No real harm caused by Chelsea Manning leaks: report | TheHill – The Hill

The information leaked several years ago by Chelsea Manning to WikiLeaks did not cause real harm to U.S. interests, according to a document prepared by a Department of Defense task force.

The 107-page document obtained by BuzzFeed News concludes with "high confidence that disclosure of the Iraq data set will have no direct personal impact on current and former U.S. leadership in Iraq," the document says, referring to Iraq-related military documents and State Department cables from Manning.

The report, from June 15, 2011, also says a different set of documents related to the U.S. war in Afghanistan would not cause "significant impact" to U.S. actions.

Manning had been sentenced to 35 years in military prison for leaking classified government documents to WikiLeaks.

But former President Barack ObamaBarack ObamaIce Cube: Black community not high on Trump's priorities list Lawmakers unveil bill to set 355-ship Navy Defense bill would limit implementation of nuclear arms treaty with Russia MORE commuted most of the remainder of her sentence in January, and Manning was released from prison in Fort Leavenworth, Kan., earlier this year after serving seven years of her sentence.

Manning was first jailed in 2010 but was convicted in 2013 on charges related to leaking the largest trove of military and government documents in U.S. history.

She said in a recent interview she had no intention of putting U.S. national security at risk when she leaked the information but that she had hoped to spark a debate about U.S. operations. Manning also thanked Obama, saying that by granting her clemency in the final days of his presidency, he gave her "a chance" to move on with her life.

Go here to read the rest:
No real harm caused by Chelsea Manning leaks: report | TheHill - The Hill

Looking Past the First Round – CLNS Radio (blog)

Much has been written about the Celtics' 1st round decisions. Not to be overlooked, however, is their next selection in the 2017 NBA Draft, which happens to be No. 37 overall (from Minnesota via Phoenix)

Below is a breakdown of five potential players the Celtics could take in the Second Round at No. 37.

Frank Jackson

Guard

(Duke)

It might seem counter intuitive for the Celtics to draft a guard given the logjam there is at the position. With Isaiah Thomas, Marcus Smart, and Avery Bradley manning the backcourt, it would seem the Celtics are pretty stacked at this position. (Plus 2015 First Round Pick Terry Rozier is a 6'1" guard).

While this pick may seem further puzzling given that Jackson recently underwent foot surgery and was precluded from working out for NBA teams, there are valid reasons why he is worthy of consideration at No. 37.

For one, he is an athletic slasher who can create his own shot, a skill that is at a premium in today's NBA. He has a 42" vertical and has a nice mid-range jump shot, a skill that is not a given for even lottery picks.

Also, if the Celts draft Jayson Tatum third overall, Jackson would be reunited with his former college teammate.

Jordan Bell

Power Forward

(Oregon)

Bell is a coach's dream. He is unselfish enough to sacrifice big scoring nights for the sake of doing the dirty work down low. Last year, he had no problem deferring scoring responsibilities to Dillon Brooks and Tyler Dorsey. A gritty rebounder, Bell averaged 8.8 boards per game last year for the Ducks. He was also a defensive stopper in the paint and showed the uncanny versatility to guard multiple positions.

At times, the Celtics ran with a smaller lineup and lacked depth in the frontcourt so having Bell's services could fill a gaping hole, whether it be this year or down the road should Bell first play in the D-League.

Tyler Lydon

Power Forward

(Syracuse)

Lydon enters the NBA as the quintessential power forward of the modern era. A textbook "stretch four," Lydon is a big man who can knock down a 17-footer and stretch out the opponent's defense. Over 71 games for the Orange, Lydon drained threes at an impressive 39.8 percent clip and hauled in 8.6 rebounds per contest last year as a sophomore.

Lydon's got the height (6'9") but many consider him underweight. Between his freshman and sophomore seasons at Syracuse, Lydon packed on over a dozen pounds, but many draft experts still consider him too light to match up against NBA big men. That said, at the college level, Lydon showed some versatility through playing both forward positions and center. If he can bulk up, perhaps that's an asset Lydon can bring to the next level.

