James

Administrators
  • Content Count

    126
  • Joined

  • Last visited

  • Days Won

    4

Everything posted by James

  1. James

    VeraCrypt

    VeraCrypt 1.24-Update8 (November 28th 2020)has been released for MacOSX 10.9 and later. It fixes compatibility issues with macOS Big Sur, especially on Apple Silicon M1 with macFUSE 4.0.x.
  2. DiskCryptor has been modified by the Mamba ransomware. The FBI have advised that if any of the DiskCryptor files are detected prior to the second reboot, attempts should be made to determine if the myConf.txt is still accessible. If so, then the password can be recovered without paying the ransom. https://www.aha.org/system/files/media/file/2021/03/fbi-tlp-white-report-mamba-ransomware-weaponizing-diskcryptor-3-23-21.pdf
  3. DiskCryptor is a free and open-source full disk encryption system for Microsoft Windows. It allows a PC’s entire hard drive or individual partitions to be encrypted, including where the OS is installed. DiskCryptor uses either AES-256, Twofish, Serpent or a combination of cascaded algorithms in XTS mode to carry out encryption. DiskCryptor has not been updated since 2014. VeraCrypt is now used as an alternative.
  4. Elon Musk has tweeted that US orders for new Tesla cars can now be secured with the equivalent of a $100 deposit in Bitcoin, with other countries following soon. Bitcoin paid to Tesla will be retained as Bitcoin, not converted to fiat currencies.
  5. Microsoft has announced that Microsoft teams will offer End-to-End Encryption. The initial preview will be limited to 1:1 unscheduled calls, but Microsoft plans to expand this to scheduled calls and online meetings over time. https://www.techradar.com/uk/news/microsoft-teams-is-finally-getting-end-to-end-encryption-and-bunch-of-other-security-upgrades https://www.theverge.com/2021/3/2/22308915/microsoft-teams-end-to-end-encryption-support-e2ee
  6. Libgcrypt is a general-purpose crypto module developed for GNU Privacy Guard (GnuPG or GPG), a free software implementation of the OpenPGP standard. The Libgcrypt update to v1.9.0 was released on 19th January 2021. It included faster implementations for Poly1305 and ChaCha, and improved use of AES-NI to speed up AES-XTS (6 times faster). https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000453.html Unfortunately Google Project Zero researcher Tavis Ormandy reported a severe flaw in this update. The identified bug is a heap buffer overflow and it's considered rather serious
  7. Federally Chartered Banks and Thrifts May Participate in Independent Node Verification Networks and Use Stablecoins for Payment Activities https://www2.occ.gov/news-issuances/news-releases/2021/nr-occ-2021-2.html WASHINGTON—The Office of the Comptroller of the Currency (OCC) today published a letter clarifying national banks’ and federal savings associations’ authority to participate in independent node verification networks (INVN) and use stablecoins to conduct payment activities and other bank-permissible functions. “While governments in other countries have built real-time pa
  8. The FBI has confirmed that the Zodiac Killer’s 340-character cipher sent to the San Francisco Chronicle 51 years ago has been cracked. David Oranchak, Sam Blake and Jarl Van Eycke used the AZdecrypt software to help them solve the puzzle. “I hope you are having lots of fun in trying to catch me. I am not afraid of the gas chamber because it will send me to paradice (sic) all the sooner because I now have enough slaves to work for me” A guide to the methods used is available on YouTube... https://www.youtube.com/watch?v=-1oQLPRE21o
  9. Flaws with the Dual Elliptic Curve Deterministic Random Bit Generator (Dual EC DRBG) were found in 2007. Dan Shumow and Niels Ferguson, pointed out that using it with elliptic curve points generated by the NSA could allow encryption to be broken. Juniper Networks discovered unauthorized VPN-decryption code inside its NetScreen firewall firmware in 2015. It was attributed to Juniper’s decision to use the NSA-designed Dual EC Pseudorandom Number Generator. The backdoor had likely been added to Juniper products as far back as 2008 at the request of a ‘customer’. In 2018, US Senator Ron
  10. Zoom announced today that it will offer End-to-End Encryption https://blog.zoom.us/zoom-rolling-out-end-to-end-encryption-offering/ Extract: Zoom meetings and webinars by default use AES 256-bit GCM encryption for audio, video, and application sharing (i.e., screen sharing, whiteboarding) in transit between Zoom applications, clients, and connectors. In a meeting without E2EE enabled, audio and video content flowing between users’ Zoom apps is not decrypted until it reaches the recipients’ devices. However, the encryption keys for each meeting are generated and managed by Zoom’s serv
  11. James

