The Barbie Typewriter has a hidden built-in cryptographic capability. Specifically, four alphabet substitution cipher modes that were explained in the manual for the original Mehano electronic typewriter that served as the basis for the Barbie Typewriter. However: As it was probably thought that secret writing would not appeal to girls, the coding/decoding facilities were omitted from the [Barbie Typewriter] manual. Nevertheless, these facilities can still be accessed if you know how to activate them. Via Bruce Schneier.
Build a fully functional electronic replica of the world famous German Enigma machine. Enjoy this documentary playlist related to the Enigma.
A little more than five years ago, a previously unused Reddit account began posting seemingly random strings of numbers and text in a new subreddit it had created. To the casual eye, there wasn’t much to see. The subreddit shared the same inscrutable set of numbers and letters as its moderator; the sidebar and comments provided no clarifying information.
After a long wait, Set 8 of the Cryptopals Crypto Challenges has been announced. Designed to be approachable by neophytes and newbies, one Hacker News commenter describes them as "...a much more interesting version of those silly string manipulation tasks you get in CS101, except that instead of passing a course you break harder and harder crypto." Filippo Valsorda, a very well-known and respected cryptographer has announced that he will be doing a live speedrun of the challenges on Twitch.
So what are the chances of encryption technologies being viewed as a "bearable arm" under the Second Amendment?
Whatsapp is now the mostly widely used end to end crypto tool on the planet. Working with Moxie Marlinspike of Open Whisper Systems the Facebook owned messaging system is now using the Signal protocol for encryption. [more inside]
Taking a holiday break from the usual dispiriting revelations, The Intercept's latest release from the Snowden files is an internal Christmas cryptographic competition from Britain's Government Communications Headquarters. Take the quiz and see if you can outsmart Her Majesty's codebreakers!
“I think the post-war turn towards social responsibility in science and engineering was less a turn than a sideways glance. .. If researchers like us were actually supposed to know or care about this stuff in any operationally significant way, well, I think we didn't get the memo. So let me retransmit it.” - Phillip Rogaway. The Moral Character of Cryptographic Work. [more inside]
How the ANC sent encrypted messages to one another during the struggle against apartheid. Talking to Vula is a series of six articles by Tim Jenkins about the project from the ANC`s monthly journal Mayibuye from May 1995 to October 1995. (via Schneier) [more inside]
Micah Lee at The Intercept provides a deep and wide introduction to encryption (with a clever but helpful Romeo & Juliet framing device) then brings us all the way through the doorframe, past thinking or talking about it—Chatting in Secret while we're all being watched. [more inside]
Once again, the ability of ordinary people to use strong encryption is under threat from lawmakers. In the wake of the exposure of the Five Eyes spying dragnet, consumers have demanded encryption, while the FBI claims encrypted devices will prevent it from fighting crime (or will they?) While the FBI has its own solution, experts deride it as impossible. Meanwhile, online mercenaries sell spyware to anyone who will pay them.
Bitcoin is unsustainable Bitcoin's power usage per transaction isn't remotely sustainable as a wholesale replacement for the conventional financial system. [more inside]
The radio signal that occupies 4625 kHz has reportedly been broadcasting since the late 1970s. The earliest known recording of it is dated 1982. Ever since curious owners of shortwave radios first discovered the signal, it has broadcast a repeating buzzing noise. Every few years, the buzzer stops, and a Russian voice reads a mixture of numbers and Russian names.
