#ETHZ:
"
Den Mond mit Glasfasern durchleuchten
"
"Künftige Mondmissionen könnten ein Hilfsmittel nutzen, das wir vom schnellen Internet zu Hause kennen: Glasfaserkabel. Forschende der ETH Zürich und aus den USA untersuchen derzeit, ob diese leichten Kabel dabei helfen, das Innere des Mondes zu erforschen und Mondbeben präzise zu messen."

https://ethz.ch/de/news-und-veranstaltungen/eth-news/news/2026/03/den-mond-mit-glasfasern-durchleuchten.html

24.3.2026

#DistributedAcousticSensing #Geophysik #Glasfaser #Glasfasersensorik #Kabel #LANL #Mond #Mondbeben #Mondstaub #Seismologie

Den Mond mit Glasfasern durchleuchten

Künftige Mondmissionen könnten ein Hilfsmittel nutzen, das wir vom schnellen Internet zu Hause kennen: Glasfaserkabel. Forschende der ETH Zürich und aus den USA untersuchen derzeit, ob diese leichten Kabel dabei helfen, das Innere des Mondes zu erforschen und Mondbeben präzise zu messen. 

ETH Zürich

Neue Forschung der #ETHZ
<<Am meisten lohnen sich neue Wälder in den Tropen. [...] Dort sind Wälder nicht nur CO2-Speicher, sondern zusätzlich auch "Klimaanlagen".>>
Zitat Audio Tagesschau.
https://www.tagesschau.de/wissen/klima/studie-aufforstung-100.html

Das können wir durch anekdotische Evidenz untermauern. Beim Besuch unserer über 10 Jahre alten #Wiederaufforstung in Costa Rica kann man diesen Kühlungseffekt bemerken.
Dazu trägt auch die Laubschicht auf dem Boden bei, wodurch Wasser verdunstet.
Nebenan im Bohnenfeld des Nachbarn ists deutlich unangenehmer in der Trockenzeit.

#CostaRica #Regenwald #Tropen #CO2 #Wald #Zuerich

Wo Wälder die Erde kühlen - und wo nicht

Wälder binden CO2. Aufforstung ist deshalb wichtig im Kampf gegen die Erderwärmung. Eine Studie zeigt jedoch: Nur am strategisch richtigen Standort funktionieren Wälder zusätzlich als Klimaanlagen.

tagesschau.de

[en] Signal #messenger: "two practical attacks that break the integrity properties of #Signal in its advertised #threat model" - Patched

Paper #ETHZ

"... protocol for resolving identities based on usernames and on phone numbers introduced a #vulnerability that allows a malicious server to inject arbitrary messages into one-to-one conversations under specific circumstances"

"The second #attack is even more severe. It arises from Signal's Sealed Sender (SSS) feature, designed to allow sender identities to be hidden ... a combination of two errors in the #SSS implementation in #Android allows a #malicious server to #inject arbitrary messages into both one-to-one and group conversations."

https://eprint.iacr.org/2026/484

#security #cryptology #encryption #e2e #chat #messaging
#ResearchHighlights

Signal Lost (Integrity): The Signal App is More than the Sum of its Protocols

Signal is a secure messaging app offering end-to-end security for pairwise and group communications. It has tens of millions of users, and has heavily influenced the design of other secure messaging apps (including WhatsApp). Signal has been heavily analysed and, as a result, is rightly regarded as setting the "gold standard" for messaging apps by the scientific community. We present two practical attacks that break the integrity properties of Signal in its advertised threat model. Each attack arises from different features of Signal that are poorly documented and have eluded formal security analyses. The first attack, affecting Android and Desktop, arises from Signal's introduction of identities based on usernames (instead of phone numbers) in early 2022. We show that the protocol for resolving identities based on usernames and on phone numbers introduced a vulnerability that allows a malicious server to inject arbitrary messages into one-to-one conversations under specific circumstances. The injection causes a user-visible alert about a change of safety numbers, but if the users compare their safety numbers, they will be correct. The second attack is even more severe. It arises from Signal's Sealed Sender (SSS) feature, designed to allow sender identities to be hidden. We show that a combination of two errors in the SSS implementation in Android allows a malicious server to inject arbitrary messages into both one-to-one and group conversations. The errors relate to missing key checks and the loss of context when cryptographic processing is distributed across multiple software components. The attack is undetectable by users and can be mounted at any time, without any preconditions. As far as we can tell, the vulnerability has been present since the introduction of SSS in 2018. We disclosed both attacks to Signal. The vulnerabilities were promptly acknowledged and patched: the first vulnerability was fixed two days after disclosure, while the second one was patched after eight days. Beyond presenting these devastating attacks on Signal's end-to-end security guarantees, we discuss more broadly what can be learned about the challenges of deploying new security features in complex software projects.

