All Activity

This stream auto-updates

  1. Earlier
  2. Zoom announced today that it will offer End-to-End Encryption https://blog.zoom.us/zoom-rolling-out-end-to-end-encryption-offering/ Extract: Zoom meetings and webinars by default use AES 256-bit GCM encryption for audio, video, and application sharing (i.e., screen sharing, whiteboarding) in transit between Zoom applications, clients, and connectors. In a meeting without E2EE enabled, audio and video content flowing between users’ Zoom apps is not decrypted until it reaches the recipients’ devices. However, the encryption keys for each meeting are generated and managed by Zoom’s serv
  3. James

    VeraCrypt

    VeraCrypt uses the Kuznyechik algorithm with 10 rounds and a 256-bit key operating in XTS mode. The Latest Stable Release: 1.24-Update7 (Friday August 7, 2020) is available from https://www.veracrypt.fr/en/Downloads.html
  4. Ring has announced that it's doorbell cameras will soon offer End-to-End Encryption (E2E) https://en-uk.ring.com/blogs/alwayshome/ring-announces-end-to-end-encryption-privacy-security-and-user-control-updates Extract: Beginning today, you can visit the new Video Encryption page in Control Centre for more information about how your videos are currently being protected. Once End-to-End Encryption is available, you will be able to enable the feature for one or multiple compatible Ring devices from Control Centre - at no additional cost. It’s been our core belief that only you
  5. The new IBM Power10 chip will be manufactured by Samsung and based on its new seven-nanometer process. It features 18 billion transistors, 30 cores, a Matrix Math Accelerator to speed up artificial intelligence performance, and multiple AES engines for performing data encryption. The Power10 chip has four times as many AES engines as the Power9. https://newsroom.ibm.com/2020-08-17-IBM-Reveals-Next-Generation-IBM-POWER10-Processor
  6. Zoom has acquired Keybase, the people behind Saltpack https://saltpack.org/ The acquisition is expected to help deliver end-to-end encryption for Zoom. It also made a commitment not to build a backdoor into its security. https://blog.zoom.us/wordpress/2020/05/07/zoom-acquires-keybase-and-announces-goal-of-developing-the-most-broadly-used-enterprise-end-to-end-encryption-offering/ https://keybase.io/blog/keybase-joins-zoom
  7. If anyone is interested in an outside the box approach. I invented a cipher over 6 years ago. It is a positional cipher that among many things compresses the cipher text to as little as a single one byte digit. Decryption is a simple counting function. Let me know if you are interested. I am not a programmer but thought this had merit even though it is now a simple hand cipher.
  8. The Zoom version 5.0 update improves the encryption used to protect call data. Zoom is upgrading from 128-bit Advanced Encryption Standard (AES) keys to AES 256-bit GCM encryption. https://mashable.com/article/zoom-encryption-update/
  9. Below is a sample key using letters. It could just as easily use ascii or bits or bytes. You will notice that it has several words called " paces" the obvious question is how do you know which one to use. The truth is it does not matter and to avoid human random error sequences that might allow this to be frequency attacked you could make decicions by the flip of a coin. In a frequency attack such as you would use with a one time pad. Vigeners cipher you could include letter double, triples, and even whole words, nibbles, bits, bytes, etc. m 5 a v er o a b space tt c
  10. Decided to post this simply because it has relevance past what I am able to code... I know Schneier said "Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can't break." I have studied cryptography, encryption methods and cryptanalysis for over 20 years. This is past me and has many one time pad similarities, but very very different. Enjoy and let me know what you think. Here is the link to see how to code and decode a positional cipher. I thought of this many years ago and thought I would post it to see what you think. To me it is lit
  11. James

    hCaptcha

    hCaptcha protects user privacy, rewards websites, and helps companies get their data labelled. It is a drop-in replacement for reCAPTCHA: you can switch within minutes. hCaptcha is free to use for publishers of any size. When you use hCaptcha, companies bid on the work your users do as they prove their humanity. You get the rewards. hCaptcha also offers an option to support the charities of your choice with the earnings you gain from using it. The hCaptcha marketplace is powered by the HUMAN Protocol, an open decentralized protocol for human review that runs on the Ethereum blockchain. We
  12. Google, Microsoft and Mozilla have re-enabled support for Transport Layer Security (TLS) 1.0 and 1.1, because of the COVID-19 pandemic. Browser makers restore support for obsolete TLS 1.0 and 1.1 encryption https://www.computerworld.com/article/3535806/browser-makers-cite-coronavirus-restore-support-for-obsolete-tls-10-and-11-encryption.html
  13. Web servers that haven’t disabled TLS 1.0 and TLS 1.1 will be downgraded in https testing results. Qualys advises: TLS 1.0 and TLS 1.1 protocols will be removed from browsers at the beginning of 2020. As there are no fixes or patches that can adequately fix SSL or deprecated TLS, it is critically important that organizations upgrade to a secure alternative as soon as possible. https://blog.qualys.com/ssllabs/2018/11/19/grade-change-for-tls-1-0-and-tls-1-1-protocols?fbclid=IwAR2VBdySrhbtuz28N6c0wb9c3axB7-6nY4ANHhuB3e7wKelQ9_q_szmr944
  14. Emmanuel Thomé and his colleagues at the National Institute for Research in Computer Science and Automation (Inria) have cracked the largest key so far. The team factored RSA-240, an RSA key with 240 decimal digits. The total computing time took was equivalent to a single computer core running for almost 4000 years. https://www.newscientist.com/article/2226458-number-crunchers-set-new-record-for-cracking-online-encryption-keys/ https://www.popularmechanics.com/science/math/a30149512/longest-encryption-ever-cracked/ https://www.darkreading.com/vulnerabilities---threats/scientists
  1. Load more activity