cryptography   21002

« earlier    

SHAttered
We have broken SHA-1 in practice.
cryptography  google  security  collision  sha-1  broken 
5 days ago by gdw
Atmel – Smarter Security – Overview
The Internet of Things (IoT) is your new frontier. You’re empowering your customers and creating new and innovative products. But there are dangers in any new frontier, and the IoT introduces vulnerabilities throughout the network. Whether it’s the connected appliances in your home, or a vast network of devices accessed by cloud services over the internet, you want to be able to control what and who can gain access to your network ecosystem. But how do you know which devices are authorized to be a part of your ecosystem and access the benefits of your network? How do you know if a network node is a device at all and not someone pretending to be a device so they can enter your network? Your home, your car, your office building, your product and its branded accessories are all ecosystems where you need explicit control over membership for security and a consistently positive user experience. So how can you protect your customers—and your business? Controlling membership of an ecosystem is no trivial task especially since software and firmware is nearly impossible to track and can be easily worked around. A network of thousands of device manufacturers, each with dozens of product lines, and each of those products with numerous software revisions makes consistent ecosystem control an unmanageable task very quickly. But, by building smart security into your networks and devices from the beginning, you can simplify this process in a secure and highly-scalable method by uniquely identifying each approved device. Authentication is so fast it is invisible to the user, and it can provide the seemless user experience your customers seek. Atmel can take care of all the security logistics for the brand owner and device maker for markets ranging from healthcare and wearables, to smart home and industrial. Let us show you how.
atmel  ecc  cryptography  iot  internetofthings  hardware  provisioning  authentication 
6 days ago by dlkinney
How Safe Are Blockchains? It Depends.
# [How Safe Are Blockchains? It Depends.](https://hbr.org/2017/03/how-safe-are-blockchains-it-depends)

> Because the consensus protocol is energy consuming, the majority of users operate in countries with cheap electricity



> These thefts are not a failure of the security of bitcoin, but of personal security; the thefts are the result of storing a private key insecurely

blockchain  cryptography  cryptocurrency  bitcoin 
7 days ago by jacklittleton
www.daemonology.net
- Added June 12, 2014 at 12:11PM
cryptography 
8 days ago by xenocid

« earlier    

related tags

1991  academic_lab  activism  aes  agorism  ai  algebra  algebraic-cryptography  algorithm  android  api  art  article  articles  artificial-intelligence  atmel  authentication  backup  banking  bbc  beinghuman  bitcoin  blake2  blockchain  blog  blogentries  book  boringssl  broken  chriswellons  cia  code  coding  collision  collisions  comic  communication  computer-networking  computer-security  cryptanalysis  crypto  cryptoanarchy  cryptocurrency  currency  curve  cyberhacking  cypherpunk  database  deep_learning  development  diffie-hellman  dnssec  ecc  economics  edward-snowden  elliptic  encryption  engineering  europe  funny  future  git  github  github_repo  golang  google  government  hackernews  hardware  hash  hashing  haskell  history  hn  homomorphic_encryption  howto  https  humancomputer  identity  important  informationsecurity  internetofthings  iot  ipsec  is:tweet  javascript  javascriptwebtokens  js  json  jwt  lang:rust  large_numbers  learning  legal  libertarianism  libraries  library  mathematics  ml  mypostings  networking  neural-networks  node  nodejs  nonce  nsa  nytimes  online  opensource  openssl  otr  papers  paranoia  password  passwords  payment  pgp  physics  privacy  processing  programming  programming_challence  provisioning  public_key_crypto  python  quantum-mechanics  quantum  ransomware  reference  research  reverse  reverseengineering  science  security  sessions  sha-1  sha1  siliconvalley  software  softwareengineering  sqlite  ssh  stackexchange  standard  standards  stanford  surveillance  table  tips  tools  totwitter  trust  types  us  usa  web  webdev  webscraping  wikipedia  zcash  zerotrust 

Copy this bookmark:



description:


tags: