Free Republic 3rd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $31,543
35%  
Woo hoo!! And the first 35% is in!! Thank you all very much!!

Keyword: encryption

Brevity: Headers | « Text »
  • Why We Encrypt

    07/15/2015 9:34:06 AM PDT · by zeugma · 22 replies
    Crypto-Gram ^ | July 15, 2015 | Bruce Schneier
    Why We Encrypt Encryption protects our data. It protects our data when it's sitting on our computers and in data centers, and it protects it when it's being transmitted around the Internet. It protects our conversations, whether video, voice, or text. It protects our privacy. It protects our anonymity. And sometimes, it protects our lives. This protection is important for everyone. It's easy to see how encryption protects journalists, human rights defenders, and political activists in authoritarian countries. But encryption protects the rest of us as well. It protects our data from criminals. It protects it from competitors, neighbors,...
  • No One Is Safe: $300 Gadget Steals Encryption Keys out of the Air, and It’s Nearly Unstoppable

    07/08/2015 6:56:44 PM PDT · by 2ndDivisionVet · 27 replies
    BGR ^ | July 8, 2015 | Zach Epstein
    Just when you thought you were safe, a new hacking toy comes along and rocks your world. Imagine a tool exists that lets hackers pluck encryption keys from your laptop right out of the air. You can’t stop it by connecting to protected Wi-Fi networks or even disabling Wi-Fi completely. Turning off Bluetooth also won’t help you protect yourself. Why? Because the tiny device that can easily be hidden in an object or taped to the underside of a table doesn’t use conventional communications to pull off capers. Instead it reads radio waves emitted by your computer’s processor, and there’s...
  • FBI Director Blasts Tech Companies Fighting for Encryption

    05/20/2015 4:11:56 PM PDT · by markomalley · 29 replies
    Nextgov ^ | 5/20/15
    FBI Director James Comey fired back on Wednesday at Silicon Valley companies that are calling for stronger encryption of their products. "Some prominent folks wrote a letter to the president yesterday that I frankly found depressing," Comey said in a discussion at Georgetown University Law Center, referring to a letter signed by Apple, Google, Facebook, Microsoft, and other companies, as well as civil-liberties groups and Internet-security experts. "Their letter contains no acknowledgment that there are societal costs to universal encryption." There can be benefits to securing devices from hackers, Comey acknowledged, but he argued there are also "tremendous costs" to...
  • Not Every Leak Is Fit to Print

    02/10/2008 5:07:57 AM PST · by ThePythonicCow · 1 replies · 139+ views
    The Weekly Standard ^ | 18 Feb 2008 | Gabriel Schoenfeld
    Not Every Leak Is Fit to Print Why have federal prosecutors subpoenaed a New York Times reporter?by Gabriel Schoenfeld 02/18/2008, Volume 013, Issue 22 Investigations of national-security leaks in Washington are not all that rare. But until Judith Miller of the New York Times was sent to jail for 85 days by a special prosecutor digging into the Valerie Plame imbroglio, investigations of such leaks in which journalists are subpoenaed were about as common as unicorns wandering the National Mall. We now have another such unicorn. On January 24, a federal grand jury in Alexandria issued a subpoena to...
  • Hillary Clinton hides emails from period when account was reportedly unencrypted

    03/12/2015 7:09:35 AM PDT · by SeekAndFind · 20 replies
    Hotair ^ | 03/12/2015 | Noah Rothman
    Since the revelations involving former Secretary of State Hillary Clinton’s private email server exploded last week, questions have swirled regarding her account’s level of information security. “I did not email any classified material to anyone on my email,” Clinton averred at a brief press conference on Tuesday. Some are… skeptical about the assertion that the nation’s top diplomat never received any classified material via her email account at an agency that is often criticized for over-classifying information.“I would assume that more than 50 percent of what the secretary of state dealt with was classified,” said an unnamed former official...
  • Rush Limbaugh just said Apple will not hand over decryption keys to Obama / NSA / Federal goons...

