- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged encryption
Smartphones Leak Encryption
Posted by Brian in Gear, News, Threat Watch on 7/Mar/2012 19:26
Technology Review reports that an attacker my be able to pick up encryption keys from cellphones with a TV antenna:
The antenna was detecting radio signals “leaking” from the transistors on the chip inside the phone performing the encryption calculations. Transistors leak those signals when they are active, so the pattern of signals from a chip provides an eavesdropper a representation of the work the chip is doing. When Kenworthy tuned his equipment to look in the right place, a clear, regular pattern of peaks and troughs appeared on his computer screen. They could be seen to come in two varieties, large and small, directly corresponding to the string of digital 1s and 0s that make up the encryption key.
Prosecutors Demand Laptop Password in Violation of Fifth Amendment
From: EFF
Prosecutors Demand Laptop Password in Violation of Fifth Amendment
EFF has urged a federal court to block the government’s attempt to force a woman to enter a password into an encrypted laptop. During the investigation, the government seized the device from the home she shares with her family, and then asked the court to compel the woman to type the password into the computer or turn over a decrypted version of her data. But EFF told the court that the demand is unconstitutional, violating her Fifth Amendment privilege against self-incrimination.
USB Drives left at Dry Cleaners on the Rise
Posted by Gary in Comms, News, Threat Watch on 25/Mar/2011 14:59
Encrypt your USB Drives
From: SC Magazine UK
A survey of dry cleaners in the UK has found that more than 17,000 USB sticks were left behind in 2010.
More than 500 dry cleaners and launderettes in the UK were asked during December 2010 and January 2011 about removable media that was left behind. Estimated figures suggested that there was an increase on the number of USB sticks left in dry cleaners of more than 400 per cent when compared with figures from 2009, and almost double from what was found in 2008.
…With the best intentions in the world, the reality is devices are often left behind and the information they contain could be devastating if disclosed. Organizations need to plan for this when developing their security strategies.â€
Cyber-Threat Whitepapers
Posted by Gary in Comms, Threat Watch on 9/Dec/2010 14:31