{"id":1265,"date":"2013-02-13T21:32:55","date_gmt":"2013-02-13T20:32:55","guid":{"rendered":"http:\/\/cerezo.name\/blog\/?p=1265"},"modified":"2024-10-14T13:40:21","modified_gmt":"2024-10-14T11:40:21","slug":"assorted-links-computer-security-2","status":"publish","type":"post","link":"http:\/\/cerezo.name\/blog\/2013\/02\/13\/assorted-links-computer-security-2\/","title":{"rendered":"Assorted Links (Computer Security)"},"content":{"rendered":"<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.cl.cam.ac.uk\/~rja14\/book.html\" target=\"_blank\" rel=\"noopener\">Security Engineering \u2014 The Book<\/a>: the updated Ross Anderson\u2019s masterpiece, for free&nbsp;again!<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/cr.yp.to\/talks\/2013.01.23\/slides.pdf\" target=\"_blank\" rel=\"noopener\">The Fundamental Goal of \u201cProvable Security\u201d<\/a>: Dan Bernstein\u2019s insights on the whole <em>provable security <\/em>trend.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.isg.rhul.ac.uk\/tls\/\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Lucky Thirteen \u2014 Breaking the <span class=\"caps\">TLS<\/span> and <span class=\"caps\">DTLS<\/span> Record Protocols<\/a>: yet another breach in the wall of the messy <span class=\"caps\">SSL<\/span>\/<span class=\"caps\">TLS<\/span> protocol suite.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.breaknenter.org\/projects\/inception\/\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Inception<\/a>: a cheaper way to obtain passwords from <span class=\"caps\">RAM<\/span> than <a href=\"http:\/\/www.elcomsoft.com\/efdd.html\" target=\"_blank\" rel=\"noopener\">Elcomsoft Forensic Disk Decryptor<\/a>.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.wired.com\/dangerroom\/2012\/12\/codes\/\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">7 Codes You\u2019ll Never Ever Break<\/a>: classic ciphers that never&nbsp;die.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Security Engineering \u2014 The Book: the updated Ross Anderson\u2019s masterpiece, for free&nbsp;again! The Fundamental Goal of \u201cProvable Security\u201d: Dan Bernstein\u2019s insights on the whole provable security trend. Lucky Thirteen \u2014 Breaking the <span class=\"caps\">TLS<\/span> and <span class=\"caps\">DTLS<\/span> Record Protocols: yet another breach in the wall of the messy <span class=\"caps\">SSL<\/span>\/<span class=\"caps\">TLS<\/span> protocol suite. Inception: a cheaper way to obtain&nbsp;[\u2026]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"ngg_post_thumbnail":0},"categories":[6,18],"tags":[],"_links":{"self":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1265"}],"collection":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/comments?post=1265"}],"version-history":[{"count":4,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1265\/revisions"}],"predecessor-version":[{"id":1556,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1265\/revisions\/1556"}],"wp:attachment":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/media?parent=1265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/categories?post=1265"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/tags?post=1265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}