UK’s GCQH is at it again. Now with a bold proposal to request Apple and other companies to build backdoors into their real-time chat apps, as this article reveals. And the weird things is, Apple and the bunch may be forced to comply since they are hosting those chats. But PassLok will fare quite a bit better, as the post explains. Read More
I’m not Australian, but I can’t help putting in my two (US) cents’ worth on the current debate over the “Assistance and Access Bill.” My point is that the bill has no teeth since it is possible for any citizen (terrorist or not) to use encryption that the bill will never be able to control. It has been possible for years and will remain so for the foreseeable future. So might as well drop the bill and do some productive business. Read More
They say that the formula for Coca-Cola is split among the company’s executives, so that a certain number of them have to get together in order to reconstruct it. The same is true of the nuclear launch codes, which require several persons to agree. I just ran into a clever way to do this with pencil and paper, and couldn’t resist improving on it. Read More
This post is motivated by Aaron Toponce’s comment on my previous article on the release of SynthPass. Rather than giving a short reply, I decided this was the opportunity to explain certain features of my recently released SynthPass password generator. In essence, the comment said that password generators will never be appealing to consumers because of certain flaws emanating from their very nature, which are aptly described in this article, entitled “4 fatal flaws in deterministic password managers,” published November 2016 in Tony Arcieri’s blog.
September 2018. You see your user ID listed as having its login compromised in a recent hack. You know you need to change your password but don’t don’t want to (or just can’t) remember yet another different one. Everybody is talking about password managers as the way to go, but you also heard about password generators, which make passwords on the fly rather than store them. You suspect that’s better than a conventional password manager. Read More
Chances are you, like me, have a collection of logins, each with their separate requirements for password strength and lifetime, user ID, and so forth, and your memory has already reached the saturation point. Since writing them on a piece of paper is a no-no, you may have resorted to a password manager. There are many good ones, even free ones, but you still wonder if things could be a little easier. If you are thinking this, SynthPass is for you. It does not work like the other password managers, which store your logins more or less securely, but rather gets around the whole problem by not storing your passwords.
Intrigued? Read on… Read More
About a year ago, I added to PassLok and its derivatives a very secure algorithm for image steganography. It was presented at the ForenSecure 2017 conference on cybersecurity and forensics, but I just dawned on me that I didn’t post anything about it on this blog, for those who may not have attended that conference. I believe that, one year later, this method is still the reigning world champion for image steganography. This article explains how it works, hopefully in a form that is easy to understand, and includes a sample program and some sample results. Read More
This May 14th, a group of German security researchers revealed EFail, a successful attack against PGP (short for Pretty Good Privacy), and S/MIME, the leading methods for end-to-end encrypted email nowadays. You can read their shorter post here, and their full paper here. I’ve contacted a number of people who wrote about it to tell them about PassLok and its immunity to the EFail attack. This post adds more details to what you may shortly found printed elsewhere. Read More
All my crypto apps, with the exception of those meant to be performed also by hand, have been upgraded to include the powerful DOM Purify filter, which removes malicious content from web pages. This is in case you get an encrypted message with a malicious payload, which might execute and do something nasty as soon as you decrypt it. Apps involved: PassLok, PassLok for Email, SeeOnce, URSA.