Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

February 23 2014


January 09 2014


Quantum Computing, The NSA And The Future Of Cryptography | On Point with Tom Ashbrook

The NSA can already crack most cryptography; now it’s working on a quantum computer to bust the rest. Is it the end of for-your-eyes-only? The world’s been up in arms because the US National Security Agency, the NSA, has been tapping and hacking and buying its way into private data all over the place.  What if it didn’t have to tap and hack and buy?  What if the NSA could build a quantum computer that could break any encryption out there and walk right in?  The latest news out of the revelations from super-leaker Edward Snowden says it’s trying.  Racing for a computer exponentially more powerful than anything now.  This hour On Point:  the NSA, quantum computing, and the future of cryptography. – Tom Ashbrook Guests Steven Rich, database editor for the investigative at The Washington Post. (@dataeditor) Seth Lloyd, professor of mechanical engineering at the Massachusetts Institute of Technology. Matthew Green, cryptographer and research professor at Johns Hopkins University. Author of the blog, “A Few Thoughts On Cryptographic Engineering.” (@Matthew_D_Green) From Tom’s Reading List Washington Post: NSA seeks to build quantum computer that could crack most types of encryption — “The development of a quantum computer has long been a goal of many in the scientific community, with revolutionary implications for fields such as medicine as well as for the NSA’s code-breaking mission. With such technology, all current forms of public key encryption would be broken, including those used on many secure Web sites as well as the type used to protect state secrets.” Wired: The quest to make encryption accessible to the masses — “Kobeissi’s challenge, to make encrypted online messaging user-friendly, has long been a bugbear of the crypto community. A paper, written in 1999, demonstrated that the encryption program PGP completely baffled most users in a series of tests. The study, now fourteen years old, is still frequently cited today as a long-unanswered call to arms.” A Few Thoughts On Cryptographic Engineering: How does the NSA break SSL? — “You see, the NSA BULLRUN briefing sheet mentions that NSA has been breaking quite a few encryption technologies, some of which are more interesting than others. One of those technologies is particularly surprising to me, since I just can’t figure how NSA might be doing it. In this extremely long post I’m going to try to dig a bit deeper into the most important question facing the Internet today. Specifically: how the hell is NSA breaking SSL?” http://onpoint.wbur.org/2014/01/08/nsa-cryptography-quantum
Sponsored post

October 30 2013


Hoe?Zo! Radio over system security(dutch)

Wie wint de wapenwedloop tussen cyber security en cyber criminaliteit? Als we onze computers veilig willen houden, moeten wetenschappers zich gaan bezighouden met hacken en 'system security'. Dat stelt VU hoogleraar Herbert Bos.

October 23 2013


vSoup Somebody’s Watching Me With Chris Hoff #38 | vSoup

Chris Hoff. Better known (at least on Twitter) as Beaker is our guest in this one. How we managed to pull that off, is still beyond us, but hey, it all worked http://vsoup.net/2013/10/vsoup-somebodys-watching-me-with-chris-hoff-38/

September 11 2013


August 19 2013


Security Now - Black Hat 2013, Tor & More

July 13 2013



Christopher Soghoian, a former boarding-pass hacker and FBI person of interest who is now principal technologist of the Speech, Privacy, and Technology project at the American Civil Liberties Union. Focusing on the NSA and the FBI, Soghoian discusses the worldwide development of privacy.

June 26 2013


Mac Power Users #10 - Mac Security | 5by5

This episode includes a survey of security issues for Mac owners. Subjects include virus and trojans, phishing and web security, and physical security and insurance. Links of Interest: Norton Anti-Virus for Mac McAfee VirusScan for Mac Virus Barrier ClamX PGP Encryption TrueCrypt Open DNS OS X Filevault MacSparky Secure Disk Image Screencast #2 George [...]

August 03 2012


Cory Doctorow: The Coming Century of War Against Your Computer - The Long Now

Who governs digital trust? Doctorow framed the question this way: "Computers are everywhere. They are now something we put our whole bodies into---airplanes, cars---and something we put into our bodies---pacemakers, cochlear implants. They HAVE to be trustworthy." Sometimes humans are not so trustworthy, and programs may override you: "I can’t let you do that, Dave." (Reference to the self-protective insane computer Hal in Kubrick’s film "2001." That time the human was more trustworthy than the computer.) Who decides who can override whom? The core issues for Doctorow come down to Human Rights versus Property Rights, Lockdown versus Certainty, and Owners versus mere Users. Apple computers such as the iPhone are locked down---it lets you run only what Apple trusts. Android phones let you run only what you trust. Doctorow has changed his mind in favor of a foundational computer device called the "Trusted Platform Module" (TPM) which provides secure crypto, remote attestation, and sealed storage. He sees it as a crucial "nub of secure certainty" in your machine. If it’s your machine, you rule it. It‘s a Human Right: your computer should not be overridable. And a Property Right: "you own what you buy, even if it what you do with it pisses off the vendor." That’s clear when the Owner and the User are the same person. What about when they’re not? There are systems where we really want the authorities to rule---airplanes, nuclear reactors, probably self-driving cars ("as a species we are terrible drivers.") The firmware in those machines should be inviolable by users and outside attackers. But the power of Owners over Users can be deeply troubling, such as in matters of surveillance. There are powers that want full data on what Users are up to---governments, companies, schools, parents. Behind your company computer is the IT department and the people they report to. They want to know all about your email and your web activities, and there is reason for that. But we need to contemplate the "total and terrifying power of Owners over Users." Recognizing that we are necessarily transitory Users of many systems, such as everything involving Cloud computing or storage, Doctorow favors keeping your own box with its own processors and storage. He strongly favors the democratization and wide distribution of expertise. As a Fellow of the Electronic Frontier Foundation (who co-sponsored the talk) he supports public defense of freedom in every sort of digital rights issue. "The potential for abuse in the computer world is large," Doctorow concluded. "It will keep getting larger." http://longnow.org/seminars/02012/jul/31/coming-century-war-against-your-computer/

