-
Interesting discussion of how to use public-key encryption tools to create software serial numbers (and, incidentally, another object lesson in why SHA-1 being broken is important).
-
Security researchers, commissioned by the state of California, report that they can compromise each of three major e-voting systems in a number of different ways, including overwriting firmware and bypassing server clients to directly access the vote database.
This entry was posted
on Wednesday, August 1st, 2007 at 12:31 am and is filed under Links.
You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
Leave a Reply
If your comment doesn't appear right away, it was probably eaten by our spam-killing bot. If your comment was not, in fact, spam (and if you're actually reading this, it probably wasn't), please send me an email and I'll try to extricate your comment from our electronic spam purgatory.