“Despite the best efforts of some to sound the alarm, the nation is being locked down into a militarized, mechanized, hypersensitive, legalistic, self-righteous, goose-stepping antithesis of every principle upon which this nation was founded. All the while, the nation’s citizens seem content to buy into a carefully constructed, benevolent vision of life in America that bears little resemblance to the gritty, pain-etched reality that plagues those unfortunate enough to not belong to the rarefied elite. For those whose minds have been short-circuited into believing the candy-coated propaganda peddled by the politicians, here is an A-to-Z, back-to-the-basics primer of what life in the USA is really all about.”
Tag Archives: False Sense Of Security
PITA Side-Channel Attack Steals GPG Key from Laptops

“It’s unlikely that anyone envisioned the evolution of cryptographic key thievery to include leavened flatbread, but that’s where we’ve arrived. Researchers from Tel Aviv University in Israel are expected in September to present a paper at the Workshop on Cryptographic Hardware and Embedded System on the latest side-channel attack exposing crypto keys. The scientists—Daniel Genkin, Lev Pachmanov, Itamar Pipman, and Eran Tromer—have developed an inexpensive rig they say from close proximity steals GnuPG keys from a laptop. The setup, which they’ve called the Portable Instrument for Trace Acquisition (PITA), does indeed fit inside pita bread.”
https://threatpost.com/pita-side-channel-attack-steals-gpg-key-from-laptops/113447
Risky Loans Shunned by Banks Are Booming in Wall Street’s Shadow

“Regulators’ efforts to rein in Wall Street’s biggest banks are in danger of backfiring. Guidelines aimed at strengthening lending standards are shifting the market for high-yield credit to less-supervised loan funds, raising alarm this week from the Financial Stability Oversight Council. Because the funds don’t have depositors, some of their money comes from Wall Street banks, leaving systemically important institutions exposed to risks regulators hoped to avoid. BDCs and private credit funds [are called] ‘Dodd-Frank banks’ because they’ve grown in the wake of the 2010 Dodd-Frank Act’s heightened supervisory scrutiny of regulated lenders.”
Ending the Ownership of Money
“The overriding effect that the elimination of cash will have on people will be that they will lose their freedom of monetary movement. They will be subject to government and banking surveillance of every transaction and, increasingly, will be subject to legislation that limits currency movement. Once this point is reached, governments will be free to move to a stage in which they declare that money is not the possession of the individual or company. It’s the possession of the government and the government ‘allows’ the public to use its currency in order to conduct commerce. As such, individuals and companies had best ‘behave,’ or they might find the privilege taken away and the money confiscated.”
http://www.internationalman.com/articles/ending-the-ownership-of-money
The Massive OPM Hack Actually Hit 25 Million People

“The stolen information includes about 1.1 million fingerprints as well as findings that investigators obtained from interviews conducted with neighbors, friends and family members for background checks. Such information can be highly sensitive since it can include knowledge about the drug and criminal history of someone undergoing a background check as well as their sexual orientation and relationships. Those affected include anyone who applied for a security clearance in 2000 or later and who underwent a background investigation. All of that is in addition to the millions people the government had already announced were hacked.”
http://www.wired.com/2015/07/massive-opm-hack-actually-affected-25-million/
Default SSH Key Found in Many Cisco Security Appliances

“Many Cisco security appliances contain default, authorized SSH keys that can allow an attacker to connect to an appliance and take almost any action he chooses. The company said that all of its Web Security Virtual Appliances, Email Security Virtual Appliances, and Content Security Management Virtual Appliances are affected by the vulnerability. This bug is about as serious as they come for enterprises. An attacker who is able to discover the default SSH key would have virtually free rein on vulnerable boxes, which, given Cisco’s market share and presence in the enterprise worldwide, is likely a high number. The default key apparently was inserted into the software for support reasons.”
https://threatpost.com/default-ssh-key-found-in-many-cisco-security-appliances/113480
Insanity on the Thames
“UK Prime Minister David Cameron is a seriously deluded man. First, he apparently believes Facebook and Twitter users currently have ‘absolute privacy’ in their communications. That is nonsense. Second, Cameron believes this nonexistent absolute privacy is unsustainable and intolerable. He wants to destroy it as soon as possible. This is necessary, Cameron told Parliament, because tolerating such privacy would ‘leave a safe space’ for terrorists to communicate with each other. Contrary to Mr. Cameron’s assurance, Britain certainly is trying to ‘search through everybody’s emails and invade their privacy.’ The U.S. government is doing the same.”
http://www.thedailybell.com/news-analysis/36397/Insanity-on-the-Thames/
The Ghosts of Spying Past

“In the 1990s, the Clinton administration fought furiously against privacy and security in communication, and we’re still hurting from it today. Yet people in powerful positions are trying to commit the same mistakes all over again. Doing business safely requires data security: If unauthorized parties can grab credit card numbers or issue fake orders, nobody is safe. However, the Clinton administration considered communication security a threat to national security. Attorney General Janet Reno said, ‘Without encryption safeguards, all Americans will be endangered.’ She didn’t mean that we needed the safeguard of encryption, but that we had to be protected from encryption.”
http://fee.org/anythingpeaceful/detail/the-ghosts-of-spying-past
Why an Arms Control Pact Has Security Experts Up in Arms

“Security researchers say a proposed set of export rules meant to restrict the sale of surveillance software to repressive regimes are so broadly written that they could criminalize some research and restrict legitimate tools that professionals need to make software and computer systems more secure. Critics liken the software rules, put forth by the US Commerce Department, to the Crypto Wars of the late ’90s, when export controls imposed against strong encryption software prevented cryptographers and mathematicians from effectively sharing their research abroad. At issue is the so-called Wassenaar Arrangement, an international agreement proposed US rules are based upon.”
http://www.wired.com/2015/06/arms-control-pact-security-experts-arms/
Critical OpenSSL bug allows attackers to impersonate any trusted server

“There’s a critical vulnerability in some versions of the widely used OpenSSL code library that in some cases allows attackers to impersonate cryptographically protected websites, e-mail servers, and virtual private networks, according to an advisory issued early Thursday morning. The bug allows attackers to force vulnerable end-user applications into treating an invalid certificate as a legitimate transport layer security (TLS) or secure sockets layer (SSL) credential. As a result, adversaries with the ability to monitor a connection between the end user and trusted server could intercept or even modify data passing between them.”


