heiglandreas, to random
@heiglandreas@phpc.social avatar

Hey : Go home and read up on secure passwords at https://pages.nist.gov/800-63-3/sp800-63b.html#-5112-memorized-secret-verifiers!

But what does know about such things. You are for sure much more knowledgeable!

jela, to passkeys German
@jela@social.tchncs.de avatar

Das hat ihre Richtlinien zur digitalen Identität für die Verwendung von ergänzt. US-Behörden können synchronisierbare und gerätegebundene Passkeys verwenden, um eine Phishing-resistente zu ermöglichen.
https://www.nist.gov/blogs/cybersecurity-insights/giving-nist-digital-identity-guidelines-boost-supplement-incorporating

ErikJonker, to ai
@ErikJonker@mastodon.social avatar

Concept NIST publication,
"Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile" , at first glance, nothing spectacular, common themes/elements.
https://airc.nist.gov/docs/NIST.AI.600-1.GenAI-Profile.ipd.pdf

abucci, to ai
@abucci@buc.ci avatar

NIST staffers revolt against expected appointment of ‘effective altruist’ AI researcher to US AI Safety Institute

The National Institute of Standards and Technology (NIST) is facing an internal crisis as staff members and scientists have threatened to resign over the anticipated appointment of Paul Christiano to a crucial, though non-political, position at the agency’s newly-formed US AI Safety Institute (AISI), according to at least two sources with direct knowledge of the situation, who asked to remain anonymous.

https://venturebeat.com/ai/nist-staffers-revolt-against-potential-appointment-of-effective-altruist-ai-researcher-to-us-ai-safety-institute/

Good for them! / / people are cultists and have no place in government. They're obsessed with fantasies like that are disconnected from reality and distract from the actual harms is already causing here on Earth. It's precisely the same phenomenon as holding endless discussions about how many angels can dance on the head of a pin while ignoring that people are suffering. It sounds like Secretary of Commerce Gina Raimondo might be a Kool-aid drinker herself or is sympathetic to the viewpoints of the Kool-aid drinkers.

From her Wikipedia entry:

Gina Marie Raimondo...an American businesswoman, lawyer, politician, and venture capitalist

Emphasis mine.

It's alarming that this is even happening, and you know the fix is in because they tried to rush the appointment without informing staffers ahead of time. I hope staffers prevail.

cc: @timnitGebru @xriskology

bwaber, to random
@bwaber@hci.social avatar

The rain didn't stop until late today, but I was still able to get in some talks for my ! (1/14)

bwaber,
@bwaber@hci.social avatar

Next was an excellent conversation with Bryan Choi on the problems and potential with NIST's software/AI frameworks and how they relate to NIST's historic evolution on @lawfare's podcast https://www.youtube.com/watch?v=_bO6Ja8cuCA (4/14)

infosec_jobs, to infosec
@infosec_jobs@mastodon.social avatar
bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Good morning, Brussels! Start of

bortzmeyer,
@bortzmeyer@mastodon.gougere.fr avatar

@jeanmimi They are doing a fine job, this sort of thing takes time, and there is no emergency.

pglpm, to random
@pglpm@emacs.ch avatar
patrickcmiller, to random

Hundreds of network operators’ credentials found circulating in Dark Web https://securityaffairs.com/158329/cyber-crime/network-operators-credentials-found-in-dark-web.html

vrtrooper99,

@patrickcmiller just another reminder that even though #MFA can be and should be enabled, it can also be #misconfigured or #disabled. MFA should not be a #backstop for unchanged #passwords. People need to change their passwords regularly. #NIST 800-63b was #wrong and badly #misinterpreted.

adminmagazine, to ai
@adminmagazine@hachyderm.io avatar
rushfanatic, to Ansible

So I'm going down the Ansible rabbit-hole. (Disclaimer: majority of my career has been in win32 environments). I have several Linux servers that need to be NIST compliant, and was looking at using Ansible to push out STIG configurations.

Any advice, recommendations, or tips that this esteemed community can provide would be most appreciated.

gtbarry, to ArtificialIntelligence
@gtbarry@mastodon.social avatar

Adversaries can deliberately confuse or even “poison” artificial intelligence (AI) systems to make them malfunction — and there’s no foolproof defense that their developers can employ.

datasets used to train an AI are far too large for people to successfully monitor and filter, there is no foolproof way as yet to protect AI from misdirection

https://www.nist.gov/news-events/news/2024/01/nist-identifies-types-cyberattacks-manipulate-behavior-ai-systems

nono2357, to random
itnewsbot, to medical
@itnewsbot@schleuss.online avatar

US agency tasked with curbing risks of AI lacks funding to do the job - Enlarge / They know... (credit: Aurich / Getty)

US president J... - https://arstechnica.com/?p=1992640

realn2s, (edited ) to microsoft

I'm not sure if I get something wrong, but I think ID Protection is complete rubbish. E.g. when ban weak passwords with the ominous 5 points rule the results seem to be completely arbitrary.

