<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: How Secure can Security be?</title>
	<atom:link href="http://www.gfi.com/blog/secure-security/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/secure-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=secure-security</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/secure-security/comment-page-1/#comment-4629</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Tue, 06 Apr 2010 13:58:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1884#comment-4629</guid>
		<description><![CDATA[Hi Leandro and John, Sorry for not replying before I missed these comments I am afraid. Yes I am aware GSM has weaknesses and it&#039;s not just encryption, it&#039;s also vulnerable to a man in the middle attack as well http://whitepapers.techrepublic.com.com/abstract.aspx?docid=155570

These are exactly the kind of attacks the encrypted voice communication solution protect against. Notrax&#039;s approach was clever and an effective attack on the solutions themselves but that&#039;s not what the solution protects against. I am not saying they&#039;re unhackable, everything is ultimately. Encryption doesn&#039;t protect anything by making it impossible to get only unfeasible because of the time requirement after all. 

John, two hours or realtime is basically the same; I wouldn&#039;t feel secure if data I wanted to protect was secure for a mere two hours for sure. This means that if one divulges confidential information on a mobile phone he would definitely need an extra layer of security such as further encrypting that call and obviously protecting the physical security of his mobile phone as best as possible.]]></description>
		<content:encoded><![CDATA[<p>Hi Leandro and John, Sorry for not replying before I missed these comments I am afraid. Yes I am aware GSM has weaknesses and it&#8217;s not just encryption, it&#8217;s also vulnerable to a man in the middle attack as well <a href="http://whitepapers.techrepublic.com.com/abstract.aspx?docid=155570" rel="nofollow">http://whitepapers.techrepublic.com.com/abstract.aspx?docid=155570</a></p>
<p>These are exactly the kind of attacks the encrypted voice communication solution protect against. Notrax&#8217;s approach was clever and an effective attack on the solutions themselves but that&#8217;s not what the solution protects against. I am not saying they&#8217;re unhackable, everything is ultimately. Encryption doesn&#8217;t protect anything by making it impossible to get only unfeasible because of the time requirement after all. </p>
<p>John, two hours or realtime is basically the same; I wouldn&#8217;t feel secure if data I wanted to protect was secure for a mere two hours for sure. This means that if one divulges confidential information on a mobile phone he would definitely need an extra layer of security such as further encrypting that call and obviously protecting the physical security of his mobile phone as best as possible.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: John Mello</title>
		<link>http://www.gfi.com/blog/secure-security/comment-page-1/#comment-3697</link>
		<dc:creator>John Mello</dc:creator>
		<pubDate>Mon, 01 Mar 2010 03:22:44 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1884#comment-3697</guid>
		<description><![CDATA[Emmanuel--I agree that a hack that involves physically compromising a cellphone isn&#039;t a knock on its encryption software, but the encryption algorithms used by both the GSM and 3G networks have been cracked by researchers recently, which has raised concerns about the future security of mobile calls.

German cryptographer Karsten Nohl, who led a group of researchers who announced in December that they&#039;d cracked the encryption code for GSM, which is used by 80 percent of all the world&#039;s cellphones, says that the cipher used to encrypt GSM conversations hasn&#039;t been changed in 21 years. That&#039;s just too long.

Just two weeks after Nohl&#039;s crew cracked GSM&#039;s encryption, a team of cryptographers at Israel&#039;s Weizmann Institute of Science divulged a process for decrypting transmissions sent over newer 3G networks, which is supposed to be more secure than GSM. Since the method requires two hours on a single PC to perform, so it can&#039;t be used to listen in on real time cell phone calls--yet--but it&#039;s only a matter of time.]]></description>
		<content:encoded><![CDATA[<p>Emmanuel&#8211;I agree that a hack that involves physically compromising a cellphone isn&#8217;t a knock on its encryption software, but the encryption algorithms used by both the GSM and 3G networks have been cracked by researchers recently, which has raised concerns about the future security of mobile calls.</p>
<p>German cryptographer Karsten Nohl, who led a group of researchers who announced in December that they&#8217;d cracked the encryption code for GSM, which is used by 80 percent of all the world&#8217;s cellphones, says that the cipher used to encrypt GSM conversations hasn&#8217;t been changed in 21 years. That&#8217;s just too long.</p>
<p>Just two weeks after Nohl&#8217;s crew cracked GSM&#8217;s encryption, a team of cryptographers at Israel&#8217;s Weizmann Institute of Science divulged a process for decrypting transmissions sent over newer 3G networks, which is supposed to be more secure than GSM. Since the method requires two hours on a single PC to perform, so it can&#8217;t be used to listen in on real time cell phone calls&#8211;yet&#8211;but it&#8217;s only a matter of time.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Leandro Amore</title>
		<link>http://www.gfi.com/blog/secure-security/comment-page-1/#comment-3614</link>
		<dc:creator>Leandro Amore</dc:creator>
		<pubDate>Fri, 26 Feb 2010 18:50:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1884#comment-3614</guid>
		<description><![CDATA[Emmanuel I think that Notrax is just use the wave generated by the announcements of the A5/1 project. They claim in a black hat conference that using some Rainbow Tables was possible to hack into any GSM conversation, and they even have proof of concept and make a demo.
This is the link to the convention agenda.
http://events.ccc.de/congress/2009/Fahrplan/events/3654.en.html

and the link to the project page http://reflextor.com/trac/a51

I totally agree with you about physical security, once it’s lost there are no real countermeasures. You can take the recent hack of a TPM device, which was quite unthinkable. (http://windowsteamblog.com/blogs/windowssecurity/archive/2010/02/10/black-hat-tpm-hack-and-bitlocker.aspx)

Best regards.

Leandro
http://Blogs.prisma.cc/leandro]]></description>
		<content:encoded><![CDATA[<p>Emmanuel I think that Notrax is just use the wave generated by the announcements of the A5/1 project. They claim in a black hat conference that using some Rainbow Tables was possible to hack into any GSM conversation, and they even have proof of concept and make a demo.<br />
This is the link to the convention agenda.<br />
<a href="http://events.ccc.de/congress/2009/Fahrplan/events/3654.en.html" rel="nofollow">http://events.ccc.de/congress/2009/Fahrplan/events/3654.en.html</a></p>
<p>and the link to the project page <a href="http://reflextor.com/trac/a51" rel="nofollow">http://reflextor.com/trac/a51</a></p>
<p>I totally agree with you about physical security, once it’s lost there are no real countermeasures. You can take the recent hack of a TPM device, which was quite unthinkable. (<a href="http://windowsteamblog.com/blogs/windowssecurity/archive/2010/02/10/black-hat-tpm-hack-and-bitlocker.aspx" rel="nofollow">http://windowsteamblog.com/blogs/windowssecurity/archive/2010/02/10/black-hat-tpm-hack-and-bitlocker.aspx</a>)</p>
<p>Best regards.</p>
<p>Leandro<br />
<a href="http://Blogs.prisma.cc/leandro" rel="nofollow">http://Blogs.prisma.cc/leandro</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 16:44:17 by W3 Total Cache --