ONIOFF is basically an Onion URL inspector, it’s a simple tool – written in pure python – for inspecting Deep Web URLs . It takes specified onion links and returns their current status along with the site’s title.
Category: Cryptography
Heard the term Blockchain? Before it changes your life, here’s what you need to know
Blockchain is one of those hard-to-understand concepts, mainly because it is based on fairly complex technology involving cryptography, encryption and networking. However understanding its application is key to realising how profound a disruption this could cause on the way we transact and make payments in future.
Bugs
Full description=BUGS is the Big and Useful Great Security key encryption algorithm and applications. It is easy to use, and includes sample applications and documentation.
Mailcrypt
Full description=Mailcrypt is an Emacs Lisp package which provides a simple interface to public key cryptography with PGP/GPG. Mailcrypt integrates strong cryptography into your normal mail and news handling environment.
Linux/Unix: Force ssh client to use only password auth authentication when pubkey auth configured
I need to test if my server accepting password. How to allow ssh client to use only password auth when pubkey auth configured? You can force your ssh client on a Linux, MacOS, FreeBSD, OpenBSD and Unix-like system to use only password authentication.
padsniff 1.0.1
Padsniff includes a pretty heavy list of dependencies, including lxml and cryptography . You’ll need to install some of their dependencies via your package manager.
Improved Protection in Updated SecureBridge from Devart
Devart, a recognized vendor of professional database tools for developers and DBAs, has released a new version of SecureBridge. An update of SecureBridge components delivers such new features as: *Elliptic Curve Cryptography cipher suites is supported.
Top security expert: ‘There is no WhatsApp backdoor’
WhatsApp, a massive messaging platform owned by Facebook, is well known as one of the more secure messengers on the market. every message sent using the service will be protected in a way that even WhatsApp would not be able to read it if it wanted to, called end-to-end encryption.
WhatsApp and friends take umbrage at report its crypto is backdoored
The Guardian roiled security professionals everywhere on Friday when it published an article claiming a backdoor in Facebook’s WhatsApp messaging service allows attackers to intercept and read encrypted messages. It’s not a backdoor-at least as that term is defined by most security experts.
D-Wave open sources quantum app development software
Agencies looking to experiment with quantum computing now have access to open source quantum software tools from D-Wave Systems. Although mainstream quantum computing is still years off, agencies are starting to experiment with D-Wave machines for optimization problems.
WISeKey India Joint Venture First Seed Financing Round Oversubscribed
As per the terms of the Joint Venture, WISeKey India will localize WISeKey’s Cybersecurity Platform and provide Indian customers – both individuals and organizations – trusted identities for the Internet of Things objects and mobiles, enabling them to complete secure online transactions with confidence, trust the identities of others, and the identities of the IoT infrastructure. These transactions will run via localized Root of Trust , serve the Indian Ecosystem, and will benefit sectors such as telecom, manufacturing, retail, and e-commerce.
securesystemslib 0.10.0
Secure Systems Library ———————- .. image:: :target: ..
Technical developments in Cryptography: 2016 in Review
While 2016 may not have been the banner year for cryptographic exploits that 2015 was , researchers around the world continued to advance the state of the art. The biggest practical development in crypto for 2016 is Transport Layer Security version 1.3 .
Google open-sources test suite to find crypto bugs
Working with cryptographic libraries is hard, and a single implementation mistake can result in serious security problems . To help developers check their code for implementation errors and find weaknesses in cryptographic software libraries, Google has released a test suite as part of Project Wycheproof .
Quantum Satellites Are a Big Step toward the Unhackable Internet
Perfectly secure cryptography requires no technology more exotic than pencil and paper: Choose a random string of letters and numbers to serve as the key for an enciphered message. Write the key down on a piece of paper, use it once and then burn the paper.