If the Celtics don't sign Kelly Olynyk to a long-term contract extension, Lydon could be a nice back-up to Al Horford at the power forward position.

Alec Peters

Forward

(Valparaiso)

The biggest concern about Peters is the season-ending stress fracture he suffered in his right foot back in February. For Peters, this was a devastating blow as he was tearing up the Horizon League on both ends of the floor. He also has shown signs of being a ferocious rebounder. Similar to Lydon, Peters can stretch out the opposing defense with his three-point shooting. Not only is Peters a threat from outside, but he can score with his back to the basket and get to the charity stripe, where he has converted at a healthy clip.

Before the injury, Peters was projected to be a late first-round pick. Now, he could potentially drop to late second round. It's a gamble for the Celtics but they do have the luxury of having three second-round picks if Peters remains hampered by his injury for an extended period of time.

Mathias Lessort

Forward/Center

(France)

What he lacks in size and scoring touch, Lessort makes up for with his relentless rebounding on the offensive glass. The feeling among many scouts is that if Lessort can improve his defensive rebounding skills, he could be an elite rebounder, perhaps one of the best in this class. On the other side of the ball, Lessort runs the floor well and sets a good screen for the pick-and-roll.

Overall, the Frenchman is an athletic freak, with uncanny lateral agility and top-tier closing speed. He's got raw talent, for sure, but with time and the right coach, he could mature into an effective two-way player.

From an intangibles perspective, Lessort fits into Brad Stevens' system well: he brings constant energy and hustle to the parquet each and every night.

Of course, a pick this late in the draft may never pan out. Or it could take years to have a considerable impact. But who knows, maybe one of these aforementioned players will become the next second round gem a la Paul Millsap or Carlos Boozer.

Visit link:
Looking Past the First Round - CLNS Radio (blog)

Edward Snowden’s quotes on the importance of privacy – YourStory.com

Unless they were citizens of a country under a dictatorship or an authoritarian regime, it used to be only tin-foil hat wearing conspiracy theorists who worried about government-led mass surveillance. The rest, knowing that as citizens of a democratic nation they were entitled to their privacy, assumed that their elected leaders would be respectful of that fundamental right. But Edward Snowdens revelations gave sight to a scary reality where governments violate their citizens rights with blatant disregard.

The United States of America, a country that perhaps most prides itself on embodying the values of freedom, conducted the most rampant mass surveillance in history with impunity. Surprisingly, it was an American citizen, a former CIA employee and NSA contractor who outed his nations transgressions against its own people.

When Edward Snowden discovered the invasive and massive scale of the surveillance that NSA was conducting, he considered it his patriotic duty to inform the American people of the crimes they were being unknowingly subjected to. That too from the very people who were sworn to protect them. So, he leaked damning information about the US intelligences extensive phone and internet surveillance and fled to Russia; giving up a comfortable life in his home country for a cause he believed in.

Today, as Edward Snowden turns 34, the US still continues its attempt to extradite and prosecute him on espionage charges. But he continues to fight for freedom in all its forms and this is what he has had to say about why he did what he did:

Read the rest here:
Edward Snowden's quotes on the importance of privacy - YourStory.com

Edward Snowden wants MAC news and notes – Hustle Belt (blog)

You know its a slow celebrity birthday day when we have to use someone from the world of politics and news for our Daily Dump. Alas, June 21 is that day. Whatever side of the aisle you fall on, however you may feel about the security of information, whichever way you lean on important issues like privacy and intrusion, its a virtual (get it?) certainty that Edward Snowden has at least made people more aware of all of those things.

Personally, theres not anything in life I care enough about to basically spend the rest of mine on the sneak. But thats just me. Having lived in DC for a decade or so, embassies are nice, no doubt. But I couldnt be confined anywhere and be happy. Maybe the Playboy mansion. I guess that would be a slightly different story, but I digress.

Regardless, Snowden is 34 today, and if I was on the lamb and holed up in an embassy somewhere wanted by nearly every intelligence agency, Id probably watch a lot of MAC football replays. Pretty points and high octane offenses always take my mind off of national security.

On to the sports news and notes you need to know from an undisclosed location in todays Hustle Belt Daily Dump....

