exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files from Bruce Schneier

Email addressschneier at counterpane.com
First Active1999-12-08
Last Active2015-07-09
Keys Under Doormats
Posted Jul 9, 2015
Authored by Bruce Schneier, Josh Benaloh, Ross Anderson, John Gilmore, Daniel J. Weitzner, Susan Landau, Ronald L. Rivest, Harold Abelson, Matthew Blaze, Jeffrey I. Schiller, Matthew Green, Michael Specter, Steven M. Bellovin, Peter G. Neumann, Whitfield Diffie

Whitepaper called Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications. Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy debate and vigorous predictions of enforcement channels "going dark," these attempts to regulate the emerging Internet were abandoned. In the intervening years, innovation on the Internet flourished, and law enforcement agencies found new and more effective means of accessing vastly larger quantities of data. Today we are again hearing calls for regulation to mandate the provision of exceptional access mechanisms. In this report, a group of computer scientists and security experts, many of whom participated in a 1997 study of these same topics, has convened to explore the likely effects of imposing extraordinary access mandates. They have found that the damage that could be caused by law enforcement exceptional access requirements would be even greater today than it would have been 20 years ago. In the wake of the growing economic and social cost of the fundamental insecurity of today's Internet environment, any proposals that alter the security dynamics online should be approached with caution. Exceptional access would force Internet system developers to reverse "forward secrecy" design practices that seek to minimize the impact on user privacy when systems are breached. The complexity of today's Internet environment, with millions of apps and globally connected services, means that new law enforcement requirements are likely to introduce unanticipated, hard to detect security flaws. Beyond these and other technical vulnerabilities, the prospect of globally deployed exceptional access systems raises difficult problems about how such an environment would be governed and how to ensure that such systems would respect human rights and the rule of law.

tags | paper, vulnerability
SHA-256 | b2cf2c1b7f4eb18e903bb934869b5489e8ecd5215e90c29f1411031756900e31
sha1_broken.html
Posted Feb 25, 2005
Authored by Bruce Schneier | Site schneier.com

SHA-1 has been broken. Not a reduced-round version. Not a simplified version. The real thing.

tags | advisory
SHA-256 | 1860ba06cb51de8ca806e1c74ca315eb7fd42ed746dfb99f55de2d3b5b9319b6
crypto-gram-0105.txt
Posted May 17, 2001
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for May 15, 2001. In this issue: Defense Options: What Military History Can Teach Network Security, Part 2, The Futility of Digital Copy Prevention, Microsoft and the Window of Vulnerability, and Safe Personal Computing.

tags | cryptography, magazine
SHA-256 | 20b338b599dd4ab17ef2a4948a8fbd99759076f754f8239a9958eb784470405a
crypto-gram-0104.txt
Posted Apr 15, 2001
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for April 15, 2001. In this issue: Natural Advantages of Defense: What Military History Can Teach Network Security, Part 1, A Correction: nCipher, CSI's Computer Crime and Security Survey, Crypto-Gram Reprints, and Fake Microsoft Certificates.

tags | cryptography, magazine
SHA-256 | 341b3529b2ea2c8c9a00ad34655943b05387e5d7056707073869ca80e4b44d0c
crypto-gram-0103.txt
Posted Mar 17, 2001
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for March 15, 2001. In this issue: The Security Patch Treadmill, Harvard's "Uncrackable" Crypto, TCP/IP Initial Sequence Number Flaw, The Doghouse: iBallot.com, The "Death" of IDS?, and 802.11 Security.

tags | cryptography, tcp, magazine
SHA-256 | 15d5a54d2bf20c20aaa2f201d2cd3da75827f22c25859732288b038f6c69f784
crypto-gram-0102.txt
Posted Feb 16, 2001
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for February 15, 2001. In this issue: Hard-Drive-Embedded Copy Protection, An Intentional Backdoor, The Doghouse: NASA and eTrue, A Semantic Attack on URLs, E-mail Filter Idiocy, Air Gaps, and Internet Voting vs. Large-Value e-Commerce.

tags | cryptography, magazine
SHA-256 | b0b49966a2d150c0a44f721540654f4d81304aea8b42eaa28021ffddd0f33b1f
crypto-gram-0101.txt
Posted Feb 16, 2001
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for January 15, 2001. In this issue: A Cyber UL?, Solution in Search of a Problem: SafeMessage, A Social Engineering Example, The Doghouse: Gianus Technologies, NIST Crypto Update, Code Signing in Microsoft Windows, and PGP Broken with keystroke recorder.

tags | cryptography, magazine
systems | windows
SHA-256 | 0c33f46f08e82b8305be0f5faa977094e7924be590044355b4e2dff66f92a763
crypto-gram-0012.txt
Posted Dec 16, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for December 15, 2000. In this issue: Voting and Technology, Crypto-Gram Reprints, IBM's New Crypto Mode of Operation, Solution in Search of a Problem: Digital Safe-Deposit Boxes, and New Bank Privacy Regulations.

tags | cryptography, magazine
SHA-256 | ff3f1cc0bac61ff3d6e20ab4e727a56aa83079c0f8ff7ab9d5432dd099ba8ad9
crypto-gram-0011.txt
Posted Nov 16, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for November 15, 2000. In this issue: Why Digital Signatures Are Not Signatures, SDMI Hacking Challenge, Microsoft Hack (the Company, not a Product), and more.