IACR Cryptology ePrint Archive

Introduction to #Linux (Tomorrow, 10.03.26):
In this course you will learn about the wide family of free operating systems based on the Linux kernel, some of the most useful software tools available for them, as well as the philosophy that made them so successful.

Find out how easy to use and yet powerful Linux systems are, discover their advantages when compared to other operating systems, and get to understand their basic structure and most important concepts.

Furthermore, discover different flavours of Linux and get a feeling for which #distribution and desktop environment would be the right match for you.

More Info: https://thealternative.ch/?eventId=95
- Speaker: Caspar Gutsche
- Where: ETH HG D7.1
- When: 10.03.26, 18:15 - 20:00

#diday #digitalin #Linuxtreff #ethz

Der beste #Kaffee an der ETH #Zürich: Bar #Caffetteria Otter, immer freitags auf der Polyterrasse!

#ethz

🇱🇻 🇨🇭 Die ETH-Bibliothek zeigt in Zusammenarbeit mit der Lettischen Nationalbibliothek die Posterausstellung «500 Jahre Bücher in Lettisch – #Riga erLesen», die einen Einblick gibt in die Zusammenarbeit der technischen Hochschulen der beiden Städte.

https://library.ethz.ch/ueber-uns-und-standorte/news/news-beitraege/2026/02/500-jahre-lettische-buchkultur-erleben.html

#zürich #ethz #ethbibliothek #latvia

Kosmos aus Karten und alten Drucken | ZüriPerlen

ZüriPerlen

«Es mag verrückt klingen, aber ich spare mit einem Studium in Genf Geld und bekomme dafür erst noch eine bessere Bildung.»

#schweiz #bildung #usa #epfl #ethz #geneve #zurich #lausanne #formation

https://www.tagesanzeiger.ch/wegen-trump-us-studierende-draengen-an-schweizer-unis-356214853238

Wegen Trump? US-Studierende drängen an Schweizer Unis

Die renommiertesten Universitäten im Land verzeichnen einen starken Anstieg von Studierenden und Doktorierenden aus den USA. Ist das der Trump-Effekt? Warum die Zahlen noch weiter steigen könnten.

Tamedia AG
Zero Knowledge (About) Encryption: A Comparative Security Analysis of Three Cloud-based Password Managers

Zero Knowledge Encryption is a term widely used by vendors of cloud-based password managers. Although it has no strict technical meaning, the term conveys the idea that the server, who stores encrypted password vaults on behalf of users, is unable to learn anything about the contents of those vaults. The security claims made by vendors imply that this should hold even if the server is fully malicious. This threat model is justified in practice by the high sensitivity of vault data, which makes password manager servers an attractive target for breaches (as evidenced by a history of attacks). We examine the extent to which security against a fully malicious server holds true for three leading vendors who make the Zero Knowledge Encryption claim: Bitwarden, LastPass and Dashlane. Collectively, they have more than 60 million users and 23% market share. We present 12 distinct attacks against Bitwarden, 7 against LastPass and 6 against Dashlane. The attacks range in severity, from integrity violations of targeted user vaults to the complete compromise of all the vaults associated with an organisation. The majority of the attacks allow recovery of passwords. We have disclosed our findings to the vendors and remediation is underway. Our attacks showcase the importance of considering the malicious server threat model for cloud-based password managers. Despite vendors’ attempts to achieve security in this setting, we uncover several common design anti-patterns and cryptographic misconceptions that resulted in vulnerabilities. We discuss possible mitigations and also reflect more broadly on what can be learned from our analysis by developers of end-to-end encrypted systems.

IACR Cryptology ePrint Archive

[en] Serious security vulnerabilities in cloud-based password managers : #Bitwarden, #Lastpass, #Dashlane

The research team of Prof. Paterson found cryptographic technologies from the 90s. "We were surprised by the severity of the security vulnerabilities".

In most cases, the researchers were able to gain access to the passwords – and even make changes to them.

https://ethz.ch/en/news-and-events/eth-news/news/2026/02/password-managers-less-secure-than-promised.html

Aside from this research paper, recommended password managers often include #KeePassXC and/or #KeePassDX for Android or #KeePassium for iOS. Also, it's usually a good idea to store only accounts and passwords that are really necessary on the go, especially on mobile devices.

#password #passwordmanager #cloudbased #security #ictsecurity #securityvulnerability #ethz

Password managers less secure than promised

Researchers from ETH Zurich have discovered serious security vulnerabilities in three popular, cloud-based password managers. During testing, they were able to view and even make changes to stored passwords. 

ETH Zurich