Best Group of 5 Non-Conference Matchups | Washington Post You know its something when a paper like the WaPo cares about MAC things. Two MAC games made the list, but all of these are what I like to call Must Watch. So get yourself ready.

College World Series Bracket and Scores | SBNation No MAC squads left, but the only college sport still ongoing is the College World Series. Storylines abound, but this will keep you current and up to date on all that stands between us and the nothingness of the July offseason.

What kind of roster could an NFL expansion team create? | SBNation With all the talk of the NHL expansion draft, its worth asking the question what would happen if the NFL had one. This is the answer to that question courtesy of the mothership.

Former NFL Tackle Comes Out | SBNation A sad, inspiring, and courageous story all rolled up into one. Worth your time and probably worth some thought after the fact.

Happy Hump Day, everybody. Half way to the weekend.

The rest is here:
Edward Snowden wants MAC news and notes - Hustle Belt (blog)

Encryption and fighting terror have the UK’s Theresa May and the … – CNET

The UK and the EU are at loggerheads once again, but it's not what you might think. This isn't another Brexit debate, but a tussle over encryption.

The British government is keen to exploit flaws in tech services for intelligence-gathering and surveillance operations. Home Secretary Amber Rudd, backed by Downing Street, has persistently called for access to WhatsApp, a service used by terrorists in the March attack at Westminster.

But on Monday, a European Parliament committee proposed an amendment to incoming legislation that would prevent member states from trying to decrypt encrypted communications, as well as compelling tech companies that don't already use end-to-end encryption to do so.

The proposal would protect internet companies from national governments pressuring them to create security flaws, or backdoors, that they could use to hack into people's emails or other messages.

The different approaches are emblematic of a debate raging around the world, boiling down to whether tech companies poke security holes in their products so that governments can spy on potential terrorists, or whether they should keep communications locked up tight so as to protect the privacy and safety of internet users. You saw it in the fight that Apple put up against the FBI's efforts to compel the company to create a backdoor into a terrorist's iPhone.

While the UK wants to ensure that terrorists have no place to hide, the EU is determined to protect the privacy of law-abiding internet users.

Theresa May makes a statement outside Downing Street following the London Bridge terror attack.

With four terrorist incidents in the country over the last four months, the British government and intelligence agencies are under pressure to explain why they were unable to thwart the attacks. They blame technology.

Following the June 4 attack on London Bridge, Prime Minister Theresa May stood outside Downing Street and in her speech, pointed her finger at "the internet -- and the big companies that provide internet-based services" for providing a safe space for extremist ideologies to flourish.

"As the nature of the threat we face becomes more complex, more fragmented, more hidden, especially online, the strategy needs to keep up," she said, calling for more online regulations.

May has long been in favor of increasing the UK's surveillance powers, introducing two bills nicknamed the "Snooper's Charter." The second of these bills, the Investigatory Powers Act, passed into law under her own leadership of the country.

The Prime Minister wants the internet to be weak and penetrable, say her critics. They also claim she is using this issue right now to reinforce her own image as "strong and stable" -- her slogan during the recent election campaign.

"To push on with these extreme proposals for internet clampdowns would appear to be a distraction from the current political situation and from effective measures against terror," said Jim Killock, director of human rights nonprofit Open Rights Group.

The biggest objection to her proposals is that they will make the internet less safe for users. If governments can exploit backdoors to get to your private communications, so too could criminals or rogue states.

"Government's intrusion into private communications might look useful on paper in order to fight crime, but such legislation is usually the product of people who don't know how technology works," said Marty P. Kamden, CMO of NordVPN. "Backdoors would bring along new security holes, and could result in even more crime."

Another risk of this style of surveillance is that it could force terrorists to use alternative, less pleasant communication services, added Killock. Pushing them underground completely would only make them even harder to monitor than they are right now, he argued.

Unsurprisingly, tech companies don't like the idea of creating security holes in their products either. In 2015, Facebook, Google, Microsoft, Twitter and Yahoo teamed up to submit written evidence to Parliament arguing that encryption is necessary for keeping users safe. Apple Chief Executive Tim Cook has also been outspoken on the subject.

