Attachments
Last edited:
"This is basically a zombie from the '90s... I don't think anybody really realized anybody was still supporting these export suites."
I'll bet the NSA knew it was still being used. Course if the vulnerability is there, its there for anyone who wants to use it (criminals, China, NSA etc.).
I was hoping to hear more about the technical details of the vulnerability and how bad this is (i.e. is this in Safari, should we not do secure website use till its fixed?)
http://en.m.wikipedia.org/wiki/Skynet_%28satellite%29
UK military comms satellites. Has been for a while.
I lol'd![]()
Where can I get this Banana Encryption Tool?
Just to put an update on this. This affects all https connections with Safari and Google Chrome on OS X and iOS - making them potentially vulnerable.
Firefox on OS X tests as safe. iOS is stuck - best not to make https connections on those devices till the patch comes out (I know pretty bad).
Google is supposedly rolling out an updated version of Chrome to fix this as well - but for now using Firefox is the best plan till Apple gets an update tested and in place (as this will be increasingly exploited as time goes on).
The possible out for iOS users would be if Google's Chrome update gives users an out on the iOS platform (cross fingers). Wish Apple would reconsider allowing Firefox on iOS - monocultures in real life or the technical security can be problematic.
I followed your advice and now some Nigerian prince sniffed my banking password and emptied out my 401k.best not to make https connections on those devices till the patch comes out (I know pretty bad).
the vulnerability stems from a U.S. government policy that once prevented companies from exporting strong encryption
but all those record snow piles from global warming are currently blocking it.![]()
Once an update for this is available for Mac users will any OS IE: Snow Leopard etc be able to down load it via "Software Update". I haven't seen too many updates for my SL OS in a long time.
That's why TrueCrypt seems the only true encryption solution, although the authors "officially" claim that the application is weak and hence it was discontinued.
Seemed. It's strongly suspected the encryption keys were stolen, most probably by the government. They (the FBI and CIA) had straight up asked Microsoft to put backdoors into BitLocker and for the encryption keys. According to Biddle, an ex-Microsoft employee, they usually got what they wanted without overtly building backdoors. That True crypt left a message saying they were folding and BitLocker (a Windows encryption software) was a good solution was seen as a warrant canary. Also, their instructions for creating encrypted disk images in OS X did not require setting a password, hence the impression that that too was compromised in some way.
There is an emblematic case from a brazilian banker called Daniel Dantas in 2008. It's said that his archives (supposedly containing illegal transactions) were encrypted with TrueCrypt and could never be deciphred, something that may or may not be true, since the decrypting process was being made with the help of FBI. Below there is a link (in portuguese) about the case. The title basically says: "Not even FBI can decipher Daniel Dantas' files, says newspaper".
http://g1.globo.com/politica/noticia/2010/06/nem-fbi-consegue-decifrar-arquivos-de-daniel-dantas-diz-jornal.html
Seemed. It's strongly suspected the encryption keys were stolen, most probably by the government. They (the FBI and CIA) had straight up asked Microsoft to put backdoors into BitLocker and for the encryption keys. According to Biddle, an ex-Microsoft employee, they usually got what they wanted without overtly building backdoors. That True crypt left a message saying they were folding and BitLocker (a Windows encryption software) was a good solution was seen as a warrant canary. Also, their instructions for creating encrypted disk images in OS X did not require setting a password, hence the impression that that too was compromised in some way.