“The SHA-1 hash algorithm is still in use for verifying the authenticity of digital content, despite the march of Moore’s Law ramping up compute power available to hackers in the wild — and despite other, more robust alternatives having existed for years. Systems that could be compromised via the technique according to the researchers include document signature, HTTPS certificates, version control (git), backup systems, software updates, ISO checksums and more.”
Related posts:
Tennessee politician arrested for habit of masturbating out car window at 90 mph
Rentalutions enables US residents to pay rent in bitcoins
Meet 4 Accidental Bitcoin Millionaires
John Hussman: Memorize This, Earn a Dollar
Very Bad News for Europe’s Young People
Same sex marriage measures approved in three states
Moammar Gadhafi Comments From the Grave on John Kerry
The 'New Science' Of Psychedelics
Man Charged with Murder After Cop Wrecks Trying to Give Him Ticket
ISIS Fighters' Salaries Halved After Loss Of Territory And Air Strikes
Now Available for You to Buy: America's Most Expensive Home, $190 Million
Hollywood Gets Tax Break Extension, While Payroll Extension Break Ended
Defense Distributed Plans to Make Bitcoins Completely Anonymous
ObamaCare’s Latest Numbers Don’t Add Up. You Will Pay the Difference.
Ron Paul: For Normal Relations With Cuba, End US Interventionism