This Week In Security: Pacman, Hetzbleed, And The Death Of Internet Explorer – Hackaday

Theres not one, but two side-channel attacks to talk about this week. Up first is Pacman, a bypass for ARMs Pointer Authentication Code. PAC is a protection built into certain ARM Processors, where a cryptographic hash value must be set correctly when pointers are updated. If the hash is not set correctly, the program simply crashes. The idea is that most exploits use pointer manipulation to achieve code execution, and correctly setting the PAC requires an explicit instruction call. The PAC is actually indicated in the unused bits of the pointer itself. The AArch64 architecture uses 64-bit values for addressing, but the address space is much less than 64-bit, usually 53 bits or less. This leaves 11 bits for the PAC value. Keep in mind that the application doesnt hold the keys and doesnt calculate this value. 11 bits may not seem like enough to make this secure, but keep in mind that every failed attempt crashes the program, and every application restart regenerate the keys.

What Pacman introduces is an oracle, which is a method to gain insight on data the attacker shouldnt be able to see. In this case, the oracle works via speculation attacks, very similar to Meltdown and Spectre. The key is to attempt a protected pointer dereference speculatively, and to then observe the change in system state as a result. What you may notice is that this requires an attack to already be running code on the target system, in order to run the PAC oracle technique. Pacman is not a Remote Code Execution flaw, nor is it useful in gaining RCE.

One more important note is that an application has to have PAC support compiled in, in order to benefit from this protection. The platform that has made wide use of PAC is MacOS, as its a feature baked in to their M1 processor. The attack chain would likely start with a remote execution bug in an application missing PAC support. Once a foothold is established in uprivileged userspace, Pacman would be used as part of an exploit against the kernel. See the PDF paper for all the details.

The other side-channel technique is a new take on an old idea. Hertzbleed is based on the idea that its possible to detect the difference between a CPU running at base frequency, and that CPU running at a boost frequency. The difference between those two states can actually leak some information about what the CPU is doing. Theres a pre-release PDF of their paper to check out for the details. The biggest result is that the standard safeguard against timing attacks, constant-time programming, is not always a reliable security measure.

It works because max frequency is dependent on the processor Thermal Design Power (TDP), the maximum amount of power a CPU is designed to use and amount of heat to dissipate. Different instructions will actually use different amounts of power and generate more or less heat based on this. More heat means earlier throttling. And throttling can be detected in response times. The details of this are quite fascinating. Did you know that even running the same instructions, with different register values, results in slightly different power draw? They picked a single cryptographic algorithm, SIKE, a quantum-safe key exchange technique, and attempted to extract a servers secret key through timing attacks.

There is a quirk in SIKE, also discovered and disclosed in this research, that its possible to short-circuit part of the algorithm, such that a series of internal, intermediary steps result in a value of zero. If you know multiple consecutive bits of the static key, its possible to construct a challenge that hits this quirk. By extension, you can take a guess at the next unknown bit, and it will only fall into the quirk if you guessed correctly. SIKE uses constant-time programming, so this odd behavior shouldnt matter. And here the Hertzbleed observation factors in. The SIKE algorithm consumes less power when doing a run containing this cascading-zero behavior. Consuming less power means that the processor can stay at full boost clocks for longer, which means that the key exchange completes slightly more quickly. Enough so, that it can be detected even over a network connection. They tested against Cloudflares CIRCL library, and Microsofts PQCrypto-SIDH, and were able to recover secret keys from both implementations, in 36 and 89 hours respectively.

There is a mitigation against this particular flaw, where its possible to detect a challenge value that could trigger the cascading zeros, and block that value before any processing happens. It will be interesting to see if quirks in other algorithms can be discovered and weaponized using this same technique. Unfortunately, on the processor side, the only real mitigation is to disable boost clocks altogether, which has a significant negative effect on processor performance.

[Frdric Basse] has a Google Nest Hub, and he really wanted to run his own Linux distro on it. Theres a problem, though. The Nest uses secure boot, and theres no official way to unlock the bootloader. Since when would a dedicated hacker let that stop him? The first step was finding a UART interface, hidden away on some unterminated channels of a ribbon cable. A custom breakout board later, and he had a U-Boot log. Next was to run through the bootup button combinations, and see what U-Boot tried to do with each. One of those combinations allows booting from a recovery.img, which would be ideal, if not for secure boot.

The great thing about U-Boot is that its Open Source under the GPL, which means that the source code should be available for perusal. Find a bug in that source, and you have your secure boot bypass. Open Source also allows some fun approaches, like running portions of the U-Boot code in userspace, and exercising it with a fuzzer. Thats the approach that found a bug, where a block size greater than 512 bytes triggers a buffer overflow. Its a generally safe assumption, as there arent really any USB storage devices with a block size greater than 512.

Never fear, a device like the Raspberry Pi Pico can run TinyUSB, which allows emulating a USB device with whatever block size you specify. A test determined that this approach did result in a repeatable crash on the real device. The code execution is fairly straightforward, writing a bunch of instructions that are essentially noop codes pointing to a payload, and then overwriting the return pointer. Code execution in the can, all that remained was to overwrite the command list and execute a custom U-Boot script. A thing of beauty.

