No, not exactly. The SHA-1 hashing algorithm still does what it is supposed to do. SHA-1 creates an unpredictable 20 byte “fingerprint” of the data input into the function, in this case a web server certificate. It is the unpredictability of the output that makes cryptographic hash functions so useful. … Continue reading
Search this site
Check out my other project…
- Create an EC2 that runs Chrome for sandboxed websurfing
- Check Multiple AWS S3 Buckets for Missing Default Encryption
- The Equifax Data Breach and the Apache Struts Vulnerability
- Test Early, Test Often
- Linux Hardening
- Information Security at Startup Companies
- Timestamp bash_history with every command
- Has SHA-1 been hacked?
Data Localization Laws And Their Impact on Privacy, Data Security And the Global Economy (start on page 109 of PDF)
Buzzword alert: "War Cloud"
Google Cloud is suffering a serious outage with services affected including Nest, Kubernetes and more. Issue is global in scale. What we know thus-far. https://www.cbronline.com/news/google-cloud-down #GCPdown #Nest #Kubernetes