The Little Riding Hood does face certain risks when her mother sends her through the woods to visit her grandmother, and what is an old lady living alone in the deep woods?
The big bad wolf indeed has frightening Endurance. It is a carnivore. Such is encoded in its nature…
Organizations dream of having the best people, the best processes, the best culture, however, having the right people, configuring the right team and modus operandi, grow the right culture (passion and virtues, values and create values), set the right mentality of leadership, forge the will, focus and swift to act…
Strange are the places where our answers are, and stranger that we have not look at yet.
There are things hidden in the ancient tombs, buried with the untold stories. There are eccentrics hidden among us who holds the unspoken and unshared answers. There are untold tragedy of unwritten secrets.
Judge we must, being judgmental we must not be. The ability to triage and decide who to trust is a matter of strategic decision of safety and security . It is a question of astute vigilance and foolish paranoia.
Lessons Learned From History
Article on Cryptographic Flaws Exploited has covered several attacks on the secure channels.
Protocol Version:Difference with previous version
1. Separation of the transport of data from the message layer. submitted by Netscape as an Internet Draft to the IEFT in 1996
2. converted to TLS v1.0…
It was known that it was the women who brought the nutrition of omega-3 which enhanced our thinking process, and pushed humanity towards civilization indirectly through their work as humble garners before the farming era. In the same manner, ideas even as innocuous as a disguised form of propaganda (coined…
Harden the character, not the heart. — 2013–09.09
The highest reward for man’s toil is not what he gets for it, but what he becomes by it. — John Ruskin, English critic, essayist, & reformer (1819–1900)
While human sense of success and satisfaction may differ, the driving factors have common…
Side-channel vulnerabilities can be due to algorithmic or protocol weaknesses, flaws or lacks, implementation bugs, lack of defensive processing or all the mentioned.
Beware of little expenses, a small leak will sink a great ship. — Benjamin Franklin (January 6, 1706 — April 17, 1790), Poor Richard’s Almanack, 1745
Humans are bad source of entropy. — Ursa
14% have a password from the top 10 passwords
40% have a password from the top 100 passwords
79% have a password from the top 500 passwords
91% have a password from the top 1000 passwords
You could be telling too…
“Does it matter?” Yes. We’re tired of branded vulnerabilities. — Anonymous
2. CRIME (related: BREACH)
3. Deja Vu
5. Dual EC PRNG
10. Padding Oracles
10.3. ROBOT (related: Triple handshake attack)