top NSA Able To Crack A5/1 Cellphone Crypto
It has been common knowledge for at least 14 years that governments could eavesdrop on A5/1 traffic
Many governments have warned industrialists not to discuss secrets when using a mobile phone near the country borders. Only the radio channels are encrypted in GSM, lawful interception happens on the wired network that interconnects the base stations so eavesdropping on A5/1 is mostly used when lawful interception is not an option, e.g. listening to the GSM traffic of other countries.
top New Zealand Converting Old Phone Booths Into National WiFi Network
Eircom in Ireland do this too, there's one outside the car park that I use when shopping in the town center, very convenient.
top NSA Director Wants Threat Data Sharing With Private Sector
Private sector data companies don't have a leak-proof record either
top NSA Releases Secret Pre-History of Computers
Well, that didn't take long.
top One Year After World IPv6 Launch — Are We There Yet?
$ nslookup -type=AAAA google.com
$ nslookup -type=AAAA slashdot.org
top Curiosity Rewarded: Florida Teen Heading to Space Camp, Not Jail
I'll ask him to say hello and give our good wishes. October Sky is one of our favourite films and let's hope Kiera does as well as Homer Hickam did despite his early escapades.
top Irish Judge Orders 'The Internet' To Delete Video
The judge knows that it's impossible to remove all copies from the Internet but he has ordered Google etc to work on the problem and demonstrate that they have spent some effort in trying as punishment for not being helpful earlier when the plaintiff asked them to clear his name.
top Smartphone Used To Scan Data From Chip-Enabled Credit Cards
I have worked in information security for 25 years and am always amused when people say something is "physically impossible". There is almost always a way. I have worked on forensic engineering for chip manufacturers, finding production faults by etching off layers using warm nitric acid and reading the secrets out of the circuit using a microscope. That technique can be used to make many copies of a card but nobody bothers because it's too time expensive and there are easier ways.
Ross Anderson's group in Cambridge are real experts in the chip and pin technology, they know that security implementation flaws often make cards vulnerable, for example see
Many parts of the world still use only the magnetic strip. For years while Europe waited for the US to deploy chip and pin we saw European CC numbers being used in the US. Now NFC will make it easier for US based cloners to get just enough data from your cards to send to their cousins in other countries.
top Who should have the most input into software redesigns?
whose job it is to listen to all of the above people and produce a coherent design that both meets the requirements and works.
top Certificate Expiry Leads to Total Outage For Microsoft Azure Secured Storage
$ curl -vIs
https://www.windowsazure.com/ 2>&1 >/dev/null | grep "expire date"
* expire date: 2013-11-15 18:15:53 GMT
Call this from a cronjob script which should then take suitable action if the date is too close.
top My favorite New Year's celebration:
The Gaelic/Celtic Calendar's new year's eve is still celebrated in many parts of the world although you now know it as Halloween.
You can find out more on
top Coderdojo Inspires Coding In Kids As Young As Seven
was a Kinsale Coderdojo session in the Lilly factory canteen. Here's a video we shot of the event
top Zimmermann's Silent Circle Now Live
I was working on public key cryptography in the late 70s while doing my undergrad degree in maths and electronics and got to know some of the people in that field.
I have talked with PZ face to face about his experiences with PGP and government. I believe him.
top Hotmail No Longer Accepts Long Passwords, Shortens Them For You
TL;DR it was not easy!
about a year and a half ago
top Cyberoam Packet Inspection Devices Open Traffic To Third Parties
Most companies that do this type of SSL inspection at their Internet gateways can get Internet Explorer (and such companies often standardize on IE) on the user's PCs to trust the fake certificate by pushing the fake Certificate Authority Root Cert through their Active Directory.
about a year and a half ago
top Programming — Now Starting In Elementary School
Here's what it looks like
top US Intelligence Mining Your Social Network Data
They're looking for intelligence on Facebook? That should keep them searching for a while
top I say (N. Hemisphere) Fall starts ...
Here in Ireland we follow a Celtic calendar. Autumn (fómhar) is defined as the three month period with the Autumnal Equinox as midpoint. For simplicity, seasons nowadays align with the months of the Gregorian civil calendar so Autumn starts on the first day of August.
top Social Media a Threat To Undercover Cops
Kevin Mitnick was able to get mugshots of police that were investigating him by buying a police yearbook claiming it was a present for a relative who was a police officer.
"At one point, he went to a police station and found a Los Angeles Police Department yearbook for sale. It included photographs and names of the very undercover squads seeking him. He said he wanted to buy a copy as a gift for his police officer uncle. With no questions asked, for $75 he walked away with a photo guide to his pursuers."
top Seigniorage Hack Could Resolve Debt Limit Crisis
Please do not give the five trillion dollar coin to Mr Burns to deliver it
ei4anb has no journal entries.