On guard against the Chinese
…
The FBI, whose agents are the frontline troops in the furtive wars of foreign counterintelligence and cyber warfare, is both alarmed and concerned about the increasing numbers of Chinese agents involved in espionage in the United States. Targets sought by the several thousand Chinese agents “loose” in the United States focus on America’s cutting edge technology — computer technology, research and sensitive defense information, it says. The FBI believes that a high proportion of all Chinese visitors have been tasked with missions for their government. A recent bureau report claims there are at least 3,000 Chinese-operated front companies in the United States whose actual business was to direct espionage efforts.
…
|
Queensland brains crack the code of 3×5
…
Any high-school student can tell you the prime factors of 15 are 3 and 5.
But if that student could tell you the prime factors of a number hundreds of digits long, they could crack the “RSA” encryption that underpins privacy and security on the internet, from online banking to confidential government emails.
A team of researchers at Queensland University has recently set a world-first benchmark using a quantum computer to find the prime factors of 15. It is a “baby step” on a path to smashing the science of cryptography.
“There’s a hell of a long way to go – we have created the world’s most boring, simplest quantum computer,” says Professor Andrew White of the university’s physics department. “But if I was encrypting things I still wanted to be secret in 20 years’ time – now I would worry.
“We don’t think we will threaten cryptography any time soon. But we are very excited about this demonstration: there is a path to scalability, to developing a computer that can solve problems impossible on a classical computer.”
…
From CALEA (section 103)
…
(3) ENCRYPTION- A telecommunications carrier shall not be responsible for decrypting, or ensuring the government’s ability to decrypt, any communication encrypted by a subscriber or customer, unless the encryption was provided by the carrier and the carrier possesses the information necessary to decrypt the communication.
…
Windows Mobile es una “invitación” para hackers (Spanish)
La compañía de seguridad informática McAfee ha analizado el sistema operativo Windows Mobile y su conclusión es implacable: “es una invitación abierta para los hackers”.
…