“The SHA-1 hash algorithm is still in use for verifying the authenticity of digital content, despite the march of Moore’s Law ramping up compute power available to hackers in the wild — and despite other, more robust alternatives having existed for years. Systems that could be compromised via the technique according to the researchers include document signature, HTTPS certificates, version control (git), backup systems, software updates, ISO checksums and more.”
Related posts:
China Broadcasts "Confession" of Chinese-American Blogger
Man gets ticket for running stop sign, dashcam video shows he didn't
America’s Corporate Tax System Ranks a Miserable 94 out of 100 Nations in “Tax Attractiveness”
Peter Schiff Explains How The Patriot Act Forces Him To Spy On His Customers
Texas Governor Candidate Welcomes 'Bitcoin Community' to Campaign
Financial Considerations for Expats
Simulated 'Street Wide' Cyber Attack on Wall Street Coming
The Bubble: film official trailer
High School AP History Book Rewrites 2nd Amendment
NH Representative Mark Warden Utilizing Bitcoin for Campaign Donations
Erik Voorhees: financial independence through gold and Bitcoin
Researcher Identifies Hidden Data-Acquisition Services in iOS
Obama: Persecution of LGBT people violates basic morality
Bitcoin Revolution Spreads to Togo
Oakland Insists It Can Defend Medical Pot Club