Forwarded from IT Security Alerts
⚠️‼️ WPA2 (which most personal and cooperate wi-fi use) has several protocol-level flaws. Be adviced that no details are known yet, security researchers will release them later today. (No severity rating from our side until we have more information)
More info: http://yt.gl/krackattack (this will be released later today)
http://yt.gl/krcm7 (Arstechnica with all current info)
#alert #prenotification #exploit #zeroday #wifi #wireless #wpa2
Please feel free to discuss this in our @itsectalk group & forward 📬 to your net- and sysadmins!
More info: http://yt.gl/krackattack (this will be released later today)
http://yt.gl/krcm7 (Arstechnica with all current info)
#alert #prenotification #exploit #zeroday #wifi #wireless #wpa2
Please feel free to discuss this in our @itsectalk group & forward 📬 to your net- and sysadmins!
Krackattacks
KRACK Attacks: Breaking WPA2
This website presents the Key Reinstallation Attack (KRACK). It breaks the WPA2 protocol by forcing nonce reuse in encryption algorithms used by Wi-Fi.
C++ templates: Creating a compile-time higher-order meta-programming language
http://matt.might.net/articles/c++-template-meta-programming-with-lambda-calculus/
http://matt.might.net/articles/c++-template-meta-programming-with-lambda-calculus/
A simple explanation of concurrency vs parallelism
http://davidvedvick.info/notes/2017/01/20/concurrency-vs-parallelism
http://davidvedvick.info/notes/2017/01/20/concurrency-vs-parallelism
A series of posts by the developers of Crash Bandicoot about making the game and what the industry was like in the 90s
http://all-things-andy-gavin.com/2011/02/02/making-crash-bandicoot-part-1/
http://all-things-andy-gavin.com/2011/02/02/making-crash-bandicoot-part-1/
Forwarded from ZeBl
How an NSA backdooring attempt showed up years later in printer software:
https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/
https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/
A Few Thoughts on Cryptographic Engineering
The strange story of “Extended Random”
Yesterday, David Benjamin posted a pretty esoteric note on the IETF’s TLS mailing list. At a superficial level, the post describes some seizure-inducingly boring flaws in older Canon printers…
A readable look at the implementation of lists in Python and how it affects your Python code
https://rcoh.svbtle.com/notes-of-cpython-lists
https://rcoh.svbtle.com/notes-of-cpython-lists