Next Page: 10000

          Comment on Continued fraction cryptography by Patrick Stein      Cache   Translate Page      
You could easily make it a shared key encryption system though by multiplying the fraction by some secret (rational) number. Unfortunately, the continued fraction expansion of the resulting number would probably have some numbers outside of the range of the input plaintext characters. It feels like it would be hard to use that to find the secret rational, but maybe not. You could even encode a secret pass phrase this way to come up with the secret rational.
          BTCC Announces the "Indefinite" Closure of Its Mining Pool      Cache   Translate Page      
BTCC Mining Pool

BTCC will be shutting down its mining pool by the end of the month.

According to a recent notice made by the Hong Kong-based exchange, BTCC will deactivate its mining pool servers on November 15, 2018, and cease all operations entirely come November 30.

Citing “business adjustments,” the notice was generally vague about the exact reason for this particular closure. Having started operations in 2014, the mining pool is one of the oldest in the space, while BTCC itself is China’s oldest crypto exchange.

BTCC’s mining pool was one of the world’s more prominent mining pools as recently as June of 2018, but, in the latter half of the year, its hashrate has steadily decreased. BTCC has requested that all current miners “complete the power switch by November 15th” and has stated that they will eventually “release the profits of all miners in time.”

It is unclear at this time what impact this shutdown will have on the regular operations of BTCC’s exchange. The announcement did not go into any specific detail on their other functions, and they have not made any similar announcements about the functionality of the company.

Still, the notice for the shutdown did end on a hopeful note, as the exchange proclaimed, “We firmly believe that the digital encryption assets and blockchain industry represented by Bitcoin will continue to develop and improve!” The announcement even concluded with an optimistic final farewell to the BTCC community that said, “We will see you again!”

At the time of publication, BTCC has not responded to Bitcoin Magazine’s request for comment.

This article originally appeared on Bitcoin Magazine.

          Major SSD security flaw lets attackers bypass encryption      Cache   Translate Page      
Radboud University has discovered a significant security flaw in self-encrypting solid state drives.
          Flaws in Popular SSD Drives Bypass Hardware Disk Encryption      Cache   Translate Page      
Researchers have found flaws that can be exploited to bypass hardware decryption without a password in well known and popular SSD drives. [...]
          Rockford Scanner™: Vehicle Crashes Into a House & The Driver Flees On Foot      Cache   Translate Page      
  A vehicle crashes into a house and the driver flees on foot just after 8 AM this morning sources are reporting a vehicle has crashed into a house in the 1100 block of Rose in Rockford. The driver got out and fled on foot. No suspect information due to the police encryption. The vehicle …
          Software Protection USB Dongle       Cache   Translate Page      
Smart Lock Standard SL20 is based on Smart Card technology, the combination of the special hardware and software technology makes it a powerful software encryption function and security function, the ...Shenzhen TAT Electronics Co.,Ltd
          Paul Schaub: QR-Code Generator for OMEMO      Cache   Translate Page      

OMEMO is, like any other encryption protocol based on trust. The user has to make sure, that the keys they are trusting belong to the right users. Otherwise a so called Man-in-the-Middle attack is possible. An attacker might pretend to be your contact and secretly steal all the messages you thought were encrypted. They are, just to the wrong recipient.

To counteract such attacks, OMEMO encourages the user to verify their contacts fingerprints. A fingerprint can be considered the name of a contacts key. The user has to make sure, that the key A he is presented with really belongs to contact C by checking, if the fingerprints match. As those fingerprints are usually long, random series of characters, this is a tedious task. Luckily there are techniques like QR codes, which make our lifes easier. Instead of comparing two long strings character by character, you just scan a code and are done.

The QR-Code contains the Jabber-ID of the owner, as well as all of their fingerprints. So by scanning your code, a friend might automatically add you to their contact list and mark your devices as trusted. You can also put the QR-Code on your personal website, so people who want to reach out to you can easily establish a secure connection to you.

I spent the last few days looking into JavaFX (I have no real UI designing experience in Java, apart from Android), designing a small tool that can generate OMEMO fingerprint QR-Codes. This is what I came up with:

QR-Code generator with selectable fingerprints

The tool logs into your XMPP account and fetches all your published keys. Then it presents you with a list in which you can select, which fingerprints you want to include in the QR-Code.

There are still a lot of features missing and I consider the tool in no means as completed. My plans are to add the possibility to export QR-Codes to file, as well as to copy the text content of the code to clipboard. You see, there is a lot of work left to do, however I wanted to share my thoughts with you, so maybe client developers can adopt my idea.

          Untagging Tor: A Formal Treatment of Onion Encryption, by Jean Paul Degabriele and Martijn Stam      Cache   Translate Page      
Tor is a primary tool for maintaining anonymity online. It provides a low-latency, circuit-based, bidirectional secure channel between two parties through a network of onion routers, with the aim of obscuring exactly who is talking to whom, even to adversaries controlling part of the network. Tor relies heavily on cryptographic techniques, yet its onion encryption scheme is susceptible to tagging attacks (Fu and Ling, 2009), which allow an active adversary controlling the first and last node of a circuit to deanonymize with near-certainty. This contrasts with less active traffic correlation attacks, where the same adversary can at best deanonymize with high probability. The Tor project has been actively looking to defend against tagging attacks and its most concrete alternative is proposal 261, which specifies a new onion encryption scheme based on a variable-input-length tweakable cipher. We provide a formal treatment of low-latency, circuit-based onion encryption, relaxed to the unidirectional setting, by expanding existing secure channel notions to the new setting and introducing circuit hiding to capture the anonymity aspect of Tor. We demonstrate that circuit hiding prevents tagging attacks and show proposal 261's relay protocol is circuit hiding and thus resistant against tagging attacks.
          DCRTR-WDM Ransomware      Cache   Translate Page      
The DCRTR-WDM Ransomware file-locker is a slightly modified variant of the DCRTR Ransomware. It appears that the operators of this file-encryption Trojan have also adopted the payment page used by the infamous GandCrab Ransomware, but you can rest assured that these two projects do not share any other code. Unfortunately, both GandCrab and DCRTR-WDM Ransomware […]
          M@r1a Ransomware      Cache   Translate Page      
The M@r1a Ransomware (also seen as the BlackHeart Ransomware) is a threatening file-encryption Trojan, which is not spread very widely, and the number of its victims is rather small for now. The bad news is that the file-encryption algorithm that the M@r1a Ransomware uses is very secure, therefore making it impossible for malware researchers to […]
          ‘’ Ransomware      Cache   Translate Page      
The ‘’ Ransomware is a file-locker, which operates by downloading a legitimate disk encryption software suite that is then used to lock the victim’s computer. When the ‘’ Ransomware is initialized, it will deploy a valid variant of the DIskCryptor application, which is meant to encrypt files and overwrite the Master Boot Record (MBR), therefore […]
          Apricorn Aegis Secure Key 3NX: An ultra-secure 256-bit AES XTS hardware-encrypted USB flash drive [Review]      Cache   Translate Page      
Storing files in the cloud means they are easily accessible from anywhere, but if you have private data that you can’t afford to fall into the wrong hands, this might not be the best option for you, especially given the number of data breaches we see on a regular basis. An alternative option is to carry those files with you on a USB flash drive, protecting them with encryption. While software encryption methods are better than nothing, a hardware encrypted solution, like the Aegis Secure Key 3NX, is a much more advisable choice. The new USB 3.1 thumbdrive from Apricorn… [Continue Reading]
          Update: Timeport. (Productivity)      Cache   Translate Page      

Timeport. 2.7.2

Device: iOS Universal
Category: Productivity
Price: Free, Version: 2.7.1 -> 2.7.2 (iTunes)


- Private photo and video galleries.
- All your accounts and strong passwords.
- Cards.
- Real documents.
- Notes, ideas.
If you liked our app, please write a review, or send some offers by:
Thank you :)
Have you ever forgotten your password, the serial number of your passport, or the pin code for your credit card? In today's Internet space, we are constantly confronted with different forms to fill out and passwords to come up with and remember.
Try the free Timeport app now!
It has an exceptionally original design. It is reliable, safe and High Tech. There is nothing like it! Timeport also features sound effect buttons and pleasant background music which can be easily disabled if desired.
Important! In addition Timeport, unlike other similar applications, does not have a server, which means that developers do not get and do not collect personal information about you and your family.
The application works without Internet access; all data is stored on your device.
Your vital information is protected by Timeport.
▪ Encrypts all your data using authenticated AES 256-bit encryption.
▪ Password Generator creates a complex and unique Timeport password.
▪ Keep the number and pin code of your credit card by assigning the status of your card.
▪ Use original and realistic templates of documents (passport, driver license and many others…)
▪ Write secret notes, ideas, thoughts, other writing.
▪ Send documents to print directly from your device.
▪ Do or transfer photos and videos must be accessible only place for you.
▪ Edit and share your documents and cards via SMS, iMessage, E-Mail, Air Drop
▪ Safe and convenient entry into the application with Touch ID
▪ Synchronization with other devices via iCloud
▪ Automatic locking program
▪ Notification Center will always remind you about the duration of validity of your documents and cards

What's New

Fix for FaceID, minor bugs fixed, general optimization.


          "Flaws in Popular SSD Drives Bypass Hardware Disk Encryption"      Cache   Translate Page

          Update: BNZ Mobile Business Banking (Finance)      Cache   Translate Page      

BNZ Mobile Business Banking 6.3.0

Device: iOS iPhone
Category: Finance
Price: Free, Version: 6.1.1 -> 6.3.0 (iTunes)


Banking should never get in the way of your business. Our app is a secure and easy way to manage your business’ finances on the go - you just need to be an Internet Banking for Business customer to use it.

• Touch ID, PIN or password login (after initial set up)
• Check balances, make transfers and pay existing bill payees
• Authorise same-day cleared payments, international payments and transfers, direct credit, direct debit, payroll and tax payments
• Create and authorise one off payments and edit statement details on the fly
• Edit a payment date on most payment types
• Make changes to payees
• Authorise domestic payments and transfers in advance of incoming funds
• View your foreign exchange (FX) rates
• Search transactions within accounts and check their details
• Find your nearest BNZ Partners Centre, store or ATM

Get started now

• If you’re already a BNZ Internet Banking for Business customer, simply install this app and start managing your business’ finances on the go.
• If you’re not a BNZ Internet Banking for Business customer, visit to register.


Activate Mobile NetGuard using your NetGuard token the first time you use Mobile Business Banking, and for future logins you’ll only need your Internet Banking for Business password, PIN or fingerprint.

Other security features include 128-bit encryption and lock-out and time-out safeguards, but you should log out as soon as you’ve finished your banking and never store your BNZ access number, PIN, password or NetGuard details on your device in any form. Access IDs, passwords and personal information won’t be stored on the app. If you lose your phone, contact your Internet Banking for Business Administrator to disable your access, log in with another device or call 0800 269 4242 (+64 4 931 8234 if you're overseas).

What's New

Download the app and make a statement – literally.

Your business statements are now available to view on mobile.

BNZ Mobile Business Banking

          Supply of red bajri      Cache   Translate Page      
Tenders are invited for Supply of red bajri

EMD Amount In Rs: 0

1) name of work: supply of red bajri for use in footpath in various parks in ward no. 86-s, south zone
estimated cost: rs. 1,87,482/-
head of account: i-130-1061
earnest money: rs. 3,750/-
tender cost: 500/-
time of completion: 1 month
validity of quoted rates: 06 months

Re-encryption of online bids: 16-11-2018 17:31 - 19-11-2018 13:30
          Adiantum Is Taking Shape As Google's Speck Replacement For Low-End Device Encryption      Cache   Translate Page      
Phoronix: Adiantum Is Taking Shape As Google's Speck Replacement For Low-End Device Encryption Earlier this year when Google added Speck-based...
          Flaws in self-encrypting SSDs let attackers bypass disk encryption      Cache   Translate Page      
Master passwords and faulty standards implementations allow attackers access to encrypted data without needing to know the user-chosen password.
          Is the SSD used in V hardware-encryption safe? (more inside)      Cache   Translate Page      

@mgajo wrote:

I found this concerning article:

Accoriding to it, the SSD may have not been manufactured or configured in a encryption-safe way (please read the article above for the details, I am honestly not an expect on this topic).
I ordered the V i7 with 1TB hard disk add-on back then. Can I be reassured on the hardware encryption’s master key?

Thank you

Posts: 2

Participants: 2

Read full topic

          Microsoft Security Advisory Notification Issued: November 6, 2018      Cache   Translate Page      
Security Advisories Released or Updated on November 6, 2018 * Microsoft Security Advisory ADV180028 – Title: Guidance for configuring BitLocker to enforce software encryption – advisory/ADV180028 – Reason for Revision: Information published. – Originally posted: November 6, 2018 – Updated: November 6, 2018 – Version: 1.0
          Comment on How to Host Multiple Mail Domains in iRedMail with Nginx by Klaus      Cache   Translate Page      
Thank you for this interesting read. Is there any encryption implemented for mail data stored at the server? If not, how would I add this?
          Wafcoin launches the Global Ecological Plan(GEP)      Cache   Translate Page      
Wafcoin launches the Global Ecological Plan(GEP)   Our vision   Wafcoin (WA) Token Trading Platform provides global users with secure, transparent, stable and efficient blockchain token trading services. In order to allow Wafcoin's trading platform to compete in the global trading market and gain more user consensus, the platform now launches the Global Ecological Plan.   There are variable fee collection rules for digital asset trading platforms while Wafcoin token trading platform is providing users with secure, transparent, stable and efficient blockchain token trading services. The platform is aiming to build the world's first blockchain token eco-transaction and co-governance platform, a user-owned platform for blockchain ecological value sharing! Wafcoin adopts the world's first mining model with funding, allowing users to enter into a new digital asset trading field with zero risk!   Our advantage   Financial-level distributed cluster architecture More than 200 million-level matching algorithm Bank-level security encryption and ODAT offline acceleration Multi-signature hot and cold wallet isolation technology All of the above is to ensure the high reliability, high performance and strong security of the token platform.   Problems solved High cost of new projects Long trading hours Unfair distribution of benefits Financial security     Our 7 core values Value sharing Autonomous Co-governance Empowerment Safety Decentralized management Distributed management Our 5 major contents 1. Registered mining with capital 2. Dividends of registration invitation 3. Dividends of holding WA 4. The platform ecology is only a gift and not for sale; people with platform ecology will enjoy a good return. 5. Outstanding rewards for the platform's outstanding contributors  
           Crucial and Samsung SSDs' Encryption Is Easily Bypassed       Cache   Translate Page      
Dutch researchers found that modern SSDs come with flawed encryption schemes and implementations that could allow attackers to easily decrypt user's data.
          How to remove .mariacbc file encryption virus (Free Guide)      Cache   Translate Page      

mariacbc Learn what mariacbc ransomware is and how to remove the computer virus and recover encrypted...

The post How to remove .mariacbc file encryption virus (Free Guide) appeared first on Botcrawl.

          Cryptomator Cloud Storage Encryption Tool 1.4.0 Released With FUSE / Dokany Support      Cache   Translate Page      
Cryptomator, a free and open source, cross-platform client-side encryption tool for cloud files, was updated to version 1.4.0. With this release, Cryptomator can use FUSE on Linux and Mac, and Dokany on Windows, to provide the virtual, unencrypted drive, which should vastly improve the integration into the system.
          How Turkmenistan spies on its citizens at home and abroad      Cache   Translate Page      

A mix of traditional techniques and new technologies allows the Turkmen regime to follow its citizens’ every move.

Turkmenistan President Gurbanguly Berdymukhamedov. Photo: Kremlin Pool / Zuma Press / PA Images. All rights reserved.New documents obtained by openDemocracy can today reveal how Turkmenistan's regime is spying on its citizens abroad, in order to scrutinise who they are in contact with and what they post. The documents, which comprise the period between 2008 and 2014, also reveal the key role Turkmenistan’s Embassy in Turkey has played in spying on Turkmen citizens in that country. 

According to Freedom House, Turkmenistan is one of the world’s least free countries, where the flow of information is severely restricted and tightly controlled. Since 2006, the Central Asian state has been part of Reporters without Borders’ list of “enemies of the internet”. Having an internet connection is punishingly expensive and satellite dishes have been dismantled. Turkmen Telekom, the only internet provider, is run by the government. Facebook, Twitter, Youtube, VKontakte have all been blocked, alongside numerous news websites.

In the mind of the authorities, censorship helps to guarantee political stability and the durability of the regime by controlling what information Turkmen citizens have – or, more accurately, don’t have – access to. However, the new documents seen by openDemocracy reveal how the regime is attempting to track its citizens abroad, as well as at home. With Turkmen students present in significant numbers at institutions in Russia, Belarus and Ukraine, it is legitimate to wonder whether the Turkmen Embassies in those countries exercise the same degree of control, too, and whether this practice continues to this day.

Tried and tested

The system is simple, if laborious. The education attaché at the embassy requests a complete list of all Turkmen students from Turkish universities, as well as the courses they are enrolled in. This information is entered into Excel files – some of which have been obtained by openDemocracy – along with the students’ date of birth, passport number and permanent address in Turkmenistan.

The data is then passed on to informers, themselves Turkmen students who are lured into collaborating with the government in exchange for financial aid. According to the documents, there is one designated informer per university dormitory who is assigned a list of students to spy on. Informers work independently and do not know the identity of other informers. They fill in their own entries in the Excel files, which are then sent to the embassy and on to Ashgabat, in a constant back-and-forth of information.

According to Kerim, one of the informers reached by openDemocracy, Ashgabat would often show an interest in students’ grades, course attendance and progress in their studies. This is confirmed in some of the entries in the Excel files, where it was noted that a ‘student has received low grades, therefore he should be questioned,’ while another student ‘tries to be good in his studies. He is under my control.’ But something more sinister lies behind this innocent facade, as not performing in one’s studies is interpreted in Ashgabat as engaging in extracurricular activities, which is why one of the informers’ tasks is to gauge students’ political and religious orientations.

lead Turkmen student Omriuzak Omarkulyev. Source: RFE/RL Turkmen Service. A document from the Turkmen Embassy in Ankara classifies Turkmen students according to their links to various “groups”, a code word used throughout the files to mean Islamic religious movements such as the Nur movement, whose disciples follows the teachings of Turkish preacher Said Nursi, and the Gülen movement, which has been banned both in Turkey and Turkmenistan. One entry states that a student “has bad marks and has been given a warning. More recently, he turned away from the movement and is now concentrating on his studies.”

As is often the case, however, spies end up being spied upon. It so happened that, since returning to Turkmenistan after finishing his studies, Kerim has been harassed by the authorities, who accused him of having been part of the Gülen movement, too, and of writing articles for foreign media outlets.

Others have had it worse. In June 2018, RFE/RL ran a story about a Turkmen student in Turkey, Omriuzak Omarkulyev, who was invited to visit Turkmenistan to take part in various events in the country, including addressing parliament, as the authorities were said to have been impressed with his activism at his Turkish university. Omarkulyev is now being held at the notorious Ovadan-Depe prison in the Karakum desert. Less than two weeks later, RFE/RL’s Turkmen service reported that several people living and studying abroad who had returned to Turkmenistan on the authorities’ invitation had also been detained.

What continues abroad begins at home

If the Turkmen government’s arm abroad is long, at home it appears to be ubiquitous, as it has effectively eradicated any form of opposition to the regime and ended all free media. Recently, the hunt is on for anyone commenting, sharing, liking and following Turkmen news sites from abroad such as Prague-based RFE/RL’s Turkmen service Azatlyk, Vienna’s Chronicles of Turkmenistan, and the Dutch-based Alternative Turkmenistan News, which are the only remaining outlets reporting on daily events inside Turkmenistan.

Reports indicate that readers of these news sources have been warned during interrogations that, since these sites remain banned in the country, reading them constitutes a crime. They are being questioned as to why they visit those sites, whether they regularly follow their news and whether they give information to them. Azatlyk disclosed that social media users have received calls directly to their mobile phones by the authorities and, at times, have even received a visit at home.

This comes against the backdrop of a fast-deteriorating economic situation in the country with food shortages and soaring unemployment, which have the government increasingly edgy about any potential source of dissent, including online. Recently, the State News Agency of Turkmenistan reported that the vice president of Rohde und Schwarz, a German technology company, had met Turkmen president Gurbanguly Berdymukhamedov. While the official reason for the encounter was trade, activists and Turkmenistan-watchers fear that the government’s real aim is to obtain devices to monitor and block mobile and satellite communications, as well as internet access. Because of this, Human Rights Watch called upon Rohde und Schwarz to disclose its dealings with Turkmenistan in order to guarantee accountability.

Apart from cutting-edge technology, the Turkmen intelligence services still resort to threats and physical violence to extract information – and, sure enough, money 

In the past, Wikileaks revealed that Turkmenistan had acquired various spy technologies, including the FinFisher software. As CorpWatch, a watchdog covering corporate wrongdoing, reported at the time: “FinFisher – a suite of software products manufactured by Gamma International, a UK company – claim that it can track locations of cell phones, break encryption to steal social media passwords, record calls including Skype chats, remotely operate built-in webcams and microphones on computers and even log every keystroke made by a user.”

Apart from cutting-edge technology, the Turkmen intelligence services still resort to threats and physical violence to extract information – and, sure enough, money – from people. In a country with no rule of law to speak of, people are threatened with all sorts of consequences – they may not be able to travel abroad ever again; their children may be kicked out of school; a relative may lose their job – for them to snitch on the internet habits of family, friends, and acquaintances. Useful information includes whether they know someone who uses VPNs to access the internet – and what websites they visit. Students studying at a foreign university and spending their summer breaks at home are also an easy prey, especially if they need to renew their passports.

However, one Ashgabat resident told openDemocracy that people targeted include those whose behaviour or appearance seem to deviate from the norm – especially when it may be interpreted as an outward expression of religiosity. So, for instance, if someone grows a beard or refuses to drink alcohol at wedding parties, often they will be summoned for interrogation shortly after. There, they will subjected to severe physical and psychological pressure, including torture, to make them comply with the intelligence services’ demands: either you report on people who speak against the government, online or otherwise, or you will spend 25 years in prison for terrorism.

In the end, whether at home or abroad, on- or off-line, one thing seems certain: the Turkmen government is out for any and all information about its citizens, and will go to any length to get it.


CC by NC 4.0

          Seven Wonders Ltd -      Cache   Translate Page      
Reduced Size Image

I'm not admin here!
Our program is intended for people willing to achieve their financial freedom but unable to do so because they're not financial experts.
SEVEN WONDERS LTD is a long term high yield private program, backed up by selling travel vouchers for rich peoples. Profits from these transactions are used to enhance our program and increase its stability for the long term.


Plan Spent Amount ($) Daily Profit (%)
WONDER 1 $10.00 - $200.00 2.10

700% AFTER 100 DAYS
Plan Spent Amount ($) Profit (%)
WONDER 7 $1000.00 - $5000.00 700.00

SSL Encryption
DDos Protection
Licensed Script
Registrar NameCheap, Inc.
Created on 2018-11-03
Expires on 2019-11-03
Updated on 2018-11-03

Accept: PM,...

Join here:
          Profit Target Online -      Cache   Translate Page      
Reduced Size Image

I'm not admin here!
Our program is intended for people willing to achieve their financial freedom but unable to do so because they're not financial experts.
Profit Target Online is a long term high yield private loan program, backed up by Forex market trading and investing in various funds and activities. Profits from these investments are used to enhance our program and increase its stability for the long term.

Profit Target Online -

1% daily (100 days) deposit after
Plan Spent Amount ($) Daily Profit (%)
Plan 1 $10.00 - $100000.00 1.00

500% after 90 days
Plan Spent Amount ($) Profit (%)
Plan 1 $2000.00 - $100000.00 500.00

SSL Encryption
DDos Protection
Licensed Script
Registrar Namecheap
Created on 2018-10-26
Expires on 2019-10-26
Updated on 2018-10-26

Accept: PM,...

