Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

+ - Acoustic cryptanalysis->

Submitted by DaBunny
DaBunny (56964) writes "From the summary:

Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts. We experimentally demonstrate that such attacks can be carried out, using either a plain mobile phone placed next to the computer, or a more sensitive microphone placed 4 meters away."

Link to Original Source

+ - NSA Metadata Program Has Stopped Zero Attacks->

Submitted by Antipater
Antipater (2053064) writes "According to a member of the White House panel that recently called for the NSA's metadata-collection program to be curtailed, that program has not stopped any terrorist actions at all. This runs counter to the stories we've heard for months, which claimed as many as fifty prevented attacks.

"Stone declined to comment on the accuracy of public statements by U.S. intelligence officials about the telephone collection program, but said that when they referred to successes they seemed to be mixing the results of domestic metadata collection with the intelligence derived from the separate, and less controversial, NSA program, known as 702, to intercept communications overseas.""

Link to Original Source

To err is human -- to blame it on a computer is even more so.

Working...