...MIT Media Lab announced the launch of the Digital Currency Initiative. The goal of this initiative is to bring together global experts in areas ranging from cryptography, to economics, to privacy, to distributed systems... previously previously-er more-previously more-er-previously oh-heck-kittens-in-boxes
Washington Post: Technology companies are scrambling to fix a major security flaw that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of supposedly secure Web sites, including Whitehouse.gov, NSA.gov and FBI.gov. The flaw resulted from a former U.S. government policy that forbade the export of strong encryption and required that weaker “export-grade” products be shipped to customers in other countries, say the researchers who discovered the problem. These restrictions were lifted in the late 1990s, but the weaker encryption got baked into widely used software that proliferated around the world and back into the United States, apparently unnoticed until this year. [more inside]
He was sitting on his bed, surreptitiously surfing the science and math board on 4chan, the notorious underground forum, when he came across a strange image that had appeared on the site three days earlier. It contained a message written in a thin white font against a black background. "Hello," it read. "We are looking for highly intelligent individuals. To find them, we have devised a test. There is a message hidden in this image. Find it, and it will lead you on the road to finding us. We look forward to meeting the few that will make it all the way through. Good luck." It was signed "3301." [more inside]
In 2010, the Colombian army wanted to send a message of hope to soldiers held hostage by FARC guerrillas deep in the jungle. But how to send a message the hostages would recognize, but their captors wouldn't? Morse code, hidden in a pop song.
If your cryptography predates The Fresh Prince, you need better cryptography. With recognition of the need for secure communication standards finally going mainstream, crypto researcher and Johns Hopkins University professor Matthew Green takes a hard look at the de facto standard everyone is jumping on, and suggests that we can and should do a lot better. [more inside]
Someone is leaving what appear to be coded messages in the stacks of Weldon Library at the University of Western Ontario. (via)
While Jacob Appelbaum grabbed headlines with his NSA revelations at this year's Chaos Communication Congress, other presentations provided equally fascinating insight into how the world works. Learn how data mining is bringing perpetrators of genocide to justice (alt), how an artist uses different concepts of secrecy landscapes (alt) to keep tabs on clandestine activities, and how India's surveillance state continues to grow (alt). previously [more inside]
"Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show." Previous
On January 5th 2012, an image was uploaded to various image boards. It contained two messages. One was obvious & easy to read. In white letters on a black background it said:
Hello. We are looking for highly intelligent individuals. To find them, we have devised a test. There is a message hidden in this image. Find it, and it will lead you on the road to finding us. We look forward to meeting the few that will make it all the way through. Good luck. 3301As promised there was another message hidden inside the image. It was the start of a bizarre, as yet unexplained chain of complex hidden messages leading those who could solve them on a journey across the Internet and around the world towards a destination none of them could predict with certainty. Is it a highly evolved ARG? Is it a recruitment campaign for the NSA? Welcome to the mystery of Cicada 3301.
The Greatest Crossword Puzzle In The History Of The World is now playable: Adobe Crossword
In a crackdown that FBI claims to be about hunting down pedophiles, half of the onion sites in the TOR network has been compromised, including the e-mail counterpart of TOR deep web, TORmail. FreedomWeb, an Irish company known for providing hosting for Tor "hidden services" -- services reached over the Tor anonymized/encrypted network -- has shut down after its owner, Eric Eoin Marques, was arrested over allegations that he had facilitated the spread of child pornography. [more inside]
Enigma breaker Alan Turing will be posthumously pardoned. Turing helped the Allies win WWII by developing the methods that broke the German Enigma code -- which didn't stop Britain from convicting him of gross indecency under anti-homosexuality legislation in 1951 and subjecting him to chemical castration. Two years later, he committed suicide by swallowing cianide. The British government has now "signalled that it is prepared to support a backbench bill that would pardon Turing."
Cypherpunk rising: WikiLeaks, encryption, and the coming surveillance dystopia by R. U. Sirius. [Via]
An advanced and well-orchestrated computer spy operation that targeted diplomats, governments and research institutions for at least five years has been uncovered by security researchers in Russia.
The highly targeted campaign, which focuses primarily on victims in Eastern Europe and Central Asia based on existing data, is still live, harvesting documents and data from computers, smartphones and removable storage devices, such as USB sticks, according to Kaspersky Lab, the Moscow-based antivirus firm that uncovered the campaign. Kaspersky has dubbed the operation “Red October.”[more inside]
Wired tells the story of an old encoded manuscript, the effort to crack it, and the secret occult society that it revealed.
