Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] [Rival] The 'Joys' of (In)Security Through Obscurity

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Chipmaker sues to quash info on smart card security flaws

,----[ Quote ]
| A semiconductor company is suing a Dutch university to keep its researchers 
| from publishing information about security flaws in the RFID chips used in up 
| to 2 billion smart cards.  
| 
| [...]
| 
| Call out the military
| 
| Nohl said the problem lies in what he calls weak encryption in the MiFare 
| Classic smart card. In March, he said that once he had broken the encryption, 
| he would only need a laptop, a scanner and a few minutes to get the 
| cryptographic key to an RFID door lock and create a duplicate card to open it 
| at will.     
`---- 

http://www.linuxworld.com.au/index.php?id=765846447&rid=-50


Related:

TJX Staffer Sacked After Talking About Security Problems

,----[ Quote ]
| In an e-mail interview, he said he was fired Wednesday for violating
| corporate policy by disclosing proprietary information.
|
| TJX is sensitive about information security after being the victim of a
| massive data theft, apparently made possible by poor security on the
| company's wireless networks. That breach, which compromised 94 million credit
| and debit card accounts, has cost the company tens of millions of dollars in
| legal settlements.
`----

http://www.pcworld.com/businesscenter/article/146276/tjx_staffer_sacked_after_talking_about_security_problems.html
http://tinyurl.com/6hoadz


Cyber attacks on American energy firms possible

,----[ Quote ]
| According to a report by a Federal supervisory authority, the Tennessee
| Valley Authority (TVA), the largest state-owned energy firm in the USA, is
| vulnerable to electronic attack. The Washington Post today reported that the
| Government Accountability Office (GAO) considers it possible for crackers to
| sabotage important systems that are responsible for supplying power to
| approximately 8.7 million Americans.
|
| [...]
|
| The Washington Post also quotes arguments of other security experts who don't
| paint such a black picture. According to them, it isn't easy for crackers to
| find their way around control systems that are written using custom protocols
| tailored to individual clients and are embedded in systems they have never
| previously seen. They claim this is an example of "security by obscurity".
| Any protection this gives is however, likely to be gradually undermined
| because the operators of many such facilities are migrating from tailor-made
| legacy systems to commonly used and well known operating systems such as
| Microsoft Windows or Linux.
`----

http://www.heise.de/english/newsticker/news/108379/from/rss09


New $2B Dutch Transport Card is Insecure

,----[ Quote ]
| Kerckhoffs’s Principle, one of the bedrock maxims of cryptography, says that 
| security should never rely on keeping an algorithm secret. It’s okay to have 
| a secret key, if the key is randomly chosen and can be changed when needed, 
| but you should never bank on an algorithm remaining secret.   
| 
| Unfortunately the designers of Mifare Classic did not follow this principle. 
| Instead, they chose to combine a secret algorithm with a relatively short 
| 48-bit key. This is a problem because once you know the algorithm it’s 
| possible for an attacker to search the entire 48-bit key space, and therefore 
| to forge cards, in a matter or days or weeks.    
| 
| [...]
| 
| Now the Dutch authorities have a mess on their hands. About $2 billion have 
| been invested in this project, but serious fraud seems likely if it is 
| deployed as designed. This kind of disaster would have been more likely had 
| the design process been more open. Secrecy was not only an engineering 
| mistake (violating Kerckhoffs’s Principle) but also a policy mistake, as it 
| allowed the project to get so far along before independent analysts had a 
| chance to critique it. A more open process, like the one the U.S. government 
| used in choosing the Advanced Encryption Standard (AES) would have been 
| safer. Governments seem to have a hard time understanding that openness can 
| make you more secure.         
`----

http://www.freedom-to-tinker.com/?p=1250


FCC ignores more than 100 years of wisdom

,----[ Quote ]
| In 1883 French cryptographer Auguste Kerckhoffs published a set of six 
| design principles for military encryption systems. The second of these
| principles is generally known today under the observation that security 
| through obscurity is not security. The Federal Communications Commission 
| (FCC) seems not to have read the history books or to be aware of how its
|  sister federal agencies develop security standards....
`----

http://www.infoworld.nl/idgns/bericht.phtml?id=002570DE00740E1800257313005EC092


Consumer-control industry and their security damnation

.-----[ Quote ]
| By some ironic fortune, proprietary vendors like Apple and
| Microsoft will likely always suffer this damnation that their
| consumer-control inspired proprietary nature always brings with
| itself: security problems - exactly the thing they claim to prevent
| by being so control obsessed. You can stay damned with them or you
| can break free.
`----

http://www.libervis.com/article/consumer_control_industry_and_their_security_damnation


Open source key to anti-terrorism efforts

,----[ Quote ]
| Open source = more security, not less. It's no surprise, then, that
| many of my own company's customers include those that place a premium 
| on safety and security (US Federal Aviation Administration, UK's 
| Ministry of Defense, French Air Force, plus others, including one
| that would surprise you...).
`----

http://weblog.infoworld.com/openresource/archives/2007/05/open_source_key.html


Consumer-control industry and their security damnation

.----[ Quote ]
| By some ironic fortune, proprietary vendors like Apple and
| Microsoft will likely always suffer this damnation that their
| consumer-control inspired proprietary nature always brings with
| itself: security problems - exactly the thing they claim to prevent
| by being so control obsessed. You can stay damned with them or you
| can break free.
`----

http://www.libervis.com/article/consumer_control_industry_and_their_security_damnation


Adobe fixes critical Flash bugs

,----[ Quote ]
| The last time Flash Player was patched was April, when Adobe repaired the 
| Linux and Solaris plug-ins used with the Opera and Konqueror browsers. In 
| March, Apple Inc. included a Flash fix in its 2007-003 security update that 
| upped Mac OS X to Version 10.4.9.   
`----

http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=operating_systems&articleId=9026824&taxonomyId=89&intsrc=kc_top


RIM unconcerned by BlackBerry bugging software

,----[ Quote ]
| As reported yesterday, the latest version of legal spying software 
| FlexiSPY enables remote third parties to bug the voice calls, log SMS 
| and mobile e-mail messages and track the location of a BlackBerry 
| user.
`----

http://www.zdnet.com.au/news/hardware/soa/RIM-unconcerned-by-BlackBerry-bugging-software/0,130061702,339279555,00.htm


Laws Threaten Security Researchers

,----[ Quote ]
| Lee Tien, a member of the working group and a senior staff attorney 
| for the Electronic Frontier Foundation, says Website vulnerabilities 
| must be exposed so people's data and identities are secured. "The 
| fewer vulnerabilities, the better."
`----

http://www.darkreading.com/document.asp?doc_id=125984&WT.svl=news1_1
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkh3YeoACgkQU4xAY3RXLo6qsgCgnnjv9vtDcjDc1HodorN1Xw51
Oc4AmwQJBnYVNy4TEZ7pzstlZNHUUeht
=oGkU
-----END PGP SIGNATURE-----

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index