tags | cryptography, magazine
SHA-256 | dc772bbdbf2bb21adfae614b25f3926130299781ac432ce3c9207ebb4138a35b
crypto-gram-0010.txt
Posted Oct 17, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for October 15, 2000. In this issue: Semantic Attacks: The Third Wave of Network Attacks, News, Council of Europe Cybercrime Treaty -- Draft, The Doghouse: HSBC, NSA on Security, AES Announced, NSA on AES, and the Privacy Tools Handbook.

tags | cryptography, magazine
SHA-256 | 7c3f8790fcf1093735c62ec84aa0c538c534313880ca411050db9d2325ac0c88
crypto-gram-0009.txt
Posted Sep 16, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for August 15, 2000. In this issue: Full Disclosure and the Window of Exposure, News, Carnivore Disinformation, FBI Requires Constitutional Changes, The Doghouse: FaceMail, PGP Vulnerability, and Comments from Readers.

tags | cryptography, magazine
SHA-256 | 0e4cbb003e4a2c2f2d719a1a3c31cb1025f8835a3832f59fa40e8e4a5db45de0
crypto-gram-0008.txt
Posted Aug 15, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for August 15, 2000. In this issue: Secrets and Lies: Digital Security in a Networked World, Microsoft Vulnerabilities, Publicity, and Virus-Based Fixes, News, Counterpane Internet Security News, Crypto-Gram Reprints, European "Crime in Cyberspace" Convention, The Doghouse: Authentica, Bluetooth, and Comments from Readers.

tags | cryptography, vulnerability, virus, magazine
SHA-256 | 25a5817a41cbe004c4d6e1112bdf771fb54aa8cfa70fb1ad5de105a3f6e42b66
crypto-gram-0007.txt
Posted Jul 17, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for July 15, 2000. In this issue: Full Disclosure and the CIA, Counterpane Internet Security News, More Counterpane Internet Security News, News, Even the President Can't Choose a Good Password, The Doghouse: Intuit QuickBooks, Full Disclosure and Lockmaking, Security Risks of Unicode, Crypto-Gram Reprints, and Comments from Readers.

tags | cryptography, magazine
SHA-256 | f64ae0592134ce4f7b1bd16733a9f0798ae00b308be2abfdfab0435e2c1b5630
crypto-gram-0006.txt
Posted Jun 16, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

CRYPTO-GRAM June 15, 2000. In this issue: News, SOAP (Simple Object Access Protocol), Java and Viruses, crypto-gram reprints, The Doghouse: Infraworks, The Data Encryption Standard (DES), and Comments from Readers.

tags | java, cryptography, protocol, magazine
SHA-256 | 73a3d2a43340b4bdb58234178ca1eb892824e2b2e7c2d20501c377a9969e00f1
crypto-gram-0005.txt
Posted May 23, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

CRYPTO-GRAM May 15, 2000. In this issue: More on Microsoft Kerberos, Trusted Client Software, ILOVEYOU Virus, Computer Security: Will We Ever Learn?, Counterpane Internet Security News, and the Cybercrime Treaty.

tags | cryptography, virus, magazine
SHA-256 | 42d10ab0dec9914d8b3833d78c6cbc4a2c76fc43734f36d7457fdc1d684c3a08
crypto-gram-0004.txt
Posted Apr 19, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

CRYPTO-GRAM April 15, 2000. In this issue: AES News, The French Banking Card Hack, Counterpane -- Featured Research, Counterpane Internet Security News, The Doghouse: Cyber Security Information Act, Microsoft Active Setup "Backdoor", The Uniform Computer Information Transactions Act (UCITA), and Comments from Readers.

tags | cryptography, magazine
SHA-256 | 1ecdc6ce3a58a7f087fe74065e4831f41987d3282b128d31159013cf3cd45bde
crypto-gram-0003.txt
Posted Mar 16, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

CRYPTO-GRAM March 15, 2000. In this issue: Kerberos and Windows 2000, AES News, Counterpane Internet Security News, Software as a Burglary Tool, The Doghouse: The Virginia Legislature, Software Complexity and Security, Comments from Readers.

tags | cryptography, magazine
systems | windows
SHA-256 | cc8d54b0047cdd3d3665e525c99e57b83b3d15f74dcacb134652b1e298d5551f
crypto-gram-0002.txt
Posted Feb 16, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

CRYPTO-GRAM February 15, 2000 - In this issue: Distributed Denial-of-Service Attacks, New Chinese Cryptography Regulations, Counterpane Internet Security News, Publicizing Vulnerabilities, Counterpane -- Featured Research, Mitnick Case Yields New Crypto Twist and Cookies.

tags | cryptography, vulnerability, magazine
SHA-256 | fea3e31504782a1a977597df976c9a991722a8061fc296b53e7ab1b5fb4a6798
crypto-gram-9912.html
Posted Dec 16, 1999
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for December 15, 1999. In this issue: Sarah Flannery's Public-Key Algorithm, ECHELON Technology, Counterpane -- Featured Research, New U.S. Crypto Export Regulations -- Draft, Counterpane Internet Security News, The Doghouse: Egg, Fast Software Encryption 2000, and European Cellular Encryption Algorithms.

tags | cryptography, magazine
SHA-256 | 99973dd01b396fa5a1b9e37afb43d8df2b87f15d2ec6be01a343a27e3c9ecdcb
pki-risks-ft.txt
Posted Dec 8, 1999
Authored by Bruce Schneier, Carl Ellison

Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure. Real security is never that simple, and that is especially true with PKI.

tags | paper
SHA-256 | 2926ad11fff203d81cb0566ec64e3e3a591e8b4c1615f063f61f1551104e045a
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close