RSS Feeds:
HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed
Become a supporter on Patreon:
Show Notes:
‘Devil’s Ivy’ Vulnerability
-
Bug is in gSOAP by Genivia
-
Plant is toxic to dogs & cats, and it is almost impossible to kill
Beyond public key encryption
-
One of the saddest and most fascinating things about applied cryptography is how 6689264031_4c7516b3e1_zlittle cryptography we actually use. In fact, with a few minor exceptions, the vast majority of the cryptography we use was settled by the early-2000s.*
-
Identity Based Cryptography – In the mid-1980s, a cryptographer named Adi Shamir proposed a radical new idea. The idea, put simply, was to get rid of public keys.
-
Attribute Based Encryption – The beautiful thing about this idea is not fuzzy IBE. It’s that once you have a threshold gate and a concept of “attributes”, you can more interesting things. The main observation is that a threshold gate can be used to implement the boolean AND and OR gates
Dan’s Let’s Encrypt Tool
- use case is centralized Let’s Encrypt with dns-01 challenges
Feedback
-
Host your own mail server – see https://www.nethserver.org/
-
PXE boot – see Zalman ZM-VE350
- HOWTO: setup a PXE Server with dnsmasq
- Cobbler – Linux install and update server
Round Up:
-
Alexa is listening to what you say – and might share that with developers – see https://nakedsecurity.sophos.com/2017/07/17/alexa-is-listening-to-what-you-say-and-might-share-that-with-developers/
-
Life Is About to Get a Whole Lot Harder for Websites Without HTTPS