The liquid plot

Here’s a chemist’s take on the plausibility of the London liquid bomb plot, followed by commentary on what he calls Potemkin security. He references Schneier, and goes on about the practicality of security against these kind of plots (as almost everything can be impregnated with nitrates, such as clothing) and the practicality of guarding against these specific threats. Yup, we all need cavity searches and x-rays before we board the planes naked.

Verichip implanted RIFD hacked

Verichip implants a tiny RFID chip in you which contains a unique ID which will identify you at hospitals, allowing doctors to find you in the database and find your file for you.
At HOPE they demonstrated that the Verichip has no encryption and no question / response mechanism, meaning that using an RFID reader and a laptop you can clone someone’s identity no problem as writing this data to an RFID chip is no problem either.

ID Fraud Lord Buckingham

BBC and el Reg are running great stories about some guy who read Day of the Jackal and decided to find a dead baby, take his birth certificate, open a bank account, get a passport – and live as this baby for 23 years! Of course, he had to go and take a fictional title (Earl of Buckingham) which hadn’t been in use since 1700 or so.
After getting married, fathering two sons, getting a divorce, this IT consultant was finally caught in 2003 and arrested for travelling under false documentation.

The stories are here:
BBC
The Register

Now, the question they fail to answer is: how did they twig on him at all? I’ve read the Day of the Jackal and the way the method works means that the passport he was travelling under was not a forgery…

Sony installs a rootkit on your system

The bastards!

Mark’s Sysinternals was playing around with RootkitRevealer and discovered that Sony installs its own media player on your PC, reroutes windows systems calls and hides itself to limit the amount of copies that can be made of the disc. Now you could call it DRM I guess, but if you try to remove the modifications it made, you end up breaking your windows installation, which nothing short of a format and re-install will fix. Begad, it’s a rootkit virus!

MySpace Worm

Samy posted a piece of very cleverly crafted stuff on his profile in MySpace, which basically made everyone who saw his profile add the same code to their profile, and add Samy to their friendslist together with some text. This shows the fragility of browsers when using AJAX to code sites, despite some fairly complicated filtering at MySpace, which Samy managed to get around.

The technical explanation and code itself is here

There’s an interview with samy and some more (easier) explanation here

Sniff traffic by listening to keyboard clicks

What makes the technique feasible is that each keystroke makes a relatively distinct sound, however subtle, when hit. Typical users type about 300 characters per minute, leaving enough time for a computer to isolate the sounds of individual keystrokes and categorize the letters based upon the statistical characteristics of English text. For example, the letters “th” will occur together more frequently than “tj,” and the word “yet” is far more common than “yrg.”

This sounds a lot like Solar Designers technique for analysing SSH traffic, as presented at Hackers At Large in 2001…

A Secret Service

A totally new look at how to keep a secure list of passwords: broadcast them live on webradio to the world!

A Secret Service invites you to submit your passwords and a timestamp for storage on the Secret Service website. It is then translated (text-to-speech), automated and broadcasted via webradio and live at Mediamatic Groundfloor every hour on the time of your choice. Because nobody can know that this is your password or what the purpose is, this seemingly paradoxical way of storing something very secret and intimate in public space can be considered completely safe.

To guarantee the absolute safety of your information, Mediamatic will take advanced security measures to protect the server on which your passwords will be saved. You are invited to the festive OPENING on the 15th of July, where the safety of these measures will be on display. If you are thoroughly convinced by the safety, you are invited to place your most sensitive information in our care.