
“The SHA-1 hash algorithm is still in use for verifying the authenticity of digital content, despite the march of Moore’s Law ramping up compute power available to hackers in the wild — and despite other, more robust alternatives having existed for years. Systems that could be compromised via the technique according to the researchers include document signature, HTTPS certificates, version control (git), backup systems, software updates, ISO checksums and more.”
Related posts:
Introducing Islamic Financial Futurist David Cameron!
Mother charged with baby's murder over prescription drug-laced breast milk
Woman Sentenced to Five Years in Prison for Voting While on Probation
$21 million later, London police stop waiting out Assange at embassy
"U.S. homeland security has forced terrorist groups to target Americans overseas"
Moody's, Goldman, feds fight the last war on financial excess
‘Pothole Robin Hood’ Steals Asphalt, Fixes Potholes, Faces Possible Charges
Tennessee Republican tells girl her father has to be deported as tea party crowd cheers
Bill Bonner: An Empire of Debt Leading to a "Crack-up" in the Global Monetary System
Court Grants Order to Freeze Hashfast’s Bitcoin Wallets
Stark Scenes From the Guantanamo Hunger Strike
Show Me the Manual: An Internet Town Hall [2012]
Survey: Quarter Of US Consumers Has Heard Of Bitcoin — And Majority Of Them Trust It
Why I Will Never, Ever, Go Back to the United States
Four Obamacare Taxes That Hurt Mothers Most