Tag: Security

  • SHA-1 Break Rumor Update

    Tonight is the “rump session” at the Crypto conference, where researchers can give informal short presentations on up-to-the-minute results. Biham and Chen have a presentation scheduled, entitled “New Results on SHA-0 and SHA-1”. If there’s an SHA-1 collision announced, they’ll probably be the ones to do it. Antoine Joux will present his SHA-0 collision. Also…

  • MD5 Collision Nearly Found

    Following up on yesterday’s discussion about new attacks on cryptographic hashfunctions, Eric Rescorla points to a new paper from Chinese computer scientists, which claims to have found a collision in MD5. MD5 is a cousin of the SHA-1 function discussed yesterday; MD5 is believed to be the weaker of the two. The paper is odd,…

  • SHA-1 Break Rumored

    There’s a rumor circulating at the Crypto conference, which is being held this week in Santa Barbara, that somebody is about to announce a partial break of the SHA-1 cryptographic hashfunction. If true, this will have a big impact, as I’ll describe below. And if it’s not true, it will have helped me trick you…

  • Security Theater

    Lots of people are telling airport-security stories these days. Thus far I have refrained from doing so, even though I travel a lot, because I think the TSA security screeners generally do a good job. But last week I saw something so dumb that I just have to share it. I’m in the security-checkpoint line…

  • Monoculture Debate: Geer vs. Charney

    Yesterday the USENIX Conference featured a debate between Dan Geer and Scott Charney about whether operating-system monoculture is a threat to computer security. (Dan Geer is a prominent security expert who co-wrote last year’s CCIA report on the monoculture program, and was famously fired by @Stake for doing so. Scott Charney was previously a cybercrime…

  • USENIX Panel

    Today I’ll be speaking on a panel at the USENIX Conference in Boston, on “The Politicization of [Computer] Security.” The panel is 10:30-noon, Eastern time. The other panelists are Jeff Grove (ACM), Gary McGraw (Cigital), and Avi Rubin (Johns Hopkins). If you’re attending the panel, feel free to provide real-time narration/feedback/discussion in the comments section…

  • Landsburg's Modest Proposal

    Steven E. Landsburg has a somewhat creepy piece over at Slate, calling for the death penalty for computer worm authors. Ernest Miller responds. UPDATE (12:15 AM): James Grimmelmann has some interesting thoughts on Landsburg’s proposal.

  • Still More About End-User Liability

    At the risk of alienating readers, here is one more post about the advisability of imposing liability on end-users for harm to third parties that results from break-ins to the end-users’ computers. I promise this is the last post on this topic, at least for this week. Rob Heverly, in a very interesting reply to…

  • More on End-User Liability

    My post yesterday on end-user liability for security breaches elicited some interesting responses. Several people debated the legal question of whether end-users are already liable under current law. I don’t know the answer to that question, and my post yesterday was more in the nature of a hypothetical than a statement about current law. Rob…

  • Should End-Users Be Liable for Security Breaches?

    Eric Rescorla reports that, in a talk at WEIS, Dan Geer predicted (or possibly advocated) that end-users will be held liable for security breaches in their machines that cause harm to others. As Eric notes, there is a good theoretical argument for this: There are two kinds of costs to not securing your computer: Internal…