Tags » Encryption

Report from HOPE X: Surveillance, Snowden, Stratfor and Surprises

HOPE X, which took place in New York this past weekend, is one of the premiere events of the hacker calendar. The Cryptosphere correspondent Douglas Lucas was there, presenting on a panel, schmoozing over sushi, sneaking into the press room, and … but that would be telling! 2,722 more words

Hackers

Stoned Bitcoin: My Analysis Tools

The most interesting thing about Stoned Bitcoin for me, was to work out a method to find these Bitcoin transactions.

When this was mentioned on Twitter, I did a string search through the Bitcoin blockchain for string STONED: no hits. 313 more words

My Software

Apple documents previously undocumented services that can leak user data

Apple documents previously undocumented services that can leak user data | Ars Technica.

Wow! Huge bombshell! When I first heard that a security researcher revealed that all iOS devices had secret services which served as a backdoor to YOUR data running; I took it with a grain of salt. 179 more words

Link

Bitcoin And Digital Currency

The book I read to research this post was Bitcoin And Digital Currency For Beginners by Alex Nkenchor Iwajeh which is a very good book which I bought from kindle. 203 more words

Computers

Security researchers at Zscaler claim to have found a security flaw in CNN’s iPhone app that exposes personal login and passwords of its users. The CNN app for iPhone, which includes an iReport feature that allows users to sign-up and submit news stories, is reportedly not using SSL encryption for registration/login and SSL certificate pinning like its Android app counterpart and sending the personal user info to and from the app unencrypted. 235 more words

Apps

Walking through a simple substitution cipher

While reading The Security Dialogue, I noticed the code contest and decided to give it a shot.  Here I present a way, one way of many, to solve it.  2,541 more words

Encryption

KALI Linux - How to find the HASHING algorithm - The Visual Guide

The default hashing algorithm for /etc/shadow files is SHA512 in Kali Linux.  Here’s the coding which relates “SHA512″ to $6$.

Step 1 – View your /etc/shadow file… 375 more words