But when it comes to legislation, Silicon Valley companies don't have the last word.

Fortunately for them, the EU does. In this case, the EU is on their side.

The proposals tabled by members of the European Parliament this week are amendments to draft privacy legislation, and forbid member states from "decryption, reverse engineering or monitoring" of encrypted communications, or compelling tech companies to do so.

"Member states shall not impose any obligations on electronic communications service providers that would result in the weakening of the security and encryption of their networks and services," one proposal reads.

Not only could these proposals scupper the UK's plans, but they could conflict with surveillance activities allowed by the Investigatory Powers Act.

"This latest move to ban backdoors in encryption appears to be a calculated slap in the face for Theresa May and her plans for an Orwellian future," said BestVPN.com cybersecurity expert Douglas Crawford.

Because of Brexit, it's hard to know how EU rules on privacy and data will apply once the UK leaves the European Union. But without support from other countries, it's highly unlikely that the British government alone would be able to compel tech companies to create backdoors to allow them to bypass encryption.

The UK's own new surveillance plans are also not yet a done deal. The small and fragile majority the Conservative party currently holds in Parliament means greater consensus and more debate will be needed in order to pass new laws, said Killock.

"We hope that this will mean our parliamentarians will reject reactionary policymaking and look for long-term, effective solutions that directly address the complex causes of terrorism," he said.

Tech companies and government representatives didn't respond to requests for comment.

CNET Magazine: Check out a sample of the stories in CNET's newsstand edition.

Logging Out: Welcome to the crossroads of online life and the afterlife.

See more here:
Encryption and fighting terror have the UK's Theresa May and the ... - CNET

Mac and iOS Diary App Finally Implements End-to-End Encryption – Observer

Most people in the mainstream may not be as fixated on personal privacy as some tech journalists (like, you know this one), but can we all agree one point? Private diaries should be very difficult for prying eyes to read.

Paper diaries even get sold with padlocks, after all. So software designed to serve as your personal diary on a laptop or cell phone ought to make it very difficult for someone to see your secret thoughts.

Day One is a journaling app for users of Apple products that first launched in 2011. Its so nice to use, people actually pay money for it. App Annie ranks it in the top ten for lifestyle and productivity apps in the iOS store, and it has thousands of positive customer ratings and reviews.

Today in a Medium post, it announced end-to-end, private key encryption for Day One Sync. Sync allows users to write entries on multiple devices.

In April, we reached out to the company after a Reddit user posted he found his diary entries stored in plain text in files on his computer, even though he had password protected the app. That user, Day Ones Dallas Peterson told the Observer in an email, must have been using Day One Classic, their original product. The current software locks those entries up, locally.

It still had a challenge in the cloud, however. When it began syncing users entries, Day One found itself in the position as key keeper. Entries got transmitted to Amazons AWS servers with TLS-encryption, but users didnt like the fact that they had to trust Day One not to read their secrets. Peterson wrote that at the time of our emails, the company was beta-testing user encryption.

Developing a solid sync and encryption system is hard. It took two years for us to complete this project, Paul Mayne, Day Ones founder, wrote in todays announcement post. During this time, we continued to move forward reading every one-star review requesting encryption come sooner.

Now, Day One users have the option to set up their own private key, so that the encryption happens locally before it goes to the cloud, and only the user has that key (users that want to let Day One hold onto their key still can).

Instructions for enabling end-to-end encryption are here. Day One also secured an auditby nVisium of their protocol before rolling it out. Users that want to skip to the nitty gritty should jump to the FAQ.

Most apps are free, which effectively requires their makers to spy on users in order to monetize them. Those ads in your Gmail account arent random. Users pay Day One money, so it has an incentive to align its interests with those of its users. In that light, it probably wasnt monetizing its users diary entries, but now those with the most reason to worry have a way to be sure.

Continue reading here:
Mac and iOS Diary App Finally Implements End-to-End Encryption - Observer

Germany Just Gave Cops More Hacking Powers to Get Around Encryption – Motherboard

Cops are getting comfortable with hacking. Already, agencies across the world are using malware or other techniques to identify child pornographers, bomb hoaxers, and stalkers.