Join here:
          River Flow Ltd -      Cache   Translate Page      
IPB Image

I'm not admin here!
River Flow Ltd is involved in Bitcoin mining. Today, when cryptocurrency is one of the fastest-growing spheres of the investment market, this modern company is involved in financial activities related to Bitcoin mining and further trading. Experienced technical staff is cautious and do its utmost for the safety of your investment and stable daily profits.
Why Bitcoin mining so interesting for us? First of all, because River Flow Ltd has own powerful mining hardware and enough skills to use it. Second, we have the best experienced technicians who know how to ensure uninterrupted processes and control the work of the mining rigs. Not long ago, barely anyone had even heard of Bitcoin. After its price skyrocketed in the fall of 2013 and after the spectacular crash in early 2014, more and more people became interested in this cryptocurrency, and some of them even started mining it. While it’s becoming more and more difficult to mine - River Flow Ltd uses the most powerful hardware for this process and getting the most profit. Currently, Bitcoin is quite frequently close to being the news of the day in the business section of every news portal. Usually due to its high price fluctuations and the stories of people it has made into millionaires.

IPB Image

130% After 1 day
Plan Spent Amount ($) Profit (%)
103% After 1 day $20.00 - $2999.00 103.00
105% After 1 day $3000.00 - $9999.00 105.00
110% After 1 day $10000.00 - $19999.00 110.00
120% After 1 day $20000.00 - $29999.00 120.00
130% After 1 day $30000.00 - $50000.00 130.00

200% After 4 days

Plan Spent Amount ($) Profit (%)
114% After 4 days $20.00 - $2999.00 114.00
120% After 4 days $3000.00 - $9999.00 120.00
150% After 4 days $10000.00 - $19999.00 150.00
175% After 4 days $20000.00 - $29999.00 175.00
200% After 4 days $30000.00 - $50000.00 200.00

350% After 9 days
Plan Spent Amount ($) Profit (%)
133% After 9 days $20.00 - $2999.00 133.00
150% After 9 days $3000.00 - $9999.00 150.00
200% After 9 days $10000.00 - $19999.00 200.00
290% After 9 days $20000.00 - $29999.00 290.00
350% After 9 days $30000.00 - $50000.00 350.00

500% After 15 days
Plan Spent Amount ($) Profit (%)
180% After 15 days $20.00 - $2999.00 180.00
225% After 15 days $3000.00 - $9999.00 225.00
300% After 15 days $10000.00 - $19999.00 300.00
400% After 15 days $20000.00 - $29999.00 400.00
500% After 15 days $30000.00 - $50000.00 500.00

800% After 22 days
Plan Spent Amount ($) Profit (%)
250% After 22 days $20.00 - $2999.00 250.00
350% After 22 days $3000.00 - $9999.00 350.00
500% After 22 days $10000.00 - $19999.00 500.00
650% After 22 days $20000.00 - $29999.00 650.00
800% After 22 days $30000.00 - $50000.00 800.00

1100% After 30 days
Plan Spent Amount ($) Profit (%)
320% After 30 days $20.00 - $2999.00 320.00
450% After 30 days $3000.00 - $9999.00 450.00
600% After 30 days $10000.00 - $19999.00 600.00
900% After 30 days $20000.00 - $29999.00 900.00
1100% After 30 days $30000.00 - $50000.00 1100.00

50% Daily for 4 days
Plan Spent Amount ($) Daily Profit (%)
28% Daily for 4 days $100.00 - $2999.00 28.00
35% Daily for 4 days $3000.00 - $9999.00 35.00
40% Daily for 4 days $10000.00 - $19999.00 40.00
45% Daily for 4 days $20000.00 - $29999.00 45.00
50% Daily for 4 days $30000.00 - $50000.00 50.00

60% Daily for 3 days
Plan Spent Amount ($) Daily Profit (%)
36% Daily for 3 days $150.00 - $2999.00 36.00
40% Daily for 3 days $3000.00 - $9999.00 40.00
45% Daily for 3 days $10000.00 - $19999.00 45.00
50% Daily for 3 days $20000.00 - $29999.00 50.00
60% Daily for 3 days $30000.00 - $50000.00 60.00

SSL Encryption
DDos Protecton
Licensed Script
Registrar TLD Registrar Solutions Ltd.
Created on 2018-10-27
Expires on 2019-10-27
Updated on 2018-11-01

Accept: PM, Payeer, Bitcoin, Litecoin, ETH, BCH,...

Join here:

Reduced Size Image
          Protection at the Hardware Level      Cache   Translate Page      

There is tremendous opportunity for application and solution developers to take charge of their data security using new hardware-based controls for cloud and enterprise environments. Intel® Software Guard Extensions (Intel® SGX), available in its second-generation on the new Intel® Xeon® E-2100 processor, offers hardware-based memory encryption that isolates specific application code and data in memory. ...continue reading Protection at the Hardware Level

The post Protection at the Hardware Level appeared first on IT Peer Network.



The post Protection at the Hardware Level appeared first on Blogs@Intel.

          Protecting Data In Use With Fortanix Runtime Encryption and Intel® SGX      Cache   Translate Page      

Our mission at Fortanix is to solve cloud security and privacy. We recognize the importance of secure and private cloud computing in unlocking the true potential of the digital era. In fact, organizations consistently rate security as one of the top challenges as they migrate to the cloud. Fortanix recognizes the vastness of compute infrastructure ...continue reading Protecting Data In Use With Fortanix Runtime Encryption and Intel® SGX

The post Protecting Data In Use With Fortanix Runtime Encryption and Intel® SGX appeared first on IT Peer Network.



The post Protecting Data In Use With Fortanix Runtime Encryption and Intel® SGX appeared first on Blogs@Intel.

          PowerArchiver 2018 Standard 18.01.04 Multilingual Portable      Cache   Translate Page

PowerArchiver 2018 Standard 18.01.04 Multilingual Portable | 70.2 Mb
Full version of PowerArchiver that includes all of the compression and encryption features along with a set of useful tools for your archives. PowerArchiver 2018 Standard includes the new advanced PA format and features the Explorer mode for easier management of your files.

What's Included:
Create and extract ZIP, ZIPX, PA, 7z, TAR/GZ/BZ2, CAB, ISO, open 60+ formats. Full Windows 7/8 and 10 support with UAC elevation and VSS! FIPS 140-2. Multicore compression and fastest RAR extraction.                                                                                                                                    Fastest ZIP/ZIPX engine. Most advanced .PA format!

Over 60 formats supported
Support for over 60 various compression formats! ZIP, ZIPX, RAR, PA, ISO, TAR and more.

Best ZIP support
Best ZIP/ZIPX support - Multi-core compression, Unlimited size, full ZIPX, 256 bit AES Encryption and more.

Explorer mode
Full Explorer replacement mode with dual panels and great archive support.

Customizable with skins
10 skins built in, more on our website. Full skinning support for GUI, icons and format icons.

Native support for 4k screens
Support for large resolution 4K screens and large DPI modes.

Advanced Codec Pack - (.PA)
Support for the PA format - the most advanced compression format with strongest compression rates.

Modern/Ribbon interface
Full Modern/Ribbon interface, Microsoft Office licensed! (optional)

10 different tools
Convert Archives, Batch Compression, Join Archives, Multi-Extract, and much more!

Windows Explorer shell extensions
Full support for Windows Explorer shell extensions.

Operating systems: Windows 10, 8.1, 8, 7, Vista, XP, Windows Server 2016, 2012, 2008, 2003

Home Page -

Download link:

Links are Interchangeable - No Password - Single Extraction

          David Rosenthal: Making PIEs Is Hard      Cache   Translate Page      
In The Four Most Expensive Words In The English Language I wrote:
Since the key property of a cryptocurrency-based storage service is a lack of trust in the storage providers, Proofs of Space and Time are required. As Bram Cohen has pointed out, this is an extraordinarily difficult problem at the very frontier of research.
The post argues that the economics of decentralized storage services aren't viable, so the difficulty of Proofs of Space and Time isn't that important. All the same, this area of research is fascinating. Now, in One File for the Price of Three: Catching Cheating Servers in Decentralized Storage Networks Ethan Cecchetti, Ian Miers, and Ari Juels have pushed the frontier further out by inventing PIEs. Below the fold, some details.

Here's the problem the Cornell team is working on:
Decentralized Storage Networks (DSNs) such as Filecoin want to store your files on strangers spare disk space. To do it properly, you need to store the file in multiple places since you don't trust any individual stranger's computer. But how do you differentiate between three honest servers with one copy each and three cheating servers with one copy total? Anything you ask one server about the file it can get from its collaborator.
This is most of the problem of Proofs of Space. Their solution is:
the world's first provably secure, practical Public Incompressible Encoding (PIE). A PIE lets you encode a file in multiple different ways such that anyone can decode it, but nobody can efficiently use one encoding to answer questions about another. Using known techniques, you can ask simple questions to see if someone is storing an encoded replica, giving you a Proof of Replication (PoRep).
In other words, instead of storing N identical replicas of the original file, N different replicas are stored. From any one of the different replicas, the original file can be recovered. But an auditor can ask questions that are specific to each individual replica.

Anyone can already do this for private data:
Sia, Storj, MaidSafe, etc. do this by encrypting your pictures three times and distributing those encrypted copies. This strategy solves the problem perfectly if you're the one encrypting your photos and someone else is storing them.
But not for public data. The Cornell team's goal is to do it for public data such as blockchains:
What happens if it's a public good like blockchain state? Blockchains are getting huge—Ethereum is over 75 GB and growing fast—and it's really expensive to have everyone store everything. But who encrypts the blockchain state? Everyone needs to read it. And worse, we don't trust anyone to encrypt it properly. We need something totally different that anyone can check and anyone can decode.
The process of encrypting each of the "copies" needs to be slow, and previous proposals about how to make it slow have been broken. The Cornell team's proposal describes their computation as:
a directed acyclic graph (DAG). Each vertex represents an operation with two steps: first we derive a key using KDF [Key Derivation Function - think hash], and then we encrypt some data using that key. Edges are either data edges, representing the inputs and outputs of the encryption, or key edges, representing the data used by KDF to derive the key.
In order to ensure that a copy is intact, the computation must be:
A depth-robust graph (DRG) is a DAG with ... this property: even if a (potentially sizable) fraction of the vertices are removed, it retains a long path.
Thus, if the computation is a DRG, not storing some of the data doesn't avoid the worst case. But that's not enough. What's needed is that not storing all of the data doesn't avoid the best case. The Cornell team ensure this by layering alternate DRGs with:
a second type of graph called butterfly graph, which has the property that there's a path from every input node to every output node. This graph, with its dependency of every output on every input, helps ensure, roughly speaking, that Mallory must compute every input node, and therefore cannot avoid computing along the long sequential path in the depth-robust graph.
The result is what they call a Dagwood sandwich. Now they have a Public Incompressible Encoding, they propose to use it to build a Decentralized Storage Network:
Pretty much any PIE-based DSN architecture involves two steps for a given file:
  1. Prove once that the file is encoded correctly.
  2. Audit by verifying continuously that the file is intact.
Let's start with (1). Storage providers in the DSN must prove to somebody—the file owner or the network—that an encoding G of a file F is a correct PIE. Given an authenticated version of F, such as a hash stored in a trusted place, it's easy to verify that a PIE is correct.
I hope to return to the issues raised by "Given an authenticated version of F" in a later post. As with LOCKSS:
As for (2), it's not much help for G to be correct if it goes missing. It's critical to continuously check that storage providers are still storing G and haven't thrown data away. There are a number of efficient, well established techniques for this purpose.
So far, I may be a bit hazy on the details but I think I understand the big picture. They then propose:
A blockchain can then perform the auditing. This could be an existing blockchain like Ethereum or, as with schemes like Sia, a new one whose consensus algorithm is independent of its storage goals. A particularly intriguing option, though, is to create a new blockchain where audit = mining.
The idea of audit = mining is where they lose me. Here follows the explanation for my confusion.

In conventional blockchains such as Bitcoin's, a miner (or more likely a mining pool) decides which transactions are in the block it will mine. Among them will be one coinbase transaction:
A special kind of transaction, called a coinbase transaction, has no inputs. It is created by miners, and there is one coinbase transaction per block. Because each block comes with a reward of newly created Bitcoins (e.g. 50 BTC for the first 210,000 blocks), the first transaction of a block is, with few exceptions, the transaction that grants those coins to their recipient (the miner). In addition to the newly created Bitcoins, the coinbase transaction is also used for assigning the recipient of any transaction fees that were paid within the other transactions being included in the same block.
If the block the miner created wins, the coinbase and other transactions in the block take effect. The miner has created their own reward for the resources they devoted to the primary function of the blockchain, in this case, verifying transactions.

In DSNs, the major costs are incurred by the storage nodes. Audit is a minor, albeit necessary, cost. Presumably, a storage node cannot audit itself. Thus audit is a function that some other node has to perform on behalf of each storage node. Audit = mining, as I see it, gives rise to a number of issues:
  • Auditors will create the blocks they mine, deciding which transactions are included, and thus which nodes they audit for this block. Among the transactions will be the coinbase transaction, rewarding the auditor for auditing. How are the storage nodes rewarded for storing data? Presumably, the idea is that the auditor will also include transactions that transfer fees paid for storage from the owners of the data they store to each of the nodes audited in this block. This means that storage nodes will depend on the kindness of strangers to get paid.
  • So, like wallets that want to transact Bitcoin, storage nodes will need to pay fees to auditors. Like transactions in Bitcoin, storage nodes will be in a blind auction for auditing, leading to both over-bidding and long delays from under-bidding.
  • For the same economic reasons as in Bitcoin, auditors will forms pools. Auditing will be dominated by a few large pools. They will be able to collude in various forms of anti-competitive behavior, such as auditing only storage nodes which are members of the pools, or charging higher audit fees to non-members. Doing so would increase the costs of competing storage nodes.
  • But the key point is that if the economics are to work out, audit fees and the inflation of the cryptocurrency by the issuance of audit rewards must be only a small part of the cost of running a storage node. In The Four Most Expensive Words In The English Language I pointed out that DSN storage nodes can't charge more than Amazon's S3, and realistically have to charge much less. Thus the income from auditing has to be minuscule.
  • But the idea is that audit = mining. It may seem like a laudable goal to make mining cheap, but it is problematic. Eric Budish writes:
    From a computer security perspective, the key thing to note ... is that the security of the blockchain is linear in the amount of expenditure on mining power ... In contrast, in many other contexts investments in computer security yield convex returns (e.g., traditional uses of cryptography) — analogously to how a lock on a door increases the security of a house by more than the cost of the lock.
    Bram Cohen's Chia Network is using Proofs of Space and Time to force miners to waste resources by storing large amounts of otherwise useless data, so running a miner is expensive. But if audit = mining in a DSN storing useful data, running a miner (= auditor) has to be cheap, and thus the network will be vulnerable.
Cecchetti et al don't elaborate on the details of their audit = mining concept, and a Google search doesn't reveal other sources for details. So it is possible that I have misinterpreted their ideas. But unless they have some way to make mining (= auditing) expensive, they are on the wrong track.

          gosuslugi-plugin (      Cache   Translate Page      
Gosuslugi Plugin is an browser add-in for using GOST encryption algorithms on electronic government services

          'PortSmash' Brings New Side-Channel Attack to Intel Processors      Cache   Translate Page      
New vulnerability exposes encryption keys in the first proof-of-concept code. Source link
          Research from Radboud University shows some popular SSDs may have vulnerabilities      Cache   Translate Page      

SSD manufacturers often use Advanced Encryption Standards (AES) to encrypt their drives.

The post Research from Radboud University shows some popular SSDs may have vulnerabilities appeared first on Techaeris.

          eyeDisk Announces the Launch of Their Unhackable USB Flash Drive With Iris Recognition Technology      Cache   Translate Page      
...most secure method of authentication available. Combined with data encryption, it is the safest way to store valuable personal and business data," says Jerry Wang , founder of eyeDisk. eyeDisk is easy to set up with a simple 3 step method. For ...

          LXer: Cryptomator Cloud Storage Encryption Tool 1.4.0 Released With FUSE / Dokany Support      Cache   Translate Page      
Published at LXer: Cryptomator, a free and open source, cross-platform client-side encryption tool for cloud files, was updated to version 1.4.0. With this release, Cryptomator can use FUSE on...
          Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group      Cache   Translate Page      
This paper proposes a novel reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. In the proposed method, groups of adjacent pixels are randomly selected, and reversibly embedded into the rest of the image to make room for data embedding. In each group, there are a reference pixel and a few host pixels. Least significant bits (LSBs) of the reference pixels are reset before encryption and the encrypted host pixels are replaced with the encrypted reference pixel in the same group to form mirroring ciphertext groups (MCGs). In such a way, the modification on MCGs for data embedding will not cause any pixel oversaturation in plaintext domain and the embedded data can be directly extracted from the encrypted domain. In an MCG, the reference ciphertext pixel is kept unchanged as a reference while data hider embeds the encrypted additional data into the LSBs of the host ciphertext pixels by employing homomorphic multiplication. On the receiver side, the hidden ciphertext data can be retrieved by employing a modular multiplicative inverse operation between the marked host ciphertext pixels and their corresponding reference ciphertext pixels, respectively. After that, the hidden data are extracted promptly by looking for a one-to-one mapping table from ciphertext to plaintext. Data extraction and image restoration can be accomplished without any error after decryption. Compared with the existing works, the proposed scheme has lower computation complexity, higher security performance, and better embedding performance. The experiments on the standard image files also certify the effectiveness of the proposed scheme.
          Security: HardenedBSD, BitLocker, Updates, Google Play, Ubuntu and Reproducible Builds      Cache   Translate Page      
  • Stable release: HardenedBSD-stable 11-STABLE v1100056.8
  • Your Data Might Be At Risk Even In Encrypted Drives, Researchers Find Major Vulnerabilities In Hardware Encryption Present In Some SSDs [Ed: BitLocker is fake encryption. Microsoft put back doors in it.]

    Talking about software, BitLocker is a full-disk encryption software offered by Windows. Although the researchers show its very unreliable. It uses the hardware encryption present on the drives by default, thus the vulnerabilities remain. The researchers state “BitLocker, the encryption software built into Microsoft Windows, can make this kind of switch to hardware encryption but offers the affected disks no effective protection in these cases. Software encryption built into other operating systems (such as macOS, iOS, Android, and Linux) seems to be unaffected if it does not perform this switch.” This can be fixed by forcing software encryption on BitLocker.

  • Security updates for Tuesday
  • Banking Trojans sneaked into Google Play store disguised as apps

    Malware authors keep testing the vigilance of Android users by sneaking disguised mobile banking Trojans into the Google Play store. We’ve recently analyzed a set of 29 such stealthy Trojans, found in the official Android store from August until early October 2018, masquerading as device boosters and cleaners, battery managers and even horoscope-themed apps.

  • These Apps On Google Play Store Can Steal Your Bank Details
  • How Ubuntu is at the forefront of security & compliance

    Whether it is HIPAA, MiFID II or GDPR, the importance of being compliant cannot be underestimated. Protecting your customers and avoiding the significant financial and reputational ramifications that threaten non-compliant organisations, is a must, and this starts with the technology powering your enterprise.

    Ubuntu is used by businesses spanning all sizes, industries and geographies, and at the foundation of the relationship between Ubuntu and its users is trust and the assurance that Ubuntu will provide a compliant platform upon which to conduct business.

    Canonical, the company behind Ubuntu, provides businesses with compliance-enabling technologies. The Landscape management tool can help ensure the latest patches are in place, avoiding negligence in complying with GDPR data standards.

  • Reproducible Builds: Weekly report #184

read more

          Security guarantees will be meaningless under encryption-busting laws: Senetas      Cache   Translate Page      
If an Australian company is compelled by legislation to deny that a capability in its products exists, then its assertions are meaningless, security company Senetas has said.
          Network and Security Administrator      Cache   Translate Page      
NY-Staten Island, We are seeking a Network and Security Services Administrator who can maintain and troubleshoot Local Area Network, Wide Area Networks, Wireless Networks and Remote Access in addition to, leading optimal installations and configurations of Data Controls, System Security, Encryption Management, Identity and Access Controls, and Compliance Monitoring. This also includes ensuring virus protection soft
          Microsoft Security Advisory for self-encrypting drives      Cache   Translate Page      

Microsoft published the security advisory ADV180028, Guidance for configuring BitLocker to enforce software encryption, yesterday. The advisory is a response to the research paper Self-encrypting deception: weaknesses in the encryption of solid state drives […]

Ghacks needs you. You can find out how to support us here or support the site directly by becoming a Patreon. Thank you for being a Ghacks reader. The post Microsoft Security Advisory for self-encrypting drives appeared first on gHacks Technology News.

          Cloud Security Consultant - 262051 - Procom - Québec City, QC      Cache   Translate Page      
Knowledge of networking (TCP / IP, OSI model) and computer security technologies (firewall, IDS / IPS, DDoS, WAF, encryption, IAM, SIEM, etc.);...
From Procom - Thu, 11 Oct 2018 21:04:53 GMT - View all Québec City, QC jobs
          BestCrypt Container Encryption 9.03.14 / Volume Encryption 4.02.07      Cache   Translate Page      
Пакет программ для создания на жестком диске компьютера виртуального зашифрованного диска (одного или нескольких), с которым можно работать точно так же, как с обычным
читать дальше >>
          Weak self-scrambling SSDs opens up Windows BitLocker      Cache   Translate Page      
Crucial MX300 Adding software encryption recommended to boost BitLocker security.

Users whose believe the data on their drives are protected with Microsoft's Windows Bitlocker could be in for lengthy workarounds, after researchers showed that the default hardware-based encryption on solid state storage isn't secure.

Carlo Meijer and Bernard van Gastel of Radboud University, Netherlands, detailed in their paper [pdf] how techniques known to be used by the US National Security Agency (NSA) can get around encryption that looks strong and impenetrable on paper.

This is a problem for Bitlocker which defaults to hardware encryption on SSDs as per the Trusting Computing Group Opal Self Encrypting Drive (SED) specification.

Bitlocker can be coaxed into using software encryption with the Windows Group Policy tool, if users have admin rights on the computers in question.

However, on Bitlocked drives that are already using the default hardware encryption, changing Group Policy settings has no effect.

"Only an entirely new installation, including setting the Group Policy correctly and securely erasing the internal drive, enforces software encryption," the researchers noted.

As a workaround to boost Bitlocker security, the researchers suggested using an open source utility such as VeraCrypt along with the SSD hardware encryption.

Using different techniques such as Joint Test Action Group (JTAG) industry standard debugging ports, and modified firmware or password validation, the researchers found that they could bypass full disk encryption on the following solid-state drives:

  • Crucial MX100
  • Crucial MX200
  • Crucial MX300
  • Samsung 840 EVO
  • Samsung 850 EVO
  • Samsung T3
  • Samsung T5

Crucial and Samsung were given six months by the researchers to issue fixed firmware for the SSDs; while the former company updated all three models, Samsung only issued new firmware for the T3 and T5, and recommends software encryption for the 840 and 850 EVO drives.

With improved cryptographic hardware in modern processors the main reason for using only the built-in encryption feature in SSDs - improved performance - no longer applies, the researchers said.

Instead, they suggested a combination of the two for users to keep their data on SSDs secure.

"One should not rely solely on hardware encryption as offered by SSDs for confidentiality," they said.

"We recommend users that depend on hardware encryption implemented in SSDs to employ also a software full-disk encryption solution, preferably an open-source and audited one.

Got a news tip for our journalists? Share it with us anonymously here.

          Self-encrypting SSDs vulnerable to encryption bypass attacks      Cache   Translate Page      

Researchers have discovered security holes in the hardware encryption implementation of several solid state disks (SSDs) manufactured by Crucial (owned by Micron) and Samsung, which could allow attackers to bypass the disk encryption feature and access the data on them without having to know the user’s password. The findings Carlo Meijer and Bernard van Gastel from Radboud University have analyzed the security of seven SSD disks by reverse engineering their firmware: Crucial MX100, MX200, and … More

The post Self-encrypting SSDs vulnerable to encryption bypass attacks appeared first on Help Net Security.