    03/10/2015 9:54:40 AM PDT · by dennisw · 50 replies
    3 10 15 | limbaugh
    Just heard this....i am the classic Apple hater but I am greatly impressed by Apple non-compliance on decryption keys... Though this may be just to ensure sales outside America...Outside the Obama/NSA zone/ FedGuv
  • Tech Whiplash: Obama Endorses, Then Undermines, Encryption

    02/18/2015 3:26:09 PM PST · by Dalek · 10 replies
    Slate ^ | 2/18/15 | Dan Gillmor
    President Obama talked a surprising amount of common sense on his trip last week to Silicon Valley, where he spoke at a "cybersecurity" gathering at Stanford University. But he undermined some noteworthy remarks about strong encryption--we need it, he said--with the kind of fear-monger hedging that has become almost every politician's refuge from telling the hard truth.... The first was Obama's clear statement that he, personally, favors ubiquitous strong encryption. He thinks everyone should use it but hedges that by saying law enforcement needs a way to break into communications and data.... [W]e need leaders who'll tell the truth--that we...
  • New Personal Encryption Thwarts NSA Snoops

    10/02/2014 9:12:33 PM PDT · by Abakumov · 15 replies
    Radix News ^ | October 3, 2014 | Scott Rasmussen
    It’s been a year and a half since Edward Snowden revealed to the world just how much private information the National Security Agency has been collecting on just about everyone. The massive spying operation raised privacy and Constitutional concerns and set off alarms with reports that some employees had used the system to keep tabs on their love interests. Sadly, but not surprisingly, the government has done little to reform the program and reassure the public. Even relatively weak legislation that fails to address core concerns has stalled in Congress. Action has come, however, from Silicon Valley. The new Apple...
  • U.S. Law Enforcement Seeks to Halt Apple-Google Encryption of Mobile Data

    09/30/2014 1:13:24 PM PDT · by Crazieman · 13 replies
    Bloomberg, link only
  • FBI Blasts Apple, Google Phone Encryption: It "Allows People To Be Beyond The Law""

    09/27/2014 8:35:23 PM PDT · by Enlightened1 · 37 replies
    Zero Hedge ^ | 09/27/14 | Tyler Durden
    The kings men also viewed their power as necessary as Comey does today. They could simply enter someone’s home and search all your papers. If you wrote anything derogatory against the king, off you went to prison. This is what inspired the American Revolution and the Fourth Amendment that there had to be a reason to search not just arbitrary desire to want to know and lets see what we can find as the NSA and FBI do today. This is the very essence of LIBERTY. You cannot pretend to be the leader of the free world with people like...
  • Apple will no longer unlock most iPhones, iPads for police, even with search warrants

    09/18/2014 5:59:16 AM PDT · by servo1969 · 35 replies
    washingtonpost.com ^ | 9-18-2014 | Craig Timberg
    Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information. The move, announced with the publication of a new privacy policy tied to the release of Apple’s latest mobile operating system, iOS 8, amounts to an engineering solution to a legal quandary: Rather than comply with binding court orders, Apple has reworked...
  • Mysterious announcement from Truecrypt declares the project insecure and dead

    05/29/2014 8:06:55 PM PDT · by aMorePerfectUnion · 53 replies
    boing boing ^ | 5-29-14 | Cory Doctorow
    The abrupt announcement that the widely used, anonymously authored disk-encryption tool Truecrypt is insecure and will no longer be maintained shocked the crypto world--after all, this was the tool Edward Snowden himself lectured on at a Cryptoparty in Hawai'i. Cory Doctorow tries to make sense of it all.
  • Open Source Crypto TrueCrypt Disappears With Suspicious Cloud Of Mystery

    05/29/2014 8:05:00 PM PDT · by TChad · 27 replies
    Forbes ^ | 5/29/2014 | James Lyne
    Over the past 24 hours the website for TrueCrypt (a very widely used encryption solution) was updated with a rather unusually styled message stating that TrueCrypt is “considered harmful” and should not be used.
  • Rand Paul Versus Barack Obama

    02/15/2014 3:01:29 AM PST · by Kaslin · 15 replies
    Townhall.com ^ | February 15, 2014 | John Ransom
    I’m a national security hawk. But, I’m also a free-market, anti-crony capitalist. I’m a Catholic, I’m a dad and I’m a businessman. And an American. For all these reasons, I stand with Rand in his lawsuit against Barack Obama and his co-defendants: the Director of National Intelligence James Clapper, NSA Director Gen. Keith Alexander and FBI Director James Comey. “Paul’s suit, filed in conjunction with conservative group FreedomWorks,” says the New York Daily News, “alleges that the NSA’s bulk collection program, under which the agency has collected the telephone metadata of many Americans, violates the Fourth Amendment of the Constitution,...
  • Daunting Mathematical Puzzle Solved, Enables Unlimited Analysis of Encrypted Data