The lowly ping command. How much can a single pair of packets tell us about a network and remote host? According to [HD Moore], quite a bit. For example, take the time given for a ping response, and calculate a distance based on 186 miles per millisecond. Thats the absolute maximum distance away that host is, though a quarter and half of that amount are reasonable lower and upper limits for a distance estimate. TTL very likely started at 64, 128, or 255, and you can take a really good guess at the hops encountered along the way. Oh, and if that response started at 64, its likely a Linux machine, 128 for Windows, and 255 usually indicates a BSD-derived OS.

Receiving a destination host unreachable message is interesting in itself, and tells you about the router that should be able to reach the given IP. Then theres the broadcast IP, which sends the message to every IP in the subnet. Using something like Wireshark for packet capture is enlightening here. The command itself may only show one response, even though multiple devices may have responded. Each of those responses have a MAC address that has can be looked up to figure out the vendor. Another interesting trick is to spoof the source IP address of a ping packet, using a machine you control with a public IP address. Ping every device on the network, and many of them will send the response via their default gateway. You might find an Internet connection or VPN that isnt supposed to be there. Who knew you could learn so much from the humble ping.

Internet Explorer is Really, Truly, Dead. If you were under the impression, as I was, that Internet Explorer was retired years ago, then it may come as a surprise to know that it was finally done in only this past week. This months patch Tuesday was the last day IE was officially supported, and from now on its totally unsupported, and is slated to eventually be automatically uninstalled from Windows 10 machines. Also coming in this months patch drop was finally the fix for Follina, as well as a few other important fixes.

Theres a new record for HTTPS DDOS attacks, set last week: Cloudflare mitigated an attack consisting of 26 million requests per second. HTTPS attacks are a one-two punch consisting of both raw data saturation, as well as server resource exhaustion. The attack came from a botnet of VMs and servers, with the largest slice coming from Indonesia.

Running the free tier of Travis CI? Did you know that your logs are accessible to the whole world via a Travis API call? And on top of that, the whole history of runs since 2013 seems to be available. It might be time to go revoke some access keys. Travis makes an attempt to censor access tokens, but quite a few of them make it through the sieve anyways.

Ever wonder what the risk matrix looks like for TPM key sniffing on boot? Its not pretty. Researchers at Secura looked at six popular encryption and secure boot applications, and none of them used the parameter encryption features that would encrypt keys on the wire. The ironic conclusion? discrete TPM chips are less secure than those built in to the motherboards firmware.

See more here:
This Week In Security: Pacman, Hetzbleed, And The Death Of Internet Explorer - Hackaday

Division of the Arts Opens Two Opportunities for Artists – State of Delaware News – news.delaware.gov

Division of the Arts Opens Two Opportunities for Artists - State of Delaware News

Read the latest news on coronavirus in Delaware. More Info

COVID-19 Vaccines For Children 6 Months to 5 Years Receives Federal Authorization; DE Vaccines to Begin Week of June 20Date Posted: June 18, 2022

DPH Prepares for CDC to Authorize Vaccines for Children Under 5; Urges Safety During Event-Filled WeekendDate Posted: June 18, 2022

DOJ, Wilmington PD Indict Gun Offenders on 75 ChargesDate Posted: June 17, 2022

New Castle Court House MuseumDate Posted: June 16, 2022

John Dickinson Plantation Receives Award of ExcellenceDate Posted: June 15, 2022

Growing Horseshoe Crab Population Supports Migratory Shorebirds along Delaware Bay, Including Threatened Red KnotsDate Posted: June 15, 2022

Division of the Arts Opens Two Opportunities for ArtistsDate Posted: June 14, 2022

Delaware Mortgage Relief Program Approved By U.S. Department Of The TreasuryDate Posted: June 14, 2022

Heritage Commission Book of the Week: GATHs Literary Work and FolkDate Posted: June 13, 2022

Suspected Overdose Deaths for May in Delaware Set New Monthly High TotalDate Posted: June 8, 2022

Student State Board of Education Member Application Due June 24Date Posted: June 8, 2022

Delaware Natural Resources Police Youth Fishing Tournament Winners AnnouncedDate Posted: June 8, 2022

Summer of OpportunityDate Posted: June 8, 2022

Funding Available for Tree-Planting ProjectsDate Posted: June 7, 2022

Heritage Commission Book of the Week: William Hare Master PotterDate Posted: June 6, 2022

DNREC to Present Living Shoreline Social Marketing Webinar June 16Date Posted: June 6, 2022

Governor Carney Announces Judicial NominationsDate Posted: June 3, 2022

State Auditor McGuiness Releases The First of Nineteen Reports on Delawares Public School Staffing LevelsDate Posted: June 3, 2022

DNREC to Propose Major Source Air Pollution Permit Renewal for Delaware City Refining CompanyDate Posted: June 3, 2022

Governor Carney, Members of the General Assembly Announce Gun Safety PackageDate Posted: June 2, 2022

Delaware African and Caribbean Affairs Commission Celebrates National Caribbean-American Heritage MonthDate Posted: June 2, 2022

New Website Helps Families Find Summer Opportunities for Their ChildrenDate Posted: June 2, 2022

FREE New Castle History Camp, July 2529, 2022Date Posted: June 2, 2022

Prohibicin ampliada de las bolsas de plstico para llevar en vigor el 1. de julio de 2022Date Posted: June 2, 2022

Enhanced Plastic Carryout Bag Ban in Effect July 1, 2022Date Posted: June 2, 2022

Stay Cool, Hydrated, And Informed to Prevent Heat-Related IllnessDate Posted: June 1, 2022

Division Of Public Health Launches New Delaware WIC Educational WebsiteDate Posted: June 1, 2022