March 17 2012


Audio: Understanding the Sudan's Histories and Future Prospects | Center for Strategic and International Studies

March 15 2012


Catch Me If You Can: Frank Abagnale 10 Years Later

Frank Abagnale’s rare expertise began more than 40 years ago when he was known as one of the world's most famous confidence men. Between the ages of 16 and 21, he successfully posed as an airline pilot, an attorney, a college professor and a pediatrician, in addition to cashing $2.5 million in fraudulent checks in every state and 26 foreign countries. Apprehended by the French police when he was 21 years old, he served time in the French, Swedish and U. S. prison systems. After five years he was released on the condition that he would help the federal government, without remuneration, by teaching and assisting federal law enforcement agencies. Frank has now been associated with the FBI for over 35 years. More than 14,000 financial institutions, corporations and law enforcement agencies use his fraud prevention programs. Frank’s exploits were depicted in the movie Catch Me If You Can, based on Frank’s best-selling book. In this session, he’ll describe his life, both during the time covered in his well known story, as well as covering what he’s up to these days. http://sxsw.com/node/10871

Put On Your Tinfoil Hats: Let's Talk About Google's New Privacy Policy, Data Sharing Risks, and Encryption

On this week's episode of Ask Lifehacker, we're getting to know the Windows 8 Consumer Preview and Google's new singular privacy policy. We're also sharing our favorite downloads and answering your questions about data protection, jailbreak upgrades, signing PDFs, and more. http://lifehacker.com/5890135/put-on-your-tinfoil-hats-lets-talk-about-googles-new-privacy-policy-data-sharing-risks-and-encryption

June 02 2011


The TWiT Netcast Network with Leo Laporte

Making passwords memorable AND uncrackable, More on Mac Defender, Lockheed Martin breach, and more. http://twit.tv/sn303

May 20 2011


Reporters' Roundtable: The hackers always win | Reporters' Roundtable Podcast - CNET Blogs

Convicted and rehabilitated, hacker Kevin Mitnick joins us today to discuss the latest Internet security breaches at Sony, LastPass, Apple, and elsewhere. Can we ever be safe online? Don't miss this show. Read this blog post by Rafe Needleman on Reporters' Roundtable Podcast. http://www.cnet.com/8301-30976_1-20064864-10348864.html

May 12 2011


Economists and Democracy by Dani Rodrik - Project Syndicate

Raised on textbooks that obscure the role of institutions, economists often imagine that markets arise on their own, with no help from purposeful, collective action. And, once we recognize that markets require rules, we must next ask who writes those rules. http://www.project-syndicate.org/commentary/rodrik56/English

April 30 2011


Climate change and national security - Saturday Breakfast RN - 30 April 2011

We talk a lot these days about the politics of climate change, but what does it mean? Political change takes place in such a vastly different time frame to that of climate change -- 20 years is a long time in politics but a very short time for climatic shifts to occur -- so we're really talking about the way the concept of climate change has become a new, highly-charged element in the unpredictable mix of politics. This presents an enormous challenge to policy makers. http://www.abc.net.au/rn/saturdayextra/stories/2011/3203929.htm

April 19 2011


Tim Keller - Real Security and the Call of God

Through Abraham we see how God's personal call graciously challenges every aspect of our lives, by giving us entirely new lives with a radical new purpose. God's call to Abraham presents him with the opportunity to find his true self, and to rely on the ultimate security that comes from trusting Him. http://sermons2.redeemer.com/sermons/real-security-and-call-god

February 10 2011


How Tough Is it to Build a Dirty Bomb? | PBS NewsHour | Feb. 8, 2011 | PBS

Science correspondent Miles O'Brien examines the threat that radioactive "dirty bombs"could pose to cities in the U.S., and what's being done to prevent a radiological attack from happening. http://www.pbs.org/newshour/bb/science/jan-june11/dirtybombs_02-08.html

September 28 2010


portswigger on eurotrash security podcast

Tags: security

August 02 2010


43: Train Spotting from socialmediawhitenoise.com

A podcast recorded where I live in Horsham. I'd better listen to it then.
Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.
No Soup for you

Don't be the product, buy the product!

YES, I want to SOUP ●UP for ...