“The SHA-1 hash algorithm is still in use for verifying the authenticity of digital content, despite the march of Moore’s Law ramping up compute power available to hackers in the wild — and despite other, more robust alternatives having existed for years. Systems that could be compromised via the technique according to the researchers include document signature, HTTPS certificates, version control (git), backup systems, software updates, ISO checksums and more.”
(Visited 20 times, 1 visits today)
Related posts:
Man Charged with Murder After Cop Wrecks Trying to Give Him Ticket
Marijuana: Will It Ever Be Legal? States Lead the Charge as Opinion Shifts
Unwise Deepening of an Unnecessary Crisis
French cops caught on video beating and tear-gassing women at traffic stop
Shakil Khan: Bitcoin can be “money over IP”, but services must get more intuitive
Still no list of Q4 2012 ex-Americans in the Federal Register
Only in NH: How to Ferment a Nano-Brewvolution
Overstock Unveils Blockchain Trading Platform at Nasdaq Event
Maine Gov. Says He Intends to Sign GMO Labeling Bill - But not Right Now
Russia: Hysteria around chemical attack suits those who want military intervention
Hillary Emails Reveal Propaganda, Executions, Coveting Libyan Oil and Gold
The Latin American startup movement gaining momentum
25 Quotes About The Coming War With Syria That Every American Should See
John Hussman: The Coming Fed-Induced Pension Bust
China Is Moving in the Right Direction on Tariffs