12:0412:04, 28 April 2016diffhist+14
Dual EC DRBG
Clarified that it is a kleptographic backdoor, a very specific type of backdoor that only the attacker can use even after discovery (as opposed to a symmetric backdoor)
02:3002:30, 26 April 2016diffhist+14
BSAFE
It is a kleptographic backdoor (i.e., only the attacker that planted it can use it...a very specific type of backdoor)
23:0223:02, 20 April 2016diffhist−262
Ransomware
The timeline is incorrect. It starts with the flawed AIDS Trojan attack in 1989 followed by the secure ransomware attack introduced by Young-Yung in IEEE S&P 1996
23:4623:46, 17 April 2016diffhist−285
Ransomware
Timeline deleted. It is negligent since it omits the AIDS Info Trojan ransomware from 1989 (though flawed since it is symmetric crypto) and it omits the secure ransomware attack of Young-Yung IEEE S&P 1996. Perhaps fix it in an upload?Tag: section blanking
11:5011:50, 30 March 2016diffhist+3
Ransomware
belief->fact. A reverse-engineer can recover the symmetric encryption key when only symmetric crypto is used.
12:0412:04, 28 April 2016diffhist+14
Dual EC DRBG
Clarified that it is a kleptographic backdoor, a very specific type of backdoor that only the attacker can use even after discovery (as opposed to a symmetric backdoor)
02:3002:30, 26 April 2016diffhist+14
BSAFE
It is a kleptographic backdoor (i.e., only the attacker that planted it can use it...a very specific type of backdoor)
23:0223:02, 20 April 2016diffhist−262
Ransomware
The timeline is incorrect. It starts with the flawed AIDS Trojan attack in 1989 followed by the secure ransomware attack introduced by Young-Yung in IEEE S&P 1996
23:4623:46, 17 April 2016diffhist−285
Ransomware
Timeline deleted. It is negligent since it omits the AIDS Info Trojan ransomware from 1989 (though flawed since it is symmetric crypto) and it omits the secure ransomware attack of Young-Yung IEEE S&P 1996. Perhaps fix it in an upload?Tag: section blanking
11:5011:50, 30 March 2016diffhist+3
Ransomware
belief->fact. A reverse-engineer can recover the symmetric encryption key when only symmetric crypto is used.