          Researchers Discover A Way to Bypass Hardware-Based SSD Full Disk Encryption      Cache   Translate Page      
Researchers Discover A Way to Bypass Hardware-Based SSD Full Disk Encryption Researchers from Radboud University in the Netherlands have announced a flaw that affects some SSDs that feature hardware-based security; the flaw could allow an attacker to completely bypass disk encryption. Bypassing the encryption would give the hackers full access to the local data without having to know the password for the disk. The

          Supply of synthetic enamel paint      Cache   Translate Page      
Tenders are invited for Supply of synthetic enamel paint

EMD Amount In Rs: 0

1) name of work: supply of synthetic enamel paint for painting of bench, cpa, gate etc. In various parks in ward no. 69-s, south zone/sdmc
estimated cost: 1,99,800/-
head of account: i-130-1061
earnest money: 3,996/-
tender cost: 500/-
time of completion: 1 month
validity of quoted rates: 06 months

Re-encryption of online bids: 16-11-2018 17:31 - 19-11-2018 13:30
          VPN Extensions are not for privacy      Cache   Translate Page      

I don't know since when VPN extensions have become popular, but VPN extensions should actually be called proxy extensions. The underlying involves no VPN but proxy, yet they claim they are as secure and private as a regular VPN.


After several pentests and personal researches on VPN extensions, I can conclude that almost all VPN extensions are vulnerable to different levels of IP leaks and DNS leaks. Ironically, although most of them are results of extensions' misconfigurations, browsers are also responsible as there are a lot of pitfalls and misleading documentations on proxy configurations.

Chrome and Firefox both provide an API for extensions to register a PAC (Proxy Auto-Configuration) script. It is a JavaScript file that exposes a function FindProxyForURL(url, host) which instructs browsers whether or not a request should be forwarded to a proxy server. Helper functions are also provided to build conditions. I am going to cover the most identified issues regarding misuses of PAC scripts in the following paragraphs.

Split tunneling

It is quite common to see VPN extensions try to resolve the hostname of a request, and allow private addresses to bypass the proxy. This allows a user to access an Intranet and proxied Internet at the same time.

function FindProxyForURL(url, host) {
  let ip = dnsResolve(host);
  if (isInNet(ip, "", ""))
    return "DIRECT";

However, it is simply impossible to achieve this without introducing DNS leaks. Since dnsResolve is called, a DNS query will be made for every request using local DNS servers, which are ISP-provided by default. This allows:

  • a website to identify what ISP a user is using
  • an on-path eavesdropper (e.g. ISP) to see what websites a user is visiting

Incorrect Use of Helper Functions

Another very common issue is extensions misunderstanding how helper functions work.

function FindProxyForURL(url, host) {
  if (shExpMatch(url, "*://*") ||
    shExpMatch(host, "192.168.*.*") ||
    dnsDomainIs(host, "") ||
    return 'DIRECT';

In Chrome, there is something called a match pattern that defines what URLs an extension is allowed to touch. It uses URL format and a wildcard character.


Naturally, developers think shExpMatch should work the same way probably because it also supports the same wildcard character. However, its expression is very different from a match pattern as it is not URL-aware. For example, bypasses the proxy because it matches the expression *://*. Similarly, bypasses the proxy because its hostname matches 192.168.*.*. A website can leak a user's IP address by making their browser issue a request to those URLs.

dnsDomainIs has a confusing description.

Returns true if and only if the domain of hostname matches.

It sounds like the function compares if the two arguments are equal. In fact, some examples also suggest that this is the case. What the description actually refers to as hostname is just the subdomain part. For example, dnsDomainIs("", "") returns true since is a subdomain of This alone does not introduce any security issues but Chrome has an intended implementation bug where it only matches the tail. This allows an attacker to register the domain to pass dnsDomainIs(host, "") and leak a user's IP address.

isPlainHostName is an interesting one. It returns true when the hostname does not contain a dot. A hostname without a dot indicates it belongs to an intranet, so letting it bypass the proxy seems reasonable. Except it is not always the case. Some TLDs like http://ai are accessible through the Internet and therefore can bypass the proxy. Fortunately, it is rather infeasible to exploit this becaues an attacker needs to own a TLD. It is worth mentioning that Chrome takes a step further to exclude IPv6 addresses since they are also dot-less (e.g. [::1]) which would have introduced another bypass.


Loose Matching

Yet another frequent issue is extensions do not use the provided helper functions. This might be as a result of developers not being aware of the provided helper functions or Firefox not supporting them.

The global helper functions usually available for PAC files (isPlainHostName(), dnsDomainIs(), and so on) are not available.

In many cases, native JavaScript functions are used directly or as polyfills instead.

function FindProxyForURL(url, host) {
  if (host.indexOf("localhost") !== -1 ||
    /^127\./.test(host) ||
    isPlainHostName(host) ||
    url.substring(0, 4) !== 'http'
    return 'DIRECT';
function isPlainHostName(host) {
  return'\\.') === -1;

Extensions trying to whitelist certain hostnames are a common occurrence, but in an inaccurate manner. For example, they only look for substring in the host or the beginning of the host ( passes both host.indexOf("localhost") !== -1 and /^127\./.test(host)). Occasionally, RegExp mistakes are involved (e.g. not escaping .).

As said earlier, Firefox does not support helper functions. Therefore Firefox extensions have to implement a polyfill for functions like isPlainHostName. Seemingly, it only needs to check if a hostname is dot-less according to the documentation. What they oversee is the aforementioned IPv6 issue. Here an attacker can leak a user's IPv6 address by making their browser issue a request to an IPv6 host.

Sometimes, extensions don't want to handle non-HTTP traffic so they allow URLs not starting with http to bypass the proxy (url.substring(0, 4) !== 'http'). This simply opens up an opportunity for a website to leak a user's IP address by forcing their browser to issue non-HTTP requests. They can be FTP (ftp://) and WebSocket ws:// & wss://).

Whitelised Hostnames

A couple extensions have a whitelist for proxy bypass. They are usually the company's domains (*, DNS loopback services (e.g., Google services, and bandwidth intensive services (e.g. CDN and streaming sites). A user visiting a whitelisted website will have their IP leaked.

Unencrypted Proxy Protocols

Some extensions use protocols that are considered not secure.

function FindProxyForURL(url, host) {

PAC script supports four proxy protocols. HTTP (PROXY & HTTP), HTTPS (HTTPS), SOCKS4 (SOCKS & SOCKS4) and SOCKS5 (SOCKS5). While HTTPS tunnels are secure thanks to TLS, HTTP and SOCKS do not support encryption. This means an on-path eavesdropper can easily intercept the traffic as if there is no VPN, or proxy rather.

DNS Prefetching

Chrome has a feature called DNS Prefetching.

DNS prefetching is an attempt to resolve domain names before a user tries to follow a link. This is done using the computer's normal DNS resolution mechanism; no connection to Google is used.

Chrome automatically prefetches DNS for:

  • suggested items in the Omnibox (address bar)
  • hyperlinks in a HTTP page or a site optting in DNS prefetching

Most importantly, this feature is enabled by default even when a proxy is turned on as demonstrated below.

[embedded content]

This affects all extensions that use a PAC script (but not fixed servers) and essentially results in DNS leaks. Opera's built-in VPN is also affected.

Updated: All Chrome VPN extensions are affected

The only mitigation is for users to manually disable this feature:

  1. Navigate to chrome://settings/
  2. Type "predict" in "Search settings"
  3. Disable the option "Use a prediction service to help complete searches and URLs typed in the address bar" and "Use a prediction service to load pages more quickly"

In addition to PAC scripts, Chrome allows extensions to set up fixed proxy servers. This acts like a PAC script with only the return statement. It does support a simple bypass list using match patterns.

Incorrect Documentation

The documentation for the bypass list states that:


Match local addresses. An address is local if the host is "", "::1", or "localhost".
Example: "<local>"

So this is pretty straightforward that this entry makes loopback addresses bypass the proxy. Wrong. Looking through the source code of Chromium reveals a different story:

class BypassLocalRule : public ProxyBypassRules::Rule {
  bool Matches(const GURL& url) const override {
    const std::string& host =;
    if (host == "" || host == "[::1]")
      return true;
    return host.find('.') == std::string::npos;

  std::string ToString() const override { return "<local>"; }

  std::unique_ptr<Rule> Clone() const override {
    return std::make_unique<BypassLocalRule>();

The Matches method returns true not only for loopback addresses ( and [::1]), but also any hostnames without a dot. This is exactly the same issue with isPlainHostName. This again enables IPv6 leaks.

In Chrome, you can go to chrome://net-internals#proxy to see the effective proxy settings. To extract the PAC script, copy everything after base64, and run atob("PASTE_HERE") in the DevTools' console. There is no easy way for Firefox other than extracting the source code.


The whole thing is a complicated mess involving VPN vendors and browsers. I've reported some of the issues to the affected parties but there doesn't seem to be much progress. Some of the edge cases I have not included can be more severe (e.g injection in PAC script to control proxy settings).

In my opinion, VPN extensions are great for bypassing geoblocking, but a big no-no for anonymity and privacy.

          Update - Freeware - Cryptomator v1.4.0      Cache   Translate Page      
Cryptomator provides you with free, Open Source client-side encryption for your cloud files. It works with any cloud provider, including Dropbox, Google Drive, OneDrive and any other storage service.....
          Exadata DBA Architect      Cache   Translate Page      
CA-Pleasanton, job summary: Randstad Technologies is currently seeking a talented Exadata DBA Architect to join a well-known client of ours within a location in the Pleasanton area. This highly skilled Exadata DBA Architect will have extensive experience in Oracle Lab environments and will be able to set up encryption and security for a larger multi-user environment. Must be legally authorized to work in the U.S
          ISC StormCast for Tuesday, November 6th 2018      Cache   Translate Page      
Struts 2.3 Uses Outdated commons-fileupload library
Fake Elon Musk Tweet used to steal Bitcoin
Bypassing SSD Drive Hardware Encryption

          Medtec China 2018 was successfully held in Shanghai this past September; 90% of the booths for next year have been booked      Cache   Translate Page      

SHANGHAI, Nov. 7, 2018 /PRNewswire/ -- Medtec China 2018 was successfully held at the Shanghai World Expo Exhibition & Convention Center September 26-28th, 2018. The three-day event succeeded in bringing together 354 exhibitors from 23 countries and regions of the world, serving as a premium quality forum for medical device R&D, production technology, materials, components, manufacturing devices, testing equipment, and regulation service and support for multinational medical device manufacturers to set up production and R&D bases in China.

Visitors in the exhibition hall
Visitors in the exhibition hall

Numbers of visitors and exhibitors reaches a new high

As a medical device design and manufacturing industry annual grand gathering, Medtec China 2018 received 21,583 visits from 4,643 companies, representing a 17.5% increase compared with 2017. Click here to check the "Post Show Report 2018".

354 exhibitors were represented and the exhibition scale increased by 17%. Exhibitors were mostly satisfied with their exhibiting experience -- more than 85% of exhibitors rebooked booths for the 2019 show. So far, almost 90% of the booth area has already been booked. To secure a booth at Medtec China 2019, please click here.

Assembling the best brands of MedTech in China

As the world-leading exhibition dedicated to the Medical Device Design and Manufacturing Industry in China, Medtec China gathers together both international and domestic brands at the show to meet all kinds of needs from visitors.

Medtec China boasts strong resources in Medical Automation, for example, through the presence of Mickron, Kahle Automation, TP Concept, Leedon, Maider, Shenzhen City North Credibility, and Chongzhan Intelligent.

Medical Materials and Components are also some of Medtec China's strong fields. 3M, Eastman, DSM, and Covestro, as leading companies in the medical materials field, have been attending Medtec China for many years. Furthermore, Furukawa Techno, Suzhou Bank Valley, Teknor Apex, and Wynca have also joined Medtec China over the years as the new generation of exhibitors. With regards to precision components, home suppliers such as Starpoint, Rapid Manufacturing, Shenzhen Sinowares, Changzhou Aron, and Ningbo OULAIKE have also provided various choices to visitors.

Visitors viewing an exhibit
Visitors viewing an exhibit

The newly-launched REGULATORY STREET appealed to visitors. REGULATORY STREET provides comprehensive regulatory consultant services. Exhibitors knoell Germany GmbH, WuXi AppTec, and NAMSA were present in this zone at Medtec China 2018. The "Regulation Lecture" also took place in this zone.

Germany and Singapore Pavilions upgraded. This year 11 companies exhibited at the German pavilion, while the Singapore pavilion welcomed 8 exhibitors. These exhibitors showed specialty cables, automation, sealing detection equipment, plastic welding technology, dialyzer assembling equipment, software encryption services, and non-standard precision components.

Concurrent Conference and Onsite activities grasp industry trends

Medtec China 2018 invited 49 keynote speakers from the government, enterprises and agencies to talk about hot topics including Regulation, Quality, Technology, Markets and Investment. 900 conference delegates participated in more than 61 sessions. Topics included: Chinese Regulatory Updates and Compliance, MDSAP updates and FDA Inspection, Concepts and Ways of Medical Device Design, and Pack&Ster Hub.

Chinese Regulatory Updates and Compliance
Chinese Regulatory Updates and Compliance

Concurrent activities provided an efficient interaction platform for exhibitors and visitors. The Exhibitor Theatre, the 4th Market Report Track of Medical Device Industry, the Elkem Silicones Healthcare Seminar, the Wuxi AppTec Medical Device Testing Business China Launch Event, the MicroPort technology seminar, the Quality Expo and the MDEA global medical design excellence awards all provided more take-aways for exhibitors and visitors.

Onsite complimentary activity
Onsite complimentary activity

Medtec China 2019 will be held at the Shanghai World Expo Exhibition & Convention Center September 25-27th, 2019. To obtain more information, please visit our website:

Media\Exhibit\Visit\Conference Contact:

Sophia XU
UBM China
T: +86 10 5730 6095

Photo -
Photo -
Photo -
Photo -

Related Links :

          Samsung, Crucial’s Flawed Storage Drive Encryption Leaves Data Exposed      Cache   Translate Page      
Firmware updates won't address the problem, so admins need to take other action.
          'PortSmash' Brings New Side-Channel Attack to Intel Processors      Cache   Translate Page      
New vulnerability exposes encryption keys in the first proof-of-concept code.
          Adiantum Is Taking Shape As Google's Speck Replacement For Low-End Device Encryption      Cache   Translate Page      
Earlier this year when Google added Speck-based file-system encryption support to the Linux kernel they intended it to be used by low-end Android phones/smartwatches with older ARM processors lacking the dedicated ARM cryptography extensions. Speck is fast enough to provide disk encryption on the low-end hardware, but ultimately they decided against Speck due to public outcry with the algorithm potentially being compromised by the US NSA. Instead Google engineers decided to pursue HPolyC as their new means of encryption on low-end hardware while now that has evolved into a new technology dubbed Adiantum...
          Elastic Support Alert: Kibana Reporting Vulnerability      Cache   Translate Page      

Elastic has recently identified that the Kibana reporting feature used to generate PDF reports unintentionally transmits user authentication credentials (i.e., Kibana username and password in reversible hashed format) in the HTTP headers used to request data from external resources whose data may be incorporated into the report.


User credentials are encrypted at rest by Kibana and are intended for use to authenticate to an Elasticsearch server to generate reports but are not intended to be transmitted to external resources. However, in this case, the HTTP headers used to request data from external resources in connection with the Kibana PDF reporting feature also included user credentials. The types of external resources or services that may be reported in Kibana include web proxies, Kibana URL field formatters, Timelion visualizations, markdown, Vega visualizations and mapping services.

To address this issue we have released ESA-2018-17 (CVE-2018-17245), Elastic Stack versions 5.6.13 and 6.4.3 contain fixes for this issue.

Affected Users

This issue affects Kibana users on versions 4.0 to 4.6, 5.0 to 5.6.12, and 6.0 to 6.4.2 of the Elastic Stack for both self-managed and hosted deployments. It affects users who have used Kibana’s PDF reporting feature to include data from external resources. It is not triggered by requests to generate CSV reports.

Recommend Changing User Credentials

While requests to some of the external resources may have been conducted via HTTPS using encryption, there can be no assurance that all requests were encrypted and, in any event, the credential would have been exposed to external resource provider following receipt of such request. We note that we are not aware of any unauthorized use or access associated with any of the affected user credentials. Nevertheless, consistent with security best practices and as a precautionary measure, we recommend that all affected users change affected credentials.

Recommended Actions

If you are an affected Kibana user (i.e., (i) you have used Kibana’s PDF reporting feature to include data from external resources) and (ii) you are on one of the affected versions described above, then you should consider changing your credential as described below.

Native Realm

This recommendation applies where users have used the "native" registration feature of the Elastic Stack, i.e., have registered using the Kibana user management interface and have created a unique username and password at the time of registration. If you are native realm user of Kibana then your user details are stored in an Elasticsearch index. This means that the individual user can change his or her credentials directly using the Kibana user management interface or, alternatively, the Elastic Stack administrator can change all user credentials via an Elasticsearch API.

Please note that native is the default security realm for customers of our Elasticsearch Service on Elastic Cloud.

File Realm

This recommendation applies where the Elastic Stack is configured to use file based user authentication. Users are managed via the ‘user’ command line utility shipped with Elasticsearch. The Elastic Stack administrator must change all user credentials using command line tools.

LDAP and Active Directory Realms

This recommendation applies where the Elastic Stack administrator has enabled user registration utilizing user credentials stored in LDAP and Active Directory. Because these user credentials affect more services than just the Elastic Stack, all affected users should be instructed to change their user credentials for LDAP and Active Directory.

SAML Realm

The SAML realm is not affected by the plaintext disclosure flaw, but a session replay attack does affect the SAML realm. To address this potential attack, we have provided instructions below on how to expire all SAML tokens.

PKI and Kerberos Realms

The PKI and Kerberos realms are not compatible with Kibana at this time and are not affected by this flaw.

Custom Realms

If you have a custom realm you should review the authentication process to decide what actions should be taken.

Instructions for Expiring All SAML Tokens

Depending on number of tokens/users you may need to scroll. This is per SAML realm:

GET /.security/_search
    "query": {
        "bool": {
            "filter": [
                { "term": { "doc_type": "token" } },
                { "term": { "access_token.realm": "<SAML REALM NAME HERE>" } },
                { "bool": { "should": [
                    { "bool": { "should": [
                        { "term": { "access_token.invalidated": false } },
                        { "range": { "access_token.user_token.expiration_time": { "gte": "now" } } }
                    ] } },
                    { "term": { "refresh_token.invalidated": false } }
                ] } }

Each result from this query will contain two tokens that need to be invalidated. The first is refresh_token.token. Invalidate this by:

DELETE /_xpack/security/oauth2/token
    "refresh_token": "<REFRESH TOKEN VALUE HERE>"

The second value that needs to be invalidated is Invalidate this with:

DELETE /_xpack/security/oauth2/token
    "token": "<TOKEN VALUE HERE>"

Going Forward

Elasticsearch 5.6.13, 6.4.3, and above come with a bug fix for this vulnerability. If you are unable to upgrade, be sure to follow the recommended actions above.

Subscription customers are encouraged to reach out to their support contact. If you have questions, please visit our forum.

          Researchers Break Full-Disk Encryption of Popular SSDs      Cache   Translate Page      

The encryption mechanism used by several types of solid state drives contains vulnerabilities that an attacker could exploit to access encrypted data without knowing a password.

read more

          Moscow Apache Ignite Meetup #5      Cache   Translate Page      
Всем привет!

14 ноября приглашаем на очередную встречу Apache Ignite в Москве. Будет интересно архитекторам и разработчикам, интересующимся open source платформой для распределённых приложений Apache Ignite.


18:30 — 19:00 — Сбор гостей, приветственный кофе


  • Измерение производительности Apache ignite. Как мы делаем бенчмарки — Илья Сунцов (GridGain)
  • Apache Ignite TeamCity Bot: боремся с нестабильными тестами в Open Source сообществе — Дмитрий Павлов (GridGain) и Николай Кулагин (Сбербанк Технологии)
  • Transparent Data Encryption. История разработки major feature в большом open source проекте — Николай Ижиков, Apache Ignite Committerа

22:00 — 22:30 — Розыгрыш полезных книг и свободное общение

Мероприятие бесплатное, нужно зарегистрироваться
          Apple's New Hardware With The T2 Security Chip Will Currently Block Linux From Booting, by Michael Larabel, Phoronix      Cache   Translate Page      

Apple's T2 security chip being embedded into their newest products provides a secure enclave, APFS storage encryption, UEFI Secure Boot validation, Touch ID handling, a hardware microphone disconnect on lid close, and other security tasks. The T2 restricts the boot process quite a bit and verifies each step of the process using crypto keys signed by Apple.

          Flaws in self-encrypting SSDs let attackers bypass disk encryption      Cache   Translate Page      
Master passwords and faulty standards implementations allow attackers access to encrypted data without needing to know the user-chosen password.
          Vulnerabilidad en el cifrado nativo de las SSDs      Cache   Translate Page      
Investigadores de seguridad holandeses han descubierto [PDF] vulnerabilidades críticas en el cifrado nativo de SSD, las unidades de estado sólido que están dominando el mercado de consumo.

En comparación con los discos duros, la lógica que hace funcionar a las SSD es mucho más compleja, e incluye un SoC más potente y un sofisticado firmware que le dice al controlador dónde está físicamente cada bit de datos del usuario almacenado a través de una serie de chips flash NAND. No es sorprendente que cuanto más sofisticado sea el firmware de una SSD, más vulnerabilidades de seguridad potenciales pueda tener.

Es lo que han descubierto estos investigadores, básicamente que las tecnologías de cifrado nativo de SSD por hardware que incluyen la mayoría de unidades modernas son superables y permitirían a un atacante romper la seguridad y hacerse con los datos sin necesidad de la contraseña de acceso.

El equipo ha examinado dos de las marcas de SSD más vendidas, Crucial y Samsung, y sus productos más populares para el segmento cliente: MX100, MX200, MX300, 840 EVO, 850 EVO, T4 y T5 externos.
"El análisis descubre un patrón de problemas críticos entre los proveedores. En varios modelos, es posible omitir el cifrado por completo, lo que permite una recuperación de los datos sin ningún conocimiento de contraseñas o claves"
Los investigadores comentan que el patrón encontrado revela que los problemas "no son incidentales sino estructurales" y explican que en este escenario estándares como el TCG Opal utilizado es "extremadamente difícil de implementar correctamente"

Con acceso físico a los puertos de depuración del dispositivo, los investigadores pudieron realizar ingeniería inversa del firmware y modificarlo para acceder a los datos cifrados del hardware ingresando cualquier contraseña. También identificaron varias vulnerabilidades de corrupción de memoria, aunque "ninguna de las cuales pudieron ser explotadas con éxito para ganar control sobre la ejecución"explican.

También comprobaron que BitLocker, el software de cifrado integrado en Microsoft Windows no ofrece una protección efectiva en estos casos cuando se utiliza cifrado por hardware. El cifrado por software parece no verse afectado.

Los investigadores informaron de las vulnerabilidades a Crucial y Samsung antes de publicar sus hallazgos. Crucial ya ha lanzado parches de firmware para todas las unidades afectadas y Samsung ha lanzado parches de seguridad para sus SSD portátiles T3 y T5. Para sus unidades EVO, Samsung recomienda instalar un software de cifrado (disponible gratuitamente en línea) que sea compatible con su sistema hasta que publique un firmware dedicado.

La investigación no descarta que estas vulnerabilidades críticas en el cifrado nativo de SSD afecten a otros fabricantes y unidades.

Fuente: Muy Seguridad
          11/7/2018: News: Khalifa orders telecast of AGL ties free      Cache   Translate Page      
President His Highness Shaikh Khalifa Bin Zayed Al Nahyan has ordered for the removal of satellite encryption of all Arabian Gulf League matches and the President’s Cup in support of the national sports sector and to allow the public to access...
          Is the SSD used in V hardware-encryption safe? (more inside)      Cache   Translate Page      

Short answer you can’t. Encryption is always vulnerable at some point. The best way to encrypt something is through Linux with a very long master password. And then encrypt every major file you need to be unavailable to read.
But hardware encryption and more generally a whole disk encryption is never safe at 100%. For the moment there is more general preference to encrypt your disk by software than hardware.
For doing that,

          Is the SSD used in V hardware-encryption safe? (more inside)      Cache   Translate Page      

I found this concerning article:

Accoriding to it, the SSD may have not been manufactured or configured in a encryption-safe way (please read the article above for the details, I am honestly not an expect on this topic).
I ordered the V i7 with 1TB hard disk add-on back then. Can I be reassured on the hardware encryption’s master key?

