encryption - Tagged - Security Boulevard The Home of the Security Bloggers Network Mon, 02 Sep 2024 04:00:06 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.1 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png encryption - Tagged - Security Boulevard 32 32 133346385 Telegram is NOT an Encrypted Messaging App, Must-See Documentaries https://securityboulevard.com/2024/09/telegram-is-not-an-encrypted-messaging-app-must-see-documentaries/ https://securityboulevard.com/2024/09/telegram-is-not-an-encrypted-messaging-app-must-see-documentaries/#respond Mon, 02 Sep 2024 04:00:06 +0000 https://sharedsecurity.net/?p=101906 In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app’s encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is co-host Kevin Johnson, bringing his trademark opinions. We also talk about some intriguing documentaries, including ‘LulaRich’ about the LuLaRoe leggings company and ‘Class […]

The post Telegram is NOT an Encrypted Messaging App, Must-See Documentaries appeared first on Shared Security Podcast.

The post Telegram is NOT an Encrypted Messaging App, Must-See Documentaries appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/09/telegram-is-not-an-encrypted-messaging-app-must-see-documentaries/feed/ 0 2029432
‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril https://securityboulevard.com/2024/08/telegram-terrorgram-grid-richixbw/ Tue, 27 Aug 2024 17:19:11 +0000 https://securityboulevard.com/?p=2028965 Sign reads, “Danger: High Voltage!”

Should’ve listened to Edison: After the arrest of Pavel Durov—the Telegram CEO—comes news of domestic extremists using the chat app to organize.

The post ‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril appeared first on Security Boulevard.

]]>
2028965
NIST Releases First Post-Quantum Encryption Algorithms https://securityboulevard.com/2024/08/nist-releases-first-post-quantum-encryption-algorithms/ https://securityboulevard.com/2024/08/nist-releases-first-post-quantum-encryption-algorithms/#respond Thu, 15 Aug 2024 15:37:42 +0000 https://www.schneier.com/?p=69264 From the Federal Register:

After three rounds of evaluation and analysis, NIST selected four algorithms it will standardize as a result of the PQC Standardization Process. The public-key encapsulation mechanism selected was CRYSTALS-KYBER, along with three digital signature schemes: CRYSTALS-Dilithium, FALCON, and SPHINCS+.

These algorithms are part of three NIST standards that have been finalized:

The post NIST Releases First Post-Quantum Encryption Algorithms appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/08/nist-releases-first-post-quantum-encryption-algorithms/feed/ 0 2027911
Google Using Enhanced Encryption to Protect Cookies https://securityboulevard.com/2024/08/google-using-enhanced-encryption-to-protect-cookies/ Thu, 01 Aug 2024 17:20:29 +0000 https://securityboulevard.com/?p=2026377 Google DBSC cookie encryption

Google is adding greater encryption capabilities to Chrome to better protect users from information-stealing malware, a move that comes after the company's controversial decision to once again delay getting rid of third-party cookies.

The post Google Using Enhanced Encryption to Protect Cookies appeared first on Security Boulevard.

]]>
2026377
Compromising the Secure Boot Process https://securityboulevard.com/2024/07/compromising-the-secure-boot-process/ Fri, 26 Jul 2024 16:21:42 +0000 https://www.schneier.com/?p=69197 This isn’t good:

On Thursday, researchers from security firm Binarly revealed that Secure Boot is completely compromised on more than 200 device models sold by Acer, Dell, Gigabyte, Intel, and Supermicro. The cause: a cryptographic key underpinning Secure Boot on those models that was compromised in 2022. In a public GitHub repository committed in December of that year, someone working for multiple US-based device manufacturers published what’s known as a platform key, the cryptographic key that forms the root-of-trust anchor between the hardware device and the firmware that runs on it. The repository was located at https://github.com/raywu-aaeon/Ryzen2000_4000.git, and it’s not clear when it was taken down...

The post Compromising the Secure Boot Process appeared first on Security Boulevard.

]]>
2025692
EU Aims to Ban Math — ‘Chat Control 2.0’ Law is Paused but not Stopped https://securityboulevard.com/2024/06/chat-control-2-eu-richixbw/ Thu, 20 Jun 2024 16:43:17 +0000 https://securityboulevard.com/?p=2022116 “Oh, won’t somebody please think of the children?”

