Mexican Army Cipher Wheel – state of the art encryption 100 years ago – Video


Mexican Army Cipher Wheel - state of the art encryption 100 years ago
This encryption machine was used during the time of conflict between Mexico and the USA shortly before World War I. It uses 5 disks that convert letters into 2 digit numbers based on a key...

By: dj51florida

See the rest here:
Mexican Army Cipher Wheel - state of the art encryption 100 years ago - Video

Getting Started with Hashing in SQL Server

Introduction

In my most recent articles, Ive talked about encryption in detail and demonstrated its usage at the entire database level with Transparent Data Encryption and at the column level with granularcell level encryption. In this article, I am going to discuss hashing in SQL Server and how it is different from encryption.

Encryption brings data into a state which cannot be interpreted by anyone who does not have access to the decryption key, password, or certificates. Though encryption does not restrict the access to the data, it ensures if data loss happens, then in that case data is useless for the person who does not have access to the decryption keypasswordcertificates. On the other hand, Hashing brings a string of characters of arbitrary size into a usually shorter fixed-length value or key that represents the original string and acts as a shortened reference to the original data. A slight change in the input string of characters produces a completely different hashed output.

To meet the demands of regulatory compliance and corporate data security standards, SQL Server allows you to enable encryption at the columncell level or on the entire database level whereas hashing can be used for several purposes for example:

Encryption is bidirectional, which means data encrypted can be decrypted back to the original string if you have access to the correct decryption key, whereas hashing is unidirectional, which means hashed data cannot be reversed back to the original string.

SQL Server has the HASHBYTES inbuilt function to hash the string of characters using different hashing algorithms. The supported algorithms are MD2, MD4, MD5, SHA, SHA1, or SHA2. The hashed data conforms to the algorithm standard in terms of storage size i.e. 128 bits (16 bytes) for MD2, MD4, and MD5; 160 bits (20 bytes) for SHA and SHA1; 256 bits (32 bytes) for SHA2_256, and 512 bits (64 bytes) for SHA2_512. SHA2_256 and SHA2_512 algorithms are available in SQL Server 2012 and later versions.

The stronger hash function you use, the more storage space it takes, and performance is slower but it provides a stronger hash value with minimal chance of hash collision (generating the same hashed output for two different input string of characters). Hence, its recommended to use hashing algorithms depending on your workload and data to hash by making it an appropriate trade-off.

The example below, demonstrates the use of the HASHBYTES function to do hashing using MD5 algorithm. As mentioned before, a slight change in the input string of characters produces a completely different hashed output and this is what you could see in the second column. The only difference between input for the first column and input for the second column is an extra space at the end of the input string in the second input string:

No matter how many times you do the hashing, the hashed output will remain same for the same set of input strings and same hashing algorithm:

View post:
Getting Started with Hashing in SQL Server

Homeland Security gets into software security

Summary: It sounds unlikely, but the Homeland Security Agency is now providing an online, open-source code-testing suite with the unlikely name of SWAMP.

PORTLAND No, I am not making this up. At OSCon, The Department of Homeland Security (DHS), best known to you as the people checking up on you between the airport parking lot and your flight, quietly announced that they're now offering a service for checking out your open-source code for security holes and bugs: the Software Assurance Marketplace (SWAMP).

"Why," you ask?

Because Patrick Beyer, SWAMP's Project Manager at Morgridge Institute for Research, the project's prime contractor, explained, "With open source's popularity, more and more government branches are using open-source code. Some are grabbing code from here, there, and everywhere." Understandably, "there's more and more concern about the safety and quality of this code. We're the one place you can go to check into the code"

This is true, but the government has been using open-source software since before the phrase "open source," or even the earlier phrase, "free software" existed. Some of NASA's COSMIC free scientific code collection, for example, dates back to the 1960s and the Veterans Affairs' Veterans Health Information Systems and Technology Architecture (VistA), the first electronic health record (EHR) system, began in the early 1980s.

During my own time at NASA in the 1980s, Linux was introduced. Soon thereafter, the first Linux supercomputer architecture, Beowulf, was created at Goddard Space Flight Center (GSFC) in 1995. More recently, in 2010, the popular open-source cloud program OpenStack, got its start as a joint project between RackSpace and NASA.

So it is that government agencies have long both used and created "open-source" software. What's been missing, and what the SWAMP tries to provide, is a centralized way of checking the code for errors and security problems.

While SWAMP is funded by a $23.4 million grant from the Department of Homeland Security Science & Technology Directorate (DHS S&T), SWAMP is designed by researchers from the Morgridge Institute, the University of Illinois-Champaign/Urbana, the University of Indiana, and the University of Wisconsin-Madison. Each brings broad experience in software assurance, security, open source software development, national distributed facilities and identity management to the project.

The SWAMP servers themselves are hosted at the Morgridge Institute in Madison, WI. At the Institute, the clustered servers are kept at a secure facility. The SWAMP cluster currently has 700 cores, 5TBs of RAM, and 100TBs of storage to meet the continuous assurance needs of multiple software and tool development projects. SWAMP opened its services to the community in February of 2014 offering five open-source static analysis tools that analyze source code for possible security defects without having to execute the program.