Thank you

          Researchers find “pattern of critical issues” in SSD encryption      Cache   Translate Page      
Forum: HEXUS News Posted By: HEXUS Post Time: 06-11-2018 at 12:01 PM
          Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)      Cache   Translate Page      
> We have analyzed the hardware full-disk encryption of several SSDs by reverse engineering their firmware. In theory, the security guarantees offered by hardware encryption are similar to or better than software implementations. In reality, we found that many hardware implementations have critical security weaknesses, for many models allowing for complete recovery of the data without knowledge of any secret.

Everything is terrible.

> This challenges the view that hardware encryption is preferable over software encryption. We conclude that one should not rely solely on hardware encryption offered by SSDs.

source: green

          AShampoo Privacy Protector      Cache   Translate Page      
Ashampoo Privacy Protector is a great security tool that combines encryption, archiving and trace removal in one application. AES256-encrypted files can be instantly burned or emailed. There's also support for self-extracting archives for easy file a...
          D-LINK DSR-150, Unified services router, 1 10/100 Base-TX WAN Ports, 8 10/100Base-TX LAN Ports, 1xUSB 2.0 port support print server, Share Port, Firewall throughput 45Mbps, PPTP/L2TP, IPSec support DES, 3DES, AES, Twofish, Blowfish, CAST-128, NULL Encryption up to 10 tunnels, Static Routing Ipv6/IPv4, User Authentication, VPN, Bandwidth Management, VPN SSL up to 1 tunels D-Link Warranty 24 month(s) - 76,25 €       Cache   Translate Page      
          AMD FX-Series FX-8350 processzor - Jelenlegi ára: 10 575 Ft      Cache   Translate Page      

Takarítás 2. -remélhetőleg utolsó : ) - kör...
Kedves ismerősünktől vettük meg a házát, aki számítógépekkel foglalkozott, ám már egy ideje külföldön él.
Sokminden, főleg PC cucc, ittmaradt utána, melyeknek már egyszer nekiugrottam, s egy adagot eladtam itt, a vaterán.  
A módszer ugyanaz, mint korábban:
Villámár nincs, a legmagasabb licitáló a nyertes.
Nem vagyok PC-zseni, alap dolgokkal tisztában vagyok, de PRÓBÁLNI, TESZTELNI NEM TUDOM AZ ALKATRÉSZEKET,  ehhez mérten, a lehető legalaposabb leírást, és képeket mellékelem a dolgokról. Alap dolgokat értelemszerűen kipróbálok.
A félreértések, és rossz szájíz elkerülése érdekében...
ALAPVATŐEN MINDEN "HIBÁS/TESZTELETLEN"-ként kerül meghirdetésre,  
Személyesen többnyire Somogyszob,
esetleg PÉCS-en is megoldható kedves ismerősömnél, előre egyeztetve, s pár nap átfutással.
Egyéb esetben posta/futár.
Utánvét csak 15 pozitív értékelés felettieknek.
Mindannyiunk békéjének érdekében kérem, ezeket figyelmben tartani - jó licitálást!
További aukcióim:
https: //www. vatera. hu/listings/index. php? us=xname007
AMD FX-Series FX-8350 8x4GHz-es processzor
A lábai rendben vannak.
Részletes adatok:
CPU / Microprocessor
Market segment
AMD FX-Series
Model number  ?  
CPU part numbers
FD8350FRW8KHK is an OEM/tray microprocessor
FD8350FRHKBOX is a boxed microprocessor with fan and heatsink
FD8350FRHKHBX is a boxed microprocessor with low-noise fan and heatsink (Wraith cooler)
Frequency  ?  
4000 MHz
Maximum turbo frequency
4200 MHz
Boosted P states [1]
#1: 4200 MHz, 1. 425V
#2: 4100 MHz, 1. 4V
Bus speed  ?  
One 2600 MHz 16-bit HyperTransport link
940-pin organic micro Pin Grid Array (UOC940)
Socket AM3+
Weight [1]
1. 4oz / 38. 3g (CPU)
1lb 5. 3oz / 604. 6g (box)
Introduction date
October 23, 2012
Price at introduction
Architecture / Microarchitecture
Processor core  ?  
Core stepping  ?  
Manufacturing process
0. 032 micron
Data width
64 bit
The number of CPU cores
The number of threads
Floating Point Unit
Level 1 cache size  ?  
4 x 64 KB 2-way set associative shared instruction caches
8 x 16 KB 4-way set associative data caches
Level 2 cache size  ?  
4 x 2 MB 16-way set associative shared exclusive caches
Level 3 cache size
8 MB 64-way set associative shared cache
Extensions and Technologies
MMX instructions
Extensions to MMX
SSE / Streaming SIMD Extensions
SSE2 / Streaming SIMD Extensions 2
SSE3 / Streaming SIMD Extensions 3
SSSE3 / Supplemental Streaming SIMD Extensions 3
SSE4 / SSE4. 1 + SSE4. 2 / Streaming SIMD Extensions 4  ?  
SSE4a  ?  
AES / Advanced Encryption Standard instructions
AVX / Advanced Vector Extensions
BMI1 / Bit Manipulation instructions 1
FMA3 / 3-operand Fused Multiply-Add instructions
FMA4 / 4-operand Fused Multiply-Add instructions
F16C / 16-bit Floating-Point conversion instructions
TBM / Trailing Bit Manipulation instructions
XOP / eXtended Operations instructions
AMD64 / AMD 64-bit technology  ?  
AMD-V / AMD Virtualization technology
EVP / Enhanced Virus Protection  ?  
Turbo Core 3. 0 technology
Low power features
Low power P states [1]
#1: 3400 MHz, 1. 225V
#2: 2800 MHz, 1. 125V
#3: 2100 MHz, 1V
#4: 1400 MHz, 0. 875V
Integrated peripherals / components
Integrated graphics
Memory controller
The number of controllers: 1
Memory channels: 2
Supported memory: DDR3-1866
Maximum memory bandwidth (GB/s): 29. 9
Other peripherals
HyperTransport technology  ?  
Electrical / Thermal parameters
Maximum operating temperature  ?  
61° C
Thermal Design Power  ?  
125 Watt

AMD FX-Series FX-8350 processzor
Jelenlegi ára: 10 575 Ft
Az aukció vége: 2018-11-07 19:56
          Development studio connectivity error      Cache   Translate Page      

Hi all,


I am running BAO version 7.9.01. I have BAO installed on Linux env. I am running Development studio on windows 7.

I am facing issue while connecting studio with BAO env as follows given in the below diagram

I have deleted disco files and tried making connectivity but problem persisted.



below are grid logs (WARN) I am getting........



018 17:42:42,397 WARN  Launcher        : SSL validation disabled for all outgoing web-service calls

05 Nov 2018 17:42:44,777 WARN  AuthenticationServiceFactory : C:\Program Files\BMC Software\BAO\Studio\config\authentication.xml (The system cannot find the file specified)

05 Nov 2018 17:42:44,802 WARN  MessageFactory  : Can't find bundle for base name, locale en_US; fabricating bundle dynamically.

05 Nov 2018 17:42:44,808 WARN  MessageFactory  : Can't find bundle for base name, locale en_US; fabricating bundle dynamically.

05 Nov 2018 17:42:44,842 WARN  MessageFactory  : Can't find bundle for base name, locale en_US; fabricating bundle dynamically.

05 Nov 2018 17:42:46,054 WARN  Rectifier       : Rewriting files in order to bring them into compliance with current encryption settings. This may be a lengthy operation, but it will be allowed at most 300,000 milliseconds to complete.

05 Nov 2018 17:42:47,228 WARN  StudioResourceBundle : Could not find resource bundle value for key [editor.close.button.rollover]

05 Nov 2018 17:42:48,105 WARN  StudioResourceBundle : Could not find resource bundle value for key [views.librarymanager.export.confirm.snapshot.version.column.label]

05 Nov 2018 17:43:19,354 WARN  MessageFactory  : Can't find bundle for base name, locale en_US; fabricating bundle dynamically.


Let me know if any body got the solution for it.



Ravi Prasad

          AMD EPYC Rome 64-Core Server Versus Intel Dual Socket Xeon Platinum Benchmark      Cache   Translate Page      
HotHardware has video of the C-Ray raytracing benchmark shown at the AMD Horizon Event. The AMD exhibit demonstrated just how powerful the new 7nm EPYC Rome architecture is with its new chiplet design that was leaked by AdoredTV. An Intel 8180M dual socket Xeon Platinum CPU server with 56 cores total and 112 threads was matched against a single AMD Zen 2 EPYC Rome 64-core CPU based server. Needless to say, the 7nm AMD EPYC Rome CPU easily won the battle. AMD CEO Dr. Lisa Su says that the 7nm EPYC Rome CPU will be a 64-core, 128-thread processor. The entire slideshow can be viewed here. Thanks @juanrga ! In addition, AMD has been able to add some security enhancements with Zen 2 as well, including hardware mitigation for recently discovered Spectre CPU vulnerabilities. AMD has also increased the number of encryption keys for virtualization to allow companies to support more virtual machines. Infinity Fabric is now in its second generation, and I/O per die has been optimized to improve both latency and power. While Infinity Fabric itself is being kept on a 14nm process, the accompanying chipset for Zen will be built on 7nm. Discussion
          Bitocker compromised by SSD Encryption: How to deal with it      Cache   Translate Page      
Guidance for configuring BitLocker to enforce software encryption
          Blog: Ja, diskkryptering er noget hø      Cache   Translate Page      
En ny artikel med titlen "Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)" og den er god læsning. CFCS har minsanten ligefrem tweetet om det: Illustration: Poul-Henning Kamp Diskkryptering er tilfældigvis noget jeg brugte en masse tid på at forske i under e...
          Ensō: A PS Vita bootloader exploit      Cache   Translate Page      

HENkaku Ensō, the first ever permanent jailbreak (also known as a custom firmware) for all PlayStation Vita devices running home menu version 3.6 was released by molecule on 2017-29-07.

In this blog post I’ll explain how I found the vulnerability and how the exploit was developed and debugged. The rest, i.e. actually loading the jailbroken CFW, is covered in this follow-up article by Yifan Lu.

You might notice how in the linked post Yifan refers to Ensō as “one of the first vulnerabilities we found was in the bootloader”. This is an obvious lie, I found this vulnerability all by myself, trust me. Now that we’re clear on that, please carry on reading.


Bootloaders are a great target to exploit. Taking over the boot process early on lets us execute our code before the system has finished initializing, allowing for much more control compared to a more traditional exploit chain such as HENkaku. In some cases it might be possible to create a future-proof exploit, i.e. being able to keep the exploit working and having latest firmware’s features (for example, support for newer games) at the same time. Unfortunately, this is not the case with Vita and Ensō, but hacking the bootloader is still worth it.


  • ASLR: Address space layout randomization. The important thing here is that Vita bootloader doesn’t have it, so a memory corruption can be turned into an exploit fairly easily.
  • ARM: The main Vita processor is a quad core Cortex-A9. In addition, Vita has a security processor, which is a Toshiba MeP, a MIPS processor used for PSP compatibility, a bunch of PowerVR GPU cores using two custom assembly languages, syscon: an external Renesas chip, and more.
  • TrustZone: The CPU supports ARM TrustZone technology, which isolates so-called “trusted” code from the rest of the system. For the purposes of this article, however, you just need to know that it is somewhat of a one side barrier between trusted (aka secure) and untrusted code, allowing trusted code to gain control over untrusted but not vice-versa. Execution starts from secure mode and transfers to non-secure.
  • SBL: secure boot loader. This is the first code that runs on ARM. It sets up NSBL (see below) and transfers control to it after dropping out of the secure mode.
  • NSBL: non-secure boot loader. This is the first code that runs on ARM in non-secure mode (outside of TrustZone).
  • eMMC: This is the primary persistent storage on Vita. It’s where the operating system, bootloaders, and system data are all stored.

Sidenote: Unlike most embedded devices, Vita implements device unique eMMC block level encryption that is transparent to the processor. This means that if you dump the data from the chip (or sniff data lines), you’ll get encrypted data. At the same time, Vita operating system will always see the decrypted data, even at the most privileged level of its operation. One consequence of this is that you have to dump and restore the data the same way. For example, if you dump the data using an eMMC adapter, you can’t restore it in software as it will have a layer of encryption unaccounted for, and vice-versa.

  • Block: data is read from eMMC in blocks. The physical block size is 0x200 bytes, so reading a single block from eMMC means reading 512 bytes.

Attack vectors

SBL is the first code to execute on the ARM processor. Unfortunately, it takes no controlled input whatsoever, so it is not possible to attack in any way.

The obvious next target is NSBL. Because it reads and loads the kernel, it is also the first code running on ARM where we can affect the execution flow. An example of affecting its execution flow is removing all kernel modules from os0:, which would turn your Vita into a useless paperweight.

The very first step of loading kernel modules is reading and parsing the filesystem they are stored on. Let’s dig deeper into the process.

Partition table

The eMMC storage on Vita is divided into multiple partitions that have different responsibilities. In this post I’ll only look at os0:, however, if you’re interested in the full list, check out the wiki article on the subject.

A partition table stores partitions’ locations, sizes and other miscellaneous information. For example, on Vita we have os0: and vs0: partitions; on Linux you may have /dev/sda1 and /dev/sda2. The partition table is usually stored in the first blocks of the physical device. Common partition table formats used on PC are MBR (also called DOS) and GPT.

On Vita, however, a custom partition table format is used. The first physical block, i.e. bytes [0x000; 0x200), contain the partition table. The structure is documented on the wiki. While not completely accurate, I’ll refer to this block as MBR throughout this article. In pseudocode Vita’s MBR would be:

typedef struct {
    uint32_t off;
    uint32_t sz;
    uint8_t code;
    uint8_t type;
    uint8_t active;
    uint32_t flags;
    uint16_t unk;
} __attribute__((packed)) partition_t;    // Size = 17 bytes

typedef struct {
    char magic[0x20];
    uint32_t version;
    uint32_t device_size;
    char unk1[0x28];
    partition_t partitions[0x10];
    char unk2[0x5E];
    char unk3[0x10 * 4];
    uint16_t sig;
} __attribute__((packed)) master_block_t;  // Size = 512 bytes

Vita supports up to 16 partitions and each partition entry is 17 bytes. For example:

00000000  53 6f 6e 79 20 43 6f 6d  70 75 74 65 72 20 45 6e  |Sony Computer En|
00000010  74 65 72 74 61 69 6e 6d  65 6e 74 20 49 6e 63 2e  |tertainment Inc.|
00000020  03 00 00 00 00 00 76 00  00 00 00 00 00 00 00 00  |......v.........|
00000030  6b 40 00 00 6a 00 00 00  00 40 00 00 00 40 00 00  |k@..j....@...@..|
00000040  00 60 00 00 00 80 00 00  00 00 00 00 00 00 00 00  |.`..............|
00000050  00 02 00 00 00 04 00 00  01 da 00 1f 0f 00 00 00  |................|
00000060  00 00 40 00 00 00 20 00  00 02 da 01 0f 0f 00 00  |..@... .........|
00000070  00 00 00 60 00 00 00 20  00 00 02 da 00 0f 0f 00  |...`... ........|
00000080  00 00 00 00 80 00 00 00  80 00 00 03 06 01 0f 0f  |................|
00000090  00 00 00 00 00 00 01 00  00 80 00 00 03 06 00 0f  |................|
000000a0  0f 00 00 00 00 00 80 01  00 00 00 03 00 0c 06 00  |................|
000000b0  ff 0f 00 00 00 00 00 80  04 00 00 00 01 00 06 06  |................|
000000c0  00 ff 0f 00 00 00 00 00  80 05 00 00 00 08 00 04  |................|
000000d0  06 00 0f 0f 00 00 00 00  00 80 0d 00 00 00 01 00  |................|
000000e0  05 06 00 ff 0f 00 00 00  00 00 80 0e 00 00 00 08  |................|
000000f0  00 0b 06 00 ff 0f 00 00  00 00 00 80 16 00 00 80  |................|
00000100  09 00 0e 07 00 ff 0f 00  00 00 00 00 00 20 00 00  |............. ..|
00000110  00 30 00 07 07 00 ff 0f  00 00 00 00 00 00 50 00  |.0............P.|
00000120  00 00 26 00 08 07 00 ff  0f 00 00 00 00 00 00 00  |..&.............|
00000130  00 00 00 26 00 00 00 00  00 00 00 00 00 00 00 00  |...&............|
00000140  00 00 00 00 76 00 00 00  00 00 00 00 00 00 00 00  |....v...........|
00000150  00 00 00 00 00 76 00 00  00 00 00 00 00 00 00 00  |.....v..........|
00000160  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
000001f0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 55 aa  |..............U.|

Yellow: idstorage; Cyan: active SLB2; Pink: inactive SLB2.

Note that the partition table is not aware of partitions’ contents. As such, there is a disconnect between for example how large a partition is in the partition table and how large the target filesystem is. The filesystem itself also isn’t aware of where it’s placed on the disk, so all offsets are relative to its first block.

Some important partitions, for example, os0: where kernel modules and other system files are stored, have a shadow copy. This is done so that a system update doesn’t brick your console if you lose power in the middle of it. The updater first overwrites the inactive os0 with the new version and then flips the active bit around. Since flipping the active bit is very fast, it is very unlikely that you’d lose power at that exact millisecond.

FAT file system

The os0: partition uses the FAT file system. The first block of the partition, called FAT boot sector, stores system data such as number of bytes per sector, number of sectors per head and number of heads per cylinder. For flash memory, like Vita uses, the concepts of cyliders or heads don’t make sense, but they are still present.

Normally, the boot sector looks like this:

00000000  eb fe 90 53 43 45 49 20  20 20 20 00 02 08 02 00  |...SCEI    .....|
00000010  02 00 02 00 80 f8 13 00  3f 00 ff 00 00 00 00 00  |........?.......|
00000020  00 00 00 00 80 00 29 22  40 77 48 4e 4f 20 4e 41  |......)"@wHNO NA|
00000030  4d 45 20 20 20 20 46 41  54 31 36 20 20 20 00 00  |ME    FAT16   ..|
00000040  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
000001f0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 55 aa  |..............U.|

The vulnerability

At offset 0xB in the FAT boot sector there is a 16-bit value called BytesPerSector (marked in red). On Vita it is set to 0x200 to match the physical sector size.

The function that parses the boot sector is located at 0x5101FD18 in 3.60 NSBL. At some point it reads the field:

fat_bytes_per_sector = *(unsigned __int16 *)&fat_cache_2.magic[0xB];
fat_bytes_per_sector_minus_1 = *(unsigned __int16 *)&fat_cache_2.magic[0xB] - 1;

And then there’s a check at the end of the function:

if ( fat_bytes_per_sector_minus_1 >= 0x200 )
  return 0x803FF003;

It seems that if we set BytesPerSector to a large value, e.g. 0x400 it would error out and Vita would refuse to boot.

Sidenote: Notice how it compares not the original BytesPerSector, but rather a calculated BytesPerSector - 1. This is likely an optimization made by the compiler. The original code probably looked like:

if (BytesPerSector == 0 || BytesPerSector > 0x200) { error out }

In our case, if BytesPerSector is zero, then BytesPerSector - 1 would be 0xFFFFFFFF, and would also fail the optimized check.

But let’s look deeper. The function with the check described above, which I’m going to call fat_buggy_func, is called from another function located at 0x5100124C that I’ll name setup_emmc. This one does:

// ...
v8 = &os0_dev;
result = fat_buggy_func(v8, 0x110000, v9, v10);
// ...
return result;

Further, setup_emmc itself is called from the function responsible for loading the modules, located at 0x5100163C:

// ...
if ( !get_cpu_aff() ) { // if executed on CPU0
// ...

Oops! Turns out, this one doesn’t use the return value at all! Therefore, NSBL will proceed even though BytesPerSector is now 0x400.

Since fat_buggy_func had returned early with an error, some code inside it did not execute and some variables were left uninitialized. Fortunatelly, it doesn’t matter for our exploit.

Looking for code that would use our BytesPerSector I found a function at 0x5101F56C. This is what I’ll call exploited_fat_func. It has the following loop:

while ( 1 )
  if ( *v73 )
    v12 = (*v73)(dword_511673A0, v69, blocks_per_sector >> 9, temp_store);
    raw_block_read = *(int (__fastcall **)(_DWORD, int, unsigned int, char *))(v68 + 84);
    if ( !raw_block_read )
      goto LABEL_42;
    // we'll exploit this call below
    v12 = raw_block_read(*(_DWORD *)(v68 + 88), v69, blocks_per_sector >> 9, temp_store);
  if ( v12 < 0 )
    goto LABEL_42;
  blocks_per_sector = *(_DWORD *)(v68 + 80);
  v13 = blocks_per_sector >> 5;
  if ( blocks_per_sector >> 5 )
  if ( ++v69 == v77 )
    v8 = v11;
    goto LABEL_51;

raw_block_read is a function pointer. It reads 0x200-sized blocks from the flash. blocks_per_sector >> 9 is equivalent to blocks_per_sector / 0x200, so it calculates how many blocks a sector is made of and reads that much from the flash memory.

The data is read into temp_store which is a global array 0x200 bytes in size. Now that we’ve managed to set blocks_per_sector to 0x400, it will overflow the array and corrupt the data after it.

The function pointer, raw_block_read, is loaded from v68 + 84. v68 is a pointer to os0_dev, which is also a global variable. It is located at 0x51167784, while temp_store is located at 0x511671A0. As such, we can corrupt the whole structure including this function pointer by setting blocks_per_sector to e.g. 0x800.

Exploit process

Now if the loop executes at least twice, on the first iteration it will corrupt the function pointer and on the second it will execute our code!

Debugging the exploit

Since any mistake here would result in a permanently bricked console, testing the exploit requires a modified Vita system so that one can restore eMMC contents at any time. At the time I didn’t have access to one, so the initial testing was done on QEMU.

By mapping bootloader image to 0x51000000, stubbing some functions (e.g. changing raw_block_read to read from file instead of implementing the HW interface), we created a test environment that allowed for rapid prototyping of the exploit.

Sidenote: Vita has 4 ARM cores. You can think of it as 4 separate CPUs. When the non-secure world starts, all CPUs start executing NSBL from the first instruction at the same time.

The cpu_barrier_start and cpu_barrier_end functions make sure that different CPUs execute same code sequentially. For example, in pseudocode:


some_function() would be called sequentially by CPU0, CPU1, CPU2, CPU3, and only a single CPU would execute it at a time.

However, there is a bug in these barrier functions. Can you find it? This bug never shows on real hardware, but on old QEMU it prevents us from going past the first barrier so I had to fix it. Here’s the code listing, including supporting functions.

What’s the best part about using QEMU? You get console output!

QEMU window

What’s even better? You get debugging too!

gdb window

It turns out that in addition to having no ASLR in the bootloader, it is also entirely mapped as RWX. At this point developing the rest of the exploit was a breeze. What I did was overwrite the function pointer with a pointer to the global buffer, then write our shellcode to the buffer. Soon I had a payload which did a printf (that you cannot see on real hardware) and another one which blinked the PS button led.

Exploit attempt 01

Testing on real hardware

I had davee help me test the payload on a real Vita which had a eMMC hardware mod implemented. Unfortunately, it did not work at all. The reason for that is that ARM is not instruction/data cache coherent. (which I really should’ve remembered but at the time was blinded by the excitement of having a boot time hack)

What that means is that you cannot just write code into RWX memory and jump into it – you have to writeback the data cache first and then flush the instruction cache. So even though there’s RWX memory and we have our code already there, we still have to implement a ROP chain to perform cache maintenance.

Fortunately, we have all the pieces already. We control the function pointer and also R0 (it is the first argument to the function, it’s loaded from v68 + 88 and we control data around v68). We also have our controlled data put at a known address, and NSBL has all the gadgets and cache maintenance functions we might ever need.

Exploit attempt 02

To kick off the ROP chain I used this LDM gadget that loads both PC and SP from R0 as a pivot:

0x51014f10 e890b672 ldm r0, {r1, r4, r5, r6, r9, sl, ip, sp, pc}

From there, the ROP chain calls data cache clean (also known as writeback on other architectures), instruction cache flush, and finally jumps to the payload. You can find the full ROP chain here.


