Levels of Assurance for DoD Microelectronics
August 29 2022The NSA has has published criteria for evaluating levels of assurance required for DoD microelectronics.
The introductory report in a DoD microelectronics series outlines the process for determining...
Read more
Ecuador’s Attempt to Resettle Edward Snowden
June 29 2022Someone hacked the Ecuadorian embassy in Moscow and found a document related to Ecuador’s 2013 efforts to bring Edward Snowden there. If you remember, Snowden was traveling from Hong...
Read moreOn the Subversion of NIST by the NSA
June 23 2022Nadiya Kostyuk and Susan Landau wrote an interesting paper: “Dueling Over DUAL_EC_DRBG: The Consequences of Corrupting a Cryptographic Standardization Process“:
Abstract: In recent decades, the U.S. National Institute of...
Read more
Details of an NSA Hacking Operation
March 3 2022Pangu Lab in China just published a report of a hacking operation by the Equation Group (aka the NSA). It noticed the hack in 2013, and was able to...
Read moreInterview with the Head of the NSA’s Research Directorate
February 3 2022MIT Technology Review published an interview with Gil Herrera, the new head of the NSA’s Research Directorate. There’s a lot of talk about quantum computing, monitoring 5G networks,...
Read moreHardening Your VPN
September 30 2021The NSA and CISA have released a document on how to harden your VPN.
Read moreMore Detail on the Juniper Hack and the NSA PRNG Backdoor
September 9 2021We knew the basics of this story, but it’s good to have more detail. Here’s me in 2015 about this Juniper hack. Here’s me in 2007 on the NSA backdoor.
Read moreMore Military Cryptanalytics, Part III
August 31 2021Late last year, the NSA declassified and released a redacted version of Lambros D. Callimahos’s Military Cryptanalytics, Part III. We just got most of the index. It’s hard to...
Read more
Recent Comments