http://www.engadget.com/2013/12/31/nsa-drououtjeep-iphone-hack-details/?ncid=rss_truncated
This was Intended to be a BSD only blog, but now it's about all Unix Like Free Operating Systems, Linux, FreeBSD etc.
Tuesday, December 31, 2013
Monday, December 30, 2013
Thursday, December 26, 2013
Monday, December 23, 2013
Sunday, December 22, 2013
Friday, December 20, 2013
QNX survives cuts at Blackberry/RIM, called "crown jewel"
Read the last segment for details,
BlackBerry CEO details survival strategy | Mobile - CNET News
http://news.cnet.com/8301-1035_3-57616170-94/blackberry-ceo-details-survival-strategy/
Thursday, December 19, 2013
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
http://www.cs.tau.ac.il/~tromer/acoustic/
Summary
Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components. These acoustic emanations are more than a nuisance: they can convey information about the software running on the computer and, in particular, leak sensitive information about security-related computations. In a preliminary presentation, we have shown that different RSA keys induce different sound patterns, but it was not clear how to extract individual key bits. The main problem was the very low bandwidth of the acoustic side channel (under 20 kHz using common microphones, and a few hundred kHz using ultrasound microphones), many orders of magnitude below the GHz-scale clock rates of the attacked computers.
Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts. We experimentally demonstrate that such attacks can be carried out, using either a plain mobile phone placed next to the computer, or a more sensitive microphone placed 4 meters away.
Beyond acoustics, we demonstrate that a similar low-bandwidth attack can be performed by measuring the electric potential of a computer chassis. A suitably-equipped attacker need merely touch the target computer with his bare hand, or get the required leakage information from the ground wires at the remote end of VGA, USB or Ethernet cables.
Wednesday, December 18, 2013
Re: Benchmarking the ODroid XU: A Fast-Clocked Quad A15 ARM Machine
make money. ;-)
Jesse
Monday, December 16, 2013
Sunday, December 15, 2013
Thursday, December 12, 2013
Google Brings AmigaOS to Chrome Via Native Client Emulation
http://m.slashdot.org/story/195515
Google Brings AmigaOS to Chrome Via Native Client Emulation
from the time-machine-always-comes-last dept.
First time accepted submitter LibbyMC writesGoogle's approach to bringing older C software to the browser is demonstrated in bringing the '80s-era AmigaOS to Chrome. 'The Native Client technology runs software written to run on a particular processor at close to the speeds that native software runs. The approach gives software more direct access to a computer's hardware , but it also adds security restrictions to prevent people from downloading malware from the Web that would take advantage of that power.'Chrome users can go straight to the demo.
Wednesday, December 11, 2013
Tuesday, December 10, 2013
Monday, December 09, 2013
Friday, December 06, 2013
Wednesday, December 04, 2013
New USB connector inbound, set to be smaller and reversible - TechSpot
NOTE: New connectors are not expected until late 2014.
http://www.techspot.com/news/54899-new-usb-connector-inbound-set-to-be-smaller-and-reversible.html
Tuesday, December 03, 2013
Monday, December 02, 2013
Subscribe to:
Posts (Atom)