Ultimately, we want Vita to boot. However, since 0x800 bytes of data section are corrupted, the bootloader now is in a weird state with a completely broken os0_dev. Not only is it overwritten, but there’s no actual “filesystem” in place, it’s just our hacked up boot sector. We have to restore it before the boot can proceed:

  1. Patch the partition read function. We redirect block 0 to block 1 and in Ensō installer write the original pristine partition table into block 1. We need to do this so that the rest of the system doesn’t use our broken os0 “partition”.

Sidenote: We’re redirecting all reads of block 0 to block 1, but not writes. This means if you read block 0 and then write it back, you’ll implicitly uninstall Ensō. One tool that does this is Sony firmware updater (when flipping active os0 bit), which is also the reason we’ve designed Ensō this way.

However, this results in unintutive and dangerous interactions. For example, if you uninstall Ensō, we restore block 0 and overwrite other blocks used by our payload (including block 1) with empty data. But this also means that if the system tries to read block 0 after the uninstall, it’d get garbage data. Which is why it’s important that any modification to Ensō operation is followed by a reboot.

eMMC state vs what the kernel sees

Another failure of our design is that we didn’t provide a way to detect whether Ensō is installed. To make sure we don’t uninstall what’s not installed, the original uninstaller checked block 1 to see if it’s a valid MBR. It then read it and wrote it to block 0. However, if instead of uninstalling Ensō through the application you upgraded your firmware and “implicitly” got rid of it, the block 1 would remain. At this point if you run the uninstaller again (never mind that there’s no reason to do that as Ensō is no longer installed), even if not on 3.60 anymore, it would see valid MBR in block 1, overwrite your real MBR with it and likely brick your console.

Why this bricked

The solution is simple yet perfect – just get rid of that logic. Instead, always read block 0 and write it back.

  1. Reinitialize os0_dev so that it points to the correct partition and can be read from.
  2. Restore the data we accidentally corrupted with the buffer overflow.

Sidenote: This was one of the show-stoppers during the development of Ensō. One of the more important things we overwrite is sysroot which stores a ton of console-specific information. Initially, I developed the exploit on an earlier firmware where the different layout of NSBL ensured that nothing important is overwritten. On 3.60, however, we were stuck. Without a valid sysroot the console wouldn’t get very far in the boot process. The sysroot is also generated by an earlier boot stage, so there’s no way to recreate it. Fortunately, Yifan has found out that just before our vulnerable code is executed, the sysroot is copied by NSBL to a different place, and we can easily copy it back. Crisis averted!

  1. Load the larger payload. It does some magic to make sure HENkaku and taihen are loaded on boot. Yifan wrote that one so it’s probably full of bugs, but you can check out his writeup here if you care.
  2. Restore the context and resume boot, as if nothing had happened.

When we enter the executable payload, sp is somewhere inside our ROP chain (which is somewhere inside the data section, near the os0_dev structure). The very first thing the payload does is change sp to unused scratch area so that our C code doesn’t turn the data section into garbage.

Once we’re done with our hooking and patching though, we want Vita to continue its boot process. But remember that our payload got called in the first place because of the exploit – while executing an NSBL function the bootloader just jumped into our code! And there’s nowhere for our payload to return, as it’s using a separate stack set up by the pivot gadget.

There’re multiple solutions to this problem. For example, one could reimplement NSBL from scratch, or clean it up and trigger a soft-reboot. However, I’ve solved this issue by “restarting” the exploited_fat_func from the point we took over. I did that by restoring corrupted registers to their original values, including the original SP. It is similar to how setjmp and longjmp work, although I never bothered to explicitly save the original values, instead, they are recalculated. Here’s the code:

// restore context and resume boot
uint32_t *sp = *(uint32_t**)(0x51030100 + 0x220); // sp top for core 0
uint32_t *old_sp = sp - 0x11d;
// r0: 0x51167784 os0_dev
// r1: 0xfffffffe
// r2: sp - 0x110
// r3: 0
__asm__ volatile (
    "movw r0, #0x7784\n"
    "movt r0, #0x5116\n"
    "movw r1, #0xfffe\n"
    "movt r1, #0xffff\n"
    "mov r2, %0\n"
    "mov r3, #0\n"
    "mov sp, %1\n"
    "mov r4, %2\n"
    "bx r4\n"
    : "r" (sp - 0x110), "r" (old_sp), "r" (0x5101F571)
    : "r0", "r1", "r2", "r3", "r4"

And from that point the boot continues normally and your Vita boots straight into HENkaku. Isn’t that great?

Bricks & lessons learned

There were two bricks during the private testing period and ~3 bricks because of the uninstaller bug described above. Unfortunately, we didn’t learn about the brick bug fast enough because people reported it on various forums instead of using our issue tracker (which is also our fault as we didn’t provide a clearly visible URL pointing to it).

Having said that, with over 270,000 downloads as reported by GitHub, I consider this release a huge success. At the same time, there are still things we could’ve done better. The obvious one is lack of a way to detect whether Ensō is installed, but there’re also other ideas I’ve been thinking about such as auto-uploading installer logs to our server, checking for installer updates at startup, and a user-friendly way to update taiHEN and HENkaku kernel modules.

Hopefully, our experience will serve as a great example of why dangerous code like the installer cannot be too safe. While we did have a ton of safety checks, including reading back blocks after they are written and checking they’re intact, we still missed a bug that resulted in a few bricks. Fortunately, as it is fixed now, there are no more bugs left and Ensō installer is the first ever example of bug-free C code!

How Sony fixed it

The vulnerability was fixed by Sony in firmware 3.67, which means firmwares 3.60 to 3.65 (and potentially everything before 3.60) are exploitable. They added the missing return value check and a panic call inside setup_emmc after fat_buggy_func is called.

result = fat_buggy_func(/* ... */);
os0_ret = result;
// ...
if ( os0_ret )
  panic(/* ... */);

In addition, they sprinkled BytesPerSector checks over various read-related functions, so even if by some miracle one manages to bypass the panic call, the moment e.g. sceIoRead is called, your Vita would explode.


The vulnerability here conceptually is way simpler than the HENkaku one, just a trivial global buffer overflow. The lack of the usual mitigations (ASLR, read-only code, etc) also makes it really easy to exploit. On the other hand, there’s way less attack surface (i.e. zero syscalls) compared to the whole kernel and you kind of need to be good at soldering to attempt the hardware mod.

Existence of another vulnerability in NSBL is mathematically impossible in this new paradigm. In a sense, we got very lucky with the Ensō one as other than this really obvious issue (sabotage by a disgruntled Sony employee? ヽ(°〇°)ノ) there’s not much left in NSBL.

That’s all for today, thanks for reading!


I’d like to thank Yifan Lu for proofreading the initial version of this article.

          BestCrypt 9.03.14       Cache   Translate Page      
BestCrypt is easy-to-use, powerful data encryption software. You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted form.
          Re: Crucial and Samsung SSDs encryption can be bypassed when using Microsoft's Bitlocker      Cache   Translate Page      
PFInterest wrote:
Wed Nov 07, 2018 8:14 am


this is way more exciting/terrifying: ... a-telecom/

I don't think that is what they meant by net neutrality.
          Critical Encryption Bypass Flaws in Popular SSDs Compromise Data Security      Cache   Translate Page      

Vulnerabilities in Samsung, Crucial storage devices enable data recovery without a password or decryption key, researchers reveal.

The full disk hardware encryption available on some widely used storage devices is so poorly implemented there may as well not be any encryption on them at all, say security researchers at Radboud University in the Netherlands.

Hardware full disk encryption encryption is generally perceived as good as or even better protection than software encryption. Microsoft's BitLocker encryption software for windows even defaults to hardware encryption if the feature is available in the underlying hardware.

But when the researchers tested self-encrypting solid state drives (SSDs) from two major manufacturers ― Samsung and Crucial ― they found fundamental vulnerabilities in many models that make it possible for someone to bypass the encryption entirely.

The flaws allow anyone with the requisite know-how and physical access to the drives to recover encrypted data without the need for any passwords or decryption keys.

"We didn't expect to get these results. We are shocked," says Bernard van Gastel, an assistant professor at Radboud University and one of the researchers who uncovered the flaws. "I can't imagine how somebody would make errors like this" in implementing hardware encryption.

Together, Samsung and Crucial account for some half of all SSDs currently sold in the market. But based on how difficult it is to get full disk encryption at the hardware level right, it wouldn't be surprising if similar flaws exist in SSDs from other vendors as well, van Gastel says. "We didn't look at other models, but it is logical to assume that Samsung and Crucial are not the only ones with the problems," he notes.

Many of the problems have to do with how difficult it is for vendors to correctly implement the requirements of TCG Opal, a relatively new specification for self-encrypting drives, van Gastel says. The standard is aimed at improving encryption protections at the hardware level, but it can be complex to implement and easy to misinterpret, resulting in errors being made, he adds.

One fundamental flaw that Gastel and fellow researcher Carlo Meijer discovered in several of the Samsung and Crucial SSDs they inspected was a failure to properly bind the disk encryption key (DEK) to a password. "Normally when you set up hardware encryption in a SSD, you enter a password. Using the password, an encryption key is derived, and using the encryption key, the disk is encrypted," Gastel says.

What the researchers found in several of the SSDs was an absence of such linking. Instead of the encryption key being derived from the password, all the information required to recover the encrypted data was stored in the contents of the drive itself. Because the password check existed in the SSD, the researchers were able to show how someone could modify the check so it would always pass any password that was entered into it, thereby making data recovery trivial.

Another fundamental flaw the researchers discovered allows for a disk encryption key to be recovered from an SSD even after a user sets a new master password for it. In this case, the vulnerability is tied to a property of flash memory in SSDs called "wear leveling," which is designed to prolong the service life of the devices by ensuring data erasures and rewrites are distributed evenly across the medium, van Gastel says. Several of the devices that the researchers inspected stored cryptoblobs in locations that made it possible to recover the DEK even if a new master password is set for it.

In total, the researchers discovered six potential security issues with hardware encryption in the devices they inspected. The impacted devices are Crucial MX 100 (all form factors); Crucial MX200 (all form factors); Crucla MX300 (all form factors); Samsung 840 EVO; Samsung 850 EVO; and the Samsung T3 and T5 USB drives.

The key takeaway for organizations is to not rely on hardware encryption as the sole mechanism for protecting data, van Gastel says. Where possible, it is also vital to employ software full-disk encryption. He recommends using open source software, such as Veracrypt, which is far likelier to have been fully audited for security issues than a proprietary encryption tool.

Organizations using BitLocker should adjust their group policy settings to enforce software encryption in all situations. Such changes, however, will make little difference on already-deployed drives, van Gastel notes.

In a brief consumer advisory , Samsung acknowledged the issues in its self-encrypting SSDs. The company advised users to install encryption software in the case of nonportable SSDs and to update their firmware for portable SSDs. Crucial has so far not commented publicly on the issue.

For the industry at large, the issues that were discovered in the Samsung and Crucial drives highlight the need for a reference implementation of the Opal spec, van Gastel says. Developers need to have a standard way of implementing Opal that is available for public scrutiny and auditing, he says.

Related Content: Data Encryption: 4 Common Pitfalls New Method Proposed for Secure Government Access to Encrypted Data IEEE Calls for Strong Encryption 7 Critical Criteria for Data Encryption In The Cloud
Critical Encryption Bypass Flaws in Popular SSDs Compromise Data Security

Black Hat Europe returns to London Dec 3-6 2018 with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ...View Full Bio

          Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain      Cache   Translate Page      

The encryption system implemented by popular solid-state drives (SSDs) is affected by critical vulnerabilities that could be exploited by a local attacker to decrypt data. The flaws were discovered by researchers Carlo Meijer and Bernard van Gastel at Radboud University in the Netherlands, the duo discovered that it is possible to bypass password-based authentication to access to […]

The post Flaws in several self-encrypting SSDs allows attackers to decrypt data they contain appeared first on Security Affairs.

          Wafcoin launches the Global Ecological Plan(GEP)      Cache   Translate Page      

Wafcoin launches the Global Ecological Plan(GEP)


Our vision


Wafcoin (WA) Token Trading Platform provides global users with secure, transparent, stable and efficient blockchain token trading services. In order to allow Wafcoin's trading platform to compete in the global trading market and gain more user consensus, the platform now launches the Global Ecological Plan.


There are variable fee collection rules for digital asset trading platforms while Wafcoin token trading platform is providing users with secure, transparent, stable and efficient blockchain token trading services. The platform is aiming to build the world's first blockchain token eco-transaction and co-governance platform, a user-owned platform for blockchain ecological value sharing! Wafcoin adopts the world's first mining model with funding, allowing users to enter into a new digital asset trading field with zero risk!


Our advantage


  • Financial-level distributed cluster architecture
  • More than 200 million-level matching algorithm
  • Bank-level security encryption and ODAT offline acceleration
  • Multi-signature hot and cold wallet isolation technology

All of the above is to ensure the high reliability, high performance and strong security of the token platform.


Problems solved

  • High cost of new projects
  • Long trading hours
  • Unfair distribution of benefits
  • Financial security



Our 7 core values

  • Value sharing
  • Autonomous
  • Co-governance
  • Empowerment
  • Safety
  • Decentralized management
  • Distributed management

Our 5 major contents

1. Registered mining with capital

2. Dividends of registration invitation

3. Dividends of holding WA

4. The platform ecology is only a gift and not for sale; people with platform ecology will enjoy a good return.

5. Outstanding rewards for the platform's outstanding contributors


          Cybersecurity Month: Differences in 'Security Protection'      Cache   Translate Page      
Cybersecurity Month: Differences in 'Security Protection'

Is your website secure today? October is National Cyber Security Awareness Month in the United States and Cyber Security Month in Europe — each aim to provide awareness and education about threats and promote the resources needed to stay safe on the web.

We know the security threat landscape of today is vast -- phishing, malware, DDoS, you name it. Attacks are meant to steal information or disrupt traffic. Although attacks can be addressed and even prevented, security best practices and technology is multifaceted.

Here are some of the common ways to thwart threats, and some options to keep your site secure.

Understanding the web security alphabet soup: HTTPs, WAF, SSL and more

Just because you have HTTPs, WAF, SSL, etc, doesn’t mean your website is secure. You likely have some, if not all of these components already on your cloud platform, but not all of them are created equal. The ultimate decision on security depends on the purpose of your site today and your vision for tomorrow. The key is to ensure you haven’t made decisions that make it difficult to evolve.

Let’s define the following security protections:

  • HTTPs: We are all pretty familiar with this one. It is the secure version of HTTP (hence the “s”). What this means is that the data transfer between the client and the server is secured using secure socket layer (SSL) or transport layer security (TLS).
  • SSL: SSL is one of the key methods for securing data as it flows across the Internet. Your site has a certificate that the user’s client recognizes to set up the secure connection. Once this transaction is complete, data can flow across a secure connection from the site to the client.
  • TLS: Also mentioned above for HTTPS, transport layer security is another method of establishing a secure connection between a client and a site. Like SSL, TLS is based on an encryption certification for data transmitted between the site and the client.
  • WAF: Web Access Firewalls are configured to examine web traffic coming in to a site to detect any suspicious behavior. WAFs are primarily used to prevent attacks like distributed denial of service (DDoS) and SQL-injection.

Some vendors package up free security offerings that don’t offer the necessary customizations or protections you need.

For example, SSL certificates may be included with some cloud hosting providers’ offerings. However, with these options you are locked in to your provider’s choice of SSL vendors. Adding your own provider to the mix may result in other features being degraded or unavailable. Different providers offer varying types of protections, some are ironclad, while others may not offer the security support you need to protect yourself from an attack.

Get updates

Receive the best content about the future of marketing, industry shifts, and other thought leadership.

How can you tell the difference between strong protection vs. another check of the box?

Within the list of protections above, you have a combination of requirements and choices. However, it’s not as straightforward as a definition. If your objective is a secure website, then you need HTTPS, but in terms of how you deliver it, you can choose between TLS or SSL.

Acquia Cloud supports SSL certificates and allows our customers to select their preferred certificate provider. Our customers have different use cases that mean one size doesn’t fit all when it comes to SSL certificates. For some customers, technology like content delivery networks (CDNs) are not required, making some of the free certificates a good option. For others, incorporating SSL certificates for Acquia Cloud Edge CDN make more sense. The key for Acquia is providing our customers the freedom to manage their requirements for HTTPs.

While Web Access Firewalls aren’t necessarily required to maintain website security per se, they can significantly prevent downtime caused by distributed denial of service (DDoS) attacks. It takes time for network monitors to realize that an attack is happening.

Once an attack is identified, it will take time to solve the problem. Between the time of the attack, investigation and response, your site is (at best) experiencing poor performance. Adding a WAF to your site will enable site traffic to be detected as harmful before it reaches your site. This means, no downtime and less effort spent on investigation and mitigation of attacks.

Brad LaPorte, senior product manager for security, Acquia

Brad LaPorte

Senior product manager for security Acquia

With 13-plus years of experience in IT security, Brad LaPorte served in the Army as a officer in the Signal Corps, and previously worked at Dell and IBM. At Acquia, he drives our Edge Protect and CDN product lines.

david.pierce Wed, 10/31/2018 - 20:13
Differences in Security Protection

          Comment on Father Of The Internet Launches ‘Magna Carta For The Web’ To Save It From Abuse by clarioncaller      Cache   Translate Page      
How does 'Tiny Tim' propose re-acquiring the 'encryption keys' that Hillary STOLE from Leader Technologies, which gives her cabal the 'back door' into ALL internet transactions?
          SmartSimple Connects the Web’s Largest Network of Volunteer Opportunities With Its All-in-one CSR Solutions      Cache   Translate Page      

 SmartSimple, a global leader of all-in-one corporate social responsibility (CSR) and grants management software, and VolunteerMatch, the web’s largest volunteer engagement network, today announced a partnership that will make it easier for companies to scale their employee volunteer programs (EVP) and offer their workforce greater choice in searching for the causes they care about.

The VolunteerMatch Network is available as an add-on to SmartSimple’s Employee Giving and volunteer management solutions. From within SmartSimple’s cloud-based solutions, employees and even retirees can seamlessly search VolunteerMatch’s extensive database of fresh, vetted volunteer opportunities from 120,000 nonprofits across 29 different cause areas, including “animals,” “refugees,” and the “environment.”

“SmartSimple's comprehensive solutions help companies better track, manage, and report on the entire lifecycle of employee volunteer and CSR programs. Integrating with VolunteerMatch's trusted network made sense as the next evolutionary step to further build out our innovative solutions," said Geoff Cook, marketing specialist, SmartSimple.

Companies looking to scale their volunteer engagement initiatives with more causes and turn-key opportunities will benefit from significantly reduced administrative hours spent sourcing, vetting, and maintaining volunteer projects. Enterprises can also boost participation rates and lower employee turnover by offering greater choice in the ways employees volunteer time to their favorite causes, including 47,000 skilled-based and 7,000 virtual volunteer opportunities.

“At VolunteerMatch, we work hard on building a network comprised of real-time volunteer needs from the nonprofit sector. We're excited to integrate with SmartSimple’s solutions to expand the impact more good companies can offer to their employees and the communities they serve,” said Scott Lohmann, VP of sales and marketing, VolunteerMatch.

SmartSimple clients wishing to take advantage of VolunteerMatch’s Network integration can contact their Account Manager for more details.

About SmartSimple
SmartSimple Software Inc. (“SmartSimple”) is a global leader in online corporate giving, employee engagement, and grants management solutions. Its flexible software transforms how enterprises manage, track, and measure the full impact of their CSR programs. Pushing the limits on the most complex process challenges in corporate responsibility and philanthropy, SmartSimple delivers innovative, client centric solutions that strengthen their triple bottom-line. SmartSimple's technology supports some of the largest Fortune 500 brands, foundations, and government agencies globally. With offices in New York, Toronto, and Dublin, SmartSimple connects over 162,000 active monthly users in more than 192 countries. SmartSimple maintains compliance certifications for SOC 1, SOC 2 plus standards for PCI DSS Level 3 and FIPS 140-2 encryption. For more information, or to request a live demonstration, visit

About VolunteerMatch
VolunteerMatch believes everyone should have the chance to make a difference. As the Web’s largest volunteer engagement network, serving 120,000 participating nonprofits, 150 network partners, and 13 million annual visitors, VolunteerMatch offers unique, award-winning solutions for individuals, nonprofits, and companies to make this vision a reality. Since its launch in 1998, VolunteerMatch has helped the social sector attract more than $6.8 billion worth of volunteer services. Learn more about VolunteerMatch at

          $50 kit adds a gigabit Ethernet port to any room in seconds      Cache   Translate Page      

What’s the one thing standing between you and a lightning-fast, always reliable internet connection on your computer or video game console? If you said Wi-Fi, you would be correct. Whether you have a $20 Wi-Fi router or a $500 mesh wireless system, wireless internet will simply never be as consistently fast or as reliable as a wired connection. It’s just the nature of the tech. Of course running Cat6 cable and installing Ethernet ports isn’t really an option for everyone, but that’s what makes the TP-Link AV1000 Gigabit Powerline Ethernet Adapter Kit so fantastic. In literally less than a minute you can have a gigabit Ethernet port in any room, because all you have to do to install one of these boxes is plug it into the wall. It instantly transforms the electrical wiring in your home into lightning-fast internet cable, practically like magic.

Here are some bullet points from the product page:

  • Powerline adapter provides up to 1000Mbps Ethernet over power. Ideal to be Ethernet extender who can easily go over the walls
  • As network adapters supporting HomePlug AV2, easy to add multiple adapters and works under 110-240V
  • Gigabit port, give you full speed of your internet
  • Power saving automatically reduces power consumption by up to 85%
  • Plug & Play, no new wires and no configuration required
  • Data encryption by 128-bit AES to make the network safe and private
  • Industry Leading Support: 2-year warranty and free 24/7 technical support. Amazon Dedicated Support Email:

          Redbird – a new reverse proxy for Node      Cache   Translate Page      

Handling dynamic virtual hosts, load balancing, proxying web sockets and SSL encryption should be easy and robust.

I agree! With built-in support for clustering, HTTP/2, LetsEncrypt, and Docker, this is worth a look. 👀

          Комментарий к записи Ошибка RDP подключения: CredSSP encryption oracle remediation (Евгений)      Cache   Translate Page      
Добрый день. Воспользовался данной инструкцией, смог достучаться до нужного компа. Однако есть вопрос: На том компе, куда я стучусь стоит майское обновление, а значит ошибка по идее не должна возникать, однако она возникает и лечится вышеописанным способом. В чем может быть причина? И там и там на обоих концах Windows 10 со всеми обновлениями кроме октябрьских Спасибо.
          USED Open Box Teradek Bolt XT 1000 SDI/ HDMI Wireless Transmitter and Receiver (TER-BOLT-965XT) 3586.70 +VAT      Cache   Translate Page      
The Bolt XT satisfies the needs of the most discerning professionals, from powerful software tools and rock-solid performance to smart power options and backward compatibility. Available with a maximum range of 500ft, 1000ft, 3000ft, or 10,000ft, the new Bolt XT line offers a professional solution for every budget. A key feature of the Bolt XT is its backward compatibility with Bolt 500, 1000, 3000, Sidekick II, and 703 Bolt, giving users more flexibility building onto their existing systems or linking with others already on set. Unlike alternative wireless video systems, Bolt XT includes a unique AES 128 encryption algorithm to protect your video footage, ensuring that only authorized receivers can connect to your transmitter. Each transmitter includes an HDMI, 3G-SDI and looping 3G-SDI output. Receivers feature an HDMI output as well as dual 3G-SDI outputs. While wireless performance is critical on set, so are practical mounting options that ensure optimal performance and a quick set-up. With the Bolt XT line, Teradek has added an integrated NATO rail on the receiver, several 1/4”-20 and 3/8” mounting points, and an ARRI rosette on the transmitter to greatly improve available mounting options. An all-new aluminum chassis further reduces the size and weight of the Bolt line, with receivers also allowing for integrated pass-through power. Available battery plate accessories include V- or Gold-mount, in addition to bi-directional Sony L-series or Canon LP-E6 plates on the Bolt 500 XT. Teradek has also replaced the internal antennas on the Bolt 500 XT transmitter with an external set to enhance wireless performance when operating in environments with large obstacles or heavy interference. The Bolt XT, like the previous generation, is multicast capable up to 4 receivers and includes built-in cross conversion and Teradeks proprietary software utilities, including a manual frequency-selection tool, 3D LUT engine, and a 5GHz spectrum analyzer to keep an eye on interference in your area.
          Complex quantum teleportation moves closer      Cache   Translate Page      

Novel complex quantum entanglement generated in the laboratory for the first time For future technologies such as quantum computers and quantum encryption, the experimental mastery of complex quantum systems is inevitable. Scientists from the University of Vienna and the Austrian Academy of Sciences have succeeded in making another leap. While physicists around the world are

The post Complex quantum teleportation moves closer appeared first on Innovation Toronto.