In Which The Irish Invent Twitter, 1984 (via Broadsheet.ie) Back in 1984 on the Late Late Show Gay Byrne shows off a new invention, a machine that allows you to send text over the phonelines. Among the uses to which this invention was put was securely communicating with Nelson Mandela in prison. Although, unfortunately, it didn't work reliably with South African phone lines. [more inside]
Happy 100th birthday, Alan Turing! 2012 is the Alan Turing Year, with celebratory academic events around the world all year. BBC News has a set of (brief) appreciations, including one in which two of Turing's colleagues share memories. Google has an interactive Doodle of a Turing Machine today (that article has some explanation and links to a useful video if the doodle's confusing). [more inside]
TorChat is an instant messaging protocol based upon Tor hidden services, making it perhaps the only instant messaging protocol with any substantive resistance to traffic analysis. [more inside]
LinkedIn has spilled 6.5 million unsalted SHA-1 password hashes. [more inside]
The forthcoming film Anonymous, which posits the Earl of Oxford as the true author of Shakespeare's plays, has scholars bemoaning the immense effort wasted over the years (NYT) pursuing bogus theories of Shakespearean authorship. On the other hand, one of the 20th century's greatest cryptographers got his start searching for secret messages from Francis Bacon in Shakespeare's plays.
Described as 'cryptography's holy grail', Homomorphic Encryption/Computation is a form of encryption where specific algebraic operations on the plaintext translate into different algebraic operations on the ciphertext, allowing the plaintext's owner to 'outsource' computations to untrusted machines. [more inside]
Robert Morris, a pioneer in the field of computer security, early major contributor to the UNIX operating system, and father of Robert Tappan Morris (author of the Morris Worm), has died at 78. NYT [more inside]
Bitcoin is growing up: early adopters lost money due to bad backups; the US Senate wants to crack down due to possible illegal drug purchases with the digital coins; it had its Black Friday, losing 30% of its value in one day (after a 5,600% increase in the first year); the Economist weighs in; and now an alledged heist of 25k bitcoins (original forum post), valued between $250k and $750k on the Mt. Gox exchange. Currently 154 petaflops of CPU and GPUs are computing SHA256 hashes in tight loops, easily beating the #1 on the top500, the Tiahne-1A with 2.56 petaflops. (Previously and more previously)
Bitcoin is a peer-to-peer digital currency. Trading at eight dollars this week—and being used to pay for everything from freelance programming jobs to magic mushrooms—it has been described as “the most dangerous open-source project ever created” and “an unambiguous challenge to the government monopoly on the power to print money.” Estimated at over 20 petaFLOPS the Bitcoin network is currently the fastest virtual supercomputer in the world. [more inside]
On June 30, 1999, sheriff’s officers in St. Louis, Missouri discovered the body of 41-year-old Ricky McCormick. He had been murdered and dumped in a field. The only clues regarding the homicide were two encrypted notes found in the victim’s pants pockets. The FBI is now asking the public to help them solve the murder.
How To Make Anything Signify Anything "By the time he retired from the National Security Agency in 1955, Friedman had served for more than thirty years as his government’s chief cryptographer, and—as leader of the team that broke the Japanese PURPLE code in World War II, co-inventor of the US Army’s best cipher machine, author of the papers that gave the field its mathematical foundations, and coiner of the very term cryptanalysis—he had arguably become the most important code-breaker in modern history."
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break."
The CIA is watching him. He's been addressed directly by powerful people all across the United States government. And earlier today on his website and across the internet, the same man has placed a 1.4 gigabyte encrypted file labeled "insurance."
XKCD author Randall Munroe appears to have left a neat little cryptographic puzzle for Reddit users in his new book. They're trying to decipher it.
Thomas Jefferson's cipher message from Robert Patterson For more than 200 years, buried deep within Thomas Jefferson's correspondence and papers, there lay a mysterious cipher -- a coded message that appears to have remained unsolved. Until now.... To Mr. Patterson's view, a perfect code had four properties: It should be adaptable to all languages; it should be simple to learn and memorize; it should be easy to write and to read; and most important of all, "it should be absolutely inscrutable to all unacquainted with the particular key or secret for decyphering." [more inside]
In March 2007, the FermiLab Office of Public Affairs in Batavia, IL "received a curious message in code" via USPS. In May 2008, scientists posted a facsimile image of the letter to their blog in the hopes of soliciting cryptologists to decipher the letter. [more inside]
Page: 1 2