    12/28/2013 10:40:30 AM PST · by null and void · 40 replies
    Scientific Computing ^ | Tue, 12/24/2013 - 10:20am | IBM
    ARMONK, NY — IBM inventors have received a patent for a breakthrough data encryption technique that is expected to further data privacy and strengthen cloud computing security. The patented breakthrough, called "fully homomorphic encryption," could enable deep and unrestricted analysis of encrypted information — intentionally scrambled data — without surrendering confidentiality. IBM's solution has the potential to advance cloud computing privacy and security by enabling vendors to perform computations on client data, such as analyzing sales patterns, without exposing or revealing the original data. IBM's homomorphic encryption technique solves a daunting mathematical puzzle that confounded scientists since the invention of...
  • NSA Paid a Huge Security Firm $10 Million to Keep Encryption Weak

    12/20/2013 4:16:47 PM PST · by James C. Bennett · 99 replies
    Gizmodo ^ | 20 dec 2013 | Gizmodo
    Reuters reports that the NSA paid massive computer security firm RSA $10 million to promote a flawed encryption system so that the surveillance organization could wiggle its way around security. In other words, the NSA bribed the firm to leave the back door to computers all over the world open. Thanks to documents leaked by Edward Snowden, we already knew the NSA played a central role in promoting a flawed formula for generating random numbers, which if used in encryption, essentially gives the spies easy access to computing systems. A piece of RSA software, bSafe, became the most significant vector...
  • Wickr: Free texting app has military-grade encryption, messages self-destruct.

    12/17/2013 1:21:43 PM PST · by Yehuda · 42 replies
    Network News ^ | 09/17/13 | Ms. Smith
    If you value privacy & security, then try the free, self-destructing encrypted messaging app Wickr so you can 'leave no trace.'If you have an Android or an iPhone, & if you value privacy & security, then please do yourself a tremendous favor today by installing Wickr, a self-destructing messaging app that uses military-grade encryption for texts, pictures, audio, video & PDFs & also exceeds NSA's compliancy standards for Top Secret communications. Equally terrific, the experts behind Wickr say it's your data; you own it. Wickr is setup so it is technically impossible for its creators to access your messages. Like...
  • FSF responds to Microsoft's privacy and encryption announcement

    12/08/2013 2:21:00 PM PST · by Utilizer · 6 replies
    Free Software Foundation ^ | Published on Dec 05, 2013 03:30 PM | by John Sullivan
    Microsoft announced a new effort to "[protect] customer data from government snooping." FSF executive director John Sullivan issued the following statement on Thursday, December 5th: "Microsoft has made renewed security promises before. In the end, these promises are meaningless. Proprietary software like Windows is fundamentally insecure not because of Microsoft's privacy policies but because its code is hidden from the very users whose interests it is supposed to secure. A lock on your own house to which you do not have the master key is not a security system, it is a jail. Even on proprietary operating systems like Windows,...
  • Crypto-Gram Newsletter for November 15, 2013

    11/17/2013 8:29:36 AM PST · by Bobalu · 5 replies
    Crypto-Gram ^ | November 15, 2013 | Bruce Schneier
    Code Names for NSA Exploit Tools This is from a Snowden document released by "Le Monde": General Term Descriptions: HIGHLANDS: Collection from Implants VAGRANT: Collection of Computer Screens MAGNETIC: Sensor Collection of Magnetic Emanations MINERALIZE: Collection from LAN Implant OCEAN: Optical Collection System for Raster-Based Computer Screens LIFESAFER: Imaging of the Hard Drive GENIE: Multi-stage operation: jumping the airgap etc. BLACKHEART: Collection from an FBI Implant DROPMIRE: Passive collection of emanations using antenna CUSTOMS: Customs opportunities (not LIFESAVER) DROPMIRE: Laser printer collection, purely proximal access (***NOT*** implanted) DEWSWEEPER: USB (Universal Serial Bus) hardware host tap that provides COVERT link over...
  • Should Truecrypt be audited?

