
“The SHA-1 hash algorithm is still in use for verifying the authenticity of digital content, despite the march of Moore’s Law ramping up compute power available to hackers in the wild — and despite other, more robust alternatives having existed for years. Systems that could be compromised via the technique according to the researchers include document signature, HTTPS certificates, version control (git), backup systems, software updates, ISO checksums and more.”
Related posts:
Zimmerman Case and Chaos?
State crime labs are incentivized to get false convictions
Crypto Stamp, Secure Timestamping Using Bitcoin
New Jersey kicks out Sandy volunteers because they aren’t unionized
Disability Rights are Human Rights
In 2017, 100 Times More Americans Were Killed by Police Than Terrorists
US troops arrive in Poland, Latvia for 'drills'
“Stomp on Jesus’ Name or Flunk My Class,” Says Professor. Student Refuses. Gone!
Israel Planned To Blow Up Passenger Plane In Arafat Assassination Plot
Italy Imposes 20% Tax Withholding On All Inbound Money Transfers
Baidu AI helps parents find their abducted son 27 years later
Cops Charge Black Man With Hate Crime For Calling Them 'Nazis'
American Entrepreneurship: Dead or Alive?
State Confiscates $10,000 From Airline Passenger Over Exchange Rate Disagreement
Social Security: Muffling the Warning Bells