El Programa P-EBT de Delaware se Expandi a Nios Menores de 6 Aos en Hogares Que Reciben SNAPDate Posted: June 1, 2022

Delawares P-EBT Program Expanded to Children Under Age 6 in Households Receiving SNAPDate Posted: June 1, 2022

DNREC, Division of Public Health Offer Tips About TicksDate Posted: June 1, 2022

The Mezzanine Gallery to Exhibit Explorations through Materiality by Samara WeaverDate Posted: June 1, 2022

Program to Help Foster Youth Pursue Higher EducationDate Posted: May 31, 2022

Governor Carney, First Lady Tracey Quillen Carney Announce Compassionate Champion AwardeesDate Posted: May 31, 2022

Heritage Commission Book of the Week: Pierre S. du Pont IV: Governor of Delaware 1977-1985Date Posted: May 31, 2022

Delaware State Parks Expected to Set Visitation RecordDate Posted: May 27, 2022

Division of the Arts Announces the 2022 Award Winners Exhibition DatesDate Posted: May 27, 2022

Delaware Child Care Professional Bonus Registry Now OpenDate Posted: May 27, 2022

New DMV Support Pollinator Plate Creating a BuzzDate Posted: May 26, 2022

Milford School Psychologist Delaware 2022 Behavioral Health Professional Of YearDate Posted: May 26, 2022

DNREC Announces Beach Access Closures Due to Storm DamageDate Posted: May 26, 2022

Memorial Day Ceremonial EventsDate Posted: May 26, 2022

Governor Carney Formally Extends Public Health EmergencyDate Posted: May 26, 2022

In Another Likely Consequence of Pandemic, Delaware Overdose Deaths Increase 15% in 2021Date Posted: May 25, 2022

Governor Carney Terminates Limited State of Emergency in Kent CountyDate Posted: May 25, 2022

Delaware Emitir Beneficios de Emergencia Mensuales el 26 de MayoDate Posted: May 25, 2022

Delaware Will Issue Monthly Emergency Benefits On May 26Date Posted: May 25, 2022

Governor Carney Announces Governors Summer Fellowship Program Date Posted: May 25, 2022

New Tram Path, Other Improvements to Greet Fort Delaware State Park Visitors This SeasonDate Posted: May 25, 2022

Historical Affairs Programs In June 2022Date Posted: May 25, 2022

May 29th is 529 DayDate Posted: May 25, 2022

Take A Kid Fishing! Events AnnouncedDate Posted: May 25, 2022

Flag Lowering for the Victims at Robb Elementary School in Uvalde, TexasDate Posted: May 24, 2022

Governor Carney Activates Emergency Management Assistance Compact to Support Emergency Response to Barge FireDate Posted: May 24, 2022

Governor Carney Vetoes House Bill 371Date Posted: May 24, 2022

Crews Work to Contain Fire on Barge in Delaware BayDate Posted: May 23, 2022

Heritage Commission Book of the Week: East of the Mason-Dixon Line by Roger E. NathanDate Posted: May 23, 2022

DPH Encourages Delawareans To Consider Masking In Public Amid Rising Covid-19 CasesDate Posted: May 21, 2022

2021 U.S. Road Fatalities Projected Highest in 16 Years, Delaware at 15-year HighDate Posted: May 20, 2022

DHSS to Partner with Habitat for Humanity on Pilot Program for Minor Home Repairs for Older DelawareansDate Posted: May 19, 2022

Click It or Ticket Campaign Reminds Drivers: Buckle Up Every Trip, Every TimeDate Posted: May 19, 2022

Public Encouraged to Avoid Rescuing Young WildlifeDate Posted: May 19, 2022

Nonprofit Security Grant Applications Due June 1, 2022Date Posted: May 17, 2022

Delawares Plastic Carryout Bag Ban July 1, 2022Date Posted: May 17, 2022

DPH Offers Guidance And Resources On How To Navigate The Infant Formula Supply ShortageDate Posted: May 17, 2022

DNREC Names Two to Leadership RolesDate Posted: May 17, 2022

Governor Carney Honors Four Century Farm Families, 2022 Marks 35th Year of Delaware Century Farm ProgramDate Posted: May 16, 2022

Governor Carney Tests Positive for COVID-19Date Posted: May 16, 2022

Holodick Names Top High School Seniors 2022 Secretary ScholarsDate Posted: May 16, 2022

With Delaware Bay Beach Nourishment Projects Complete, DNREC Now Works Toward Restoring Atlantic CoastlineDate Posted: May 16, 2022

DE Heritage Commission Book of the Week: Captain Thomas MacdonoughDate Posted: May 16, 2022

School Behavioral Health Professionals HonoredDate Posted: May 16, 2022

The Wooden World Revealed at Lewes Zwaanendael MuseumDate Posted: May 13, 2022

Concord Pond to Be Treated for Invasive Aquatic Weed HydrillaDate Posted: May 13, 2022

DNREC To Update Vehicle Emission Testing RequirementsDate Posted: May 13, 2022

Dr. Karyl Rattay Announces Departure From Delaware Division Of Public Health Effective June 30, 2022Date Posted: May 13, 2022

Governor Carney Orders Lowering of FlagsDate Posted: May 13, 2022

Delaware Extends Electric Vehicle Rebate ProgramDate Posted: May 12, 2022

High Path Avian Influenza Confirmed In Black Vultures, Poultry Producers Encouraged To Take PrecautionsDate Posted: May 11, 2022