          Researchers Discover A Way to Bypass Hardware-Based SSD Full Disk Encryption      Cache   Translate Page      
Researchers Discover A Way to Bypass Hardware-Based SSD Full Disk Encryption Researchers from Radboud University in the Netherlands have announced a flaw that affects some SSDs that feature hardware-based security; the flaw could allow an attacker to completely bypass disk encryption. Bypassing the encryption would give the hackers full access to the local data without having to know the password for the disk. The
          Cloud Security Consultant - 262051 - Procom - Québec City, QC      Cache   Translate Page      
Knowledge of networking (TCP / IP, OSI model) and computer security technologies (firewall, IDS / IPS, DDoS, WAF, encryption, IAM, SIEM, etc.);...
From Procom - Thu, 11 Oct 2018 21:04:53 GMT - View all Québec City, QC jobs
          Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing. (arXiv:1811.02276v1 [cs.CR])      Cache   Translate Page      

Authors: Ahsan Manzoor, Madhsanka Liyanage, An Braeken, Salil S. Kanhere, Mika Ylianttila

Data is central to the Internet of Things (IoT) ecosystem. Most of the current IoT systems are using centralized cloud-based data sharing systems, which will be difficult to scale up to meet the demands of future IoT systems. Involvement of such third-party service provider requires also trust from both sensor owner and sensor data user. Moreover, the fees need to be paid for their services. To tackle both the scalability and trust issues and to automatize the payments, this paper presents a blockchain based proxy re-encryption scheme. The system stores the IoT data in a distributed cloud after encryption. To share the collected IoT data, the system establishes runtime dynamic smart contracts between the sensor and data user without the involvement of a trusted third party. It also uses a very efficient proxy re-encryption scheme which allows that the data is only visible by the owner and the person present in the smart contract. This novel combination of smart contracts with proxy re-encryption provides an efficient, fast and secure platform for storing, trading and managing of sensor data. The proposed system is implemented in an Ethereum based testbed to analyze the performance and the security properties.

          Defeating the Downgrade Attack on Identity Privacy in 5G. (arXiv:1811.02293v1 [cs.CR])      Cache   Translate Page      

Authors: Mohsin Khan, Philip Ginzboorg, Kimmo Järvinen, Valtteri Niemi

3GPP Release 15, the first 5G standard, includes protection of user identity privacy against IMSI catchers. These protection mechanisms are based on public key encryption. Despite this protection, IMSI catching is still possible in LTE networks which opens the possibility of a downgrade attack on user identity privacy, where a fake LTE base station obtains the identity of a 5G user equipment. We propose (i) to use an existing pseudonym-based solution to protect user identity privacy of 5G user equipment against IMSI catchers in LTE and (ii) to include a mechanism for updating LTE pseudonyms in the public key encryption based 5G identity privacy procedure. The latter helps to recover from a loss of synchronization of LTE pseudonyms. Using this mechanism, pseudonyms in the user equipment and home network are automatically synchronized when the user equipment connects to 5G. Our mechanisms utilize existing LTE and 3GPP Release 15 messages and require modifications only in the user equipment and home network in order to provide identity privacy. Additionally, lawful interception requires minor patching in the serving network.

          SoftoRooM -> EditPlus 5.1      Cache   Translate Page      
Твой софтовый форум: SoftoRooM

EditPlus 5.1 + crack (keygen-serial)
Build 1802

Цитата( EditPlus 5.1 ):
Version 5.1 (2018-11-05)
=== Features ===
- Supports non-blocking Open/Save Remote and FTP Upload.
- Supports moving individual side panel tabs to the right side panel.
- Allows the Output Window to be located at either right or left side.
- sftp now supports aes256-ctr encryption.
- Adds 'Undo/Redo to Last Save' menu command ('Edit'->'Clipboard').
- Adds 'Align Equal Signs' menu command ('Edit'->'Format').
- Adds 'Tabs to Spaces in Files' menu command ('Edit'->'Format').
- Adds 'Toggle Column Marker' command to the popup menu.
- Adds 'Go to Cliptext List' menu command ('View'->'Toolbars/Views').
- Find in Files adds a new option to show search contents only.
- Adds 'Run as Text Fitler (Browser)' option to the user tool actions.
- 'First line of file' option for file type detection now allows regular expressions.
- Changing 'Base directory' in the Project dialog box now updates existing file paths in the project.
- "-pl" command-line argument for selecting a project and loading all files in it.
- Adds 'Copy Project' button in the Project dialog box.
- Adds 'Libraries' to drive list in the directory window.
- Supports syntax highlighting SQL files by default.
- Supports syntax highlighting for JavaScript template literals.
- Adds missing C++ 11 keywords to cpp.stx.
- CSS number format now recognizes rem, vh, vw units.
- Adds a toolbar button for Recent Directories command.
- Keystroke recoding can now record 'Fill Selection' command.
- Allows Ctrl+Shift+Up/Down instead of Ctrl+Alt+Up/Down to avoid hotkey conflict.

=== Bug fixes ===
- Fixes an issue where Open Remote dialog box could cause program crash in some cases.
- Fixes sftp connection issues on some servers.
- Fixes an issue where opening remote file could fail if file name contains colon.
- Fixes an issue where Search Tag command could cause program crash in some cases.
- Fixes an issue where Match Tag command didn't work correctly in some cases.
- Fixes an issue where Select Tag command didn't work as expected in some cases.
- Fixes an issue where side panel and output window couldn't handle right click from touch and pen input.
- Fixes an issue where 'Reload unsaved buffers' didn't work correctly with remote files.
- Fixes an issue where Rename File command didn't update the document tabs correctly.
- Fixes an issue where highlighted braces sometimes were not correctly restored to normal state.
- Fixes an issue where brace highlighting sometimes were not erased by cursor movement.
- Fixes an issue that you could not change color of JavaScript regular expressions.
- Fixes an issue where replace in selection sometimes couldn't update the selection correctly.
- Fixes an issue where Alt+mouse drag sometimes couldn't start column selection from blank space.
- Fixes an issue where Duplicate Line command didn't work correctly when selection exists.
- Fixes an issue where restoring window size could be incorrect due to Windows 10 invisible borders.
- Fixes an issue where #AUTOCASE=y in the syntax file didn't work if auto completion was off.
- Fixes an issue where canceling column selection with ESC key didn't' work correctly in some cases.
- Fixes an issue where 'Auto Indent on Paste' option didn't work as expected in some cases.
- Fixes an issue where Find Previous with regular expression could skip matches.
- Fixes an issue where 'Starting column #' sort option didn't work as expected in foreign language ANSI files.
- Fixes an issue where 'Set Marker' in the file dialog didn't follow 'Whole word only' option.
- Fixes an issue where built-in browser window didn't follow 'Save Window Width' command.

медицина от WD
x32 + x64
Скрытый текст!
Подробности на форуме...

EditPlus 5.1

          Re: How to Encrypt a Text file?      Cache   Translate Page      
johnubc wrote:
Tue Nov 06, 2018 9:43 pm

There are plenty of ways to encrypt a file - WinZip has an encrypt option. Word can be used, but make sure the encrypt option is chosen vs just a password protected word file. Just a password on a file does not mean that the file is encrypted.

Yes - I have used both. When you desire encryption, make sure to select it, have a strong password and ask for the level of encryption you want.
          pyzipper added to PyPI      Cache   Translate Page      
AES encryption for zipfile.
          Weekend Reading: FOSS Projects      Cache   Translate Page      

FOSS Project Spotlights provide an opportunity for free and open-source project team members to show Linux Journal readers what makes their project compelling. Join us this weekend as we explore some of the latest FOSS projects in the works.


FOSS Project Spotlight: Nitrux, a Linux Distribution with a Focus on AppImages and Atomic Upgrades

by Nitrux Latinoamericana S.C.

Nitrux is a Linux distribution with a focus on portable, application formats like AppImages. Nitrux uses KDE Plasma 5 and KDE Applications, and it also uses our in-house software suite Nomad Desktop.


FOSS Project Spotlight: Tutanota, the First Encrypted Email Service with an App on F-Droid

by Matthias Pfau

Seven years ago, Tutanota was being built, an encrypted email service with a strong focus on security, privacy and open source. Long before the Snowden revelations, the Tutanota team felt there was a need for easy-to-use encryption that would allow everyone to communicate online without being snooped upon.


FOSS Project Spotlight: LinuxBoot

by David Hendricks

Linux as firmware.

The more things change, the more they stay the same. That may sound cliché, but it's still as true for the firmware that boots your operating system as it was in 2001 when Linux Journal first published Eric Biederman's "About LinuxBIOS". LinuxBoot is the latest incarnation of an idea that has persisted for around two decades now: use Linux as your bootstrap.


FOSS Project Spotlight: CloudMapper, an AWS Visualization Tool

by Scott Piper

Duo Security has released CloudMapper, an open-source tool for visualizing Amazon Web Services (AWS) cloud environments.

When working with AWS, it's common to have a number of separate accounts run by different teams for different projects. Gaining an understanding of how those accounts are configured is best accomplished by visually displaying the resources of the account and how these resources can communicate. This complements a traditional asset inventory.


FOSS Project Spotlight: Ravada

by Francesc Guasch

          Gobit Max Ltd -      Cache   Translate Page      
IPB Image

I'm not admin here!
QUOTE is a registered company that deals with major oil producing corporations & cooperatives involved in oil operations.We work with five-star suppliers & register Under companieshouse #11187377.We offer Investment services in Oil Minning.This program is open for foreigner Investments where all over the world people make Investment and Enjoy Profit.We accept Perfect moeny , Payeer , Advcash , Bitcoin , Litecoin , Ethereum . Dashcoin , Bitcoin cash to make Investment in our Company.We Provide 100% Money Back Guaranteed with Profit.

IPB Image

17.5% - 30% Hourly For 6 Hours
Plan Amount Spent ($) Hourly Profit (%)
Plan 1 $1.00 - $1000.00 17.50
Plan 2 $1001.00 - $1500.00 18.00
Plan 3 $1501.00 - $2000.00 20.00
Plan 4 $2001.00 - $2500.00 25.00
Plan 5 $2501.00 - $50000.00 30.00

9.3% - 20% Hourly For 12 Hours
Plan Amount Spent ($) Hourly Profit (%)
Plan 1 $1.00 - $2000.00 9.30
Plan 2 $2001.00 - $2500.00 10.00
Plan 3 $2501.00 - $5000.00 15.00
Plan 4 $7000.00 - $7500.00 18.00
Plan 5 $10000.00 - $15000.00 20.00

355% - 800% After 6 Days
Plan Amount Spent ($) Profit (%)
Plan 1 $1.00 - $25000.00 355.00
Plan 2 $25001.00 - $50000.00 550.00
Plan 3 $50001.00 - $70000.00 650.00
Plan 4 $70001.00 - $75000.00 750.00
Plan 5 $100000.00 - $250000.00 800.00

1250% - 2500% After 12 Days
Plan Amount Spent ($) Profit (%)
Plan 1 $1.00 - $50000.00 1250.00
Plan 2 $70000.00 - $75000.00 1500.00
Plan 3 $100000.00 - $150000.00 1800.00
Plan 4 $200000.00 - $250000.00 2000.00
Plan 5 $300000.00 - $350000.00 2500.00

2550% - 6500% After 24 Days
Plan Amount Spent ($) Profit (%)
Plan 1 $1.00 - $100000.00 2550.00
Plan 2 $100001.00 - $150000.00 3500.00
Plan 3 $150001.00 - $200000.00 4500.00
Plan 4 $250000.00 - $500000.00 5500.00
Plan 5 $700000.00 - $750000.00 6500.00

SSL Encryption
DDos Protection
Licensed Script
Created on 2018-11-05
Expires on 2019-11-05
Updated on 2018-11-05

Accept: PM, Payeer, Bitcoin, Litecoin, Dogecoin, ETH, BCH, DASH,...

Join here:

Reduced Size Image

My deposit:
The amount of 100 USD has been withdrawn from your account.
Accounts: U4603107->U17647134. Memo: Shopping Cart Payment.
Deposit to User hyiptank..
Date: 14:55 07.11.18. Batch: 235145082.

          Mobile Encryptor      Cache   Translate Page      
General Dynamics Mission Systems has announced the expansion of its Tactical Local Area Network Encryption (TACLANE) portfolio, the world's most widely deployed family of Type 1 encryptors, with the new, small form-factor mobile encryptor, the TACLANE-Nano (KG-175N). The new encryptor was shown operating this year, passing live traffic including real-time streaming video with other TACLANE (High Assurance Internet Protocol Encryptor) HAIPE encryptors. It was also integrated into several market leading deployable systems and flyaway communication kits used by government in support of mobile missions today.
          Flaw In SSDs Allows Hackers To Access Encrypted Data Without Password      Cache   Translate Page      

A researcher from Radboud University has uncovered a flaw in some Solid State Drives (SSDs) that is allowing hackers to bypass disk encryption and access the data without requiring the encryption password. The vulnerability has affected only those SSD models supporting hardware-based encryption which uses local built-in chips for carrying out disk encryption operations. These […]

The post Flaw In SSDs Allows Hackers To Access Encrypted Data Without Password appeared first on Fossbytes.

          Microsoft Security Advisory for self-encrypting drives      Cache   Translate Page      

@Madafaker pisze:

Martin Brinkmann:
Microsoft published the security advisory ADV180028, Guidance for configuring BitLocker to enforce software encryption, yesterday. The advisory is a response to the research paper Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs) by the Dutch security researchers Carlo Meijer and Bernard von Gastel from Radboud University (PDF here).
The researchers discovered a vulnerability in Solid State Drives that support hardware encryption that enabled them to retrieve data from the encrypted drive without knowledge of the password used to encrypt the data on it.

Czytaj więcej:

Wpisy: 1

Uczestnicy: 1

Przeczytaj cały temat

          SoftoRooM -> EditPlus 5.1      Cache   Translate Page      
Твой софтовый форум: SoftoRooM
EditPlus 5.1 + crack (keygen-serial)
Build 1802

Цитата( EditPlus 5.1 ):
Version 5.1 (2018-11-05)
=== Features ===
- Supports non-blocking Open/Save Remote and FTP Upload.
- Supports moving individual side panel tabs to the right side panel.
- Allows the Output Window to be located at either right or left side.
- sftp now supports aes256-ctr encryption.
- Adds 'Undo/Redo to Last Save' menu command ('Edit'->'Clipboard').
- Adds 'Align Equal Signs' menu command ('Edit'->'Format').
- Adds 'Tabs to Spaces in Files' menu command ('Edit'->'Format').
- Adds 'Toggle Column Marker' command to the popup menu.
- Adds 'Go to Cliptext List' menu command ('View'->'Toolbars/Views').
- Find in Files adds a new option to show search contents only.
- Adds 'Run as Text Fitler (Browser)' option to the user tool actions.
- 'First line of file' option for file type detection now allows regular expressions.
- Changing 'Base directory' in the Project dialog box now updates existing file paths in the project.
- "-pl" command-line argument for selecting a project and loading all files in it.
- Adds 'Copy Project' button in the Project dialog box.
- Adds 'Libraries' to drive list in the directory window.
- Supports syntax highlighting SQL files by default.
- Supports syntax highlighting for JavaScript template literals.
- Adds missing C++ 11 keywords to cpp.stx.
- CSS number format now recognizes rem, vh, vw units.
- Adds a toolbar button for Recent Directories command.
- Keystroke recoding can now record 'Fill Selection' command.
- Allows Ctrl+Shift+Up/Down instead of Ctrl+Alt+Up/Down to avoid hotkey conflict.

=== Bug fixes ===
- Fixes an issue where Open Remote dialog box could cause program crash in some cases.
- Fixes sftp connection issues on some servers.
- Fixes an issue where opening remote file could fail if file name contains colon.
- Fixes an issue where Search Tag command could cause program crash in some cases.
- Fixes an issue where Match Tag command didn't work correctly in some cases.
- Fixes an issue where Select Tag command didn't work as expected in some cases.
- Fixes an issue where side panel and output window couldn't handle right click from touch and pen input.
- Fixes an issue where 'Reload unsaved buffers' didn't work correctly with remote files.
- Fixes an issue where Rename File command didn't update the document tabs correctly.
- Fixes an issue where highlighted braces sometimes were not correctly restored to normal state.
- Fixes an issue where brace highlighting sometimes were not erased by cursor movement.
- Fixes an issue that you could not change color of JavaScript regular expressions.
- Fixes an issue where replace in selection sometimes couldn't update the selection correctly.
- Fixes an issue where Alt+mouse drag sometimes couldn't start column selection from blank space.
- Fixes an issue where Duplicate Line command didn't work correctly when selection exists.
- Fixes an issue where restoring window size could be incorrect due to Windows 10 invisible borders.
- Fixes an issue where #AUTOCASE=y in the syntax file didn't work if auto completion was off.
- Fixes an issue where canceling column selection with ESC key didn't' work correctly in some cases.
- Fixes an issue where 'Auto Indent on Paste' option didn't work as expected in some cases.
- Fixes an issue where Find Previous with regular expression could skip matches.
- Fixes an issue where 'Starting column #' sort option didn't work as expected in foreign language ANSI files.
- Fixes an issue where 'Set Marker' in the file dialog didn't follow 'Whole word only' option.
- Fixes an issue where built-in browser window didn't follow 'Save Window Width' command.

медицина от WD
x32 + x64
Скрытый текст!
Подробности на форуме...

EditPlus 5.1

          Information Security Support Engineer - Certificate Management - 1912205408      Cache   Translate Page      
IL-Chicago, The Security Support Engineer will work with the team that is responsible for the day to day maintenance and support of our Enterprise Security environment comprising of Anti-virus and Advanced Threat Analytics and Encryption tools. RESPONSIBILITIES Responsible for supporting PKI Enterprise Systems such as Certificate Authorities, Venafi, Vormetric and FutureX devices. Required to interact with ve
          Senior Security Architect - 1912205244      Cache   Translate Page      
IL-Chicago, Senior Security Architect Required Skills 15+ years experience in defining and driving design and implementation strategy across the enterprise. Solid knowledge and understanding of the functional design and architecture of Enterprise IT security infrastructure. Solid understanding of Encryption methods (Data at rest and in Transit) and symmetric key management. Solid understand of Privacy, Compli
          [RC5-72] hitparade van week 45      Cache   Translate Page      
Replies: 3 Last poster: KuuKe at 07-11-2018 17:28 Topic is Open [RC5-72] hitparade van 6 november 2018Daily Top 30posdailymembertotal1.(1)8.679Distri Server8.910.565(16)2.(1)630 Long live ATi Stream9.512.634(15)3.()144Zelluf3.042.948(34)4.()95Joost van der Linden623.218(80)5.()64D.R.3.492.489(29)6.(1)30RamonP1.297.270(59) Meer...Overall Top 30postotalmemberdaily1.()602.899.988x-RaY99 the one-man 'team'02.()372.686.336NoizyCows03.()177.176.899msteggink04.()152.205.525Damic05.()61.039.256TeamBVD06.()41.009.983Team ColdFusion07.()33.952.266Division Brabant08.()27.131.785EliteHackers.info09.()26.132.593Happy Hour010.()20.620.597Uplinksweetlake011.()16.598.622Zoltan012.()12.350.739...ScoutLink -Force...013.()11.531.167I'R Cow014.()10.058.423D2DM015.()9.512.634 Long live ATi Stream630(2)16.()8.910.565Distri Server8.679(1)17.()7.979.685easy_17 at hotmail.com018.()7.147.296NGS019.()4.272.743flying_pizza020.()4.270.171Joh14vers6021.()4.188.950Crazy Cows022.()4.160.973VictordeHollander023.()4.134.060J2S024.()4.114.344Team KillEmAll graast voor goud025.()4.036.313Antoine026.()3.791.015Aspivalth027.()3.775.964Vimani Burning cows028.()3.770.677the HolycowS029.()3.492.489D.R.64(5)30.()3.409.245Peter F /0 Meer...Teams Daily Top 15posdailymembertotal1.()578.731BugTraq.Ru Team. United power of xUSSR.2.123.490.857(2)2.() Win32 (Windows)308.258.695(16)4.()277.997Distributed Amiga442.933.323(10)5.()229.819Dorms358.381.472(13)6.(4)190.706Free-DC314.521.080(15)7.()190.638Encryption Is For Sissies!126.530.357(31)8.(1)126.481Japan FreeBSD Users Group766.397.665(5)9.(1)115.416Linuxfr: French Linux Team74.101.934(54)10.(6)110.225TeamUFies (All Hail the Dust Puppy!)32.358.603(98)11.(9)96.853Team Warped (OS/2)248.335.466(17)12.(1)90.498CCWN65.651.382(63)13.(1)83.313AL-Mail Users39.080.207(87)14.()76.904amd3dnow100.764.887(40)15.()72.801Russian Team137.407.204(29) Meer...Teams Overall Top 15postotalteamdaily1.()7.885.153.487dnetc@Home BOINC Team896(107)2.()2.123.490.857BugTraq.Ru Team. United power of xUSSR.578.731(1)3.()1.780.440.514Dutch Power Cows9.642(52)4.()799.842.424Ars Technica Team Beef Roast15(168)5.()766.397.665Japan FreeBSD Users Group126.481(8)6.()762.920.961Japan Linux Users Group21.336(42)7.()750.886.353German Hardware Network44.956(22)8.() FH HN30.801(38)10.()442.933.323Distributed Amiga277.997(4)11.()438.064.200TeamNorway012.()365.401.524Knights Who Say "Ni!"42.771(25)13.()358.381.472Dorms229.819(5)14.()320.249.877Amd-Users48.172(20)15.()314.521.080Free-DC190.706(6) Meer...LedenFlushers: 6/2151 = 0.3%Geen nieuwe leden haalt ons in over7 jaarTeam Win32 (Windows) haalt ons in over12 jaarDistributed Amiga haalt ons in over13 jaarDorms haalt ons in over19 jaarJapan FreeBSD Users Group haalt ons in over25 jaarEncryption Is For Sissies! haalt ons in over26 jaarUS-Distributed haalt ons in over27 jaarLinuxfr: French Linux Team haalt ons in over27 jaarFree-DC haalt ons in over28 jaarBOFH@Chalmers haalt ons in over39 jaarAL-Mail Users haalt ons in over55 jaarTeamUFies (All Hail the Dust Puppy!) haalt ons in over57 jaarCCWN haalt ons in over59 jaarTeam Warped (OS/2) haalt ons in over65 jaaramd3dnow haalt ons in over71 jaarRussian Team haalt ons in over74 jaarTeam Witchvox (The Witches' Voice vs. RC5-72) haalt ons in over93 jaarLost Circuits haalt ons in over95 jaarGerman Hardware Network haalt ons in over102 jaarAmd-Users haalt ons in over111 jaarTeam EvangeLista (Macs Rule! :-) haalt ons in over115 jaarAnandTech 10635 haalt ons in over119 jaarKnights Who Say "Ni!" haalt ons in over133 jaarProject Moo! haalt ons in over141 jaarMonochrome BBS haalt ons in over161 jaarNSWC-COR -- Go Navy! haalt ons in over164 jaarMU Software DNet Team haalt ons in over168 jaarTeam FreeBSD haalt ons in over173 jaarLogan FH HN haalt ons in over174 jaarFuzion ! [Fr] haalt ons in over188 jaarLibertarians for Privacy haalt ons in over200 jaarTeam rANdOm haalt ons in over208 jaarNorth Carolina State University (NCSU) haalt ons in over217 jaarTriangle'nTatibanaLab. with UHOON/HIU haalt ons in over224 jaarGlobal Dragon Ltd haalt ons in over237 jaarBattleForce haalt ons in over237 jaarComputer Magazine Belgium haalt ons in over255 jaarFinal Tear Z haalt ons in over279 jaarTeam MacNN haalt ons in over281 jaarAMD Zone haalt ons in over282 jaarTeam Lanners :) haalt ons in over303 jaarJapan Linux Users Group haalt ons in over385 jaarDrunkenTech Olympic Crunching Team haalt ons in over415 jaardrift@tihlde haalt ons in over486 jaarBelgian MoOo Farm haalt ons in over643 jaarTeam TMD haalt ons in over664 jaarICTA (International Christian Technologists' Association) haalt ons in over724 jaarTeam DENKEN haalt ons in over844 jaarRC5 Hardware Network haalt ons in over886 jaarAi's Team haalt ons in over1288 jaarRC5 For Jesus haalt ons in over1367 jaarpr0c3X0r 0v3rC|0X0r5 haalt ons in over1814 haalt ons in over2577 jaarAcorn Users Group haalt ons in over5628 jaardnetc@Home BOINC Team wordt ingehaald over1395 jaarMegaflush top 53 juni 2010x-RaY99 the one-man 'team'39.246.61917 december 2017Damic20.856.0443 januari 2011msteggink19.467.09230 juli 2009NoizyCows10.758.9727 januari 2018Zoltan4.102.626Meer informatieRC5-72 projectpagina op WDO*** suggesties voor een DPCH? ***bron
          Comment on 16 Apps That Make Sharing Large Files A Snap by Balazs Kovacs      Cache   Translate Page      
I was searching for a new large file sharing solution, and I found Tresorit Send. It's a free secure alternative to the mentioned above. If you are looking for something with encryption, it might worth to have a look and see.
          Awesome projects under 1000 stars (3) - Lyo      Cache   Translate Page      


One of the most appreciated feature of the Javascript environment is undoubtedly the NPM huge choice of open-source packages. Easy to use, (mostly) reliable, fast, secure ... it has many big advantages under its belt.