But, in the continuing battle over the proliferation of easy-to-use encryption, German lawmakers want to go further. On Thursday, the Bundestaagthe German parliamentpassed legislation authorizing the country's law enforcement to use malware in a wider range of investigations, including drug trafficking.

"Police must be able to do what terrorists and criminals can already do today," Johannes Fechner from the SPD, a centre-left party which forms part of the current government, said during a debate before the vote.

The news revolves around Germany's so-called "state trojan," an overarching term given to the authority's hacking capabilities. Back in 2011, German hacking organization the Chaos Computer Club dissected one version of it, which could siphon off data but had a host of vulnerabilities.

The new change expands the use of malware to 38 different criminal offenses, including drug trafficking, money laundering, currency counterfeiting, bribery, sex crimes, and the distribution of child sexual abuse imagery.

Hans-Christian Strbele from the Green Party criticized the law, and said that it will not withstand a complaint at the German Supreme Court.

"What's completely missing from this law is an obligatory and independent test of what the tool can actually do and does when it's used; but this is what the Bundesverfassungsgericht [Supreme Court] has explicitly demanded," he said during the debate.

This legislative expansion comes as European politicians call for more to be done about the increased use of encryption; something that end-point hacking circumvents. In general terms, malware could obtain the contents of a communication before the device or messaging application, such as WhatsApp, encrypts it.

Got a tip? You can contact this reporter securely on Signal at +44 20 8133 5190, OTR chat at jfcox@jabber.ccc.de , or email joseph.cox@vice.com

Both the UK's Prime Minister and Home Secretary have said companies providing encryption should do more to help the authorities. The UK recently passed the Investigatory Powers Act, which explicitly gave law enforcement agencies authority to use malware for the first time. "Equipment interference" can be used in cases of serious crime.

However, European politicians have proposed legislation that would ban backdoors in encryption products.

Max Hoppenstedt contributed reporting.

Get six of our favorite Motherboard stories every day by signing up for our newsletter .

Read more:
Germany Just Gave Cops More Hacking Powers to Get Around Encryption - Motherboard

How Analytics Has Changed in the Last 10 Years (and How It’s Stayed the Same) – Harvard Business Review

Executive Summary

Ten years ago, Jeanne Harris and I published the book Competing on Analytics, and weve just finished updating it for publication in September. Revising our book offered a chance to take stock of ten years of change in analytics. These include advances in hardware, efforts to incorporate unstructured data, an increased reliance on open source software, and the increased use of autonomous analytics, or artificial intelligence. The change in analytics technologies has been rapid and broad. Theres no doubt that the current array of analytical technologies is more powerful and less expensive than the previous generation. In short, all analytical boats have risen.

Ten years ago, Jeanne Harris and I published the book Competing on Analytics, and weve just finished updating it for publication in September. One major reason for the update is that analytical technology has changed dramatically over the last decade; the sections we wrote on those topics have become woefully out of date. So revising our book offered us a chance to take stock of 10years of change in analytics.

Of course, not everything is different. Some technologies from a decade ago are still in broad use, and Ill describe them here too. There has been even more stability in analytical leadership, change management, and culture, and in many cases those remain the toughest problems to address. But were here to talk about technology. Heres a brief summary of whats changed in the past decade.

The last decade, of course, was the era of big data. New data sources such as online clickstreams required a variety of new hardware offerings on premise and in the cloud, primarily involving distributed computing spreading analytical calculations across multiple commodity servers or specialized data appliances. Such machines often analyze data in memory, which can dramatically accelerate times-to-answer. Cloud-based analytics made it possible for organizations to acquire massive amounts of computing power for short periods at low cost. Even small businesses could get in on the act, and big companies began using these tools not just for big data but also for traditional small, structured data.

Along with the hardware advances, the need to store and process big data in new ways led to a whole constellation of open source software, such as Hadoop and scripting languages. Hadoop is used to store and do basic processing on big data, and its typically more than an order of magnitude cheaper than a data warehouse for similar volumes of data. Today many organizations are employing Hadoop-based data lakes to store different types of data in their original formats until they need to be structured and analyzed.

