The Internet Has Serious Trust Problems, Part 5: Response Leads to Corporate Survival or Death
May 12,
2014
Over the past four weeks (here, here, here, and here) I have explained the cryptographic side of digital certificates and continuing problems with what many see as misbehavior by root CAs. I’ll get to the end, or really back to the start, of this story this week. For further details and discussion, join Learning Tree’s […]
This Hash Result Startled Me!
Aug 13,
2012
Even when you work with this technology, sometimes you are really surprised to find that things don’t work at all as you might expect. Hash functions are one-way operations. It is easy to calculate the hash of even a large piece of data. But it should be impractically difficult to find an input that generates […]
Flame Authorship is Acknowledged… Now What?
Jul 2,
2012
Last week the Washington Post reported that “Western officials with knowledge of the effort” said that the malware called Flame had been jointly developed by the United States and Israel. The main surprise here was the announcement itself. The complexity and sophistication of the Flame malware had led researchers to conclude that it was probably […]