Information Technology

Cold Boot Attacks

Some of you might have heard about an attack called a cold boot attack. This attack is a side channel attack that is performed by stealing the encryption keys out of a systems DRAM and/or SRAM that has an encrypted hard drive. How It Works A cold boot attacks are pretty simple to preform, but for the group of people who figured it out, it was no walk in the park. The reason cold boot attacks work is because usually none of the information that is stored in your RAM is encrypted and therefore the attackers are able to gain
Read More

Categories: Information Technology, IT Security, and Preston Hood.

Does TrueCrypt Have a Future?

As some of you might have heard the 10 year old on-the-fly encryption (OTFE) software TrueCrypt was discontinued on May 28, 2014 by its anonymous developers. On May 28th of 2014 TrueCrypt’s website started forwarding visitors to sourceforge.net, which is a source code repository for free and open source software. Apparently the TrueCrypt developers discontinued this software project because of Microsoft ending support for Windows XP, and because the new OS’s already have built in encryption options. The TrueCrypt developers are recommending that you migrate your data that is encrypted by TrueCrypt to “virtual disk images supported on your platform”.
Read More

Categories: Information Technology, IT Security, and Preston Hood.

NSA Surveillance

First of all let’s start off with what the NSA’s goal is; their goal is to have total surveillance and control in secrecy. The good news is they can’t… completely. There is no boundary on what the NSA wants to do but there are sometimes boundaries on what they are funded to do. What we know so far is that the NSA has massive global surveillance systems. That covers everything from the National Reconnaissance office with their keyhole satellites to the NSA’s TURMOIL, TURBINE, and QFIRE systems to handle the internet. I am going to focus on the internet side
Read More

Categories: Information Technology, IT Security, and Preston Hood.

Surveillance in the Modern Age

As you may have heard there are many different security agencies and people trying to spy on our every move. Luckily there is still hope for our society. We need to use VERY strong mathematics (cryptography) to put an end to mass surveillance at least at the network level. We can use tools such as the Onion router (Tor), I2P, and Freenet for avoiding someone monitoring your upstream and to provide end-to-end encryption (as long as you don’t exit the Tor network). We also need to use tools such as PGP and OTR messaging to protect our communications that might
Read More

Categories: Information Technology, IT Security, and Preston Hood.