index threat vectors

[Link] Web trust dies in darkness: Hidden Certificate Authorities undermine public crypto infrastructure

Read: 22/11/2021 www.theregister.com

Security researchers have checked the web's public key infrastructure and have measured a long-known but little-analyzed security threat: hidden root Certificate Authorities. Certificate Authorities, or CAs, vouch for the digital certificates we use to establish trust online.

certificate authorities chain of trust cryptography cybersecurity fake identity fraud identity documents identity theft internet internet infrastructure mistaken identity public key crypto ssl stolen identity threat vectors university research unknown identity vulnerabilities web browsers


[Link] Research Center: Limiting Anonymity Helps to Expose Terrorists (and Pirates)

Read: 22/11/2021 torrentfreak.com

The International Center for Law and Economics believes that cloud hosting providers and related services should do more to deter illegal activity. Responding to an inquiry from the U.S.

8chan anonymisation antipiracy organisations bipartisan politics calls for bipartisanship cloud services copyright criminal investigation crypto exchanges cryptocurrency cryptocurrency regulation darknet iaas internet infrastructure lobbying mass shootings massacres mpa antipiracy piracy piracy as a service piracy court cases piracy hosts pseudonyms tech lobbying terror prosecution terrorism terrorist threats threat vectors threats tor torrentfreak us lobbying vpns


[Link] Trojan Source attack: Code that says one thing to humans tells your compiler something very different, warn academics

Read: 3/11/2021 www.theregister.com

Updated The way Unicode's UTF-8 text encoding handles different languages could be misused to write malicious code that says one thing to humans and another to compilers, academics are warning.

code compilers cyber hacks cyberpunk future cybersecurity dependency attack encryption github hidden in plain site infocalypse malicious software novel attacks optical illusion software software dependencies software development source code supply chains threat vectors trojan horse unicode unreliable source lol vulnerabilities