Skip to main content

标 题: Re: 来个学术贴具体分析一下heartbleed的原理.


发信人: mitbbs2715 (好吃不懒做), 信区: PDA
标  题: Re: 来个学术贴具体分析一下heartbleed的原理.
发信站: BBS 未名空间站 (Fri Apr 11 13:01:39 2014, 美东)

大部分开源加密软件NSA是肯定挖了坑的
有很多核心程序员可能本来就是NSA的人
某大牛曾经因为拒绝合作被司法部门搞得很惨

越加密越引起NSA怀疑, 变成重点监控对象

可行的策略是避免跟进新的功能性代码包, 只对漏洞做Patch. 一更新就必然引入新坑

从一个侧面证明了, TG在美帝面前根本没有秘密可言, TG大部分东西都是直接copy&
paste的. 话说一个做安全朋友告诉我连gcc都曾挖了不少坑, 不知道现在如何.

【 在 chunjuan (春卷,更多春卷) 的大作中提到: 】
: 现在越来越觉得truecrypt真心就是nsa的大坑
: 大家哼哧哼哧二次加密 人家一键解锁
: 话说该去买那件tshirt了
: let's cut out the middle man and save our data on nsa's server

发信人: Corinthian (Diogenes门下一走狗), 信区: PDA
标  题: 真不知道有些2货给nsa洗个毛的地
发信站: BBS 未名空间站 (Thu Jul 11 16:57:21 2013, 美东)

大约三四年前。OpenSSL 就被人曝出来
里面被加了后门。这玩意是干什么的 想必有点计算机安全知识的都知道。说白了屁民
想藏点东西那是不可能的 
就连pgp这种东西 因为擅自公开了源代码 被美国政府追着告了八年

美国人放出来的加密算法. 不是nsa能破解的 那就是nsa放了后门的 这就是为什么别的
国家就算要用des aes 这种公开算法 也一定要自己从头开始写code的原因

9x年美国只允许出口四十位的加密算法 想想为啥吧
http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec