“The SHA-1 hash algorithm is still in use for verifying the authenticity of digital content, despite the march of Moore’s Law ramping up compute power available to hackers in the wild — and despite other, more robust alternatives having existed for years. Systems that could be compromised via the technique according to the researchers include document signature, HTTPS certificates, version control (git), backup systems, software updates, ISO checksums and more.”
Related posts:
Gold Sector: A Small Fish in a Big Pond
Stocks: The Road Ahead
New York 'BitLicense' Forces Mining Pool BTCGuild To Shut Down
China Builds Great Central Bankers?
Feds Give Up Trying to Seize a Motel Based on Drug Offenses by a Few Guests
Texas U. Sold $375 Million in Gold Bars
Rep holds up vodka and steak on House floor to shame food stamp opponents
What Was Bradley Manning’s Sin?
Berkeley, CA Replacing Municipal Debt With Blockchain Crowdfunding
TSA removes X-ray body scanners from major airports
Coinbase: First $1,000,000 USD in merchant processing is now free!
A View Down The Road
Obama steps into China's African shadow
Trump wants a total ban on German luxury car imports
Spy Agencies Work On Psychologically Profiling Everyone