We Need Bug Bounties for Bad Algorithms
In the age of algorithmic decision-making, we need to incentivize algorithmic auditors to become our new immune system. Continue reading We Need Bug Bounties for Bad Algorithms
Collaborate Disseminate
In the age of algorithmic decision-making, we need to incentivize algorithmic auditors to become our new immune system. Continue reading We Need Bug Bounties for Bad Algorithms
This is interesting: Creating these defenses is the goal of NIST’s lightweight cryptography initiative, which aims to develop cryptographic algorithm standards that can work within the confines of a simple electronic device. Many of the sensors, actuators and other micromachines that will function as eyes, ears and hands in IoT networks will work on scant electrical power and use circuitry… Continue reading NIST Issues Call for "Lightweight Cryptography" Algorithms
The ISO has rejected two symmetric encryption algorithms: SIMON and SPECK. These algorithms were both designed by the NSA and made public in 2013. They are optimized for small and low-cost processors like IoT devices. The risk of using NSA-designed ciphers, of course, is that they include NSA-designed backdoors. Personally, I doubt that they’re backdoored. And I always like seeing… Continue reading Two NSA Algorithms Rejected by the ISO
The ISO has rejected two symmetric encryption algorithms: SIMON and SPECK. These algorithms were both designed by the NSA and made public in 2013. They are optimized for small and low-cost processors like IoT devices. The risk of using NSA-designed ciphers, of course, is that they include NSA-designed backdoors. Personally, I doubt that they’re backdoored. And I always like seeing… Continue reading Two NSA Algorithms Rejected by the ISO
“Guess what, friends…. Facebook’s algorithm now chooses your 26 FB friends.” No, no it doesn’t. Continue reading Facebook HOAX! New algorithm will NOT only show you 26 friends
New graph theory research offers good news for privacy advocates, bad news for the FBI. Continue reading How to Hide Within a Social Network
Turns out that those sensors in your smartphone that do all kinds of cool, magical things like give you directions, find your friends, let your Uber or Lyft driver find you, and a host of other conveniences have a not-so-cool downside. Continue reading Sensor data can be used to guess your PIN, unlock your phone
NIST has organized a competition for public-key algorithms secure against a quantum computer. It recently published all of its Round 1 submissions. (Details of the NIST efforts are here. A timeline for the new algorithms is here.)… Continue reading Post-Quantum Algorithms
NIST has organized a competition for public-key algorithms secure against a quantum computer. It recently published all of its Round 1 submissions. (Details of the NIST efforts are here. A timeline for the new algorithms is here.)…
The post Post-Quan… Continue reading Post-Quantum Algorithms
It’s thought to be the first in the country to push for open sourcing of the algorithms used by courts, police and city agencies Continue reading New York to crack open its code, looking for bias