{"id":1336,"date":"2013-04-01T17:15:56","date_gmt":"2013-04-01T15:15:56","guid":{"rendered":"http:\/\/cerezo.name\/blog\/?p=1336"},"modified":"2024-10-14T13:35:49","modified_gmt":"2024-10-14T11:35:49","slug":"assorted-links-compsec-2","status":"publish","type":"post","link":"https:\/\/cerezo.name\/blog\/2013\/04\/01\/assorted-links-compsec-2\/","title":{"rendered":"Assorted Links (CompSec)"},"content":{"rendered":"<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.acm.org\/news\/featured\/awards\/turing-award-2012\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Turing award goes to Goldwasser<span class=\"amp\">&amp;<\/span>Micali<\/a>: zero-knowledge, semantic security and universal forgery under chosen message attack.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/blog.cloudflare.com\/the-ddos-that-almost-broke-the-internet\" target=\"_blank\" rel=\"noopener\">The DDoS That Almost Broke the Internet<\/a>: attacking whole Internet eXchanges just to bring down SpamHaus.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.economist.com\/news\/business\/21574478-market-software-helps-hackers-penetrate-computer-systems-digital-arms-trade\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Cyber-security: The digital arms trade<\/a>: price quotes for exploits, <em>The Economist\u2019s style<\/em>.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/www.nsa.gov\/public_info\/declass\/cryptologs.shtml\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\"><span class=\"caps\">NSA<\/span> Cryptologs<\/a>: was this really classified? Many opinions and little-to-none noteworthy facts.<\/li>\n<li style=\"text-align: justify;\"><a href=\"http:\/\/cr.yp.to\/talks\/2013.03.12\/slides.pdf\" target=\"_blank\" rel=\"noopener\"><span class=\"caps\">RC4<\/span> as used in <span class=\"caps\">TLS<\/span>\/<span class=\"caps\">SSL<\/span> is broken<\/a>: see page 306. More <a href=\"http:\/\/www.isg.rhul.ac.uk\/tls\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">here<\/a>.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Turing award goes to Goldwasser<span class=\"amp\">&amp;<\/span>Micali: zero-knowledge, semantic security and universal forgery under chosen message attack. The DDoS That Almost Broke the Internet: attacking whole Internet eXchanges just to bring down SpamHaus. Cyber-security: The digital arms trade: price quotes for exploits, The Economist\u2019s style. <span class=\"caps\">NSA<\/span> Cryptologs: was this really classified? Many opinions and little-to-none noteworthy facts.&nbsp;[\u2026]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"ngg_post_thumbnail":0},"categories":[6,18],"tags":[],"_links":{"self":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1336"}],"collection":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/comments?post=1336"}],"version-history":[{"count":3,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1336\/revisions"}],"predecessor-version":[{"id":1548,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/1336\/revisions\/1548"}],"wp:attachment":[{"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/media?parent=1336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/categories?post=1336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/tags?post=1336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}