Tag Archive for: keys

Secret keys stashed in Google Play apps pose risk to Android users, developers – Ars Technica


Ars Technica

Secret keys stashed in Google Play apps pose risk to Android users, developers
Ars Technica
A recent scan of the Google Play market found that Android apps contained thousands of secret authentication keys that could be maliciously used to access private cloud accounts on Amazon or compromise end-user profiles on Facebook, Twitter, and a half
Google's backward step on Android app privacyZDNet

all 200 news articles »

android botnet – read more

Scientist-devised crypto attack could one day steal secret Bitcoin keys

Wikipedia

Exposing a previously unknown weakness in the cryptographic system securing bitcoins, scientists have devised an attack that can steal large amounts of the digital currency when hackers run even unprivileged software on the same computer processing the coins.

The technique, laid out in an academic paper published Wednesday, doesn’t pose an immediate threat to Bitcoin users. A successful hack relies on the thief having some access to the same Intel-made processor that processes the targeted bitcoins. That requirement means there would almost certainly be easier ways for the same attacker to pilfer the digital coins. Still, the research is significant because it exposes subtle cryptographic weaknesses not only in a key Bitcoin algorithm, but also in OpenSSL, a widely used code library that implements the core cryptographic protections on the Internet.

The attack relies on “side channel analysis,” in which attackers extract a secret decryption key based on clues leaked by electromagnetic emanations, data caches, or other manifestations of a targeted cryptographic system. In this case, cryptographers can retrieve the private key needed to take control of bitcoins by taking minute measurements of the CPU as it makes transactions using the digital currency. Specifically, by observing the last-level (L3) CPU cache of an Intel processor as it executes as few as 200 signatures, an attacker in many cases has enough data to completely reconstruct the secret key needed to take ownership. The attack exploits the way OpenSSL implements the elliptic curve digital signature algorithm (ECDSA) based on a specific curve known as secp265k1 found in Bitcoin.

Read 13 remaining paragraphs | Comments


Ars Technica » Technology Lab

Meet the seven people who hold the keys to worldwide internet security – The Guardian


The Guardian

Meet the seven people who hold the keys to worldwide internet security
The Guardian
All have long backgrounds in internet security and work for various international institutions. They were chosen for their geographical spread as well as their experience – no one country is allowed to have too many keyholders. They travel to the

“internet security” – read more

Apps for that: Virtual keys, internet-connected doorbells, all-in-one home security

CES 2014 of course has all the big brands showing off new products, but when it comes to home security and automation, what’s new and doesn’t cost a fortune? Issue virtual keys via a smartphone:
Ms. Smith’s blog