Governor Carney Signs Paid Family Leave LegislationDate Posted: May 11, 2022

Tonieboxes Now Available for Children at Delaware LibrariesDate Posted: May 11, 2022

McGuinesss National COVID-19 Data Quality Audit Template Shapes Public Emergency Response Efforts CountrywideDate Posted: May 10, 2022

DNREC, Delaware Center for the Inland Bays To Host Water Family Fest Saturday, May 14Date Posted: May 10, 2022

ICYMI: Dolly Parton in Delaware for the Imagination Library Statewide CelebrationDate Posted: May 9, 2022

DPH Diabetes & Heart Disease Prevention & Control Program Sponsors 20th Annual Diabetes Wellness ExpoDate Posted: May 9, 2022

Heritage Commissions Book of the Week: Allen McLane Patriot, Solider, Spy, Port CollectorDate Posted: May 9, 2022

US Wind and rsted Conducting Offshore Wind ResearchDate Posted: May 9, 2022

Gov. Carney Celebrates 150th Arbor Day in Rehoboth BeachDate Posted: May 6, 2022

Division of Small Business Launches Innovative New Website Service Designed to Support Delawares Small BusinessesDate Posted: May 6, 2022

DNREC, DEMA Sponsor Delaware Flood Awareness WeekDate Posted: May 6, 2022

Delaware Changes Summer Flounder, Scup and Black Sea Bass Recreational Fishing RegulationsDate Posted: May 5, 2022

DHSS Releases Second Annual Health Care Benchmark Trend ReportDate Posted: May 5, 2022

Drivers Needed for DARTs Upcoming Beach Bus SeasonDate Posted: May 5, 2022

DHSS Launches State Health Care Provider Loan Repayment ProgramDate Posted: May 5, 2022

DTI Announces New Chief Of Administration And Broadband ManagerDate Posted: May 5, 2022

DNRECs Monitoring Shows Overall Good Air Quality in DelawareDate Posted: May 4, 2022

Columbus Organization Will Continue to Connect Individuals to Services, SupportsDate Posted: May 4, 2022

May Is Viral Hepatitis Awareness Month; May 19 Hepatitis Testing DayDate Posted: May 4, 2022

Governor Carney Proclaims May 2022 as Trauma Awareness MonthDate Posted: May 4, 2022

The rest is here:
Division of the Arts Opens Two Opportunities for Artists - State of Delaware News - news.delaware.gov

The prospect of jobs in Web3.0 – The Financial Express

By Guneet Kaur

The new version of the Internet called decentralized web or Web3 or a blockchain-based Internet is trending these days. Recent graduates, as well as professionals from various industries, seem really curious to find out how to land a career in Web3 and its sub-sectors, including Metaverse, Digital assets, and Non fungible tokens (NFTs).

Although there is no hard and fast rule in joining or switching to a new career, what matters is your knowledge and skills. So, anyone looking for a job in Web3 needs to acquire the necessary education or real-world expertise. That said, this article will help you grasp essential insights on how to land a career in Web3.

Learn the basics

Understanding how blockchain technology and cryptocurrency function will put you ahead of the competition. You dont have to be an expert, simply learn the fundamentals. You can learn the basics by doing free courses on Coursera (accessible through financial aid).

Additionally, look for freely available MOOCs (Massive Open Online Courses) such as the one offered by the University of Nicosia titled Introduction to Digital Currencies. The next start date is September 2022, so hurry up! Cointelegraphs Cryptopedia articles may also help you transform from a beginner to an expert in various fields like DeFi, Metaverse, NFTs, etc.

While such courses and MOOCs are more suitable for beginners or non-developers, software engineers and blockchain developers need to learn programming languages like Solidity, Python, Rust, JavaScript, Vyper, etc. GitHub is a great place to store your projects and let others assess and authenticate them.

Get involved and improve your visibility

There are an increasing variety of ways to get involved and help companies discover you. These include meetups, conferences, mentoring programs, and events that exist globally. If you do some research, you should be able to join your first conference this month, such as ETH NYC.

Also, you can apply for a scholarship to join an 18-Week mentoring program called NFT Talents by the Frankfurt School Blockchain Center. The first cohort has already started on 7th June 2022. Stay tuned for the next one!

In addition to the above, you can also start writing blog posts on Medium so that people know that you are contributing to the Web3 space. Consistent engagement on CryptoTwitter is also an ideal way to help others discover your potential. As a developer, you can also add open-source libraries on GitHub (the ones developed by you), and contribute to other projects.

Join communities

Joining Discord, Reddit or Telegram channels of projects in the Web3 space can help you be aware of the opportunities (both paid and non-paid). And if you can add value to the project, such as finding a bug (if you are a developer) or voluntarily promoting a decentralized automated organization or DAO (if you are a marketer), dont be surprised if you get a full-time job offer (of course, a paid one).

Look for employment openings on job sites and platforms

Relying upon someone to send you a job opportunity may not help you get your dream job. In order to be successful in your job hunt, look for open job positions at Web3-centric job boards like web3.career or cryptocurrencyjobs.io. Also, actively apply for jobs on LinkedIn and Indeed. Finally, freelancers can search for opportunities on Upwork, Fiverr, etc.

Start by applying for internships if you are a recent graduate or a beginner in this space. Something is better than nothing; remember! However, do not go for something you wont be working on for long! Consistency is the key to becoming an expert in your area of interest.