Ongoing European Union quest to break end-to-end encryption (E2EE) mysteriously disappears.

The post EU Aims to Ban Math — ‘Chat Control 2.0’ Law is Paused but not Stopped appeared first on Security Boulevard.

]]>
2022116
DNS and Your Privacy: Should you use encrypted DNS? https://securityboulevard.com/2024/06/dns-and-your-privacy-should-you-use-encrypted-dns/ Wed, 19 Jun 2024 17:00:00 +0000 https://avoidthehack.com/more-info-dns

DNS enables the easy navigation from website to website as you currently know it. However, the system wasn’t exactly designed with your privacy and security in mind.

Many DNS resolvers - such as your internet service provider's (ISP) - do not encrypt queries and may log data and metadata surrounding your queries. Additionally, unencrypted queries can be captured, viewed, and otherwise "consumed" (used) by eavesdropping third parties since data is exchanged in clear text.

Fortunately, using an encrypted DNS server provider can be a viable option for some users out there. This post aims to explore how and why - and doesn't leave out the limitations of encrypted DNS.

DNS and your privacy

Assuming you know the basics of DNS and how the system works, privacy issues surrounding DNS frequently involve the potential capture and “snooping” of DNS queries made by a device and the sending of unnecessary information (typical in the absence of QNAME minimization) to DNS servers performing the resolution.

DNS servers can log data about the device making the query, times queries were requested, and of course the query itself - ex: avoidthehack.com. Naturally, the amount of logging or even the presence of logging depends on the DNS service itself; for example, ISPs often log DNS queries and share them with a variety of third parties. Users often get no "say" or may not even be aware of this.

locked padlock on blue tech background concept

With unencrypted queries - which is often the default for most resolvers - third-parties to the transaction between the device and the DNS resolver can “eavesdrop” on queries made by devices. Eavesdropping has been has been performed by public and private organizations alike to surveil DNS traffic (and potentially hijack it.)

With the presence of HTTPS, third-party snooping devices won’t be able to see what data is passed between the client device and the web server - but with unencrypted DNS queries, it would be able to see that a query was made. Captured over time, browsing habits can be inferred from DNS requests observed.

What data is sent to DNS Servers?

Internet connections to visited websites and web apps start out as a DNS request. Assuming the absence of the requested website in a DNS cache - which can be in the browser and/or on the device itself - a query is sent to the DNS resolver.

The DNS resolver can be a machine local to the network or a service managed by a DNS service provider. The latter is generally more common (especially for most users out there); though, it is worth mentioning that local resolvers often pass queries to "upstream" DNS servers.

Again, generally, many users use the ISP’s DNS resolvers as it is the "default" and most do not know these can be changed in the browser or on the device/network (hardware/firmware permitting). Of those who know how to change DNS settings, we can safely assume most of these users, who are already a minority amongst most users, aren't running a local recursive resolver.

server rack with blue higlights and red data stream

Exact data sent to DNS resolvers vary, but data sent to DNS resolvers typically include:

  • Top-level domain (TLD) requested. This includes link clicked/domains typed into the browser address bar and background connections initiated by apps/services and resources called by websites.
  • If HTTP is used: Visited pages within the TLD. The commonality of HTTPS makes this irrelevant in the modern landscape, though some websites still serve content using a mix of HTTP/HTTPS.
  • Timestamp request was made
  • IP address of client device
  • Protocol (UDP or TCP)
  • Record type (A, AAAA, etc)

Data sent with the queries themselves can also be logged by DNS resolvers, but as mentioned previously, the details of logged data and the action of logging itself ultimately depends on the DNS service provider.

Depending on the service provider, additional information about network subnets and device identifiers (such as MAC addresses) may be embedded within DNS queries, essentially fingerprinting users or their networks.

Who can see DNS information?

Ultimately, it depends.

laptop sitting on desk in low lighting with a data stream on screen

As mentioned, DNS queries are typically unencrypted and thus clear text and readily available for anyone willing to listen.

Even with encrypted DNS, generally your device, the router, and the DNS provider can see DNS requests. If you are using your ISP’s DNS servers - which are usually the default - then they can also see your DNS requests.

