These days I work on Tensor/Pixel and Android security
bsky.app/profile/vino...
The International Association for Cryptologic Research (IACR) is unable to tally their election results because they lost a private key. Ouch!
bsky.app/profile/vino...
www.iacr.org/news/item/27...
#IACR #Cryptography #KeyManagement #InfoSec #OPSEC #Elections
www.iacr.org/news/item/27...
#IACR #Cryptography #KeyManagement #InfoSec #OPSEC #Elections
System design should account for this. I wish IACR took accountability for the design failure rather than blaming the human element.
System design should account for this. I wish IACR took accountability for the design failure rather than blaming the human element.
This is a system design issue. No critical system should have a 3-of-3 quorum requirement.
This is a system design issue. No critical system should have a 3-of-3 quorum requirement.
Most secure systems fail or get compromised, not due to sophisticated cryptanalytic attacks, but due to implementation and OPSEC issues.
Most secure systems fail or get compromised, not due to sophisticated cryptanalytic attacks, but due to implementation and OPSEC issues.
1. Availability is a security requirement. It is just as important as Confidentiality.
While this seems like a truism, it is not uncommon to come across system designs (or even NSA/NIST specs) that contradict this principle.
1. Availability is a security requirement. It is just as important as Confidentiality.
While this seems like a truism, it is not uncommon to come across system designs (or even NSA/NIST specs) that contradict this principle.
One trustee lost their share. Now the results are mathematically secure—forever.
The math worked. The encryption held. The process failed.
One trustee lost their share. Now the results are mathematically secure—forever.
The math worked. The encryption held. The process failed.
This affects everything from your car's driving directions to the guidance systems for precise missiles.
Sources:
www.theregister.com/2025/10/20/c...
www.cert.org.cn/publish/main...
This affects everything from your car's driving directions to the guidance systems for precise missiles.
Sources:
www.theregister.com/2025/10/20/c...
www.cert.org.cn/publish/main...
(An interesting source of drift: Relativistic time dilation, because the sats move at ~9,000 mph!)
(An interesting source of drift: Relativistic time dilation, because the sats move at ~9,000 mph!)
Attack outcome: If you disrupt the time, you can disrupt the entire communications grid.
Attack outcome: If you disrupt the time, you can disrupt the entire communications grid.
Modern tech relies on nanosecond-level accuracy. If you can mess with time, you can disrupt critical infrastructure.
Here are two key examples:
Modern tech relies on nanosecond-level accuracy. If you can mess with time, you can disrupt critical infrastructure.
Here are two key examples:
satcom.sysnet.ucsd.edu/docs/dontloo...
satcom.sysnet.ucsd.edu/docs/dontloo...
- TelMex VOIP on satellite backhaul: Plaintext voice calls
- U.S. military: SIP traffic exposing ship names
- Mexico government and military: Unencrypted intra-government traffic
- TelMex VOIP on satellite backhaul: Plaintext voice calls
- U.S. military: SIP traffic exposing ship names
- Mexico government and military: Unencrypted intra-government traffic
"The Interior Ministry explained that... the G-Drive’s structure did not allow for external backups. This vulnerability ultimately left it unprotected."
"The Interior Ministry explained that... the G-Drive’s structure did not allow for external backups. This vulnerability ultimately left it unprotected."
cloud.google.com/blog/topics/...
cloud.google.com/blog/topics/...