Toggle navigation
TWunroll
TWunroll
faq
Contact US
Matthew Green
matthew_d_green
How it started: How it’s going: This is probably old enough that it doesn’t ring a lot of bells for people, so here:https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/ I was trying
Read more
I couldn’t tweet a better description than the headline for this piece: After SolarWinds breach, lawmakers ask NSA for help in cracking Juniper cold case.https://www.cyberscoop.com/nsa-juniper-backdoor-wyden-espionage/ For those who haven
Read more
The boring answer very likely is that police *aren’t* guessing suspects’ passcodes. They’re relying on the fact that the owner probably typed it in. Not *after* the phone is seized,
Read more
My students @maxzks and Tushar Jois spent most of the summer going through every piece of public documentation, forensics report, and legal document we could find to figure out how
Read more
Stories like this remind me that people in the Infosec community routinely make and sell exploits to these nations.https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hacked-with-suspected-nso-group-imessage-zero-click-exploit/ I’m h
Read more
My final thought on DKIM after reading 12,000 opinions on HN:It appears that many opinionated Internet users feel that DKIM non-repudiability is an essential feature that is basically indispensable for
Read more
So the resolution explicitly calls for gaining “targeted access to encrypted data”, but we’re going to say that’s not a “backdoor in encryption”. Because we say things. Sorry, @TechCrunch. The
Read more
Article on the Senate’s new crypto killer bill.https://www.nbcnews.com/tech/security/lawful-access-bill-would-allow-feds-legally-bust-encrypted-devices-n1232071 What’s amazing about this bill is that scientists and national security exp
Read more
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree