Cloning Google Titan 2FA keys
January 12 2021
This is a clever side-channel attack:
The cloning works by using a hot air gun and a scalpel to remove the plastic key casing and expose the NXP
Read more
This is a clever side-channel attack:
The cloning works by using a hot air gun and a scalpel to remove the plastic key casing and expose the NXP
Read more
Here's the latest Naked Security Live video talk - watch now, and please share with your friends!
Read moreResearchers can now made software copies of Google's "unclonable" Titan security keys - but not yet undetectably.
Read more
Researchers have been able to find all sorts of personal information within GPT-2. This information was part of the training data, and can be extracted with the right sorts...
Read moreIf snooping and falsifying web traffic is so easy when plain old HTTP is used, why do we still have HTTP at all?
Read more5 articles that help you become an expert, without needing you to be an expert to read them in the first place
Read more
In what is surely an unthinking cut-and-paste issue, page 921 of the Brexit deal mandates the use of SHA-1 and 1024-bit RSA:
The open standard s/MIME as extension...
Read more
Latest episode - listen now, and please tell your friends about our podcast.
Read moreWhat looked at first glance underwater like an "old typewriter" turned out to be an historic cipher machine.
Read more
Quanta magazine recently published a breathless article on indistinguishability obfuscation — calling it the “‘crown jewel’ of cryptography” — and saying that it had finally been achieved, based...
Read more
Recent Comments