Blogroll
Another Branch Prediction Attack
When Spectre and Meltdown were first announced earlier this year, pretty much everyone predicted that there would be many more attacks targeting branch prediction in microprocessors. Here's another one: In the new attack, an attacker primes the PHT and running branch instructions so that the PHT will always assume a particular branch is taken or not taken. The victim code...
Bruce Schneier
Categories: Security
Breaking the Anonymity in the Cryptocurrency Monero
Researchers have exploited a flaw in the cryptocurrency Monero to break the anonymity of transactions. Research paper. BoingBoing post....
Bruce Schneier
Categories: Security
Tracing Stolen Bitcoin
Ross Anderson has a really interesting paper on tracing stolen bitcoin. From a blog post: Previous attempts to track tainted coins had used either the "poison" or the "haircut" method. Suppose I open a new address and pay into it three stolen bitcoin followed by seven freshly-mined ones. Then under poison, the output is ten stolen bitcoin, while under haircut...
Bruce Schneier
Categories: Security
Fooling Face Recognition with Infrared Light
Yet another development in the arms race between facial recognition systems and facial-recognition-system foolers. BoingBoing post....
Bruce Schneier
Categories: Security
Adding Backdoors at the Chip Level
Interesting research into undetectably adding backdoors into computer chips during manufacture: "Stealthy dopant-level hardware Trojans: extended version," also available here: Abstract: In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientific community. One of the main concerns is that integrated circuits, e.g., for military or critical-infrastructure applications, could be maliciously manipulated during...
Bruce Schneier
Categories: Security
Friday Squid Blogging: Giant Squid Stealing Food from Each Other
An interesting hunting strategy: Off of northern Spain, giant squid often feed on schools of fish called blue whiting. The schools swim 400 meters or less below the surface, while the squid prefer to hang out around a mile deep. The squid must ascend to hunt, probably seizing fish from below with their tentacles, then descend again. In this scenario,...
Bruce Schneier
Categories: Security
Zeynep Tufekci on Facebook and Cambridge Analytica
Zeynep Tufekci is particularly cogent about Facebook and Cambridge Analytica. Several news outlets asked me to write about this issue. I didn't, because 1) my book manuscript is due on Monday (finally!), and 2) I knew Zeynep would say what I would say, only better....
Bruce Schneier
Categories: Security
GreyKey iPhone Unlocker
Some details about the iPhone unlocker from the US company Greyshift, with photos. Little is known about Grayshift or its sales model at this point. We don't know whether sales are limited to US law enforcement, or if it is also selling in other parts of the world. Regardless of that, it's highly likely that these devices will ultimately end...
Bruce Schneier
Categories: Security
Reverse Engineering the Cuban Sonic Weapon
Interesting analysis and speculation....
Bruce Schneier
Categories: Security
Hijacking Computers for Cryptocurrency Mining
Interesting paper "A first look at browser-based cryptojacking": Abstract: In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies; in particular, the mining of Monero through Coinhive and similar code-bases. In this model, a user visiting a website will download a JavaScript code that executes client-side in her browser, mines a cryptocurrency, typically without her consent or...
Bruce Schneier
Categories: Security
Dan Geer on the Dangers of Computer-Only Systems
A good warning, delivered in classic Dan Geer style....
Bruce Schneier
Categories: Security
Israeli Security Attacks AMD by Publishing Zero-Day Exploits
Last week, the Israeli security company CTS Labs published a series of exploits against AMD chips. The publication came with the flashy website, detailed whitepaper, cool vulnerability names -- RYZENFALL, MASTERKEY, FALLOUT, and CHIMERA -- and logos we've come to expect from these sorts of things. What's new is that the company only gave AMD a day's notice, which breaks...
Bruce Schneier
Categories: Security
Friday Squid Blogging: New Squid Species Discovered in Australia
A new species of pygmy squid was discovered in Western Australia. It's pretty cute. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here....
Bruce Schneier
Categories: Security
Interesting Article on Marcus Hutchins
This is a good article on the complicated story of hacker Marcus Hutchins....
Bruce Schneier
Categories: Security
Artificial Intelligence and the Attack/Defense Balance
Artificial intelligence technologies have the potential to upend the longstanding advantage that attack has over defense on the Internet. This has to do with the relative strengths and weaknesses of people and computers, how those all interplay in Internet security, and where AI technologies might change things. You can divide Internet security tasks into two sets: what humans do well...
Bruce Schneier
Categories: Security
The 600+ Companies PayPal Shares Your Data With
One of the effects of GDPR -- the new EU General Data Protection Regulation -- is that we're all going to be learning a lot more about who collects our data and what they do with it. Consider PayPal, that just released a list of over 600 companies they share customer data with. Here's a good visualization of that data....
Bruce Schneier
Categories: Security
E-Mailing Private HTTPS Keys
I don't know what to make of this story: The email was sent on Tuesday by the CEO of Trustico, a UK-based reseller of TLS certificates issued by the browser-trusted certificate authorities Comodo and, until recently, Symantec. It was sent to Jeremy Rowley, an executive vice president at DigiCert, a certificate authority that acquired Symantec's certificate issuance business after Symantec...
Bruce Schneier
Categories: Security
Greyshift Sells Phone Unlocking Services
Here's another company that claims to unlock phones for a price....
Bruce Schneier
Categories: Security
Two New Papers on the Encryption Debate
Seems like everyone is writing about encryption and backdoors this season. "Policy Approaches to the Encryption Debate," R Street Policy Study #133, by Charles Duan, Arthur Rizer, Zach Graves and Mike Godwin. "Encryption Policy in Democratic Regimes," East West Institute. I recently blogged about the new National Academies report on the same topic. Here's a review of the National Academies...
Bruce Schneier
Categories: Security
Friday Squid Blogging: Interesting Interview
Here's an hour-long audio interview with squid scientist Sarah McAnulty. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here....
Bruce Schneier
Categories: Security