    VeraCrypt

    VeraCrypt uses the Kuznyechik algorithm with 10 rounds and a 256-bit key operating in XTS mode. The Latest Stable Release: 1.24-Update7 (Friday August 7, 2020) is available from https://www.veracrypt.fr/en/Downloads.html
  12. Ring has announced that it's doorbell cameras will soon offer End-to-End Encryption (E2E) https://en-uk.ring.com/blogs/alwayshome/ring-announces-end-to-end-encryption-privacy-security-and-user-control-updates Extract: Beginning today, you can visit the new Video Encryption page in Control Centre for more information about how your videos are currently being protected. Once End-to-End Encryption is available, you will be able to enable the feature for one or multiple compatible Ring devices from Control Centre - at no additional cost. It’s been our core belief that only you
  13. The new IBM Power10 chip will be manufactured by Samsung and based on its new seven-nanometer process. It features 18 billion transistors, 30 cores, a Matrix Math Accelerator to speed up artificial intelligence performance, and multiple AES engines for performing data encryption. The Power10 chip has four times as many AES engines as the Power9. https://newsroom.ibm.com/2020-08-17-IBM-Reveals-Next-Generation-IBM-POWER10-Processor
  14. Zoom has acquired Keybase, the people behind Saltpack https://saltpack.org/ The acquisition is expected to help deliver end-to-end encryption for Zoom. It also made a commitment not to build a backdoor into its security. https://blog.zoom.us/wordpress/2020/05/07/zoom-acquires-keybase-and-announces-goal-of-developing-the-most-broadly-used-enterprise-end-to-end-encryption-offering/ https://keybase.io/blog/keybase-joins-zoom
  15. The Zoom version 5.0 update improves the encryption used to protect call data. Zoom is upgrading from 128-bit Advanced Encryption Standard (AES) keys to AES 256-bit GCM encryption. https://mashable.com/article/zoom-encryption-update/
  16. James

    hCaptcha

    hCaptcha protects user privacy, rewards websites, and helps companies get their data labelled. It is a drop-in replacement for reCAPTCHA: you can switch within minutes. hCaptcha is free to use for publishers of any size. When you use hCaptcha, companies bid on the work your users do as they prove their humanity. You get the rewards. hCaptcha also offers an option to support the charities of your choice with the earnings you gain from using it. The hCaptcha marketplace is powered by the HUMAN Protocol, an open decentralized protocol for human review that runs on the Ethereum blockchain. We
  17. Google, Microsoft and Mozilla have re-enabled support for Transport Layer Security (TLS) 1.0 and 1.1, because of the COVID-19 pandemic. Browser makers restore support for obsolete TLS 1.0 and 1.1 encryption https://www.computerworld.com/article/3535806/browser-makers-cite-coronavirus-restore-support-for-obsolete-tls-10-and-11-encryption.html
  18. Web servers that haven’t disabled TLS 1.0 and TLS 1.1 will be downgraded in https testing results. Qualys advises: TLS 1.0 and TLS 1.1 protocols will be removed from browsers at the beginning of 2020. As there are no fixes or patches that can adequately fix SSL or deprecated TLS, it is critically important that organizations upgrade to a secure alternative as soon as possible. https://blog.qualys.com/ssllabs/2018/11/19/grade-change-for-tls-1-0-and-tls-1-1-protocols?fbclid=IwAR2VBdySrhbtuz28N6c0wb9c3axB7-6nY4ANHhuB3e7wKelQ9_q_szmr944
  19. Emmanuel Thomé and his colleagues at the National Institute for Research in Computer Science and Automation (Inria) have cracked the largest key so far. The team factored RSA-240, an RSA key with 240 decimal digits. The total computing time took was equivalent to a single computer core running for almost 4000 years. https://www.newscientist.com/article/2226458-number-crunchers-set-new-record-for-cracking-online-encryption-keys/ https://www.popularmechanics.com/science/math/a30149512/longest-encryption-ever-cracked/ https://www.darkreading.com/vulnerabilities---threats/scientists
  20. Mastercard, Visa, eBay and Stripe have also withdrawn from the Libra Association. https://www.bbc.co.uk/news/technology-50023008
  21. The Libra Association co-founded by Facebook aims to serve as a monetary authority for the Libra cryptocurrency. It says Libra's purpose is to "empower billions of people," citing 1.7 billion adults without bank accounts who could use the currency. The Libra Association is a group of 28 companies and non-profits helping to develop Libra. The Libra blockchain is implemented using Rust. The coding guidelines for the Libra Core Rust codebase are at https://developers.libra.org/docs/community/coding-guidelines On Friday 4th October, PayPal announced its withdrawal from the project. It sa
  22. NIST has a section for Threshold Encryption and says it has areas of relevant related research including secure multi-party computation, intrusion tolerant distributed systems, and threshold circuit design... https://csrc.nist.gov/Projects/Threshold-Cryptography
  23. James

    VeraCrypt

    VeraCrypt is now available from https://www.veracrypt.fr/en/Home.html VeraCrypt 1.22 was released in March 2018. It included Kuznyechik speedup, new cascades cipher algorithms, and TRIM support for SSD. VeraCrypt 1.23 was released in September 2018. It added a default SecureBoot for the Windows EFI system.
  24. Tesla has confirmed that it will carry out an over-the-air software update to fix a security flaw in key fobs for the Tesla S. The key fob, manufactured by Pektron, was previously based on 40-bit encryption, and upgraded to 80-bit encryption after it was found that fobs could be easily cloned. Unfortunately the latest fobs have a bug which allows two 40-bit keys to be cracked instead of the expected 80-bit key. Further information about the hack is at https://carbuzz.com/news/turns-out-the-tesla-model-s-is-still-easy-to-hack
  25. There is an interesting discussion of the cryptographic strength of Data's password at https://orbitalflower.github.io/tv/startrek/datas-password.html The password has 52 characters - 173467321476c32789777643t732v73117888732476789764376 You will need to memorise this password if you want to sing along to Data & Picard by Pogo