Thursday, September 17, 2015

::facepalm::

::facepalm::

This is why you don't build backdoors into your encryption algorithms.

Originally shared by Kirill Grouchnikov

The TSA is learning a basic lesson of physical security in the age of 3-D printing: If you have sensitive keys—say, a set of master keys that can open locks you’ve asked millions of Americans to use—don’t post pictures of them on the Internet.

A group of lock-picking and security enthusiasts drove that lesson home Wednesday by publishing a set of CAD files to Github that anyone can use to 3-D print a precisely measured set of the TSA’s master keys for its “approved” locks—the ones the agency can open with its own keys during airport inspections. Within hours, at least one 3-D printer owner had already downloaded the files, printed one of the master keys, and published a video proving that it opened his TSA-approved luggage lock.
http://www.wired.com/2015/09/lockpickers-3-d-print-tsa-luggage-keys-leaked-photos

No comments:

Post a Comment

In 1976 (yes, 1976), I heard my professor, one Don Norman, say pretty much the same thing.

In 1976 (yes, 1976), I heard my professor, one Don Norman, say pretty much the same thing. https://www.fastcompany.com/90202172/why-bad-tech...