{"id":259,"date":"2015-05-21T20:15:22","date_gmt":"2015-05-21T20:15:22","guid":{"rendered":"https:\/\/melangedmaculateme.wordpress.com\/2015\/05\/21\/todays-terrifying-web-security-vulnerability\/"},"modified":"2023-07-28T16:25:13","modified_gmt":"2023-07-28T20:25:13","slug":"todays-terrifying-web-security-vulnerability","status":"publish","type":"post","link":"https:\/\/melange.dmaculate.me\/home\/2015\/05\/21\/todays-terrifying-web-security-vulnerability\/","title":{"rendered":"Today&#8217;s terrifying Web security vulnerability, courtesy of the 1990s crypto wars"},"content":{"rendered":"<p><a href=\"http:\/\/mostlysignssomeportents.tumblr.com\/post\/119540541071\/todays-terrifying-web-security-vulnerability\" class=\"tumblr_blog\" target=\"_blank\" rel=\"noopener\">mostlysignssomeportents<\/a>:<\/p>\n<blockquote>\n<figure class=\"tmblr-full\"><img decoding=\"async\" src=\"https:\/\/78.media.tumblr.com\/981ac4ad3de75135e0033e58689a309c\/tumblr_inline_noonumbHla1rkw4x1_540.jpg\" \/><\/figure>\n<p><b><br \/><\/b><\/p>\n<p>\n<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/i0.wp.com\/craphound.com\/images\/bc.jpg\" class=\"bordered\" align=\"right\" height=\"209\" width=\"209\" \/><br \/>\nThe Logjam bug allows attackers to break secure connections by tricking<br \/>\nthe browser and server to communicate using weak crypto \u2013 but why do<br \/>\nbrowsers and servers support weak crypto in the first place?<\/p>\n<p>\nThe answer is in the Bill Clinton-era export restrictions on strong<br \/>\ncrypto. During the first crypto wars, the Clinton administration forced<br \/>\ntech companies to export pre-broken crypto to nations to which the US<br \/>\nwas hostile. This created the possibility that Web servers would find<br \/>\nthemselves communicating with browsers that only supported weak crypto,<br \/>\nand that Web browsers might connect to servers that were incapable of<br \/>\nthe normal strong crypto that we rely upon to protect our sensitive<br \/>\ninformation from eavesdroppers.\n<\/p>\n<p>\nAs a result, browsers and servers distributed in the USA and other<br \/>\nwestern states have routinely shipped with a mode in which they appear<br \/>\nto be communicating securely, but are actually using a weak,<br \/>\neasy-to-break cryptographic protocol.\n<\/p>\n<p>\nIn other words, they have back doors. And attackers have figured out how to waltz through those back doors.\n<\/p>\n<p>\nThis is especially significant because western governments are demanding<br \/>\n a fresh round of back doors in broader classes of devices that are even<br \/>\n more tightly connected to our daily lives. UK Prime Minister David<br \/>\nCameron <a href=\"http:\/\/boingboing.net\/2015\/01\/13\/what-david-cameron-just-propos.html\" target=\"_blank\" rel=\"noopener\">made it an election promise<\/a>, and the <a href=\"http:\/\/boingboing.net\/2015\/03\/26\/as-crypto-wars-begin-fbi-sile.html\" target=\"_blank\" rel=\"noopener\">FBI has demanded that Congress<\/a> give them the power to force tech companies to build in back doors.\n<\/p>\n<p>\nBut it\u2019s not the 1990s anymore. Crypto doesn\u2019t just protect the Web \u2013 it secures your car\u2019s wireless interface to <a href=\"http:\/\/www.cnet.com\/news\/car-hacking-code-released-at-defcon\/\" target=\"_blank\" rel=\"noopener\">keep attackers out of your brakes and steering<\/a>; it secures your pacemaker against wireless attacks that can <a href=\"http:\/\/www.secure-medicine.org\/public\/publications\/icd-study.pdf\" target=\"_blank\" rel=\"noopener\">kill you where you stand<\/a>; it secures your phone against having the camera and mic remotely operated by \u201csextortionist\u201d voyeurs who <a href=\"http:\/\/boingboing.net\/2013\/09\/28\/how-miss-teen-usas-sextortio.html\" target=\"_blank\" rel=\"noopener\">blackmail their victims into performing live sex acts<\/a> on camera with the threat of disclosure of nude photos covertly snapped by their compromised networked cameras.\n<\/p>\n<p>\nOnce these vulnerabilites are inserted, they ripple out into devices that are placed in the field and <a href=\"http:\/\/boingboing.net\/2012\/04\/10\/forever-day-bugs.html\" target=\"_blank\" rel=\"noopener\">never updated<\/a>,<br \/>\n whose owners and users have no way to know that they were broken by<br \/>\ndesign. There is only one way to attain cybersecurity, and that\u2019s by<br \/>\nmaking the Internet and the devices we connect to it as secure as<br \/>\npossible.<\/p>\n<p><b><a href=\"http:\/\/boingboing.net\/2015\/05\/21\/todays-terrifying-web-securi.html\" target=\"_blank\" rel=\"noopener\">Read the rest\u2026.