Key takeaways

Millions of people have been empowered by blockchain technology to pick how they make a living, providing them options that never existed before. Web3 defies all of the conventional wisdom about how people earn money and spend their time. That said, remote work and getting paid in cryptocurrencies is the new normal!

As Web3 attracts the brightest minds, it will undoubtedly have a juggernaut effect, resulting in the creation of a decentralized Internet unlike anything weve ever seen before. Opportunities are many; you just need to leave your comfort zone and prepare yourself to land a career in Web3.

The author is technology editor, Cointelegraph

Read the original here:
The prospect of jobs in Web3.0 - The Financial Express

BLS signatures on BitcoinPairing-based cryptography: Part 2 – CoinGeek

This post was first published onMedium.

Boneh-Lynn-Shacham(BLS) is a signature scheme based onbilinear pairings.

Compared toECDSAorSchnorrsignatures, it enjoys several salient advantages:

Due to its minimal storage and bandwidth requirements, it has been adopted by multiple blockchains such as Ethereum, Dfinity, Algorand, and Chia. We illustrate how to implement it on Bitcoin natively.

BLS Signatures: the Theory

Hash to Curve: H(m)

In ECDSA, a messagemis hashed into a number. In BLS, we hash it to a point on the elliptic curve.

One naive way is to hash the message and multiply the result with the generator pointGto get a curve point. However, it isinsecure.

To do this securely, we first hash the message using SHA-256 and treat the 256 bit result as the x-coordinate of a point. If no such point exists on the curve, we increment the x-coordinate and try again, till we find the first valid point.

Sign

Signing is trivial. We simply multiply:

pkis the private key andmis the message. Note no random number is needed.Sis just a curve point and can becompressedto 33 bytes, about half the size of an ECDSA signature.

Verify

To verify a signature, we simply compare two pairings:

To see why the verification works,

Bilinear pairingeallows us to move scalarpkfrom the first input to the second.

Implementation on Bitcoin

We have implemented BLS signature verification usingthe pairing library.

Note we let users passy-coordinate directly and verify it, to avoid computing modular square root.

Summary

We have only demonstrated how to verify a single BLS signature on Bitcoin. BLSs main power lies inaggregated signatures and keys. We leave their implementations on Bitcoin as exercises to readers.

***

NOTES:

[1] This approach is called Hash and Pray, which runs in non-constant time. Constant time approach exists, such asFouque and Tibouchi, but are harder to implement.

[2] We assume a curve point with the x-coordinate exists for ease of exposition here. A hash and pray approach can be easily added.

New to Bitcoin? Check out CoinGeeksBitcoin for Beginnerssection, the ultimate resource guide to learn more about Bitcoinas originally envisioned by Satoshi Nakamotoand blockchain.

Read more:
BLS signatures on BitcoinPairing-based cryptography: Part 2 - CoinGeek

What’s In a Crypto Wallet?: Understanding the Role of Cryptos Essential Tool – Grit Daily

Cryptocurrency is known for not being a beginner-friendly technology, requiring new users to learn a lot of concepts and tools. While this is not surprising due to its highly technical nature, users tend to fall for cognitive biases as they progress through their crypto journey. While not necessarily the case for everybody, it is not uncommon to see clear representations of the Dunning-Kruger effect in so-called veterans.

Probably the greatest example of crypto users overestimating their own knowledge is their understanding of crypto wallets. While Crypto wallets are probably the most important tool when it comes to interacting with crypto and blockchain, most people misunderstand them. Starting with the idea that crypto wallets store cryptocurrency, these misunderstandings can prove disastrous in the long term.

There is also a group of crypto enthusiasts that understand that cryptocurrency wallets dont store crypto but the keys to interact with it. Private and public keys serve different purposes, allowing a range of actions from receiving cryptocurrency to authorizing transactions. To truly understand how these keys allow for such operations, a user would need to have an understanding of cryptography and basic blockchain infrastructure

The understanding of how crypto wallets work gets even more difficult as concepts like custodial, non-custodial, asymmetric cryptography, digital signature, hot/cold wallets, and multisig get thrown around. While it is true that understanding such concepts is not necessary to make use of a cryptocurrency wallet, misunderstanding them must be avoided at all costs. As such, making crypto wallets easy to use without the need to understand the technology is essential.

Making such a wallet might not sound that difficult but in truth, it can be especially complex given the decentralized nature of crypto. Decentralization comes with more freedom of choice at the cost of safeguards, putting developers in a tough spot. With new movements like web3, NFTs, and GameFi gaining momentum, the importance of these decisions continues to increase.

Dilemmas like these are what Robin Guyard, CTO of Laguna; Blake Commagere, Co-founder and COO of Vault12; and Doug Horn, Chief Architect of Telos, sat to discuss during Grit Daily House at Consensus 2022. Rachel Wolfson, Enterprise Blockchain Analyst at CoinTelegraph, moderated the panel titled Whats In a Crypto Wallet? by asking insightful questions on the role wallets are to play in the future of the crypto space.

If you missed the chance to attend Grit Daily House in person and to hear what these experts had to say about this topic, worry not. Not only will you be able to watch the panel in the video below but you can also find other panels on Grit Dailys official YouTube Channel.

