{"id":1348,"date":"2013-07-22T20:09:24","date_gmt":"2013-07-22T18:09:24","guid":{"rendered":"http:\/\/cerezo.name\/blog\/?p=1348"},"modified":"2024-10-14T13:33:25","modified_gmt":"2024-10-14T11:33:25","slug":"assorted-links-crypto-2","status":"publish","type":"post","link":"http:\/\/cerezo.name\/blog\/2013\/07\/22\/assorted-links-crypto-2\/","title":{"rendered":"Assorted Links (Crypto)"},"content":{"rendered":"<ul>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/srlabs.de\/rooting-sim-cards\/\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Rooting <span class=\"caps\">SIM<\/span> cards<\/a>: the latest research of Karsten Nohl on <span class=\"caps\">GSM<\/span> security (as if the typical problems of&nbsp;<a href=\"http:\/\/blog.cryptographyengineering.com\/2013\/05\/a-few-thoughts-on-cellular-encryption.html\" target=\"_blank\" rel=\"noopener\">cellular encryption<\/a> weren\u2019t enough)<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.governmentattic.org\/8docs\/NSA-WasntAllMagic_2002.pdf\" target=\"_blank\" rel=\"noopener\">The early history of computing to automate cryptanalysis<\/a> (declassified)<\/li>\n<li style=\"text-align: justify;\"><span class=\"caps\">TLS<\/span> forward secrecy has been proposed as the easiest solution to PRISM-like attacks, but it may be very easy <a href=\"https:\/\/www.imperialviolet.org\/2013\/06\/27\/botchingpfs.html\" target=\"_blank\" rel=\"noopener\">to botch<\/a><\/li>\n<li style=\"text-align: justify;\">Buggy and poorly implemented protocols are the quickest path to break any encrypted voice protocol, as the <a href=\"http:\/\/blog.azimuthsecurity.com\/2013\/06\/attacking-crypto-phones-weaknesses-in.html\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">recent weaknesses in <span class=\"caps\">ZRTPCPP<\/span> shows<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/dnscrypt.org\/\" target=\"_blank\" rel=\"noopener\">DNSCrypt<\/a>: I remember playing with a similar tool a decade ago, but this one is incredibly advanced<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Rooting <span class=\"caps\">SIM<\/span> cards: the latest research of Karsten Nohl on <span class=\"caps\">GSM<\/span> security (as if the typical problems of&nbsp;cellular encryption weren\u2019t enough) The early history of computing to automate cryptanalysis (declassified) <span class=\"caps\">TLS<\/span> forward secrecy has been proposed as the easiest solution to PRISM-like attacks, but it may be very easy to botch Buggy and poorly implemented&nbsp;[\u2026]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"ngg_post_thumbnail":0},"categories":[16],"tags":[],"_links":{"self":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1348"}],"collection":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/comments?post=1348"}],"version-history":[{"count":3,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1348\/revisions"}],"predecessor-version":[{"id":1545,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1348\/revisions\/1545"}],"wp:attachment":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/media?parent=1348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/categories?post=1348"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/tags?post=1348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}