On the other hand, one of the most hated subject, even by veteran developer is the weird dichotomy between node.js and javascript browser engines. The language offer the possibility to run the same code on back-end and front-end, but we never quite got where it works seamlessly.


Lyo aim to fill that gap. This tool could turn any node.js package into a single file browser library.
Let's walk through an example to see it running.

First, I choose a random package on NPM that I want to have on my browser. A common feature missing from Javascript is native encryption, so I choose sha1. Imagine I want to add this hashing script to a plain HTML page.

Since npx exists, I don't even have to install Lyo, I can just run:

npx lyo get sha1

Lyo result#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

From top to bottom, we can see that :

  • Lyo was installed in 6.5s
  • run over sha1 version 1.1.1
  • it read the file sha1.js
  • output a file named sha1.min.js
  • named the library sha1
  • Browserify, Babel and Uglify was successfully ran
  • Lyo terminated without error

Then, I can simply add the output file into my HTML page.

<script src="sha1.min.js"></script>
console.log(sha1("P@ssWord")); // => 56355fa0c17cb7f9dc0d936f6c7aa385114ee097

How easy is this !

Not easy enough ? You don't even want to open your terminal ? Lyo got you covered. Open on your favorite browser and enter the name of the package you want to compile. Lyo will take care of everything and output how you can use this package over a CDN or node.js.

Lyo service#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

On the other side of the spectrum, why not provide your user with a browser version of your node.js package ?
Of course, you might already use Browserify or Webpack, but you can now delegate all the work to Lyo.

Open your project folder, then run:

npx lyo init
npm install

Lyo will edit the package.json file to add itself as a dependency and add a script to execute it.
Now, every time you publish your work on NPM, it will be packed in a single file. This file can then be directly downloaded or through a CDN like jsDelivr or unpkg.

A few caveat, Lyo can't ensure that its output is working under the browser environment. For example, a package using the file system or any node-only capability, won't be able to run on a browser. Also, Browserify is quite opinionated on the use of ES6 features like import/export. It means you can't use any syntax not already supported by the node.js' last version.

I really love how a so complex process can be used so easily. Whether you like or not the extreme modularity of NPM, Lyo allow you to harness this power.

See you all next month.

          Supply of hussion cloth      Cache   Translate Page      
Tenders are invited for Supply of hussion cloth

EMD Amount In Rs: 0

1) name of work: supply of hussion cloth at chirag delhi store in ward no. 88-s, south zone, sdmc
estimated cost: 1,98,800/-
head of account: i-130-1061
earnest money: 3,960/-
tender cost: 500/-
time of completion: 1 month
validity of quoted rates: 06 months

Re-encryption of online bids: 16-11-2018 17:31 - 19-11-2018 13:30
          Dutch police snoop on criminal chats by intercepting encryption server      Cache   Translate Page      
Law enforcement says they were able to read over 250,000 messages.
          Improvement of park      Cache   Translate Page      
Tenders are invited for Improvement of park

EMD Amount In Rs: 0

1) name of work: improvement of district park swami nagar in ward no. 88-s, south zone/sdmc
estimated cost: rs. 1,82,117/-
head of account: i-130-1031
earnest money: rs. 3,642/-
tender cost: 500/-
time of completion: 2 month
validity of quoted rates: 06 months

Re-encryption of online bids: 16-11-2018 17:31 - 19-11-2018 13:30
          Pro-ISIS Tech Group Recommends Apps, Methods For Encryption And Secure Communication      Cache   Translate Page      
A pro-Islamic State (ISIS) tech group released a poster advising on the best ways to send sensitive information. The poster recommended using the Conversations app with OMEMO encryption on the Android mobile operating system, Chat Secure on iOS, and GAJIM on Win/Lin. The group also released a French translation of a guide to encrypting files [&hellip
          Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals      Cache   Translate Page      

Pick your books posted a photo:

Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals

Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
Bart R. McDonough (Author)
Release Date: January 7, 2019
Buy new: $19.95 $18.95

(Visit the Hot New Releases in Security & Encryption list for authoritative information on this product’s current rank.)

Buy now: Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals

          Updating A Table Using Change Data Capture Without Downtime      Cache   Translate Page      
Installing OpenSSH Server: windows 10 Edition

Kevin Feasel


Administration , Security

No Comment

Anthony Nocentino shows us how to install OpenSSH server on Windows 10 update 1803: So inyesterday’s postwe learned that the OpenSSH client is included with theWindows 10, Update 1803! Guess, what else is included in this server, an OpenSSH Server! Yes, that’s right…you can now run an OpenSSH server on your Windows 10 system and […] Read More RDP Error: CredSSP Encryption Oracle Remediation

Kevin Feasel


Administration , Security

No Comment

Kerry Tyler explains an error message popping up in RDP sessions: In March, a vulnerability in CredSSP (Credential Security Support Provider) was patched, which would affect authentication via RDP (this is outlined in advisoryCVE-2018-0886). However, it was implemented in such a way that the behavior change didn’t have to be “honored” by either the server […] Read More
          Re: How to Encrypt a Text file?      Cache   Translate Page      
TravelGeek wrote:
Wed Nov 07, 2018 12:53 pm

Assuming you are just planning to keep the file to yourself after encryption, it seems there is no value in using asymmetric encryption. You now have two keys to manage, for no good reason.

Depending on what you are actually trying to protect and how computer command line illiterate/savvy you are, I would reconsider the ask for a GUI on top of OpenSSL. The more layers of software you add (from potentially unknown sources, with unknown bugs or “features”), the more you are putting your data at risk (defeating the encryption you are looking for in the first place). The OpenSSL command is pretty simple, and you could probably write a tiny command line wrapper that just saves you a few keystrokes by accepting a single file name as a parameter and defaulting all the other stuff.

I'm liking OpenSSL so far. I was able to download it for Windows and play with it a little. Not that difficult to use.

Do you know the defaults used on OpenSSL for key derivation or hashing function? To get a sightly better understanding, I'm trying to get NppCrypt (notepad++ plugin) to generate the same output as: openssl aes-256-cbc -in input.txt -out output.txt

In NppCrypt if I choose AES 256 as the cipher and cbc as the mode, that should match the aes-256-cbc used in the openssl command, but I don't know what to set the rest of the options (see post above for screenshot of options).
          The Top 10 Things to Check for a healthy vSAN Cluster      Cache   Translate Page      

Top 10 Things to check vSAN Cluster 

1-vSAN Metrics
Topic: Performance and Troubleshooting
Problem: Poor performance
Impact: High. The Workloads might not receive the expected resources for a base performance
Cause: Host, Device or Network failure. Not optimal vSAN Design. Design or Sizing didn't align with Best Practices
Max Disk Group Congestion
Read Cache / Write Cache Latency (ms)
Avg Read / Write Latency (ms)
vSAN Port Group Packets Dropped
Capacity Disk Latency (ms)
Min Disk Group Write Buffer free (%)
Sum Disk Group Errors
Read Cache Hit Rate (%) (Hybrid vSAN Cluster)
Read Cache Miss Rate Ratio (Hybrid vSAN Cluster)
Best Practice: Align Cache, Endurance and Capacity disks based on Workload behaviour expected (Write, Read and Mix use intensive)

2-What if
Topic: Potential failures on Host Resources or Fault Domains
Problem: After a vSAN failure the Cluster doesn’t have the minimum amount of Resources to provide Availability based on the PFTT Policy Rule
Impact: Medium-High. Components state might be Degraded, Absent or Stale. Some VMs Objects would not be available
Cause: A Host in Maintenance mode, Network partition, Host Isolated, Controller Failure, Disk Failure
RVC: vsan.whatif_host_failures
vSphere Client Health Check -> Limits -> After 1 additional Host failure
ESXCLI vsan health cluster get -t "After 1 additional host failure”
Best Practice: Don’t use the minimum amount of Hosts per Cluster

3-Hardware Compatibility
Topic: vSAN Compatibility Guide (VCG)
Problem: Hardware not supported. Firmware and Drivers not validated
Impact: Medium-High. vSphere Health Check will show a warning or error. VMware support may not accept the ticket
Cause: The Hardware is not in the vSAN VCG for the current vSphere version. The Hardware-Firmware-Driver is not supported or validated for the current version. Firmware and-or Driver was not updated after a vSphere Upgrade
vSphere Client vSAN Health Check -> Hardware compatibility
vSphere Client vSAN Health Check -> Online health -> vCenter Server up to date
esxcli vsan debug controller list
Best Practice: Use vSAN Ready Nodes if possible. Always check the VCG before Upgrading. Keep the vSAN HCL DB (vCenter Health Check) up to date.

4-Network Performance
Topic: Network Configuration and Bandwidth
Problem: Network misconfiguration, physical errors, dropped packets, poor performance
Impact: High. Network problems might result in Isolated Hosts, vSAN Cluster Partitions and implications in the Availability and Performance
Cause: Not following the Best Practices for Network Design. The Network resources provided for vSAN VMkernel are not enough. Potential failures in the Physical layer
Sum vSAN Portgroup Packets Dropped (%)
Total Throughput (KBps)
vSphere Client vSAN Health Check -> Network -> Hosts with connectivity issues
Best Practice: 10Gbps for All-Flash at a minimum. QoS at the physical layer. NIOC if you share vmnics. Jumbo Frames and one VLAN per vSAN Cluster. Enable vDS with Health Check in vCenter.

5-vSAN Components Resynchronizing
Topic: vSAN Object Compliance
Problem: After a Failure or Rebalance the vSAN Cluster has to re-create Components. While that process takes place it is not recommended to run any Maintenance task such as Upgrade, apply a new Policy to existing VMs, force a Proactive Rebalance or put a Host in Maintenance mode.
Impact: Medium-High. It’s possible to see an impact on the Performance. Based on the Available Resources and the PFTT and FTM policy’s, if one Host enters in Maintenance mode, that might affect the Availability of some Components.
Cause: Host or Device failure, proactive or reactive rebalance, Maintenance task and Change vSAN Policy.
vSphere Client -> vSAN Cluster -> Monitor -> vSAN -> Resyncing Components
RVC: vsan.resync_dashboard
PowerCLI -> Get-VsanResyncingComponent -Cluster $cluster
Best Practice: Provide enough Network resources and avoid the deployment of vSAN Clusters with a minimal amount of Hosts (based on the PFTT and FTM rules).

6-vSAN Hosts and KMS Clusters
Topic: vSAN Encryption
Problem: After a general outage over a vSAN Cluster with Encryption services enabled, the Hosts are not able to reach the KMS Servers.
Impact: High. The Virtual Machines in that Cluster won’t be able to be powered on.
Cause: A general outage that powered off all the Hosts and Virtual Machines, including vCenter Server VM.
vSphere Client vSAN Health Check -> Encryption -> vCenter and all hosts are connected to Key Management Servers
vCenter and Hosts have to be able to reach KMS Cluster that on 5696 Port
Best Practice: Avoid single point of failures. Add KMS Cluster based on IP. Don't encrypt vCenter VM.

7-Host Membership
Topic: vSAN Cluster Partitioned
Problem: The Host is not able to provide resources to the Cluster.
Impact: Medium-High. Some Objects will appear as non-compliance and some Components might be Absent.
Cause: Because of a logical problem, a network partition, misconfigurations and human errors, the vSAN Cluster is partitioned, one Host isolated or the Host is not a member of the Cluster (even if the vSphere Client shows the Host inside the Cluster in the UI).
esxcli vsan cluster get
RVC: vsan.cluster_info
vSphere Client vSAN Health Check -> Cluster -> vSphere cluster members
Best Practice: Follow the vSAN Network Design Best Practices. Avoid a SPOF.

8.-Stretched Cluster Sites Connectivity
Topic: Stretched Cluster
Problem: Available Bandwidth, high Latency and lost connectivity.
Impact: Medium. In the case of failures or high latency between Sites, Replicas might be impacted. A Witness failure will suppose Absent Components and Objects in non-compliance state and, for this reason, a Risk.
Cause: Poor network resources such as Low Bandwidth, high Latency and non-stable connectivity between Sites.
vSphere Client vSAN Health Check -> Stretched cluster
Available Bandwidth and Round Trip Latency between Sites (using 3rd party tools)
Best Practice: Follow the vSAN Network Design Best Practices for Stretched Cluster and 2 Node Cluster.

9.-Available Capacity
Topic: vSAN Storage Capacity
Problem: Low available capacity in the vSAN Cluster.
Impact: High. This situation might create a Risk if any failure takes place. It will limit some maintenance tasks and may restrict the creation of new VMs.
Cause: The design didn't consider the usable capacity, the growth, snapshots, swap files, slack and the impact of the policies.
Slack space (between 25% and 30%)
Total Disk Space (GB)
Disk Space Used (%)
Used Disk Space (GB)
Best Practice: Maintain a 25%-30% additional space for Slack. Consider the ratio Cache:Capacity when adding more capacity.

10.-Are you Following the vSAN Best Practices?
Topic: vSAN Best Practices to check
Two or more Disk Groups per Host
Two (or more) Disk Controllers per Host
QoS and Jumbo Frames
LACP (if already configured). Align physical switch configuration with vDS LACP
1 vSAN Cluster, 1 VMkernel PG, 1 VLAN
Use Passthrough Controller mode. Set 100% Read Cache on Controllers
Avoid Dedup and Compression on High-Performance Workloads
Sharing vmnics? Use vDS with NIOC. Configure Bandwidth reservation and high custom shares
Align Cache, Endurance and Capacity disks based on Workload behaviour expected (Write, Read and Mix use intensive)
Deploy homogenous Hosts Configurations for CPU, RAM, NETWORK and DISK
Configure BIOS Host Power Management for OS Controlled
Use multiple Storage Policies
Using controllers with high queue depth improves performance
Consider NVMe Devices for high-performance

          Azure SQL Data Warehouse introduces new productivity and security capabilities      Cache   Translate Page      

SQL Data Warehouse continues to provide a best in class price to performance offering, leading others in TPC-H and TPC-DS benchmarks based on independent testing. As a result we are seeing customers, including more than 50 percent of Fortune 1000 enterprise such as Anheuser Busch InBev, Thomson Reuters, and ThyssenKrupp build new analytics solutions on Azure. 

With the launch of SQL Data Warehouse Gen2 in April 2018, customers have benefited tremendously from query performance and concurrency enhancements. To support our customers’ exponentially growing data volume and resulting analytics workloads, today we are sharing new SQL Data Warehouse features. Enhanced workload management, row-level security, and improved operational experiences.

Azure SQL Data Warehouse

Enhanced workload management

SQL Data Warehouse will offer workload management capabilities that optimize query execution to ensure that high value work gets priority access to system resources. With features such as workload importance, customers can use a single SQL Data Warehouse database to more efficiently run multiple workloads, taking away the complexity of separate data warehouses for each solution. With this new capability, SQL Data Warehouse enables better control, utilization and optimization over deployed resources. Workload importance will be available for all SQL Data Warehouse customers later this year at no additional cost.

Industry leading security

SQL Data Warehouse now supports native row-level security (RLS), enabling customers to implement the most stringent security policies for fine-grained access control. Going forward, customers will be able change security policies without redesigning and redeploying of the data warehouse and there will be no impact to query performance when row-level security is applied. By implementing granular security directly in the database tier itself, and with native integration with Azure Active Directory, managing and controlling the overall security model is simplified via centralized security policy adjustments.

Complimented by Virtual Network Service Endpoints, Threat Detection, Transparent Data Encryption, and compliance with more than 40 national, regional and industry-specific requirements, SQL Data Warehouse offers best in class security and compliance at zero additional cost.

Best in class development tools and insights

SQL Data Warehouse is committed to delivering first class experience for data warehouse administrators and developers through improved insights and updated tooling to streamline automation and management. With the latest improvements, building a modern data warehouse on Azure just got faster and easier.

Today we are sharing the preview of SQL Server Data Tool (SSDT) in Visual Studio for SQL Data Warehouse, offering first-class development experience with integrated support for version control, test automation with continuous integration, and one-click deployment of change scripts. This means that as business requirements evolve, data warehouse implementers can code and deploy enhancements faster, whilst still adhering to robust quality controls that block regressions from creeping into production systems.

We are also extending the intelligent insights capability to include additional details for database schema optimization that recommends optimal use of replicated tables as well as well utilization of Adaptive Cache and TempDB. With a built-in holistic management experience through Azure Advisor and Azure Monitor integration, data warehouse administrators can seamlessly uncover performance insights and easily tune the solution for better performance.

Query Store has been an incredibly popular feature within SQL Server that enables developers to troubleshoot query performance issues relative to historical execution time. We’re pleased to now bring this capability to SQL Data Warehouse. With Query Store, developers can review query workloads running on the platform, and analyze associated query plans and runtime statistics to identify any performance issues that may impede productivity.

To keep your data warehouses fresh and up to date with data source changes, supporting updates and transactions is critical. However, interrupting long running transactions can sometimes lead to longer database recovery processes. To improve database availability, SQL Data Warehouse now incorporates Accelerated Database Recovery (ADR) feature. With ADR, SQL Data Warehouse improves database availability and enables much quicker pause and resume service operations.

For advanced troubleshooting scenarios, SQL Data Warehouse now provides one-click integration with Azure Monitor Diagnostic Logs that enables developers to capture and archive usage data such as queries executed and wait stats for future analysis. These logs are a natural extension of the existing dynamic management view capabilities in SQL Data Warehouse and developers will benefit from the familiar and powerful experience.

Azure is a great platform for all analytics

With its native integration with Azure Databricks, Azure Data Factory, and Power BI, SQL Data Warehouse allows customers to build new analytics solutions to support modern data warehousing, advanced analytics, and real-time analytics scenarios. A key feature now generally available is SQL Data Warehouse’s native integration with Azure Data lake Storage Gen2 the only cloud scale data lake designed specifically for mission critical analytics and AI workload.

Customers can also leverage 25 plus Microsoft and third-party data integration and BI tools to build an analytics solution for any enterprise. We have partnered with vendors to streamline the modernization of legacy on-premises data warehouse to Azure. These ecosystem investments allow our customers to build upon their existing infrastructure and significantly accelerate time to value for powerful analytics solutions.

          UAE's top football league matches to be shown live free-to-air      Cache   Translate Page      
UAE President Sheikh Khalifa bin Zayed Al Nahyan orders for the removal of satellite encryption of all Arabian Gulf League football matches
          Microsoft issues a security advisory regarding a vulnerability in hardware encryption      Cache   Translate Page      

Microsoft has issued a security advisory regarding a new vulnerability that affects hardware-based encryption on SSDs. The vulnerability was first discovered by Dutch security researchers Carlo Meijer and Bernard von Gastel from Radboud University who published a paper titled “weaknesses in the encryption of solid state drives”. The vulnerability allows hackers to gain access to the […]

Read More: Microsoft issues a security advisory regarding a vulnerability in hardware encryption

          (IT) Security Solution Architect      Cache   Translate Page      

Rate: £650-£700 Per Day   Location: London   

A tier 1 global bank are running a significant digital transformation programme within digital banking. The objective is to replace a JavaServer Pages (JSP) based online banking platform with a widget based vendor product which utilises modern web based technology and frameworks moving the bank towards a REST based architecture We are looking for a Cyber Security Architect who can look at the architecture artefacts that architects are producing and challenge them on security considerations. Key responsibilities & skills: Cybersecurity architect with web, mobile and infrastructure security experience Experience with open authentication Experience with Single Sign-on (SSO) Experience with data encryption Desirable Technology experience: Experience with ForgeRock OpenAm, Experience with Transmit Security Additional Information: Salary Offered: £650-£700/day (based on experience) Location: London (Moorgate) Duration: Initially 6 months with opportunity for significant extension Applicants must have the right to live and work in the United Kingdom and will be required to partake in pre-employment background checking
Rate: £650-£700 Per Day
Type: Contract
Location: London
Country: UK
Contact: James Hey
Advertiser: Shareforce Ltd
Reference: JSJH140

          (IT) Security Architect      Cache   Translate Page      

Rate: £600-750/Day   Location: London   

Working on a large global digital transformation programme within the commercial banking sector we are looking for an experienced Cyber Security Architect to work on a programme to replace a JSP based online banking platform with a widget based product which utilises modern web technologies and frameworks and moving the bank towards a REST based architecture. In this role you will be looking at the architecture artefacts and challenging on the security considerations associated with an online banking platform. You MUST HAVE experience of working within banking on a similar project associated with web, mobile and infrastructure security and experience with open authentication, single sign on (SSO) and data encryption. Tech wise they are using Forgerocks' OpenAM and Transmit Security for authentication.
Rate: £600-750/Day
Type: Contract
Location: London
Country: UK
Contact: Richard Sutcliffe
Advertiser: Vivate Recruitment
Reference: JSCSA

          Update on the encryption program      Cache   Translate Page      
Last time i wrote about my idea for my encryption program. I was able to convert numbers to other nu
          Microsoft Releases Guidance for Users Concerned About Flawed SSD Encryption      Cache   Translate Page      

After security researchers discovered vulnerabilities in the encryption mechanism of several types of solid-state drives (SSDs), Microsoft decided to explain how one can enforce software encryption instead.

read more

          Iperius Backup Free 5.8.1      Cache   Translate Page      
Iperius Backup Free is a lightweight feature-rich backup and sync utility that provides flexible use for all your backup needs. It can copy files and folders to any mass storage device, like NAS, RDX devices, external USB drives, computers in the network, AES encryption, Zip 64 compression, synchronization and more. [License: Freemium | Requires: Win 10 / 8 / 7 / Vista / XP | Size: 47.4 MB ]
          Processeur Kaby Lake - Intel Core i7-7700      Cache   Translate Page      
328,29€ - Cdiscount
Nom du produitIntel Processeur Kaby Lake - Core i7-7700 - 3.6GHz
GénéralType de produitProcesseur
ProcesseurNombre de coeursQuadricoeur
Nbre de processeurs1
Port de processeur compatibleLGA1151 Socket
Caractéristiques architecturalesTechnologie SpeedStep améliorée, fonction Execute Disable Bit, technologie de virtualisation Intel, technologie Intel 64, technologie d'exécution fiabilisée Intel (TXT), technologie Intel Turbo Boost 2.0, nouvelles instructions Intel AES-NI (Advanced Encryption Standard New Instructions), technologies de surveillance thermique, Intel Virtualization Technology for Directed I-O (VT-d), technologie vPro de Intel, Idle States, Intel Identity Protection Technology, Intel Secure Key, Intel Advanced Vector Extensions 2 (AVX2.0), Intel TSX-NI, Intel Stable Image Platform Program (SIPP), Intel Software Guard Extensions (SGX), Intel Memory Protection Extensions (MPX), Intel Device Protection Technology with Boot Guard
Spécifications thermiques100 °C
Détails de la mémoire cacheSmart Cache - 8 Mo
Cache8 Mo
Vitesse maximale en mode Turbo4.2 GHz
Nombre de filetages8 filetages
Enveloppe thermique65 W
Type - FormatIntel Core i7 7700 (7ème génération)
Procédé de fabrication14 nm
Fréquence d'horloge3.6 GHz
Configurations PCI Express1x16, 2x8, 1x8+2x4
Nombre de voies PCI Express16
Révision PCI Express3.0
Graphiques intégrésTypeIntel HD Graphics 630
Fréquence de base350 MHz
Fréquence dynamique maximum1.15 GHz
CaractéristiquesIntel Clear Video Technology, Intel Clear Video HD Technology, InTRU 3D Technology, Intel Quick Sync Video, Triple Display Capable
Résolution maximale prise en charge4096x2304@24Hz (HDMI), 4096x2304@60Hz (eDP), 4096x2304@60Hz (DP)
Taille de mémoire maximale de prise en charge64 Go
DiversType d'emballageIntel Boxed
Garantie du fabricantService et maintenanceGarantie limitée - remplacement - 3 ans
          Self-Encrypting SSDs Vulnerable to Attack, Microsoft Warns      Cache   Translate Page      

Researchers from Radboud University in the Netherlands, Carlo Meijer and Bernard van Gastel, have published a paper claiming that encryption on SEDs can be bypassed using different attack vectors

The post Self-Encrypting SSDs Vulnerable to Attack, Microsoft Warns appeared first on Petri.

