March 7, 2023
-
-
-
-
-
-
-
-
-
-
-
-
I love crypto research that demonstrates practical attacks. The paper `A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm` by Nicky Mouha and Christopher Celi demonstrates RCE (!) through controlled memory corruption in the final-round update of the Keccak code used by SHA-3. This implementation bug affected Python, PHP, and the SHA-3 Ruby package: https://eprint.iacr.org/2023/331
Bonus points for dropping a Metasploit reverse TCP payload!
https://infosec.exchange/@hdm/109979752192232352
-
-
-
-
-
The city of Rotterdam used an " AI " algorithm to flag people for possible social fraud. Wired et al figured out how this algorithm mostly flagged the most vulnerable people: young single moms with a low income and only basic knowledge of Dutch.
https://www.wired.com/story/welfare-state-algorithms/
https://mstdn.social/@JorisMeys/109976797433224542
-