Juan Fajardo is a News Desk Editor at Grit Daily. He is a software developer, tech and blockchain enthusiast, and writer, areas in which he has contributed to several projects. A jack of all trades, he was born in Bogota, Colombia but currently lives in Argentina after having traveled extensively. Always with a new interest in mind and a passion for entrepreneurship, Juan is a news desk editor at Grit Daily where it covers everything related to the startup world.

Go here to read the rest:
What's In a Crypto Wallet?: Understanding the Role of Cryptos Essential Tool - Grit Daily

Apple’s Passkeys aim to replace passwords, here’s why you need them – T3

Join our newsletter

All the best features, news, tips and great deals to help you live a better life through technology

Thank you for signing up to T3. You will receive a verification email shortly.

There was a problem. Please refresh the page and try again.

You'd be forgiven for missing the Passkey announcement that came as part of Apple's WWDC 2022 keynote. There was a lot of information there, even for a well-versed tech journalist to follow. Among MacOS Ventura features might not be as flashy as the new continuity camera or stage manager but it's arguably far more important.

Passkeys have the potential to completely change web security by eliminating the need for you (or even your password manager) to enter a password on a website. The theory is that if there's no password exchanged, there's nothing that can be compromised.

Perhaps the most important factor though is that Passkeys aren't a Mac-only technology. It is part of the work being done by the FIDO Alliance, which also includes Microsoft and Google, to create a passwordless internet. Apple's version, however, will be synced between your devices using the iCloud Keychain that's also secured using end-to-end encryption.

(Image credit: Apple)

The process of using a Passkey won't feel that different to using Apple's Keychain or Google's Password manager. When you sign up to a site, or update your security settings on an account, you will be given the option to use a Passkey instead of a password. Then each time you visit that site, instead of inputting a password, you will be asked to use your TouchID or FaceID to verify much as you can at the moment to access those stored passwords.

The difference is happening behind the scenes. With Passkeys, no information is actually exchanged. It's all based on a clever WebAuthn standard that includes a public key and a private key and the cryptography between them. The private key never leaves your device, it is simply verified for the site by your own device. This means it can't be phished or leaked as it isn't stored on a web server.

While Apple's Passkeys are designed to work across all Apple devices, the collaboration with the FIDO alliance means that you will be able to access websites on non-Apple devices too. In the keynote, Apple shows a QR code on a website, which can then be scanned by your iPhone to access your passkey again, without sharing it with the website or third-party device.

The beauty of this is that it mean you can still use the security on your work machine, or even a shared computer in a hotel lobby, without worrying about hackers.

While Apple admits the move to Passkeys is a journey, it's a significant one that brings genuine benefits to users. It will take time for websites to provide the facility for one, but I can't wait to ditch my password manager and use it.

Today's Best Apple MacBook deals

Follow this link:
Apple's Passkeys aim to replace passwords, here's why you need them - T3

GUEST ESSAY: We need to talk about crypto crash and its inevitable recovery – Daily Maverick

A disinterested observer may be bemused, or even gleeful at this red sea. The walls reverberate with I told you sos. I suspect if you are a stakeholder in this new ecosystem, particularly an innocent one, the humour will be lost on you.

I am one of those stakeholders, personally and professionally. But I am still smiling, albeit through gritted teeth, holding on to my optimism with whitened knuckles.

Here is why.

Cryptography has been around for thousands of years but lurched forward in the 1970s as many researchers started developing new techniques for keeping secrets. More importantly, the market for this arcane mathematics grew quickly from military, to telecommunications, to industry, to the Internet. But the industry we generally now refer to as crypto and see daily in the headlines was really borne in 2009, which was when Bitcoin was conceived.

Not to put too fine a point on it, the explosion of innovations since then has been breathtaking hard to follow, hard to digest and hard to predict. Cryptocurrencies, financial services, NFTs, crypto-secured supply chains, the metaverse, gaming, governance-communities and other wondrous things have emerged (and continue daily to do so), all built on the back of cryptography.

This is to say that the quantum of brain power committed to this industry mathematicians, statisticians, computer scientists, economists, financial engineers, innovators, inventors, developers, educators and dreamers has become voluminous and adamant. There are hundreds of thousands of them and new ideas and experiments pour out daily, most of them utterly unconnected to the world of cryptocurrencies and the token prices which so consume the news cycle.

The price of Bitcoin or Ether or any other crypto asset will be of transient consequence to these people with their heads down building new worlds and better, fairer services. At worst, less investment will pour into the sector for a brief period. At best, pretenders and grifters and dodgy projects will disappear.

So the stuff happening deep in the bowels of the cryptoverse is largely unconcerned with the price of Bitcoin. There is simply no chance of this wave ending; these are fertile plains of abundant innovation in myriad matters of human interaction.

In any event, markets have a short memory. A much more serious bear market occurred at the end of 2017 with many tokens up to 80% down from highs. Prior to that, a number of other crashes dating back to 2013, also more merciless and eye-popping than this one. The crypto market recovered quickly from all of them, as I expect it will do from this one.

More importantly, it is important to retain perspective and context here. Most tech stocks, including giants like Netflix, are down more than 50% off their highs. Even those stocks in unrelated sectors like real estate and insurance are growling like bears. So the question that needs to be asked: is crypto crashing because crypto is toxic kryptonite (in the words of one of richest men in the world), or is crypto crashing because everything is crashing?