          Quantum information systems will revolutionize computing… as soon as we figure out how to make them.      Cache   Translate Page      
Physics professor Arun Bansil has received a $3.54 million grant from the Department of Energy to investigate new ways to design quantum information systems, which could revolutionize data encryption, enable new medical treatments, and more accurately model the changing climate.
          How to encrypt portable external hard drive      Cache   Translate Page      

Encrypt portable external hard drive using Linux Unified Key Setup to protect data in transit.

Connect new and empty portable external hard drive to identify it.

[Mon Mar 19 04:20:11 2018] usb 3-2: new SuperSpeed USB device number 6 using xhci_hcd
[Mon Mar 19 04:20:11 2018] usb 3-2: New USB device found, idVendor=125f, idProduct=a35a
[Mon Mar 19 04:20:11 2018] usb 3-2: New USB device strings: Mfr=2, Product=3, SerialNumber=1
[Mon Mar 19 04:20:11 2018] usb 3-2: Product: HD650
[Mon Mar 19 04:20:11 2018] usb 3-2: Manufacturer: ADATA
[Mon Mar 19 04:20:11 2018] usb 3-2: SerialNumber: 4810358C3023
[Mon Mar 19 04:20:11 2018] scsi host4: uas
[Mon Mar 19 04:20:11 2018] scsi 4:0:0:0: Direct-Access     ADATA    HD650            0    PQ: 0 ANSI: 6
[Mon Mar 19 04:20:11 2018] sd 4:0:0:0: Attached scsi generic sg1 type 0
[Mon Mar 19 04:20:11 2018] sd 4:0:0:0: [sdb] Spinning up disk...
[Mon Mar 19 04:20:12 2018] .
[Mon Mar 19 04:20:13 2018] .
[Mon Mar 19 04:20:14 2018] .
[Mon Mar 19 04:20:15 2018] .
[Mon Mar 19 04:20:15 2018] ready
[Mon Mar 19 04:20:15 2018] sd 4:0:0:0: [sdb] 3907029168 512-byte logical blocks: (2.00 TB/1.82 TiB)
[Mon Mar 19 04:20:15 2018] sd 4:0:0:0: [sdb] 4096-byte physical blocks
[Mon Mar 19 04:20:15 2018] sd 4:0:0:0: [sdb] Write Protect is off
[Mon Mar 19 04:20:15 2018] sd 4:0:0:0: [sdb] Mode Sense: 43 00 00 00
[Mon Mar 19 04:20:15 2018] sd 4:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
[Mon Mar 19 04:20:15 2018]  sdb: sdb1
[Mon Mar 19 04:20:15 2018] sd 4:0:0:0: [sdb] Attached SCSI disk

It will likely W95 FAT32 filesystem by default.

$ sudo sfdisk --list /dev/sdb
Disk /dev/sdb: 1.8 TiB, 2000398934016 bytes, 3907029168 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 4096 bytes
I/O size (minimum/optimal): 4096 bytes / 33553920 bytes
Disklabel type: dos
Disk identifier: 0xf7316823

Device     Boot Start        End    Sectors  Size Id Type
/dev/sdb1  *     2048 3907026943 3907024896  1.8T  c W95 FAT32 (LBA)

Unmount if it was mounted automatically.

$ mount | grep sdb
/dev/sdb1 on /media/milosz/ADATA HD650 type vfat (rw,nosuid,nodev,relatime,uid=1000,gid=1000,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,showexec,utf8,flush,errors=remount-ro,uhelper=udisks2)
$ sudo umount /dev/sdb1 

Initialize LUKS partition and set password.

$ sudo cryptsetup luksFormat --cipher aes-xts-plain64 --key-size 256 --hash sha256 /dev/sdb1 

This will overwrite data on /dev/sdb1 irrevocably.

Are you sure? (Type uppercase yes): YES
Enter passphrase:  ****************
Verify passphrase: ****************

Diplay header information of LUKS partition.

$ sudo cryptsetup luksDump /dev/sdb1 
LUKS header information for /dev/sdb1

Version:       	1
Cipher name:   	aes
Cipher mode:   	xts-plain64
Hash spec:     	sha256
Payload offset:	65535
MK bits:       	256
MK digest:     	67 fe f5 dc 74 de fa 82 7a 19 67 cd a2 e3 41 61 94 bc 34 3f 
MK salt:       	a8 63 0b 89 26 16 9b 05 4d aa 19 dd a7 7c dd 6d 
               	d8 32 4d 1e c4 bd fd 50 0c 5b f8 6f c4 cd e4 e6 
MK iterations: 	84500
UUID:          	780554cb-5335-4dc0-80fc-43e7bb4cf16c

Key Slot 0: ENABLED
	Iterations:         	343163
	Salt:               	83 10 7e 0c d5 60 3e 2a 72 2f 44 fd 6c 47 93 d2 
	                      	ab e7 46 61 4a 26 62 5e a8 4e 6a a1 fb 62 95 d3 
	Key material offset:	8
	AF stripes:            	4000
Key Slot 1: DISABLED
Key Slot 2: DISABLED
Key Slot 3: DISABLED
Key Slot 4: DISABLED
Key Slot 5: DISABLED
Key Slot 6: DISABLED
Key Slot 7: DISABLED

Open LUKS partition and map it as homeext after successful verification.

$ sudo cryptsetup luksOpen /dev/sdb1 homeext
Enter passphrase for /dev/sdb1: ****************

Format encrypted homext virtual block device.

$ sudo mkfs.ext4 /dev/mapper/homeext 
mke2fs 1.42.13 (17-May-2015)
/dev/mapper/homeext contains a ext4 file system
	created on Wed Mar 28 20:03:45 2018
Proceed anyway? (y,n) y
Creating filesystem with 488369920 4k blocks and 122093568 inodes
Filesystem UUID: 68100a88-4049-427d-ba0d-85ab54c936bd
Superblock backups stored on blocks: 
	32768, 98304, 163840, 229376, 294912, 819200, 884736, 1605632, 2654208, 
	4096000, 7962624, 11239424, 20480000, 23887872, 71663616, 78675968, 
	102400000, 214990848

Allocating group tables: done                            
Writing inode tables: done                            
Creating journal (32768 blocks): done
Writing superblocks and filesystem accounting information: done       

Create mount directory and mount virtual block device.

$ sudo mkdir /mnt/homeext
$ sudo mount /dev/mapper/homeext /mnt/homeext/
$ sudo chown milosz:milosz /mnt/homeext
$ sudo chmod 770 /mnt/homeext/

Unmount and close virtual block device after required data is copied.

$ sudo umount /mnt/homeext 
$ sudo cryptsetup luksClose homeext

Use luksOpen,mount and unmount, luksClose operations next time.

You can benchmark available algorithms using the following command.

$ cryptsetup benchmark
# Tests are approximate using memory only (no storage IO).
PBKDF2-sha1      1052787 iterations per second
PBKDF2-sha256     688041 iterations per second
PBKDF2-sha512     578046 iterations per second
PBKDF2-ripemd160  651289 iterations per second
PBKDF2-whirlpool  227555 iterations per second
#  Algorithm | Key |  Encryption |  Decryption
     aes-cbc   128b   592.2 MiB/s  2362.0 MiB/s
 serpent-cbc   128b    79.5 MiB/s   507.3 MiB/s
 twofish-cbc   128b   164.9 MiB/s   320.2 MiB/s
     aes-cbc   256b   438.2 MiB/s  1899.4 MiB/s
 serpent-cbc   256b    79.9 MiB/s   492.6 MiB/s
 twofish-cbc   256b   168.7 MiB/s   319.9 MiB/s
     aes-xts   256b  1425.9 MiB/s  1419.8 MiB/s
 serpent-xts   256b   498.3 MiB/s   486.5 MiB/s
 twofish-xts   256b   294.9 MiB/s   311.0 MiB/s
     aes-xts   512b  1231.8 MiB/s  1157.3 MiB/s
 serpent-xts   512b   496.8 MiB/s   484.4 MiB/s
 twofish-xts   512b   312.3 MiB/s   319.1 MiB/s

          Encrypt your Android device with a passcode      Cache   Translate Page      
Android has never had the same reputation for security as iOS or desktop operating systems. That doesn’t mean it lacks useful protections, though. On most devices, you can first set up a PIN and then go to Security -> Settings and enable the Encrypt Phone option. Note that initial encryption can take a while and […]
          Russian Government Hits Last Independent News Outlet With A $338,000 Fine      Cache   Translate Page      

The Russian government took another consolidation-of-power step recently. Deciding to exercise a 2012 law written specifically to give it leverage against independent press outlets, a Moscow court has hit the country's last remaining opposition magazine with a massive fine.

The Committee to Protect Journalists today condemned an exorbitant fine imposed on the independent news outlet The New Times. A Moscow court on October 26 ordered the outlet to pay 22.3 million rubles (US$338,000) for failing to provide financial information under Russia's "foreign agents" law and ordered the outlet's editor-in-chief Yevgenia Albats to pay an additional fine of 30,000 rubles, TV Dozhd reported.

Albats suspects this fine is the result of an October 22nd interview with opposition politician and vocal Putin critic Aleksei Nalvany. The hefty fine should result in the closure of The New Times, which would be exactly what the Russian government wants.

The law used to effectively push the magazine into bankruptcy went live in 2012. It requires all non-government operations that receive foreign funding to register as "foreign agents." This law was upgraded last year in response to a new US policy requiring similar "foreign agent" registration for Russian state-run news outlets. This newer twist allows for direct targeting of press outlets. But, even without this addition, the Russian government still could have crippled The New Times. As Agence France-Presse reports, part of The New Times' funding involves donations collected by a registered charity.

With this move, Russian citizens will now be limited to state-run publications. The internet will still provide opportunities for Russians to read news not controlled by the state, but those too will eventually dry up as the Russian government continues to assert its control of this medium as well. The internet was the last refuge of The New Times, which had to cease publication of its print edition due to a lack of funding.

The court decision itself is suspect. Rather than pretend the fine (supposedly triggered by single failure to update registration paperwork three months ago) could be discussed or disputed, the court made its decision without input from the defendants. New Times' staff and lawyers were not present and evidence showing the outlet had made a good faith effort to rectify its error was not presented.

The court case, which began back in April, suddenly accelerated towards a hefty fine following the publication's interview with a prominent Putin critic. There are additional details contained in The New Times' post on the subject -- including its justifiably dour announcement that it will be appealing this decision -- harbors no expectations any Russian court will reverse this decision.

If it all plays out the way everyone involved believes it will, the Russian government will have secured a "100% Complete" trophy for press suppression. If it can just keep the internet in line, it will be able to return the country to its former Cold War glory.

Permalink | Comments | Email This Story

          El estándar WPA3 podría llegar a Windows 10 en la siguiente gran actualización que debe llegar en primavera      Cache   Translate Page      

El estándar WPA3 podría llegar a Windows 10 en la siguiente gran actualización que debe llegar en primavera#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

Hace un rato hemos visto cómo Microsoft liberaba el primer SDK basado en Windows 10 en la rama 19H1. Una actualización que vendrá cargada de novedades y entre todas puede que encontremos una que sobresalga del resto: el soporte para la nueva versión del protocolo de seguridad WPA.

Recordamos que fue en junio cuando la Wi-Fi Alliance anunció el nuevo estándar de encriptación WI-FI. El WPA3 llegaba para suceder al WPA2, el cual era noticia por el ataque KRACKed con el que se comprometía la integridad de los datos que circulan por nuestra red Wi-Fi. El WPA3 es la respuesta a esa laguna de seguridad.

Y al parecer Windows 10 19H1 será compatible con la nueva versión de WPA (Wi-Fi Protected Access). El objetivo es mejorar el el cifrado Advanced Encryption Standard (AES, por sus siglas en inglés) y el cifrado de 128 bits que estrenó WPA2.

Entre las ventaja del estándar WPA3 destaca el que cuenta con cifrado de datos individualizado e inicios de sesión basados ​​en contraseñas más fuertes con los que busca evitar que alguien puede averiguar nuestra contraseña de red.

WPA3 se antojaba cómo muy necesario, sobre todo si recordamos cómo en octubre de 2017 se descubrió el exploit que afectaba al protocolo WPA y WPA2 y que gracias a una técnica llamada Key Reinstallation AttaCK o KRACK, permitía el acceso al tráfico entre los ordenadores y los equipos conectados en una red Wi-Fi.


El nuevo estándar es resistente a estos ataques y bloqueará las solicitudes de autenticación después de varios intentos fallidos. Además añade una mejora en el caso de que un atacante pueda averiguar la contraseña, puesto que mediante un cifrado de datos individualizado, evita que al obtener acceso a la conexión, se pueda desencriptar el tráfico anterior que ha habido. WPA3 mantendrá cifrado todo el que hayas tenido hasta el momento de la intromisión.

Además, WPA3 facilita la configuración de los dispositivos sin pantalla gracias a WI-FI Easy Connect, un método que se sirve de un código QR que escaneamos usando el smartphone para generar una contraseña que enviaremos al dispositivo en cuestión escaneando después el código QR que este también tendrá.

Por ahora WPA3 tiene un uso residual, pues sólo es compatible con los dispositivos más recientes que llegan al mercado, algo que debe cambiar según aumente la presencia de estos en nuestros hogares.

En el caso de Windows 10, por ahora este no es compatible y será la actualización que veremos en primavera la que prestará soporte al nuevo estándar, una mejora que ya pueden probar los integrantes del Programa Insider en la rama 19H1 de Windows 10.

Fuente | MSPU

También te recomendamos


Es difícil, pero si Wanna Decryptor (u otro malware) ha infectado tu equipo puedes combatirlo con estos pasos

Con estos sencillos pasos puedes conocer la dirección MAC de tu equipo con Windows para identificarlo en la red

La noticia El estándar WPA3 podría llegar a Windows 10 en la siguiente gran actualización que debe llegar en primavera fue publicada originalmente en Xataka Windows por Jose Antonio .

Next Page: 10000

Site Map 2018_01_14
Site Map 2018_01_15
Site Map 2018_01_16
Site Map 2018_01_17
Site Map 2018_01_18
Site Map 2018_01_19
Site Map 2018_01_20
Site Map 2018_01_21
Site Map 2018_01_22
Site Map 2018_01_23
Site Map 2018_01_24
Site Map 2018_01_25
Site Map 2018_01_26
Site Map 2018_01_27
Site Map 2018_01_28
Site Map 2018_01_29
Site Map 2018_01_30
Site Map 2018_01_31
Site Map 2018_02_01
Site Map 2018_02_02
Site Map 2018_02_03
Site Map 2018_02_04
Site Map 2018_02_05
Site Map 2018_02_06
Site Map 2018_02_07
Site Map 2018_02_08
Site Map 2018_02_09
Site Map 2018_02_10
Site Map 2018_02_11
Site Map 2018_02_12
Site Map 2018_02_13
Site Map 2018_02_14
Site Map 2018_02_15
Site Map 2018_02_15
Site Map 2018_02_16
Site Map 2018_02_17
Site Map 2018_02_18
Site Map 2018_02_19
Site Map 2018_02_20
Site Map 2018_02_21
Site Map 2018_02_22
Site Map 2018_02_23
Site Map 2018_02_24
Site Map 2018_02_25
Site Map 2018_02_26
Site Map 2018_02_27
Site Map 2018_02_28
Site Map 2018_03_01
Site Map 2018_03_02
Site Map 2018_03_03
Site Map 2018_03_04
Site Map 2018_03_05
Site Map 2018_03_06
Site Map 2018_03_07
Site Map 2018_03_08
Site Map 2018_03_09
Site Map 2018_03_10
Site Map 2018_03_11
Site Map 2018_03_12
Site Map 2018_03_13
Site Map 2018_03_14
Site Map 2018_03_15
Site Map 2018_03_16
Site Map 2018_03_17
Site Map 2018_03_18
Site Map 2018_03_19
Site Map 2018_03_20
Site Map 2018_03_21
Site Map 2018_03_22
Site Map 2018_03_23
Site Map 2018_03_24
Site Map 2018_03_25
Site Map 2018_03_26
Site Map 2018_03_27
Site Map 2018_03_28
Site Map 2018_03_29
Site Map 2018_03_30
Site Map 2018_03_31
Site Map 2018_04_01
Site Map 2018_04_02
Site Map 2018_04_03
Site Map 2018_04_04
Site Map 2018_04_05
Site Map 2018_04_06
Site Map 2018_04_07
Site Map 2018_04_08
Site Map 2018_04_09
Site Map 2018_04_10
Site Map 2018_04_11
Site Map 2018_04_12
Site Map 2018_04_13
Site Map 2018_04_14
Site Map 2018_04_15
Site Map 2018_04_16
Site Map 2018_04_17
Site Map 2018_04_18
Site Map 2018_04_19
Site Map 2018_04_20
Site Map 2018_04_21
Site Map 2018_04_22
Site Map 2018_04_23
Site Map 2018_04_24
Site Map 2018_04_25
Site Map 2018_04_26
Site Map 2018_04_27
Site Map 2018_04_28
Site Map 2018_04_29
Site Map 2018_04_30
Site Map 2018_05_01
Site Map 2018_05_02
Site Map 2018_05_03
Site Map 2018_05_04
Site Map 2018_05_05
Site Map 2018_05_06
Site Map 2018_05_07
Site Map 2018_05_08
Site Map 2018_05_09
Site Map 2018_05_15
Site Map 2018_05_16
Site Map 2018_05_17
Site Map 2018_05_18
Site Map 2018_05_19
Site Map 2018_05_20
Site Map 2018_05_21
Site Map 2018_05_22
Site Map 2018_05_23
Site Map 2018_05_24
Site Map 2018_05_25
Site Map 2018_05_26
Site Map 2018_05_27
Site Map 2018_05_28
Site Map 2018_05_29
Site Map 2018_05_30
Site Map 2018_05_31
Site Map 2018_06_01
Site Map 2018_06_02
Site Map 2018_06_03
Site Map 2018_06_04
Site Map 2018_06_05
Site Map 2018_06_06
Site Map 2018_06_07
Site Map 2018_06_08
Site Map 2018_06_09
Site Map 2018_06_10
Site Map 2018_06_11
Site Map 2018_06_12
Site Map 2018_06_13
Site Map 2018_06_14
Site Map 2018_06_15
Site Map 2018_06_16
Site Map 2018_06_17
Site Map 2018_06_18
Site Map 2018_06_19
Site Map 2018_06_20
Site Map 2018_06_21
Site Map 2018_06_22
Site Map 2018_06_23
Site Map 2018_06_24
Site Map 2018_06_25
Site Map 2018_06_26
Site Map 2018_06_27
Site Map 2018_06_28
Site Map 2018_06_29
Site Map 2018_06_30
Site Map 2018_07_01
Site Map 2018_07_02
Site Map 2018_07_03
Site Map 2018_07_04
Site Map 2018_07_05
Site Map 2018_07_06
Site Map 2018_07_07
Site Map 2018_07_08
Site Map 2018_07_09
Site Map 2018_07_10
Site Map 2018_07_11
Site Map 2018_07_12
Site Map 2018_07_13
Site Map 2018_07_14
Site Map 2018_07_15
Site Map 2018_07_16
Site Map 2018_07_17
Site Map 2018_07_18
Site Map 2018_07_19
Site Map 2018_07_20
Site Map 2018_07_21
Site Map 2018_07_22
Site Map 2018_07_23
Site Map 2018_07_24
Site Map 2018_07_25
Site Map 2018_07_26
Site Map 2018_07_27
Site Map 2018_07_28
Site Map 2018_07_29
Site Map 2018_07_30
Site Map 2018_07_31
Site Map 2018_08_01
Site Map 2018_08_02
Site Map 2018_08_03
Site Map 2018_08_04
Site Map 2018_08_05
Site Map 2018_08_06
Site Map 2018_08_07
Site Map 2018_08_08
Site Map 2018_08_09
Site Map 2018_08_10
Site Map 2018_08_11
Site Map 2018_08_12
Site Map 2018_08_13
Site Map 2018_08_15
Site Map 2018_08_16
Site Map 2018_08_17
Site Map 2018_08_18
Site Map 2018_08_19
Site Map 2018_08_20
Site Map 2018_08_21
Site Map 2018_08_22
Site Map 2018_08_23
Site Map 2018_08_24
Site Map 2018_08_25
Site Map 2018_08_26
Site Map 2018_08_27
Site Map 2018_08_28
Site Map 2018_08_29
Site Map 2018_08_30
Site Map 2018_08_31
Site Map 2018_09_01
Site Map 2018_09_02
Site Map 2018_09_03
Site Map 2018_09_04
Site Map 2018_09_05
Site Map 2018_09_06
Site Map 2018_09_07
Site Map 2018_09_08
Site Map 2018_09_09
Site Map 2018_09_10
Site Map 2018_09_11
Site Map 2018_09_12
Site Map 2018_09_13
Site Map 2018_09_14
Site Map 2018_09_15
Site Map 2018_09_16
Site Map 2018_09_17
Site Map 2018_09_18
Site Map 2018_09_19
Site Map 2018_09_20
Site Map 2018_09_21
Site Map 2018_09_23
Site Map 2018_09_24
Site Map 2018_09_25
Site Map 2018_09_26
Site Map 2018_09_27
Site Map 2018_09_28
Site Map 2018_09_29
Site Map 2018_09_30
Site Map 2018_10_01
Site Map 2018_10_02
Site Map 2018_10_03
Site Map 2018_10_04
Site Map 2018_10_05
Site Map 2018_10_06
Site Map 2018_10_07
Site Map 2018_10_08
Site Map 2018_10_09
Site Map 2018_10_10
Site Map 2018_10_11
Site Map 2018_10_12
Site Map 2018_10_13
Site Map 2018_10_14
Site Map 2018_10_15
Site Map 2018_10_16
Site Map 2018_10_17
Site Map 2018_10_18
Site Map 2018_10_19
Site Map 2018_10_20
Site Map 2018_10_21
Site Map 2018_10_22
Site Map 2018_10_23
Site Map 2018_10_24
Site Map 2018_10_25
Site Map 2018_10_26
Site Map 2018_10_27
Site Map 2018_10_28
Site Map 2018_10_29
Site Map 2018_10_30
Site Map 2018_10_31
Site Map 2018_11_01
Site Map 2018_11_02
Site Map 2018_11_03
Site Map 2018_11_04
Site Map 2018_11_05
Site Map 2018_11_06
Site Map 2018_11_07