    10/18/2013 9:25:12 AM PDT · by ShadowAce · 18 replies
    LinuxBSDos.com ^ | 15 October 2013 | Unknown
    Truecrypt is a cross-platform, free disk encryption software for Windows and Unix-like operating systems. It is generally considered a good disk encryption software, and not too long ago, I wrote a tutorial that showed how to encrypt the Windows installation of a Windows-Linux dual-boot setup (see Dual-boot Fedora 18 and Windows 7, with full disk encryption configured on both OSs). Truecrypt is said to be published under an open source license, but in some quarters, its license has not been accepted as a valid open source license. And some of those people believe it has a backdoor. Guess who is...
  • How to remain secure against NSA surveillance

    09/06/2013 4:15:48 AM PDT · by shego · 41 replies
    The Guardian ^ | 9/5/13 | Bruce Schneier
    Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves.... At this point, I feel I can provide some advice for keeping secure against such an adversary.... 1) Hide in the network. Implement hidden services. Use Tor to anonymize yourself. Yes, the NSA targets Tor users, but it's work for them.... 2) Encrypt your communications. Use TLS. Use IPsec. Again, while it's true that the NSA targets encrypted connections--and it may have explicit exploits...
  • Germans switch to national email providers after US scandal

    08/29/2013 3:12:41 AM PDT · by Olog-hai · 22 replies
    EU Observer ^ | 29.08.13 @ 10:43 | Valentina Pop
    German people are flocking to national email providers and demanding encryption services normally reserved for corporate security in the wake of the US spying scandal, German justice minister Sabine Leutheusser-Schnarrenberger told journalists in Berlin on Wednesday (28 August). “German users have reacted to the NSA [the US’ National Security Agency] scandal by switching to German email providers … and they are demanding encryption of their emails so far reserved to telecom companies. There is a great opportunity for private encryption,” the minister said. She claimed that “some 80 percent have done so” already. …
  • 'Cryptopalypse' Now: Looming Security Crisis Could Cripple Internet

    08/21/2013 8:50:45 PM PDT · by Errant · 89 replies
    LiveScience.com ^ | 21 August, 2013 | Paul Wagenseil
    The Internet, and many forms of online commerce and communication that depend on it, may be on the brink of a "cryptopalypse" resulting from the collapse of decades-old methods of shared encryption. The result would be "almost total failure of trust in the Internet," said four researchers who gave a presentation at the Black Hat security conference in Las Vegas earlier this month. "We need to move to stronger cryptosystems that leverage more-difficult mathematical problems," the presenters said.
  • Meet The Dread Pirate Roberts

    08/15/2013 3:37:21 AM PDT · by Bobalu · 16 replies
    Forbes ^ | 8/14/2013 | Andy Greenberg
    An entrepreneur as professionally careful as the Dread Pirate Roberts doesn’t trust instant messaging services. Forget phones or Skype. At one point during our eight-month preinterview courtship, I offer to meet him at an undisclosed location outside the United States. “Meeting in person is out of the question,” he says. “I don’t meet in person even with my closest advisors.” When I ask for his name and nationality, he’s so spooked that he refuses to answer any other questions and we lose contact for a month. All my communications with Roberts are routed exclusively through the messaging system and forums...
  • Al Qaeda Conference Call Intercepted by U.S. Officials Sparked Alerts

    08/07/2013 5:54:15 AM PDT · by don-o · 66 replies
    The Daily Beast ^ | August 7, 2013 | Eli Lake and Josh Rogin
    t wasn’t just any terrorist message that triggered U.S. terror alerts and embassy closures—but a conference call of more than 20 far-flung al Qaeda operatives, Eli Lake and Josh Rogin report. The crucial intercept that prompted the U.S. government to close embassies in 22 countries was a conference call between al Qaeda’s senior leaders and representatives of several of the group’s affiliates throughout the region. snip Several news outlets reported Monday on an intercepted communication last week between Zawahiri and Nasser al-Wuhayshi, the leader of al Qaeda’s affiliate based in Yemen. But The Daily Beast has learned that the discussion...
  • How the NSA's XKeyscore program works

    08/01/2013 8:17:06 AM PDT · by SoFloFreeper · 73 replies
    NBC ^ | 7/31/13 | Yannick LeJacq
    Until Wednesday morning, you'd probably never heard of something called "XKeyscore," a program that the National Security Agency itself describes as its "widest reaching" means of gathering data from across the Internet. According to reports shared by NSA leaker Edward Snowden with the Guardian, is that in addition to all of the other recent revelations about the NSA's surveillance programs, by using XKeyscore, "analysts can also search by name, telephone number, IP address, keywords, the language in which the Internet activity was conducted or the type of browser used." David Brown, who co-authored the recent book "Deep State: Inside the...
  • Microsoft helped defeat encryption for NSA on Outlook, SkyDrive, Skype

