Tag Archive for: paper

Firm hacks iPhone X Face ID with paper mask

Cybersecurity experts also say they’re not too worried because of the huge effort needed to hack Face ID. Press CTRL+C (Windows), CMD+C (Mac), or long-press the URL below on your mobile device to copy the code
mac hacker – read more

Know your encryption workarounds: a paper

As The 21st Century Encryption Wars continue with no end in sight, security experts Bruce Schneier and Orin Kerr have collaborated on a paper that seeks to establish a common understanding of one aspect of the clash: encryption workarounds.  

The authors consciously avoid policy recommendations, but rather hope to better the understanding of those who will do so in our political and law enforcement arenas.

From the paper’s abstract:

The widespread use of encryption has triggered a new step in many criminal investigations: the encryption workaround. We define an encryption workaround as any lawful government effort to reveal an unencrypted version of a target’s data that has been concealed by encryption. This essay provides an overview of encryption workarounds. It begins with a taxonomy of the different ways investigators might try to bypass encryption schemes. We classify six kinds of workarounds: find the key, guess the key, compel the key, exploit a flaw in the encryption software, access plaintext while the device is in use, and locate another plaintext copy. For each approach, we consider the practical, technological, and legal hurdles raised by its use.

To read this article in full or to leave a comment, please click here

Network World Paul McNamara

Big data paper shows stock market trades behave like light bulbs

In the stock market, electronic trading (AKA “etrading”) originally started so people could buy and sell stocks and other financial instruments more easily. No more hanging out on the floor of a stock exchange or calling your orders into your broker; you could do it all from your desktop. This was good because it made markets more accessible and reduced costs.

Then, in the 1980’s, because the electronic trading platforms had application programming interfaces to allow new client-side interfaces to be developed, the inevitable happened, the next generation of electronic trading appeared. Algorithmic trading (AKA “algo trading” or “black box trading”) removed humans from the equation and exploded as the latest, greatest stock market money-making strategy. 

To read this article in full or to leave a comment, please click here

Network World Security

Cyber warfare overshadows ‘netwar’ concept putting US at risk, new ODNI paper … – FierceGovernmentIT

Cyber warfare overshadows 'netwar' concept putting US at risk, new ODNI paper
FierceGovernmentIT
While many government officials are focused on cyberwarfare following a spate of high-profile cyberattacks including the recent Office of Personnel Management data breach allegedly by Chinese hackers, a new paper states that another concept called …

cyber warfare – read more