Since much of big data is relatively unstructured, data scientists created ways to make it structured and ready for statistical analysis, with new (and old) scripting languages like Pig, Hive, and Python. More-specialized open source tools, such as Spark for streaming data and R for statistics, have also gained substantial popularity. The process of acquiring and using open source software is a major change in itself for established businesses.

The technologies Ive mentioned for analytics thus far are primarily separate from other types of systems, but many organizations today want and need to integrate analytics with their production applications. They might draw from CRM systems to evaluate the lifetime value of a customer, for example, or optimize pricing based on supply chain systems about available inventory. In order to integrate with these systems, a component-based or microservices approach to analytical technology can be very helpful. This involves small bits of code or an API call being embedded into a system to deliver a small, contained analytical result; open source software has abetted this trend.

This embedded approach is now used to facilitate analytics at the edge or streaming analytics. Small analytical programs running on a local microprocessor, for example, might be able to analyze data coming from drill bit sensors in an oil well drill and tell the bit whether to speed up or slow down. With internet of thingsdata becoming popular in many industries, analyzing data near the source will become increasingly important, particularly in remote geographies where telecommunications constraints might limit centralization of data.

Another key change in the analytics technology landscape involves autonomous analytics a form of artificial intelligence or cognitive technology. Analytics in the past were created for human decision makers, who considered the output and made the final decision. But machine learning technologies can take the next step and actually make the decision or adopt the recommended action. Most cognitive technologies are statistics-based at their core, and they can dramatically improve the productivity and effectiveness of data analysis.

Of course, as is often the case with information technology, the previous analytical technologies havent gone away after all, mainframes are still humming away in many companies. Firms still use statistics packages, spreadsheets, data warehouses and marts, visual analytics, and business intelligence tools. Most large organizations are beginning to explore open source software, but they still use substantial numbers of proprietary analytics tools as well.

Its often the case, for example, that its easier to acquire specialized analytics solutions say, for anti-money laundering analysis in a bank than to build your own with open source. In data storage there are similar open/proprietary combinations. Structured data in rows and columns requiring security and access controls can remain in data warehouses, while unstructured/prestructured data resides in a data lake. Of course, the open source software is free, but the people who can work with open source tools may be more expensive than those who are capable withproprietary technologies.

The change in analytics technologies has been rapid and broad. Theres no doubt that the current array of analytical technologies is more powerful and less expensive than the previous generation. Itenables companies to store and analyze both far more data and many different types of it. Analyses and recommendations come much faster, approaching real time in many cases. In short, all analytical boats have risen.

However, these new tools are also more complex and in many cases require higher levels of expertise to work with. As analytics has grown in importance over the last decade, the commitments that organizations must make to excel with it havealso grown. Because so many companies have realized that analytics are critical to their business success, new technologies havent necessarily made it easier to become and remain an analytical competitor. Using state-of-the-art analytical technologies is a prerequisite for success, but their widespread availability puts an increasing premium on nontechnical factors like analytical leadership, culture, and strategy.

Read more:
How Analytics Has Changed in the Last 10 Years (and How It's Stayed the Same) - Harvard Business Review

Practical IoT Cryptography on the Espressif ESP8266 – Hackaday

The Espressif ESP8266 chipset makes three-dollar Internet of Things development boards an economic reality. According to the popular automatic firmware-building site nodeMCU-builds, in the last 60 days there have been 13,341 custom firmware builds for that platform. Of those, only 19% have SSL support, and 10% include the cryptography module.

Were often critical of the lack of security in the IoT sector, and frequently cover botnets and other attacks, but will we hold our projects to the same standards we demand? Will we stop at identifying the problem, or can we be part of the solution?

This article will focus on applying AES encryption and hash authorization functions to the MQTT protocol using the popular ESP8266 chip running NodeMCU firmware. Our purpose is not to provide a copy/paste panacea, but to go through the process step by step, identifying challenges and solutions along the way. The result is a system thats end-to-end encrypted and authenticated, preventing eavesdropping along the way, and spoofing of valid data, without relying on SSL.

