::facepalm::
This is why you don't build backdoors into your encryption algorithms.
Originally shared by Kirill Grouchnikov
The TSA is learning a basic lesson of physical security in the age of 3-D printing: If you have sensitive keys—say, a set of master keys that can open locks you’ve asked millions of Americans to use—don’t post pictures of them on the Internet.
A group of lock-picking and security enthusiasts drove that lesson home Wednesday by publishing a set of CAD files to Github that anyone can use to 3-D print a precisely measured set of the TSA’s master keys for its “approved” locks—the ones the agency can open with its own keys during airport inspections. Within hours, at least one 3-D printer owner had already downloaded the files, printed one of the master keys, and published a video proving that it opened his TSA-approved luggage lock.
http://www.wired.com/2015/09/lockpickers-3-d-print-tsa-luggage-keys-leaked-photos
Thursday, September 17, 2015
Subscribe to:
Post Comments (Atom)
In 1976 (yes, 1976), I heard my professor, one Don Norman, say pretty much the same thing.
In 1976 (yes, 1976), I heard my professor, one Don Norman, say pretty much the same thing. https://www.fastcompany.com/90202172/why-bad-tech...
-
Still thinking through this, myself. This seems a useful place to start. Originally shared by Allen “Prisoner” Firstenberg What can should ...
-
Oooh! Crossing fingers! Originally shared by **** We’re exploring bringing Fiber to San Diego. This means working with city leaders to under...
No comments:
Post a Comment