Bruce Schneier comments the CA system is broken.
Blog
-
Happy Birthday, Fefes Blog
Das Blog, das, neben Don Alphonso, radikaler als ein Salafisten Forum ist, und allen Internet-Nerds Medienkompetenz vermittelt, wird heute 10 Jahre alt.
-
The magical security unicorn.
The purpose of security software is to make other software more secure. This is what the security industry claims, sometime with legit arguments, sometime the industry tries to chase unrealistic ideals, as a recently linked article suggest.
And I couldn’t agree more. The security industry approaches the problem from the wrong end, most of the time. With keeping in mind the principles of security, Integrity, Availability and Authenticity, security software helps mitigate threats in the class of Vulnerabilities, Exploits and malicious software and payloads. Products available to purchase can be considered in classes of, Encryption (Integrity and Authenticity), for data in rest (disk encryption, file encryption) or for data in transit (VPN or protocol encryption). Backup is clearly saving Availability, but most companies in the security industry consider this a different topic. Then there are products to limit access, e.g. Network Layer Firewalls, which have a very distinct functionality. Up to here, things are very clear and deterministic. When it comes to Application Layer Firewalling, e.g. Web Application Firewalls things start to get fuzzy.
Products that aim to protect from any unknown threat, malware or payload, like Anti Virus, Anti Spam, Intrustion Prevention and even Vulnerability Scanners, provide information that is know already.
Now that a particular exploit is know, protection for it can be provided in two distinct locations: the vulnerable software can be patched to remove the problem. Or, what the security industry offers, have another piece of software in place that tries to protect from something that is known already. And with that, raising system complexity and opening another vector for vulnerability.
The sustainable approach is to invest in secure software and architecture, that has built in encryption, authentication and redundancy. This is something the security industry can provide as technology vendors, rather than chasing the magical unicorn.
-
‘Rules!’ Is the First Official Apple Watch Game
You cannot even buy it yet, but there is a game!
via ‘Rules!’ Is the First Official Apple Watch Game.
And there is a unicorn!
-
Münchner Webwoche
Die Münchner WebWoche des Isarnetz findet dieses Jahr vom 13.Juni.15 bis zum 21.Juni.15 statt. Erste Veranstaltungen sind im zugehörigen Kalender zu finden.
Anstehende Events » Münchner Webwoche.
via
And so it begins… Erste richtig spannende Veranstaltungen der #mww15 stehen fest http://t.co/jnXEI8LO9i – much more to come!
— Inititiative Isarnetz (@isarnetz) March 31, 2015
-
Analysis of the GitHub DDoS.
NETRESEC took a closer look at the long lasting DDoS attacks on github.com. One of the few instances of this type of attack that even made it to mainstream media.
The article finds random web browsers from outside China are tricked into reloading two particular pages on github.com. Apparently, this happens by manipulating requests coming from users physically outside China to services in country hosted content at the border infrastructure.This is another example of why encryption is a good thing. General usage of SSL/TLS will prevent passive filtering infrastructure from manipulating traffic, and prevent such problems.
-
Europol chief warns on computer encryption.
Europol chief warns on computer encryption.
And No more cubes warns on Europol chief.
-
Slack hacked.
Slack hacked. Responds with transparency.
A role model for others.
-
Github Under JS-Based "Greatfire" DDoS Attack, Allegedly From Chinese Government
Github is under attack from the Chinese Government, Slashdot writes.
via Github Under JS-Based “Greatfire” DDoS Attack, Allegedly From Chinese Government – Slashdot.