Institutional money started pouring into crypto in the last 18 months as it became evident that the asset class was not a bubble. This means that it has started to get caught in the net of big moneys risk-on/risk-off calculations. So when money flees from high-risk bets to low-risk safe harbours, it will flee from emerging markets, high-growth stocks, fancy derivatives. And it will flee from crypto, now sadly correlated with everything else in traditional finance. Crypto is crashing mostly because everything is crashing, save for a few terrible bloopers like the Terra stablecoin of which I have previously written.

Meanwhile, it is indeed painful to watch.

I submit that no one remembers the crypto crash of 2017 because it was simply swamped by the subsequent value of crypto-fueled inventions that came in its wake, and the growth of the industry wiped memories clean.

And I submit that is what will happen again this time, sooner rather than later. DM

Steven Boykey Sidley (Professor of Practice, JBS, University of Johannesburg)

Read the original here:
GUEST ESSAY: We need to talk about crypto crash and its inevitable recovery - Daily Maverick

Chelsea Manning dodges Grimes relationship questions

Chelsea Manning dodged questions about her relationship with musician Grimes by refusing to talk about her personal life.

The Daily Beast asked the famed whistleblower about her romance with the Genesis singer, and in response Manning drew a line in the sand.

Im not gonna get into my dating life. Theres been a lot of speculation and a lot of news stories. I have not changed my perspective on this: I dont like speculation about my private life, Manning told the publication.

I prefer to keep my private life private. I dont want to create a precedent either. Another concern that I have is I dont want to confirm or deny anything in my private life because I dont want to make it seem like Im open to having people digging into my personal life, real or imagined.

Manning, 34, continued to explain that she doesnt want to get sucked into celebrity-culture stuff but acknowledged that shes based in New York.

Page Six broke the news in March that Grimes, 34, had started dating Manning after her relationship with Elon Musk ended for the second time. Grimes and the Tesla founder share two children.

Theyre getting serious. They U-Hauled it, a source told us of Manning and Grimes fast-paced nature of their relationship. Theyve been living together in Austin.

Our insider also noted that Manning still had her Brooklyn apartment, where she remains when not spending time with Grimes.

Neither Grimes nor Manning has publicly confirmed the relationship, but around the time that we published our exclusive report, 50-year-old Musk began tweeting seemingly transphobic memes. The Daily Beast speculated that they were directed at the couples relationship, as Manning is a transgender woman.

My response was a meme back. The one thing I will say is: he around that time definitely seemed transphobic, and rumor or speculation aside, thats off-limits, Manning told the outlet.

Im going to respond to it. Any transphobia in a transphobic environment is not OK.

See original here:
Chelsea Manning dodges Grimes relationship questions

Chelsea Manning dodges question about rumoured relationship with Grimes

(DIRK WAEM/BELGA MAG/AFP / ANGELA WEISS/AFP / Getty Images)

Chelsea Manning has spoken candidly about keeping her personal life private, as she avoided answering any questions about her rumoured relationship with Grimes.

The 34-year-old former whistleblower, who was previously imprisoned for passing classified information to WikiLeaks, was asked if the dating rumours about her and the 34-year-old musician were true during a recent interview with The Daily Beast.

In response, Manning said that she was not going to discuss her dating life or the speculation around it, before acknowledging how she prefers to keep [her] private life private.

Im not gonna get into my dating life, she explained. Theres been a lot of speculation and a lot of news stories. I have not changed my perspective on this: I dont like speculation about my private life. I prefer to keep my private life private. I dont want to create a precedent either.

She also said that because she doesnt want people to think shes open to discussing her private life, she wont confirm or deny any rumours being spread about her.

Another concern that I have is I dont want to confirm or deny anything in my private life because I dont want to make it seem like Im open to having people digging into my personal life, real or imagined, she explained. I see a lot of people struggling with this, and I dont want to get sucked into celebrity-culture stuff.

However, Manning did address where her hometown is, detailing how she resides in New York when shes not travelling.

The one thing I will say is that I live entirely in New York, she added. I dont know where this idea came about that I would live remotely close to Texas. I travel a lot, but Im based in New York.

Last March, Page Six reported that, following her second split with Elon Musk, Grimes had begun dating Manning. The musician and Tesla founder share two children,X A-Xii, two, and Exa Dark Siderl, six months, together.

Theyre getting serious. They U-Hauled it, a source told the publication about Manning and Grimes. Theyve been living together in Austin.

Story continues

The pair were spotted interacting on Twitter that same month, as Grimes tweeted that she had been postponing her appearance on a YouTubers twitch stream, like ten times, because she kept not being in LA. In response, Manning tweeted: vouch.

Although neither Grimes and Manning have confirmed their relationship, The Daily Beast discussed how Elon Musk had tweeted transphobic memes at the time, when rumours first circulated about his exs new partner.

According to the publication Musks memes seemed like subtweets about Manning, as she is a transgender woman. In response, the security consultant expressed how the business magnates tweets, at the time, definitely seemed transphobic.

My response was a meme back, she explained. The one thing I will say is: he around that time definitely seemed transphobic, and rumour or speculation aside, thats off-limits. Im going to respond to it. Any transphobia in a transphobic environment is not OK.

Last April, Musk had shared a tweet that said: If our twitter bid succeeds, we will defeat the spam bots or die trying! And authenticate all real humans.

Mannings meme, in response to Musk, featured a cartoon girl, with pink hair, holding her hand up and frowning, as the text next to the photo reads: A billionaire occupying your mind rent free.

In the second part of the meme, that same girl could be seen smiling and wearing a shirt with the transgender flag on it, as the text reads: Occupying a billionaires mind rent free.