    07/12/2013 7:19:39 AM PDT · by SeekAndFind · 41 replies
    Hotair ^ | 07/12/2013 | Ed Morrissey
    <p>I’d call this another reason to go Mac, except that Apple also cooperated with NSA in accessing customer activities. Second look at Linux?</p> <p>Microsoft has collaborated closely with US intelligence services to allow users’ communications to be intercepted, including helping the National Security Agency to circumvent the company’s own encryption, according to top-secret documents obtained by the Guardian.</p>
  • Introducing the NSA-Proof Font

    06/23/2013 11:20:11 PM PDT · by 2ndDivisionVet · 22 replies
    Motherboard beta blog ^ | June 23, 2013 | Brian Merchant
    At a moment when governments and corporations alike are hellbent on snooping through your personal digital messages, it'd sure be nice if there was a font their dragnets couldn't decipher. So Sang Mun tried to build one. Sang, a recent graduate from the Rhode Island Schoold of Design (RISD), has unveiled ZXX—a "a disruptive typeface" that he says is much more difficult for data collectors like the NSA to decrypt. He's made it free to download on his website. "The project started with a genuine question: How can we conceal our fundamental thoughts from artificial intelligences and those who deploy...
  • The Threat of Silence (New innovation in online privacy)

    02/12/2013 9:54:51 PM PST · by Windflier · 25 replies
    Slate.com ^ | Feb. 4, 2013 | Ryan Gallagher
    Meet the groundbreaking new encryption app set to revolutionize privacy and freak out the feds. For the past few months, some of the world’s leading cryptographers have been keeping a closely guarded secret about a pioneering new invention. Today, they’ve decided it’s time to tell all. Back in October, the startup tech firm Silent Circle ruffled governments’ feathers with a “surveillance-proof” smartphone app to allow people to make secure phone calls and send texts easily. Now, the company is pushing things even further—with a groundbreaking encrypted data transfer app that will enable people to send files securely from a smartphone...
  • Tools released at Defcon can crack widely used PPTP encryption in under a day

    07/29/2012 12:52:30 PM PDT · by LibWhacker · 16 replies
    CSO ^ | July 29, 2012 | Lucian Constantin
    New tool and service can decrypt any PPTP and WPA2 wireless sessions using MS-CHAPv2 authenticationSecurity researchers released two tools at the Defcon security conference that can be used to crack the encryption of any PPTP (Point-to-Point Tunneling Protocol) and WPA2-Enterprise (Wireless Protected Access) sessions that use MS-CHAPv2 for authentication. MS-CHAPv2 is an authentication protocol created by Microsoft and introduced in Windows NT 4.0 SP4. Despite its age, it is still used as the primary authentication mechanism by most PPTP virtual private network (VPN) clients. MS-CHAPv2 has been known to be vulnerable to dictionary-based brute force attacks since 1999, when a...
  • 'Tinba' Bank Trojan Burrows into Browsers to Steal Logins

    06/04/2012 8:25:11 AM PDT · by Perseverando · 17 replies
    PC World ^ | June 3, 2012 | John E. Dunn
    Researchers have spotted a new banking Trojan subbed 'Tinba' that appears to have hit on a simple tactic for evading security - be as small as possible. An astonishing 20KB in size, Tinba ('Tiny Banker') retains enough sophistication to match almost anything that can be done by much larger malware types. Its main purpose is to burrow into browsers in order to steal logins, but it can also use 'obfuscated' (i.e disguised) web injection and man-in-the-browser to attempt to finesse two-factor web authentication systems. A particularly interesting feature is the way it tries to evade resident security, injecting itself into...
  • A Cloud that Can't Leak

    08/08/2011 10:53:51 AM PDT · by for-q-clinton · 5 replies
    Technology Review ^ | 8 Aug 2011 | Tom Simonite
    Researchers at Microsoft have built a virtual vault that could work on medical data without ever decrypting it. Imagine getting a friend's advice on a personal problem and being safe in the knowledge that it would be impossible for your friend to divulge the question, or even his own reply. Researchers at Microsoft have taken a step toward making something similar possible for cloud computing, so that data sent to an Internet server can be used without ever being revealed. Their prototype can perform statistical analyses on encrypted data despite never decrypting it. The results worked out by the software...
  • DOJ: We can force you to decrypt that laptop

