Forwarded from IT Security Alerts
⚠️‼️ WPA2 (which most personal and cooperate wi-fi use) has several protocol-level flaws. Be adviced that no details are known yet, security researchers will release them later today. (No severity rating from our side until we have more information)
More info: https://yt.gl/krackattack (this will be released later today)
https://yt.gl/krcm7 (Arstechnica with all current info)
#alert #prenotification #exploit #zeroday #wifi #wireless #wpa2
Please feel free to discuss this in our @itsectalk group & forward 📬 to your net- and sysadmins!
  
  More info: https://yt.gl/krackattack (this will be released later today)
https://yt.gl/krcm7 (Arstechnica with all current info)
#alert #prenotification #exploit #zeroday #wifi #wireless #wpa2
Please feel free to discuss this in our @itsectalk group & forward 📬 to your net- and sysadmins!
Krackattacks
  
  KRACK Attacks: Breaking WPA2
  This website presents the Key Reinstallation Attack (KRACK). It breaks the WPA2 protocol by forcing nonce reuse in encryption algorithms used by Wi-Fi.
  C++ templates: Creating a compile-time higher-order meta-programming language
https://matt.might.net/articles/c++-template-meta-programming-with-lambda-calculus/
  https://matt.might.net/articles/c++-template-meta-programming-with-lambda-calculus/
A simple explanation of concurrency vs parallelism
https://davidvedvick.info/notes/2017/01/20/concurrency-vs-parallelism
  https://davidvedvick.info/notes/2017/01/20/concurrency-vs-parallelism
A series of posts by the developers of Crash Bandicoot about making the game and what the industry was like in the 90s
https://all-things-andy-gavin.com/2011/02/02/making-crash-bandicoot-part-1/
  https://all-things-andy-gavin.com/2011/02/02/making-crash-bandicoot-part-1/
Forwarded from ZeBl
  How an NSA backdooring attempt showed up years later in printer software:
https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/
  
  https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/
A Few Thoughts on Cryptographic Engineering
  
  The strange story of “Extended Random”
  Yesterday, David Benjamin posted a pretty esoteric note on the IETF’s TLS mailing list. At a superficial level, the post describes some seizure-inducingly boring flaws in older Canon printers…
  A readable look at the implementation of lists in Python and how it affects your Python code
https://rcoh.svbtle.com/notes-of-cpython-lists
  https://rcoh.svbtle.com/notes-of-cpython-lists