Were aware that there are also more powerful platforms that can easily support SSL (e.g. Raspberry Pi, Orange Pi, FriendlyARM), but lets start with the cheapest hardware most of us have lying around, and a protocol suitable for many of our projects. AES is something you could implement on an AVR if you needed to.

MQTT is a lightweight messaging protocol that runs on top of TCP/IP and is frequently used for IoT projects. Client devices subscribe or publish to topics (e.g. sensors/temperature/kitchen), and these messages are relayed by an MQTT broker. More information on MQTT is available on their webpage or in our own getting-started series.

The MQTT protocol doesnt have any built-in security features beyond username/password authentication, so its common to encrypt and authenticate across a network with SSL. However, SSL can be rather demanding for the ESP8266 and when enabled, youre left with much less memory for your application. As a lightweight alternative, you can encrypt only the data payload being sent, and use a session ID and hash function for authentication.

A straightforward way to do this is using Lua and the NodeMCU Crypto module, which includes support for the AES algorithm in CBC mode as well as the HMAC hash function. Using AES encryption correctly requires three things to produce ciphertext: a message, a key, and an initialization vector (IV). Messages and keys are straightforward concepts, but the initialization vector is worth some discussion.

When you encode a message in AES with a static key, it will always produce the same output. For example, the message usernamepassword encrypted with key 1234567890ABCDEF might produce a result like E40D86C04D723AFF. If you run the encryption again with the same key and message, you will get the same result. This opens you to several common types of attack, especially pattern analysis and replay attacks.

In a pattern analysis attack, you use the knowledge that a given piece of data will always produce the same ciphertext to guess what the purpose or content of different messages are without actually knowing the secret key. For example, if the message E40D86C04D723AFF is sent prior to all other communications, one might quickly guess it is a login. In short, if the login system is simplistic, sending that packet (a replay attack) might be enough to identify yourself as an authorized user, and chaos ensues.

IVs make pattern analysis more difficult. An IV is a piece of data sent along with the key that modifies the end ciphertext result. As the name suggests, it initializes the state of the encryption algorithm before the data enters. The IV needs to be different for each message sent so that repeated data encrypts into different ciphertext, and some ciphers (like AES-CBC) require it to be unpredictable a practical way to accomplish this is just to randomize it each time. IVs do not have to be kept secret, but its typical to obfuscate them in some way.

While this protects against pattern analysis, it doesnt help with replay attacks. For example, retransmitting a given set of encrypted data will still duplicate the result. To prevent that, we need to authenticate the sender. We will use a public, pseudorandomly generated session ID for each message. This session ID can be generated by the receiving device by posting to an MQTT topic.

Preventing these types of attacks is important in a couple of common use cases. Internet controlled stoves exist, and questionable utility aside, it would be nice if they didnt use insecure commands. Secondly, if Im datalogging from a hundred sensors, I dont want anyone filling my database with garbage.

Implementing the above on the NodeMCU requires some effort. You will need firmware compiled to include the crypto module in addition to any others you require for your application. SSL support is not required.

First, lets assume youre connected to an MQTT broker with something like the following. You can implement this as a separate function from the cryptography to keep things clean. The client subscribes to a sessionID channel, which publishes suitably long, pseudorandom session IDs. You could encrypt them, but its not necessary.

Moving on, the node ID is a convenient way to help identify data sources. You can use any string you wish though: nodeid = node.chipid().

Then, we set up a static initialization vector and a key. This is only used to obfuscate the randomized initialization vector sent with each message, NOT used for any data. We also choose a separate key for the data. These keys are 16-bit hex, just replace them with yours.

Finally well need a passphrase for a hash function well be using later. A string of reasonable length is fine.

Well also assume you have some source of data. For this example it will be a value read from the ADC. data = adc.read(0)

Now, we generate a pseudorandom initialization vector. A 16-digit hex number is too large for the pseudorandom number function, so we generate it in two halves (16^8 minus 1) and concatenate them.

We can now run the actual encryption. Here we are encrypting the current initialization vector, the node ID, and one piece of sensor data.

