the politicians and policy wonks amongst us - in it's utility of small words. We really like those small words... H/T

March 01, 2017 /Marc Handelman
All is Information, Encryption, Confidentiality, Integrity, Information Security

AWS re:Invent 2016 - Encryption, It Was the Best of Controls, It Was the Worst of Controls →

December 15, 2016 by Marc Handelman in All is Information, Conferences, Education, Encryption, Information Security, Cloud Security
December 15, 2016 /Marc Handelman
All is Information, Conferences, Education, Encryption, Information Security, Cloud Security

Android, The Weakening →

July 05, 2016 by Marc Handelman in All is Information, Blatant Stupidity, Encryption, Information Security

Storage of encryption keys on mobile devices is should be verboten...

July 05, 2016 /Marc Handelman
All is Information, Blatant Stupidity, Encryption, Information Security

Mastermind, The Paul Le Roux Saga

March 31, 2016 by Marc Handelman in All is Information, Crime, Encryption

via Firewall Consultants' Trey Blalock, comes this superb telling of the Paul Le Roux story, written by Evan Ratliff, and published by The Atavist Magazine. Mr. Le Roux also happens to be the man behind TrueCrypt... Hat Tip to Mr. Blalock for this tale of intrigue.

Editors: Katia Bachko, Joel Lovell, Additional reporting: Natalie Lampert, Designer: Thomas Rhiel, Fact checkers: Queen Arsem-O’Malley, Riley Blanton, Research: Aurora Almendral, Daniel Estrin, Copy editor: Sean Cooper, Trailer: Paul Kamuf - credits via The Atavist Magazine

March 31, 2016 /Marc Handelman /Source
All is Information, Crime, Encryption

USENIX Announces ENIGMA 2017 →

March 16, 2016 by Marc Handelman in All is Information, Conferences, Encryption, Information Security

USENIX’s Enigma Conference is slated for January 30th through February 1st, 2017 at the Oakland, CA Marriott City Center. David Brumley and Parisa Tabriz also reprise their roles as Program Co-Chairs. Most certainly a Must Attend Conference in 2017.

March 16, 2016 /Marc Handelman
All is Information, Conferences, Encryption, Information Security

DANE, Huque's Take →

December 15, 2015 by Marc Handelman in All is Information, Encryption, Internetwork Security, Information Security, DNS

Verisign Principal Research Scientist Shumon Huque, discusses the merits and functionality of DANE (DNS-based Authentication of Named Entities) on CircleID. If you read anything today about DNS, make sure you take a modicum of your precious moments to examine Shumon's outstanding post at CircleID.

December 15, 2015 /Marc Handelman
All is Information, Encryption, Internetwork Security, Information Security, DNS

Prevent HSTS Tracking →

October 20, 2015 by Marc Handelman in All is Information, Encryption, Information Security

The eponymous Martin Brinkmann, writing at his gHacks site, details the method used to disable the HTTP Strict Transport Security tracking 'feature' in browsers (specifically, in this case, within Mozilla's Firefox browser. Outstanding.

October 20, 2015 /Marc Handelman
All is Information, Encryption, Information Security

Google Disables SSL and RC4, Better Late Than Never →

October 05, 2015 by Marc Handelman in All is Information, Encryption, Information Security, Transport Layer Security

Adam Langley posts good news... Google Inc. (NasdaqGS: GOOG) has finally made the move, and is in the process of disabling SSL v3 (obsoleted 16 years ago) and RC4.

SSLv3 has been obsolete for over 16 years and is so full of known problems that the IETF has decided that it must no longer be used. RC4 is a 28 year old cipher that has done remarkably well, but is now the subject of multiple attacks at security conferences. The IETF has decided that RC4 also warrants a statement that it too must no longer be used. - via Adam Langley writing at the Google Online Security blog.

October 05, 2015 /Marc Handelman
All is Information, Encryption, Information Security, Transport Layer Security

Encrypt Everything

October 02, 2015 by Marc Handelman in Encryption, Information Security
October 02, 2015 /Marc Handelman
Encryption, Information Security

Encryption, The Trick →

September 22, 2015 by Marc Handelman in All is Information, Encryption, Information Security, Quantum Effects, Quantum Mathematics

Quite likely one of the best articles on the problematic world of quantum encryption, written by Natalie Wolchover (published in Quanta Magazine) managed to bubble up through the jetsam of our collective interwebs yesterday. Today's Must Read.

September 22, 2015 /Marc Handelman
All is Information, Encryption, Information Security, Quantum Effects, Quantum Mathematics
  • Newer
  • Older