Detroit Deathfest 2006

I Bands: Circle of Dead Children (PA) Summon (MI) Daath (GA) Decrypt (IN) Nocturnal Fear (MI) Saprogenic (MI) Unburied (VA) Ten Ton Dieselhead (MI) Darkness Undying (OH) Vein Of Lunacy (MI) Unregistered Sex Offender (OH) Goatswat (MI) Crucifist Venue: The 2500 Club Located in Downtown Detroit

https://grpunkflyers.notopia.dev/flyers/1763/

Google released a blog post on steps required to take ASAP, so that we are prepared for when quantum computers are readily available to crack current encryption [1]. I read it after I saw a video talking about this post, which as one might expect, was a bit alarmist. However, it is a real #cybersec #threat, and I've seen other sources mention, that #threatactors are starting to gather #encrypted #data in the expectation to readily #decrypt it in the near future. /1

[1] https://blog.google/innovation-and-ai/technology/safety-security/the-quantum-era-is-coming-are-we-ready-to-secure-it/

The quantum era is coming. Are we ready to secure it?

Google shares an update on its work and suggestions for how policymakers can help everyone be more secure in the Quantum Era.

Google
#ForwardSecrecy <generates a unique session key for every session a user initiates, the compromise of a single session key will not affect any data other than that exchanged>, which prevents someone who is sniffing your data, to later #decrypt it all in one go. This <https://en.wikipedia.org/wiki/Forward_secrecy>. Continued...
Forward secrecy - Wikipedia

An interesting lighting talk at #hacklu presenting a tool for Offline decryption of SCCM database secrets.

https://github.com/MartinoTommasini/offlineSCCMdecrypt

#sccm #decrypt #cybersecurity

GitHub - MartinoTommasini/offlineSCCMdecrypt: Step-by-step documentation on how to decrypt SCCM database secrets offline

Step-by-step documentation on how to decrypt SCCM database secrets offline - MartinoTommasini/offlineSCCMdecrypt

GitHub
Morning Minute: $19B Wiped Out in Crypto's Biggest Liquidation Ever

Friday's crash, which saw billions of dollars in crypto liquidations, is now being chalked up to a misunderstanding between Trump and China.

Decrypt

2030
It will be time to host his own server for family tchat and not to use official ones.

nothing to hipe, ok, but It is not the reason to let everyone reads and knows

https://www.techradar.com/vpn/vpn-privacy-security/the-eu-wants-to-decrypt-your-private-data-by-2030

#linux #security #privacy #crypt #decrypt

The EU wants to decrypt your private data by 2030

The EU Commission unveiled the first step in its security strategy to ensure "lawful and effective" law enforcement access to data

TechRadar

This weekend's GreyCatCTF had an interesting "Reverse 101" challenge in the "EZPZ" category. In "nc" a number of questions were asked on the binary, and the most interesting one was what a certain function did (RC4 encrypt) and what input is required to get the flag.

Besides ghidra & gdb, angr was very helpful here to get the plaintext for the RC4 encryption. See pictures for details.

#greycat #ctf #cybersecurity #angr #reverseengineering #rc4 #decrypt #ezpz #writeup #notawriteup #lazy

A̮åȃa̋áā Aăă Āa̰á Ãäa̡ạa̦ A̡a̦a̯a̰áȃ Aăa̋åȃảāa̰ǎã

🗣️🔥 **scream_cypher** — A cypher based on XKCD-3054

🅰️ Messages consist of all As with different letters

🦀 Available as both a CLI tool and a Rust library!

⭐ GitHub: https://github.com/icorbrey/scream_cypher

#rustlang #cypher #xkcd #encrypt #decrypt #library #commandline #meme

GitHub - icorbrey/scream_cypher: Áâa̡ȃa̦a̯ā aâa̱ a̱áa̡ȃa̦a̯ā ǎáããaa̋áã äãảâa̋ āa̰á ÃA̡ȂÁAǍ A̡A̦A̯A̰ÁȂ!

Áâa̡ȃa̦a̯ā aâa̱ a̱áa̡ȃa̦a̯ā ǎáããaa̋áã äãảâa̋ āa̰á ÃA̡ȂÁAǍ A̡A̦A̯A̰ÁȂ! - icorbrey/scream_cypher

GitHub

@tejan the only correct way to deal with this is using proper #E2EE like #PGP/MIME & anonymous eMail accounts.

  • Providers can only #decrypt and #read for what they have the keys!

Same goes with #Messengers, which is why I only recommend #XMPP+#OMEMO (i.e. @monocles / #monoclesChat & @gajim / #gajim ) & PGP/MIME (i.e. @delta / #deltaChat & @thunderbird / #Thunderbird), because unlike #proprietary #SingleVendor & #SingoeProvider solutions, they offer #SelfCustody so even if a provider is cooperative or served a #subopena or got theor equipment seized, they can't decrypt the contents!