    07/11/2011 10:39:22 AM PDT · by Smogger · 143 replies
    CNET News ^ | JULY 11, 2011 12:07 AM PDT | Declan McCullagh
    The Colorado prosecution of a woman accused of a mortgage scam will test whether the government can punish you for refusing to disclose your encryption passphrase. The Obama administration has asked a federal judge to order the defendant, Ramona Fricosu, to decrypt an encrypted laptop that police found in her bedroom during a raid of her home. Because Fricosu has opposed the proposal, this could turn into a precedent-setting case. No U.S. appeals court appears to have ruled on whether such an order would be legal or not under the U.S. Constitution's Fifth Amendment, which broadly protects Americans' right to...
  • From the files of Terror Inc

    08/16/2004 3:02:51 PM PDT · by Calpernia · 571 replies · 7,393+ views
    theaustralian.news.com.au ^ | August 14, 2004 | Alan Cullison
    The September11 terror attacks in the US were staged to overcome disunity in al-Qa'ida, confidential computer records reveal. Alan Cullison reports on what happened after his laptop was wrecked while he was covering the combat in Afghanistan IN the autumn of 2001, I was one of scores of journalists who ventured into northern Afghanistan to write about the US-assisted war against the Taliban. After losing use of my computer in an accident, I scrawled stories by candlelight with a ballpoint pen and read dispatches to my editors at The Wall Street Journal over a satellite phone. When the Taliban's defences...
  • SSDs Prove Tough To Erase (Solid state drives)

    02/23/2011 1:44:13 AM PST · by LibWhacker · 19 replies
    Information Week ^ | 2/22/11 | Mathew J. Schwartz
    Techniques that reliably erase hard disk drives don't produce the same results for solid state drives, warn University of California at San Diego researchers.Solid state drives (SSDs) have a small security problem: they're tough to erase. That warning comes from researchers at the University of California at San Diego. "Sanitization is well-understood for traditional magnetic storage, such as hard drives and tapes," said the researchers' in their study summary. "Newer solid state disks, however, have a much different internal architecture, so it is unclear whether what has worked on magnetic media will work on SSDs as well." Accordingly, the researchers...
  • Informant says Wikileaks suspect had civilian help

    07/31/2010 12:36:26 PM PDT · by rawhide · 41 replies · 9+ views
    ajc.com ^ | 7-31-10 | By DAVID DISHNEAU
    HAGERSTOWN, Md. — A key figure in the government's investigation of thousands of leaked secret war records says the suspected culprit had help. Adrian Lamo is the computer hacker who turned in Army intelligence analyst Bradley Manning. Lamo says someone told him that he helped Manning set up encryption software that Manning allegedly used to send classified information to the whistleblower website Wikileaks. Lamo isn't naming the apparent accomplice. But he says the man is among a group of people in the Boston area who work with Wikileaks.
  • Has HDTV Code Been Cracked? (Duh?)

    09/15/2010 7:29:58 AM PDT · by ImJustAnotherOkie · 24 replies
    Fox News ^ | Sept 14, 2010 | Blake Snow
    Much to the chagrin of the entertainment industry, the encryption that protects most high-definition video content may have just been cracked. Intel Corp. officials confirmed Tuesday to FoxNews.com an investigation into a security breach, possibly a fundamental compromise of High-bandwidth Digital Content Protection (HDCP) -- the digital rights management software that governs every device that plays high-def content.
  • Oglala Lakota code talker Clarence Wolf Guts laid to rest

    06/23/2010 9:50:22 AM PDT · by Kartographer · 22 replies · 1+ views
    rapidcityjournal.com ^ | 6/23/10 | Tyler Jerke
    Three rifle volleys echoed through the Hills Tuesday afternoon, bidding farewell to the nation’s last Oglala Lakota code talker. Clarence Wolf Guts, an 86-year-old World War II veteran, was laid to rest in the Black Hills National Cemetery with the Lord’s Prayer and drum beat resonating inside the rock rotunda. A procession of 30 vehicles -- including one white Chevy Impala with the sign “We love you Grandpa Clarence, forever in our heart.” -- followed a white van that carried Wolf Guts from a traditional Lakota ceremony in Wanblee to Sturgis. A crowd of over 60 traveled to pay their...
  • Jihadis Discover Google's Encrypted Search