Your ISP may log this information and potentially use it for their own endeavors and/or share this data with third parties - which can include advertisers or government agencies.

Unless you are using a virtual private network (VPN) or an onion routing service like the Tor network, your ISP can still see connections to IP addresses.

Benefits of using encrypted (and privacy-friendly) DNS services

Benefits of using encrypted DNS services include preventing third-party DNS query sniffing, keeping DNS traffic private from ISP, and blocking ads on a network.

Eliminate third-party sniffing of DNS queries

The primary benefit of using any encrypted DNS server is preventing third parties from sniffing traffic and seeing what DNS queries users' devices make. This is true even if the encrypted DNS provider is capturing device information or otherwise logging DNS query data and metadata (though this is far from ideal.)

magnifying glass and small keyhole in wall covered in blue light

However, it's worth mentioning that if the encrypted DNS server is indeed logging information, they may share this information with third parties - this is a different threat vector than a third party listening or capturing the queries themselves. This can be alleviated by using a "trusted" encrypted DNS provider.

Filtered (and encrypted) DNS servers can block ads/malicious domains on the network level

Some encrypted DNS providers also offer domain filtering. Depending on the provider, they may filter domains known to serve malware, ads, trackers - or any combination of these.

For example, if you set your router to use such a resolver, it will provide blocking services for devices connected to your home network.

red padlock on a dark blue tech background concept

Some DNS providers give users customization options for what is blocked or filtered. Others run specific blocklists on their servers and do not allow the user to customize what is blocked. In either case, devices/networks using DNS providers with filtering services will not connect...

The post DNS and Your Privacy: Should you use encrypted DNS? appeared first on Security Boulevard.

]]>
2022014
Does Real Queryable Encryption mean there is a Fake Queryable Encryption? https://securityboulevard.com/2024/04/does-real-queryable-encryption-mean-there-is-a-fake-queryable-encryption/ Tue, 30 Apr 2024 19:16:03 +0000 https://baffle.io/?p=2966 TLDR There is no “fake” queryable encryption, but a certain NoSQL database provider has coined the term “Queryable Encryption”, and Baffle has something to say about that. Background To understand real queryable encryption, we must first understand the encryption offerings that already exist. The first encryption offerings to examine are database-side operations. As the name…

The post Does Real Queryable Encryption mean there is a Fake Queryable Encryption? appeared first on Baffle.

The post Does Real Queryable Encryption mean there is a Fake Queryable Encryption? appeared first on Security Boulevard.

]]>
2016768
From Promising to Practical: The Transformative Impact of Homomorphic Encryption https://securityboulevard.com/2024/04/from-promising-to-practical-the-transformative-impact-of-homomorphic-encryption/ Thu, 04 Apr 2024 13:47:57 +0000 https://techspective.net/?p=35487 When the impact of a relatively unfamiliar technology sounds too good to be true, it’s natural to question those claims. Homomorphic encryption has been described as the ‘holy grail’ of encryption for its unique ability to allow users to leverage […]

The post From Promising to Practical: The Transformative Impact of Homomorphic Encryption appeared first on TechSpective.

The post From Promising to Practical: The Transformative Impact of Homomorphic Encryption appeared first on Security Boulevard.

]]>
2013980
Hardware Vulnerability in Apple’s M-Series Chips https://securityboulevard.com/2024/03/hardware-vulnerability-in-apples-m-series-chips/ Thu, 28 Mar 2024 11:05:01 +0000 https://www.schneier.com/?p=68657 It’s yet another hardware side-channel attack:

The threat resides in the chips’ data memory-dependent prefetcher, a hardware optimization that predicts the memory addresses of data that running code is likely to access in the near future. By loading the contents into the CPU cache before it’s actually needed, the DMP, as the feature is abbreviated, reduces latency between the main memory and the CPU, a common bottleneck in modern computing. DMPs are a relatively new phenomenon found only in M-series chips and Intel’s 13th-generation Raptor Lake microarchitecture, although older forms of prefetchers have been common for years...

The post Hardware Vulnerability in Apple’s M-Series Chips appeared first on Security Boulevard.

]]>
2013314