See more here:
Chelsea Manning dodges question about rumoured relationship with Grimes

Will Julian Assange be extradited to the U.S.? Where his case stands now – NPR

Stella Assange, wife of WikiLeaks founder Julian Assange, speaks in front of the U.K. Home Office in London as protesters demand Julian Assange's release on May 17. Home Secretary Priti Patel signed the extradition order on Friday. Dan Kitwood/Getty Images hide caption

Stella Assange, wife of WikiLeaks founder Julian Assange, speaks in front of the U.K. Home Office in London as protesters demand Julian Assange's release on May 17. Home Secretary Priti Patel signed the extradition order on Friday.

Julian Assange is another step closer to trial in the U.S., where he faces 18 federal counts related to his publishing classified diplomatic cables and sensitive military reports from the Iraq and Afghanistan wars.

On Friday, the British government formally ordered the WikiLeaks founder to be extradited but Assange has two weeks to appeal that order from the U.K.'s Home Office.

"This is disappointing news that should concern anyone who cares about the First Amendment and the right to publish," Assange's attorney, Barry Pollack, said. "The decision will be appealed."

U.K. authorities arrested Assange in April of 2019, as the U.S. unsealed an indictment accusing him of a criminal conspiracy resulting in "one of the largest compromises of classified information in the history of the United States."

A federal grand jury indicted Assange in the Eastern District of Virginia. If he loses his appeal and is extradited, his first court appearance would be in the Albert V. Bryan U.S. Courthouse in Alexandria, Va., just outside of Washington, D.C. The case is assigned to District Judge Claude M. Hilton.

If Assange is convicted, he could face up to 10 years in prison for each of the 17 most serious felony counts against him although the Justice Department notes, "Actual sentences for federal crimes are typically less than the maximum penalties."

The U.K. Home Office said British courts had not found extradition would be incompatible with Assange's "human rights, including his right to a fair trial and to freedom of expression."

"That last point is pretty crucial," London-based journalist Willem Marx told NPR. It's where legal experts believe Assange will focus his appeal, Marx says, adding "as well as on this really interesting potential political motivation his team allege [is] behind this extradition request."

The extradition fight has dragged on since Assange was jailed in the U.K. in 2019. A British magistrate ruled in Assange's favor in early 2021, saying he faced a high risk of suicide if he were sent into the U.S. justice system. But the U.S. appealed that decision and won.

In March, the U.K. Supreme Court ruled Assange couldn't appeal the lower court's ruling against him, saying his case "didn't raise an arguable point of law." One month later, another judge formally approved the U.S. extradition request, putting the next move in the hands of Home Secretary Priti Patel who then signed the extradition order.

Protesters gather outside the Home Office last month to demand Julian Assange's immediate release in London. Dan Kitwood/Getty Images hide caption

Protesters gather outside the Home Office last month to demand Julian Assange's immediate release in London.

U.S. prosecutors accuse Assange, 50, of helping Chelsea Manning, a former U.S. Army intelligence analyst who had a top-secret security clearance, to crack a password on Defense Department computers connected to the Secret Internet Protocol Network in 2010. The U.S. government uses the network to share classified information and material.

The charges against Assange have grown in number and detail, outlined in three separate indictments that were previously under a court seal. The most serious counts against him include conspiracy to obtain and disclose national defense information. The least serious charge Assange faces is the first one leveled against him: conspiracy to commit computer intrusion.

Assange has been fighting extradition for years, going so far as to jump bail and live in the Ecuadorian Embassy in London for seven years to elude the authorities. At the time, he was concerned both about U.S. espionage charges and also an extradition request over rape allegations in Sweden (which have since been dropped).

WikiLeaks has published a massive number of documents on its website and has also given information to journalists. The subjects include some 490,000 sensitive military reports from the Iraq and Afghanistan wars, along with around 800 Guantanamo Bay detainee assessments and about 250,000 State Department cables.

By publishing unredacted sensitive documents, the U.S. says in court filings, Assange revealed the names of people who shared information or otherwise helped the U.S. despite potential repercussions not only in Iraq and Afghanistan, but also in China, Iran and Syria.

The initial federal charges focused on Assange's contacts with Manning. But in 2020, a new indictment alleged that Assange also recruited hackers from groups such as Anonymous, LulzSec and Gnosis to launch cyberattacks against government agencies, cybersecurity firms and other entities, hoping to compromise internal databases and gather sensitive documents.

Assange has insisted he was acting as a journalist, working for transparency and exposing secrets. But his critics, including the U.S. government, counter that he's attempting to use the First Amendment to shield himself from being held responsible for allegedly illegal actions.

Assange's defenders, including the American Civil Liberties Union, say the U.S. should drop the charges against him. For one thing, they note, the information he published was true.

A U.S. prosecution of Assange "would be unprecedented and unconstitutional," the ACLU's Ben Wizner said last December, "and would open the door to criminal investigations of other news organizations."

But the Justice Department says the charges against Assange aren't for receiving classified information, but for allegedly working to obtain that information through illegal hacking. It also says the charges aren't a response to him publishing U.S. secrets in bulk, but to revealing specific confidential information about people facing dangerous reprisals.

"Julian Assange is no journalist," said Assistant Attorney General for National Security John C. Demers, when he announced a raft of felony charges against Assange.

See original here:
Will Julian Assange be extradited to the U.S.? Where his case stands now - NPR