Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Schneier: Canada Spies on Internet Downloads->

From feed by bsfeed
Another story from the Snowden documents: According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada's equivalent of the NSA. (The Canadian agency was formerly known as "CSEC" until a recent name change.) [...] CSE finds...
Link to Original Source

Schneier: Subconscious Keys->

From feed by bsfeed
I missed this paper when it was first published in 2012: "Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks" Abstract: Cryptographic systems often rely on the secrecy of cryptographic keys given to users. Many schemes, however, cannot resist coercion attacks where the user is forcibly asked by an attacker to reveal the key. These attacks, known as...
Link to Original Source

Schneier: The IDEA Encryption Algorithm with a 128-bit Block Length->

From feed by bsfeed
Here's an IDEA-variant with a 128-bit block length. While I think it's a great idea to bring IDEA up to a modern block length, the paper has none of the cryptanalysis behind it that IDEA had. If nothing else, I would have expected more than eight rounds. If anyone wants to practice differential and linear cryptanalysis, here's a new target...
Link to Original Source

Schneier: Basaaly Moalin: The One "Terrorist" Caught by Section 215 Surveillance->

From feed by bsfeed
Remember back in 2013 when the then-director of the NSA Keith Alexander claimed that Section 215 bulk telephone metadata surveillance stopped "fifty-four different terrorist-related activities"? Remember when that number was backtracked several times, until all that was left was a single Somali taxi driver who was convicted of sending some money back home? This is the story of Basaaly Moalin....
Link to Original Source

Schneier: When Thinking Machines Break the Law->

From feed by bsfeed
Last year, two Swiss artists programmed a Random Botnot Shopper, which every week would spend $100 in bitcoin to buy a random item from an anonymous Internet black market...all for an art project on display in Switzerland. It was a clever concept, except there was a problem. Most of the stuff the bot purchased was benignfake Diesel jeans, a baseball...
Link to Original Source

Schneier: Defending Against Liar Buyer Fraud->

From feed by bsfeed
It's a common fraud on sites like eBay: buyers falsely claim that they never received a purchased item in the mail. Here's a paper on defending against this fraud through basic psychological security measures. It's preliminary research, but probably worth experimental research. We have tested a collection of possible user-interface enhancements aimed at reducing liar buyer fraud. We have found...
Link to Original Source

Schneier: Accountability as a Security System->

From feed by bsfeed
At a CATO surveillance event last month, Ben Wittes talked about inherent presidential powers of surveillance with this hypothetical: "What should Congress have to say about the rules when Barack Obama wants to know what Vladimir Putin is talking about?" His answer was basically that Congress should have no say: "I think most people, going back to my Vladimir Putin...
Link to Original Source

Schneier: US Law Enforcement Also Conducting Mass Telephone Surveillance->

From feed by bsfeed
Late last year, in a criminal case involving export violations, the US government disclosed a mysterious database of telephone call records that it had queried in the case. The defendant argued that the database was the NSA's, and that the query was unconditional and the evidence should be suppressed. The government said that the database was not the NSA's. As...
Link to Original Source

Schneier: New NSA Documents on Offensive Cyberoperations->

From feed by bsfeed
Appelbaum, Poitras, and others have another NSA article with an enormous Snowden document dump on Der Spiegel, giving details on a variety of offensive NSA cyberoperations to infiltrate and exploit networks around the world. There's a lot here: 199 pages. (Here they are in one compressed archive.) Paired with the 666 pages released in conjunction with the December 28 Spiegel...
Link to Original Source

God help those who do not help themselves. -- Wilson Mizner

Working...