Now we apply the hash function for authentication. First we combine the nodeid, iv, data, and session ID into a single message, then compute a HMAC SHA1 hash using the passphrase we defined earlier. We convert it to hex to make it a bit more human-readable for any debugging.

Now that both encryption and authentication checks are in place, we can place all this information in some structure and send it. Here, well use comma separated values as its convenient:

When we run the above code on an actual NodeMCU, we would get output something like this:

All together, the encryption program is as follows (MQTT sections excluded for clarity):

Now, your MQTT broker doesnt know or care that the data is encrypted, it just passes it on. So, your other MQTT clients subscribed to the topic will need to know how to decrypt the data. On NodeMCU this is rather easy. Just split the received data into strings via the commas, and do something like the below. Note this end will have generated the session ID so already knows it.

Then compare the received and computed HMAC, and regardless of the result, invalidate that session ID by generating a new one.

For a little variety, consider how we would handle decryption in Python, if we had an MQTT client on the same virtual machine as the broker that was analysing the data or storing it in a database. Lets assume youve received the data as a string payload, from something like the excellent Paho MQTT Client for Python.

In this case its convenient to hex encode the encrypted data on the NodeMCU before transmitting. So on the NodeMCU we convert all encrypted data to hex, for example: encrypted_iv = crypto.toHex(crypto.encrypt("AES-CBC", ivkey, iv, staticiv))

Publishing a randomized sessionID is not discussed below, but is easy enough using os.urandom() and the Paho MQTT Client. The decryption is handled as follows:

Now we have a system that sends encrypted, authenticated messages through an MQTT server to either another ESP8266 client or a larger system running Python. There are still important loose ends for you to tie up if you implement this yourself. The keys are all stored in the ESP8266s flash memory, so you will want to control access to these devices to prevent reverse engineering. The keys are also stored in the code on the computer receiving the data, here running Python. Further, you probably want each client to have a different key and passphrase. Thats a lot of secret material to keep safe and potentially update when necessary. Solving the key distribution problem is left as an exercise for the motivated reader.

And on a closing note, one of the dreadful things about writing an article involving cryptography is the possibility of being wrong on the Internet. This is a fairly straightforward application of the tested-and-true AES-CBC mode with HMAC, so it should be pretty solid. Nonetheless, if you find any interesting shortcomings in the above, please let us know in the comments.

More here:
Practical IoT Cryptography on the Espressif ESP8266 - Hackaday

Pamela Anderson Is Opening a Pop-Up Vegan Restaurant – PEOPLE.com

Pamela Anderson is adding restaurant owner to her resum.

Starting on July 4, the former Baywatch starand longtime animal rights activist will be hosting an all-vegan pop-up restaurant in Ramatuelle in the South of France for 50 nights only.

Anderson announced the news about the restaurant, Le Table du Marche by Pamela, on her foundations website on Monday, and says the concept is festive, glamorous and vegan.

The menu, which she developed with chef Christophe Leroy, will feature a champagne bar and a variety of plant-based dishes, including a traditional tomato tartare with Goji berries, traditional Provenal petits farcis (stuffed vegetables), an asparagus risotto and a vegan burger.

RELATED:Celebrity Foodies: See What the Stars Are Snacking onToday

Opening the restaurant is also an effort to release her rumored love interest, WikiLeaks founder Julian Assange, who is being held inside the Ecuadorian embassy in London.

I am reaching out to Emmanuel Macron, and to his wife Brigitte Trogneux, she writes in a tribute to Assange. As a resident of France, my adopted home, I would like to meet with you and discuss Julians situation. I am opening a new vegan restaurant in France in July, and I would like to extend my invitation to the new President and his First Lady. Join me on the day I open the doors, and we will sit and eat good food and discuss what can be done for Julian. France could display its strength, and so could you, if you give Julian asylum.

WATCH THIS:How This Burger-Loving Nurse Lost 141 Lbs. With a Vegan Dietand Started Her Own Wellness Business

The restaurant will be open every night starting at 6 p.m. and reservations can be made on their website.

Continue reading here:
Pamela Anderson Is Opening a Pop-Up Vegan Restaurant - PEOPLE.com