{"id":1034,"date":"2012-06-04T21:11:39","date_gmt":"2012-06-04T19:11:39","guid":{"rendered":"http:\/\/cerezo.name\/blog\/?p=1034"},"modified":"2024-10-14T13:58:36","modified_gmt":"2024-10-14T11:58:36","slug":"assorted-links-comp-security","status":"publish","type":"post","link":"http:\/\/cerezo.name\/blog\/2012\/06\/04\/assorted-links-comp-security\/","title":{"rendered":"Assorted Links (Comp. Security)"},"content":{"rendered":"<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"text-align: justify;\">German Federal Government intelligence agencies can decrypt <span class=\"caps\">PGP<\/span> (<a href=\"http:\/\/www.golem.de\/news\/bundesregierung-deutsche-geheimdienste-koennen-pgp-entschluesseln-1205-92031.html\" target=\"_blank\" rel=\"noopener\">German<\/a>)<\/li>\n<li style=\"text-align: justify;\">Breakthrough silicon scanning <a href=\"http:\/\/www.cl.cam.ac.uk\/%7Esps32\/sec_news.html#PUB\" target=\"_blank\" rel=\"noopener\">discovers backdoor in military chip<\/a> and <a href=\"http:\/\/theinvisiblethings.blogspot.com.es\/2009\/03\/trusting-hardware.html\" target=\"_blank\" rel=\"noopener\">Rutkowska\u2019s essay on Trusting Hardware<\/a><\/li>\n<li style=\"text-align: justify;\">A closer look into the <a href=\"http:\/\/www.sensepost.com\/blog\/7045.html\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\"><span class=\"caps\">RSA<\/span> SecureID software token<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/web.eecs.umich.edu\/%7Ezhiyunq\/tcp_sequence_number_inference\/\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Off-Path <span class=\"caps\">TCP<\/span> Sequence Number Inference Attack<\/a><\/li>\n<li style=\"text-align: justify;\">Fixing <span class=\"caps\">SSL<\/span>: the <a href=\"https:\/\/www.trustworthyinternet.org\/ssl-pulse\/\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Trustworthy Internet Movement<\/a><\/li>\n<li style=\"text-align: justify;\">Alan Turing\u2019s Wartime Research Papers: <a href=\"https:\/\/www.nationalarchives.gov.uk\/catalogue\/displaycataloguedetails.asp?CATID=8878912&amp;CATLN=6&amp;accessmethod=5&amp;j=1#access\" target=\"_blank\" rel=\"noopener\">Statistics of Repetitions<\/a> and <a href=\"https:\/\/www.nationalarchives.gov.uk\/catalogue\/displaycataloguedetails.asp?CATID=8878911&amp;CATLN=6&amp;accessmethod=5&amp;j=1\" target=\"_blank\" rel=\"noopener\">On the Applications of Probability to Cryptography<\/a><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>German Federal Government intelligence agencies can decrypt <span class=\"caps\">PGP<\/span> (German) Breakthrough silicon scanning discovers backdoor in military chip and Rutkowska\u2019s essay on Trusting Hardware A closer look into the <span class=\"caps\">RSA<\/span> SecureID software token Off-Path <span class=\"caps\">TCP<\/span> Sequence Number Inference Attack Fixing <span class=\"caps\">SSL<\/span>: the Trustworthy Internet Movement Alan Turing\u2019s Wartime Research Papers: Statistics of Repetitions and On&nbsp;the&nbsp;[\u2026]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"ngg_post_thumbnail":0},"categories":[6,18],"tags":[],"_links":{"self":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1034"}],"collection":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/comments?post=1034"}],"version-history":[{"count":2,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1034\/revisions"}],"predecessor-version":[{"id":1594,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1034\/revisions\/1594"}],"wp:attachment":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/media?parent=1034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/categories?post=1034"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/tags?post=1034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}