By yaelk from Slashdot's updates department
prisoninmate writes: Ubuntu 14.04.4 LTS (Long-Term Support) builds are available for download in the form of Live and Installable ISO images for Desktop, Server, Cloud, and Core products, on both 64-bit and 32-bit platforms, and that existing Ubuntu 14.04.3 LTS users can now update their systems. But not only Ubuntu 14.04 LTS (Trusty Tahr) users can update, as all the official flavors have been updated as well, so users of Kubuntu 14.04 LTS, Edubuntu 14.04 LTS, Xubuntu 14.04 LTS, Lubuntu 14.04 LTS, Ubuntu Studio 14.04 LTS, Mythbuntu 14.04 LTS, Ubuntu GNOME 14.04 LTS, and Ubuntu Kylin 14.04 LTS can also update their systems today or grab the new ISOs.Read Replies (0)
By yaelk from Slashdot's mcafee-makes-a-comeback department
MojoKid writes: Wondering what John McAfee is up to these days? It's not sniffing bath salts nor is he fleeing foreign countries as a person of interest in a murder investigation and faking heart attacks (been there, done all that) ; instead, he's on a mission to save America. How so? By cracking the code on the San Bernardino iPhone that's causing such a ruckus. McAfee didn't just criticize the FBI; instead he offered a potential solution. Let him and his team of hackers break into the iPhone without any help from Apple. "With all due respect to Tim Cook and Apple, I work with a team of the best hackers on the planet. These hackers attend Defcon in Las Vegas, and they are legends in their local hacking groups, such as HackMiami. They are all prodigies, with talents that defy normal human comprehension," McAfee said. Eccentric rant aside, McAfee's offer is simple - give him three weeks and he will, "free of charge, decrypt the information on the San Bernardino phone" with his team of hackers. He'll do it using mostly social engineering.Read Replies (0)
By yaelk from Slashdot's dont-avoid-it department
An anonymous reader writes: If you want to look out into the Universe, all you need to do is gather the light it gives off. Unless, of course, there's something in the way. For about 20% of the sky, that's exactly the story. In our own Milky Way galaxy, the neutral gas and dust block most of the visible light everywhere we look, preventing us from observing the Universe beyond. However, although the gas and dust might block visible light, longer wavelengths like radio and infrared can pass right through. Recently NASA's Wide-field Infrared Survey Explorer (WISE) mission mapped the entire sky in the infrared, including the entire galactic plane. It not only found many background galaxies, but it gave us a new window into what's possible. Perhaps, with future missions, we'll discover the cause of the "great attractor" phenomenon after all.Read Replies (0)
By timothy from Slashdot's it's-coming-from-inside-the-faraday-cage department
Motherboard carries a report that with equipment valued at about $3,000, a group of Israeli researchers have been able to extract cryptographic keys from a laptop that is not only separated by a physical wall, but protected by an air gap. This, they say, "is the first time such an approach has been used specifically against elliptic curve cryptography running on a PC." From the article:
The method is a so-called side-channel attack: an attack that doesn't tackle an encryption implementation head on, such as through brute force or by exploiting a weakness in the underlying algorithm, but through some other means. In this case, the attack relies on the electromagnetic outputs of the laptop that are emitted during the decryption process, which can then be used to work out the target's key.
Specifically, the researchers obtained the private key from a laptop running GnuPG, a popular implementation of OpenPGP. (The developers of GnuPG have since released countermeasures to the method. Tromer said that the changes make GnuPG âoemore resistant to side-channel attack since the sequence of high-level arithmetic operations does not depend on the secret key.â)Read Replies (0)
By timothy from Slashdot's don't-you-love-children? department
An anonymous reader writes with a story at Ars Technica, citing a Yahoo News interview, that National Security Agency Director Michael Rogers has explicitly blamed the terrorist attacks which struck Paris last November on communications backed by strong crypto. From the article:
Because of encrypted communications, he said, "we did not generate the insights ahead of time. Clearly, had we known, Paris would not have happened."
Rogers did not explicitly re-launch the campaign waged by FBI director James Comey to force technology companies to provide a "golden key" to encrypted communications. Rogers called encryption "foundational to our future" and added that arguing over encryption backdoors was "a waste of time." But he did say that encryption was making the job of the NSA and law enforcement more difficult.
The interview comes shortly after the FBI won an order requiring Apple to provide technical means to bypass the security measures preventing them from unlocking the iPhone 5C belonging to Syed Rizwan Farook. Farook, along with his wife, are responsible for the December mass shooting in San Bernardino, California."Read Replies (0)