<\/a><br \/><\/b><\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>mostlysignssomeportents: The Logjam bug allows attackers to break secure connections by tricking the browser and server to communicate using weak crypto \u2013 but why do browsers and servers support weak crypto in the first place? The answer is in the &hellip; <a href=\"https:\/\/melange.dmaculate.me\/home\/2015\/05\/21\/todays-terrifying-web-security-vulnerability\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-259","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":490,"url":"https:\/\/melange.dmaculate.me\/home\/2014\/07\/04\/own-your-crypto-extremism-with-the-torrorist-tee\/","url_meta":{"origin":259,"position":0},"title":"Own your crypto-extremism with the Torrorist tee","author":"aslam","date":"July 4, 2014","format":false,"excerpt":"mostlysignssomeportents: Celebrate yesterday\u2019s news that the NSA classes all Tor users as \u201cextremists\u201d and targets them for indefinite, deep surveillance\u2026with fashion! Read more\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":58,"url":"https:\/\/melange.dmaculate.me\/home\/2017\/05\/06\/hillary-clinton-to-launch-political-group-as-soon\/","url_meta":{"origin":259,"position":1},"title":"Hillary Clinton to launch political group as soon as next week &#8211; POLITICO","author":"aslam","date":"May 6, 2017","format":"link","excerpt":"Must keep the Dems comfortably captive.Hillary Clinton to launch political group as soon as next week - POLITICO","rel":"","context":"In \"Democrats\"","block_context":{"text":"Democrats","link":"https:\/\/melange.dmaculate.me\/home\/tag\/democrats\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1602,"url":"https:\/\/melange.dmaculate.me\/home\/2011\/06\/24\/hillary-clinton-gives-green-light-for-israeli\/","url_meta":{"origin":259,"position":2},"title":"Hillary Clinton gives green light for Israeli attack on Gaza flotilla","author":"aslam","date":"June 24, 2011","format":false,"excerpt":"Via Scoop.it - Rights & LibertiesIn comments yesterday, US Secretary of State Hillary Clinton seemed to lay the ground \u2013 indeed almost provide a green light \u2013 for an Israeli military attack on the upcoming Gaza Freedom Flotilla, which will include the US Boat to Gaza.Show original","rel":"","context":"In \"flotilla\"","block_context":{"text":"flotilla","link":"https:\/\/melange.dmaculate.me\/home\/tag\/flotilla\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":171,"url":"https:\/\/melange.dmaculate.me\/home\/2016\/03\/19\/hillary-clintons-indefensible-stance-on-the-death\/","url_meta":{"origin":259,"position":3},"title":"Hillary Clinton\u2019s Indefensible Stance on the Death Penalty","author":"aslam","date":"March 19, 2016","format":"link","excerpt":"As a trained defense attorney who once represented clients for violent crimes, Clinton has been long aware of how the criminal justice system works in theory versus reality. That she continues to defend the death penalty given everything we know about it now does not so much betray ignorance as\u2026","rel":"","context":"In \"death penalty\"","block_context":{"text":"death penalty","link":"https:\/\/melange.dmaculate.me\/home\/tag\/death-penalty\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":662,"url":"https:\/\/melange.dmaculate.me\/home\/2013\/05\/30\/dirty-wars-official-theatrical-trailer-by\/","url_meta":{"origin":259,"position":4},"title":"DIRTY WARS - Official Theatrical\u2026","author":"aslam","date":"May 30, 2013","format":"video","excerpt":"DIRTY WARS - Official Theatrical Trailer (by IFCFilmsTube)(Source: https:\/\/www.youtube.com\/)","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/gdDdaahMRuo\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":167,"url":"https:\/\/melange.dmaculate.me\/home\/2016\/04\/30\/the-line-that-may-have-won-hillary-clinton-the\/","url_meta":{"origin":259,"position":5},"title":"The Line That May Have Won Hillary Clinton the Nomination","author":"aslam","date":"April 30, 2016","format":"link","excerpt":"Thanks to a number of settlements, we now know that some companies got many of those new signatures via intentional strategies targeting black and Hispanic customers. The most infamous example was Wells Fargo, which paid a $175 million settlement for systematically overcharging black and Hispanic borrowers. It came out that\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/comments?post=259"}],"version-history":[{"count":1,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/259\/revisions"}],"predecessor-version":[{"id":2282,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/posts\/259\/revisions\/2282"}],"wp:attachment":[{"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/media?parent=259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/categories?post=259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melange.dmaculate.me\/home\/wp-json\/wp\/v2\/tags?post=259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}