#decryption

2025-09-22

I listened to the latest pod episode of Random but memorable by 1Password. In the interview with Hayley Benedict, she highlighted the threat that eg state actors harvest encrypted data from internet. The data is safely encrypted for now. But when quantum computing comes, older and much current encryption can be deccrypted. It is debated when quantum computing becomes real. She is a cyber intelligence analyst at RANE.

#encryption #decryption #cybersecurity

randombutmemorable.simplecast.

2025-09-17

The No More Secrets (nms) is fun CLI utility to recreate the famous data decryption effect seen on Sneakers movie in your Linux Terminal.

Read the full blog post here: ostechnix.com/no-more-secrets-

#NoMoreSecrets #Sneakers #Nms #RobertRedford #Decryption #Fun #Opensource #CLI

2025-09-04

Schneier on Security: 1965 Cryptanalysis Training Workbook Released by the NSA. “The listings in the report are printouts from the Stethoscope program, run on the NSA’s Bogart computer, showing statistical and structural data extracted from encrypted messages, but the encrypted messages themselves are not included. They were used in NSA training programs to teach analysts how to interpret […]

https://rbfirehose.com/2025/09/04/schneier-on-security-1965-cryptanalysis-training-workbook-released-by-the-nsa/

xsukax :verified:xsukax@infosec.exchange
2025-08-29

#xsukax #AES-256 File & Folder #Encryption & #Decryption Tool is a comprehensive #Python application that provides #military-grade encryption for both individual files and entire folder structures. Available in both GUI and CLI modes, this tool makes advanced cryptography accessible to users while offering maximum performance through #TAR archiving.

github.com/xsukax/xsukax-AES-2

2025-07-06

Ubuntu Security Flaw Lets Attackers Bypass Full Disk Encryption
#OMGUbuntu article: omgubuntu.co.uk/2025/07/ubuntu

“Not all #Linux distributions are affected, such as #OpenSUSE_Tumbleweed.”

#Attackers with physical access to a Linux system can access a debug shell simply by entering the wrong #decryption #password several times in a row. On Ubuntu, they hit esc at the password prompt, punch in a few key combos and debug shell appears.
They can mount a USB drive with tools that let them modify the #initramfs (Initial RAM Filesystem – a temporary system run during boot to prep the main OS) to inject #maliciouscode, and then repack it – without tripping any #security flags.
Then, the next time the owner boots up their #laptop and enters their correct password, the code runs with elevated privileges to do whatever the #attacker wants.”

“Impactful though this exploit could be in the wild, there is no reason for most #Ubuntu users to be concerned about it.
This #vulnerability is what the security industry refer to as an '#evilmaidattack': it requires physical access to a #device to pull off.”

“Finally, protecting against this #vulnerability is easy. Users can simply tweak their system #kernel so that the #computer #reboots on failed password attempts, instead of providing a #debug shell.”

N-gated Hacker Newsngate
2025-03-14

Oh, look, another "genius" using a GPU farm to play hero against . 🙄🤖 Because decrypting Akira's variant is just another weekend project, right? Next time, maybe they'll use a toaster. 😂🔥
tinyhack.com/2025/03/13/decryp

2025-02-26

University of Oslo: AI assists researchers in decoding old secret letters. “In today’s world, encryption plays a vital role in all aspects of data protection and cybersecurity, ensuring that unauthorised individuals cannot access the information you transmit or store. However, the practice of sending messages that can only be interpreted by their intended recipients predates the age of […]

https://rbfirehose.com/2025/02/26/university-of-oslo-ai-assists-researchers-in-decoding-old-secret-letters/

2025-01-19

Do you want a funny weekend project?

The Chilean , akin to the from United States, asks to sign tax documents using SHA1-RSA.

This encryption is susceptible to Marvin Attack, Collision Vulnerability, and SHAttered Attack.

Literally, all business in are vulnerable to these attacks.

2024-11-06

🇪🇺 #DataProtection Board's Statement on the 42 Recommendations of the »High-Level Group on Access to Data for Effective Law Enforcement« aka the #EuGoingDark surveillance plan:
edpb.europa.eu/system/files/20

> "The #EDPB, …, positively notes the intention expressed in the Recommendations to establish a harmonised EU regime on #DataRetention …"

Nothing about the undemocratic and biased working methods of the group …

#GoingDark #decryption #Vorratsdatenspeicherung #encryption #Privacy #TeamDatenschutz

I am building an online chat application for use on websites and want to encrypt the conversations before saving them. Any suggestions which JavaScript libraries to use for encryption and decryption?

#javascript #Encryption #decryption #security

Google Tink is an open-source cryptography library designed to simplify the implementation of secure encryption protocols. Tink supports a variety of languages, including Java, C++, Go, and JavaScript, and is intended to help developers build secure applications by managing key management, encryption, and decryption processes.

developers.google.com/tink

#Google #tink #encryption #decryption #key #cryptography

gtbarrygtbarry
2024-09-30

How Digital Forensics Experts Read Your Encrypted WhatsApp Messages

With physical access to the cell phone, forensic tools can extract the WhatsApp database directly and then decrypt the database. This means the communications are viewable to the digital forensics examiner just like they would be to the WhatsApp user

forbes.com/sites/larsdaniel/20

gtbarrygtbarry
2024-09-26

‘Harvest now, decrypt later’: Why hackers are waiting for quantum computing

With , hackers can access anything encrypted — data storage systems are no longer their primary focus. They can eavesdrop on the connection between a web browser and a server, read cross-program communication or intercept information in transit

venturebeat.com/security/harve

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst