One-time pad: the only unbreakable encryption

Using one-time pad encryption is employing an equation with two unknowns, one of which is truly random – and henceforth making the equation is mathematically unsolvable. Which is good news, if you happen to use one-time pads. And which is bad news if you don’t. So, according to a well-known expert on encryption, “even infinite…

The hack-anything mouse & keyboard combo

Whatever system you are using, if it is having some sort of data input interface, an external power supply and potentially a connection to the net – it can be hacked. Period.     What I describe here is a simple method to circumvent most protective means, let these be software or hardware-based ones. It needs…

The CIA Recognized the need to fight technology

We reached a milestone of the digital society, some sort of an enlightenment, which is the recognition of the need to fight technology in order to survive.     A few days ago the Deputy Director of the CIA, Dawn Meyerriecks delivered a keynote address at the GEOINT2018 conference, claiming that advancements of the use of…

The ISO 27000 series mitigate threats – and create them as well

One of the main contemporary standards of how to conduct IT security is the ISO/IEC 27001 (the other widely spreading standards system being the PA-DSS / PCI-DSS). The current trend is that without such a certificate, only small players can stay on the market. It contains a number of well thought out approaches that are…

Some are smarter than others: researchers call AI no other than alchemy

The artifical intelligence field, which is based on irreproducible machine learning caused quite a few sceptic remarks over the years, but this time some researchers finally started to speak some truth. The main problem that puts ML/AI outside of the rigid scientific boundaries is -“that researchers often can’t replicate their own results – and virtually…

Taking over planes and ships via satellite comms

Ships and aircraft of civvie and military owners are often equipped with stellite communication systems, enabling the crew to send and receive messages or orders, and the Internet while traveling. It turns out some of these systems are deeply insecure and allow for attackers to access and interfere with communication and – if integrated –…

Spoofing facial recognition – the easy way

It is now widely discussed that faking media with FakeApp is pretty much possible. Some even calls it a grave danger to the security of nations. But that’s just the tip of the iceberg. Why? Because it is as easy to fool the surveillance systems as to make a revenge porn video, that’s why.    …

Oops! Amazon’s AI just identified 28 congressmen as convicted felons

In a bizarre experiment, the US human rights watchdog American Civil Liberties Union (ACLU) built a dataset from 25.000 publicly available arrest mughsots and then matched these with the pictures of congressmen. And they were shocked to see that the ‘Rekognition’ app falsely identified 28 of them as being those on the arrest mugshots. The…