    06/07/2010 3:32:44 PM PDT · by Cindy · 2 replies · 21+ views
    INTERNET HAGANAH.com ^ | June 7, 2010 | n/a
    07 June 2010 "JIHADIS DISCOVER GOOGLE'S ENCRYPTED SEARCH" SNIPPET: "What this means is that their connection to Google's servers is encrypted. Their search terms are not encrypted."
  • ...Charges Two Brooklyn Men with Conspiring to Provide Material Support to al Qaeda

    04/30/2010 1:45:09 PM PDT · by Cindy · 17 replies · 385+ views
    Note: The following text is a quote: Manhattan U.S. Attorney Charges Two Brooklyn Men with Conspiring to Provide Material Support to al Qaeda PREET BHARARA, the United States Attorney for the Southern District of New York, GEORGE VENIZELOS, the Special Agent-in-Charge of the New York Office of the Federal Bureau of Investigation ("FBI"), and RAYMOND W. KELLY, the Police Commissioner of the City of New York, announced the indictment of U.S. citizens WESAM EL-HANAFI and SABIRHAN HASANOFF for allegedly conspiring to provide material support, including computer advice and assistance, to al Qaeda. EL-HANAFI and HASANOFF are expected to be presented...
  • Security chip that does encryption in PCs hacked

    02/09/2010 3:40:32 PM PST · by Neil E. Wright · 37 replies · 838+ views
    AP/Yahoo News ^ | Feburary 08, 2010 | JORDAN ROBERTSON, AP Technology Writer
    SAN FRANCISCO – Deep inside millions of computers is a digital Fort Knox, a special chip with the locks to highly guarded secrets, including classified government reports and confidential business plans. Now a former U.S. Army computer-security specialist has devised a way to break those locks.The attack can force heavily secured computers to spill documents that likely were presumed to be safe. This discovery shows one way that spies and other richly financed attackers can acquire military and trade secrets, and comes as worries about state-sponsored computer espionage intensify, underscored by recent hacking attacks on Google Inc.The new attack discovered...
  • Officers Warned of Flaw in U.S. Drones in 2004 (Predator vulnerability discussed 12/17)

    12/18/2009 11:57:45 AM PST · by markomalley · 9 replies · 409+ views
    Wall Street Journal ^ | 12/18/2009 | YOCHI J. DREAZEN, AUGUST COLE and SIOBHAN GORMAN
    Senior U.S. military officers working for the Joint Chiefs of Staff discussed the danger of Russia and China intercepting and doctoring video from drone aircraft in 2004, but the Pentagon didn't begin securing the signals until this year, according to people familiar with the matter. The disclosure came after The Wall Street Journal reported insurgents in Iraq had intercepted video feeds from drones, downloading unencrypted communications from the unmanned planes. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, said a person...
  • Secret code saves man who spied on flatmates

    10/22/2009 7:09:31 AM PDT · by BGHater · 10 replies · 1,868+ views
    Courier Mail ^ | 19 Oct 2009 | Jeremy Pierce
    A MAN who established a sophisticated network of peepholes and cameras to spy on his flatmates has escaped a jail sentence after police were unable to crack an encryption code on his home computer. Rohan James Wyllie, 39, yesterday pleaded guilty in Southport District Court to charges of attempting to visually record one of his flatmates when she was in a private place without her consent. But police were unable to prove his elaborate surveillance system had actually been used. Wyllie's three flatmates, two women and a man, grew suspicious that he was up to something when they noticed lights...
  • New attack cracks common Wi-Fi encryption in a minute

    08/28/2009 10:58:25 AM PDT · by ShadowAce · 42 replies · 1,331+ views
    Network World ^ | 27 August 2009 | Robert McMillan
    Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute. The attack gives hackers a way to read encrypted traffic sent between computers and certain types of routers that use the WPA (Wi-Fi Protected Access) encryption system. The attack was developed by Toshihiro Ohigashi of Hiroshima University and Masakatu Morii of Kobe University, who plan to discuss further details at a technical conference set for Sept. 25 in Hiroshima. Last November, security researchers first showed how WPA could be broken, but the Japanese researchers have taken the...
  • iPhone security “broken” - business users take note