These tools currently are:

Read more here:
Homeland Security gets into software security

Julian Assange Fails To Overturn Swedish Arrest Warrant

Wikileaks founder Julian Assange has failed to overturn his arrest warrant, and remains confined to the Ecuadorean Embassy in London, after a Swedish court rejected his appeal on Wednesday.

Assange has spent two years holed up in the Ecuadorians residency, to avoid extradition to Sweden over allegations of sexual misconduct which were made more than three years ago. He claims that he would likely be sent on to the US for trial over Wikileaks publication of US government material although he has not as yet been charged in America.

Assanges lawyers filed a petition in a Swedish court to withdraw his arrest warrant, which was issued after allegations of sexual misconduct. So far, no official charges have been filed in Sweden, and Assange insists that the Swedish warrant is nothing more than a political ploy, which would see him eventually extradited to the United States, to face criminal charges there over Wikileaks release of thousands of confidential US government documents.

Those leaks were highly embarrassing to the US government, and a Federal Grand Jury is currently preparing a criminal case against WikiLeaks.

Assanges lawyers argued that the Swedish arrest warrant should be withdrawn, because it is not legally enforceable whilst Assange resides within the grounds of the embassy of Ecuador.

Assanges lawyers also highlighted that Swedish prosecutors are refusing to travel to the UK to interview him about the allegations, so they can decide whether to actually file criminal charges.

But the Swedish court dismissed Assanges legal attempt.

All in all, the district court makes the assessment that the reasons for the arrest warrant offset the infringement and adverse effects the measure entails for Julian Assange, District court judge Lena Egelin was quoted as saying by Reuters. He should therefore continue to be wanted for arrest in his absence.

Thomas Olsson, one of Assanges Swedish lawyers, was quoted as saying that he would appeal the Swedish court verdict.

Ecuador granted Assange political asylum back in August 2012, and Assange wants a guarantee of safe passage to Ecuador before he will leave the embassy, as he fears the United States will have him arrested if he leaves.

Excerpt from:
Julian Assange Fails To Overturn Swedish Arrest Warrant

Eric Cantona works out with Julian Assange… apparently

Something rather bizarre happened at the weekend, involving a football icon and a controversial activist.

Eric Cantona was pictured working out alongside Julian Assange in a tweet that gave little further information.

Julian Assange works out with Eric Cantona

The photo was taken in Assange's room in the Ecuadorian embassy, where he has been camped since June 2012 to avoid extradition to Sweden for questioning on sexual assault allegations.

Assange looks on as a sweaty and knackered Cantona pants on a running machine, which was given to Assange by Ken Loach, who directed Cantona in the 2009 film Looking for Eric.

Assange's spokesperson said that the pair had "discussed a future collaboration", which will be revealed "in due course".

Could we be about to see a footy tournament involving former footballers and activists on the run? Or Ken Loach's latest film Looking for Julian?

Read the original here:
Eric Cantona works out with Julian Assange... apparently

Edward Snowden ‘If I end up in chains in Guantánamo I can live with that’ video interview World – Video


Edward Snowden #39;If I end up in chains in Guantnamo I can live with that #39; video interview World
With due credit and congratulations to the Guardian interviewers. Snowden seems to be in great shape, much more than Assange, who has little exercise and can...

By: Jacques Poumeyrol

View original post here:
Edward Snowden 'If I end up in chains in Guantánamo I can live with that' video interview World - Video

Edward Snowden’s New Role: Product Pitchman

Edward Snowden talks during a simulcast conversation during the SXSW Interactive Festival on Monday, March 10, 2014, in Austin, Texas. Snowden talked with American Civil Liberties Unions principal technologist Christopher Soghoian, and answered tweeted questions. (Photo by Jack Plunkett/Invision/AP) | Jack Plunkett/Invision/AP

Edward Snowden has been given many titles: Whistleblower. Traitor. Asylum-seeker.

Now, the fugitive National Security Agency contractor appears to have found a new role: Product pitchman.

In recent interviews and speeches at tech conferences, where he appeared remotely via Google Hangout, Snowden has endorsed several privacy and security tools -- whether the product's makers wanted his help or not.

Last week, Snowden told The Guardian that consumers should avoid the cloud storage service Dropbox, which he said was "hostile to privacy," and instead use a lesser-known competitor, SpiderOak, because it makes it harder for law enforcement to obtain stored content.

At the South by Southwest conference in March, Snowden recommended that people use Tor, a software that allows people to use the Internet anonymously. He also touted the encryption service Pretty Good Privacy, or PGP, and Open WhisperSystems, a project that built an app for encrypting text messages.

In a crowded market where security companies often claim their products are NSA-proof, an endorsement from Snowden can be a boon to a lesser-known startup, giving it added credibility and free publicity. But some companies have learned that being good enough for Snowden can also bring unwanted scrutiny.

Snowden is currently living in temporary asylum in Russia while facing theft and espionage charges in the United States for disclosing details of the NSA surveillance program to media outlets.

Theres no sign he has been paid for his recent product plugs, but some say Snowden could find a lucrative new career by positioning himself as a trusted privacy expert who makes money touting tech products. Snowden also hinted last week at a technology conference that he may start developing privacy tools himself.

At some point he's going to have to make a living, said John Pescatore, director of emerging security trends at the SANS Institute, a cybersecurity training organization. That is probably whats really going on here.

Read the rest here:
Edward Snowden's New Role: Product Pitchman