In a recent presentation at the Real World Crypto symposium, researchers affiliated with Brown University and a startup called Pixek presented their work developing an app that encrypts photos at the moment they’re taken and uploads them in encrypted form to a cloud server, in such a way that the keys remain on theRead More
In cryptographic and security circles, the “evil maid” problem describes a class of attacks in which a piece of unguarded hardware, is tampered with by someone who gains physical access to it: for example, a hotel chambermaid who can access your laptop while you’re out of the room.
The Freedom of the PressRead More
In a new white paper, Consumers Union (publishers of Consumer Reports) looks at the “consumer stake in the encryption debate”: they note that governments want to ban working cryptography so that cops can spy on crooks, but the reprt does an excellent job enumerating all the applications for crypto beyond mere person to personRead More
Zerodium is a cyber-arms dealer that produces hacking tools for governments by buying up newly discovered defects in widely used systems, weaponizing them and then selling them to be used against criminals, activists, journalists and other targets of state surveillance.
In 2015, the company offered $1m in bounties for Iphone breaks. Now, it’sRead More
219 Shares Image: Shutterstock/Wit Olszewski By Stan Schroeder2017-09-12 13:15:36 UTC Late last week, a report from Caixin shook the Bitcoin world. According to the state-owned media outlet, China plans to ban all cryptocurrency exchanges. The report was followed by a similar one from The Wall Street Journal, which cited anonymous sources familiar with the matter. Read More
In The Network Structure of Opioid Distribution on a Darknet Cryptomarket, (Sci-Hub mirror), a paper presented today at the American Sociological Association meeting in Montreal, social scientists Scott W. Duxbury and Dana L. Haynie lay out their findings on using fake bad reviews to disrupt the darknet drug-trade.
Darknet drug sellers areRead More
The Wannacry worm burned through the world’s unpatched IT systems, hitting more than 80 countries in 24 hours, taking down hospitals, airlines, banks and logistics companies, until a hidden killswitch was able to halt its spread.
The Wannacry worm owed its virulence to its use of leaked NSA cyberweapon — a defectRead More