    07/23/2009 9:01:39 PM PDT · by AKSurprise · 19 replies · 1,044+ views
    Tech Crunch ^ | 07/23/09 | Devin Coldewey
    An Apple expert and hacker has shown that the iPhone, in all its various forms and moltings, is child’s play to compromise. This comes despite assurances from Apple regarding the 3GS’s encryption feature. Bad news for businesspeople of the 21st century, who have glommed onto the iPhone and its service halo like no other device. The wonder-phone has certainly changed the way smartphones and other devices are made, but this isn’t the first time Apple’s security measures have been described as being seriously lacking. It seems that with a little creative coding, or access to an insecure computer, the iPhone...
  • Former State Department Official and Wife Arrested for Serving as Illegal Agents of Cuba...

    06/05/2009 4:00:39 PM PDT · by Cindy · 26 replies · 1,260+ views
    Note: The following text is a quote: Former State Department Official and Wife Arrested for Serving as Illegal Agents of Cuba for Nearly 30 Years Couple Allegedly Conspired to Provide Classified Information to Cuban Government A former State Department official and his wife have been arrested on charges of serving as illegal agents of the Cuban government for nearly 30 years and conspiring to provide classified U.S. information to the Cuban government. The arrests were announced today by David Kris, Assistant Attorney General for National Security; Channing D. Phillips, Acting U.S. Attorney for the District of Columbia; Joseph Persichini, Jr.,...
  • DVDs to harness hyperspace - Gold nanorods could boost capacity of next-generation disks.

    05/23/2009 1:35:38 PM PDT · by neverdem · 20 replies · 1,225+ views
    Nature News ^ | 20 May 2009 | Zeeya Merali
    DVDs are set to explore new dimensions.Punchstock Spreading into extra dimensions could help next-generation DVDs to store even more data than they currently do. The new technique could squeeze around 140 times the capacity of the best Blu-rays into a standard-sized disk. Traditional DVDs and Blu-ray disks store data in two dimensions, and there's been a recent push to increase their capacity by creating multi-layered disks that store data across three dimensions. But, asks James Chon at the Swinburne University of Technology in Melbourne, Australia, why stop there?Chon and his colleagues are stepping into hyperspace, by encoding information in two...
  • Dangerous and depraved: paedophiles unite with terrorists online

    10/18/2008 11:15:58 AM PDT · by BGHater · 10 replies · 501+ views
    Times Online ^ | 17 Oct 2008 | Richard Kerbaj, Dominic Kennedy, Richard Owen and Graham Keeley
    For some, the internet is merely a hiding place — a web of secret corridors where all manner of shameful deeds unfold. But the police never expected that it might become a strategic platform where two groups of society's outcasts, terrorists and child sex abusers, could meet to exchange operational secrets. The realisation that there might be something in common between violent Muslim fanatics known for their supposed piety and sexual deviants who prey on children has only slowly dawned on officers. Cracking the mystery of how these worlds overlap is expected to improve understanding of the mindsets of both...
  • UK appeals court rejects encryption key disclosure defense

    10/18/2008 11:38:09 AM PDT · by BGHater · 6 replies · 388+ views
    IDG News Service ^ | 15 Oct 2008 | Jeremy Kirk
    Defendants can't deny police an encryption key because of fears the data it unlocks will incriminate them, a British appeals court has ruled. The case marked an interesting challenge to the UK's Regulation of Investigatory Powers Act (RIPA), which in part compels someone served under the act to divulge an encryption key used to scramble data on a PC's hard drive. Failure to do so could mean a two-year prison sentence or up to five years if the case involves national security. The appeals court heard a case in which two suspects refused to give up encryption keys, arguing that...
  • New attack against multiple encryption functions

    08/22/2008 12:55:10 PM PDT · by LibWhacker · 7 replies · 141+ views
    Computerworld ^ | 8/22/08 | Carl Jongsma
    New mathematical attack works against a broad range cryptographic functions.Unless you're a dyed in the wool cryptographic geek you probably didn't know that there was a Crypto conference, or even a chain of worldwide crypto conferences that take place each year. Fortunately, for the most of us that aren't crypto geeks there are a handful of very highly skilled people who are; they can take the highly theoretical and complex mathematical proofs and arguments that make up most of modern cryptographic and cryptanalytic research and put it into plain language. Probably the best known is Bruce Schneier, who is a...