Microsoft speaks of including commonly used weak or compromised passwords in their Global banned password list. But the list isn't based on any external data source, so leaked passwords not leaked by Microsoft are not included 🤡​.

This leads to:
Known leaked passwords are accepted. Location name plus year is accepted. Dictionary word plus year is accepted!!!

Not sure if this applies only to German dictionary words.

It gets even worse. Reading the documentation, I found "Characters not allowed: Unicode characters" WTF

Coming back to the weird point system. A banned password is not really banned, it gives you "only" 1 point (and you need five).

This leads to the question how many points do none-banned words give?

If you think it can't get worse, you're wrong! It looks like each character of a none-banned word gives one point. Meaning "password1234" is an accepted password. (1 point for password and 4 for each digit)

Or a real life example: The attach which affected Microsoft, US government agency and countless other organizations world wide, was cause by a weak FTP server password.
Namely "solarwinds123", which would be accepted by ID Protection (1 point each for "solar" and "wind", 3 points for the numbers. If "solarwinds" would be on the custom banned list, "solarwind1234" would have been enough.

And you can't do anything against it.

I actually hope that the documentation is somewhat wrong and that "123" is not 3 points but 1 as it are consecutive numbers. But this would make it only marginal better (2023

realn2s,

Moving on to in general

Microsoft offers the following Password Guidance
https://www.microsoft.com/en-us/research/publication/password-guidance/

Side note, the PDF contains no (visible) version information or date :-(
Please, if you publish guidance, especially if you are an influential company, include a date in your documents. I treat a guidance form 2016 differently than a guidance from 2023

Back to the recommendations. Most of the are solid but some stick out

  1. Maintain an 8-character minimum

That seem awfully short. states "Longer is better", the recomend 15+ characters and, wait for it Microsoft themself recommends 12 or better 14+ characters.

  1. Ban common passwords, to keep the most vulnerable passwords out of your system.

The NIST recommendation check against "commonly used and compromised passwords" considerably extends this!

Microsoft at other places recommends "Not a word that can be found in a dictionary or the name of a person, character, product, or organization."

  1. Educate your users not to re-use their password for non-work-related purposes.

Work related reuse is OK????

I would love to know if internally really follows these password rule. Or if they enforce a more strict set. If anyone knows about this, please let me know (but don't if this would gt you fired)

BTW, the other place were Microsoft recommends a different/stronger set of password rules is here (gain no date):
https://support.microsoft.com/en-us/windows/create-and-use-strong-passwords-c5cebb49-8c53-4f5e-2bc4-fe357ca048eb

init_6_, to security

I'm sure everyone's seen the 'hiring gaps' and layoffs but what's been your experience getting an infosec/cybersecurity/hacker job? Did you transition careers? What's the good, bad, ugly, roadblocks, whatever?

2023 Global Cybersec Workforce = 5,452,732 ✅

2023 Global Cybersec Workforce Gap = 3,999,964 ❌

  • What got you interested in infosec/cybersecurity/hacking gigs?

  • What's your 'why' for selecting this industry?

  • Any crazy hurdles or frustrating moments?

  • How are you learning the ropes, especially if you came from a completely different background?

  • Any specific training that helped you on your way?

  • What have interviews been like?

  • Anything weird that you never expected? Did your expectations match the industry?

  • How's the job market for these roles?

Most importantly....what would have made the process easier? For research purposes exclusively 😅

djb, to random
@djb@cr.yp.to avatar

New blog post: "Reducing 'gate' counts for Kyber-512: Two algorithm analyses, from first principles, contradicting NIST's calculation." https://blog.cr.yp.to/20231023-clumping.html #xor #popcount #gates #memory #clumping Also via Cloudflare given the frequent DoS attacks: https://blog-cr-yp-to.viacache.net/20231023-clumping.html

cazabon,

@djb

djb - DuckDuckGo it if you aren't familiar - in his most recent blog post about the NIST standardization efforts for next-gen cryptography shows, quite clearly, how badly botched their . But perhaps more importantly, they have resisted all efforts to correct their mistake(s), or even acknowledge them.

I found it much easier to comprehend than his previous post. If you're interested in and aren't scared of a little :

https://blog.cr.yp.to/20231023-clumping.html

cazabon,

@djb

This less-than-transparent behaviour on the part of , when added to all their trying to obscure the deep involvement of the in the competition, instead attributing NSA's work to NIST itself, is troubling.

To a conspiratorially-minded person, Occam's Razor might suggest that it was NSA's to get the world to on that is much than claimed - i.e., encryption that they know they can already .

Shades of ...

gnyman, to random

I was looking at the NIST CSF 2.0 draft wondering why there was so little comments for such an important document ... only 26?

But then I saw that there has indeed been quite a few comments at earlier opportunitues (during the concept paper etc). And it seems to include comments from most of the big organisations.

But it still seems like such an important document would and should have more comments. I mean a viral infosec thread on any social media probably has a magnitude more comments...

https://csrc.nist.gov/pubs/cswp/29/the-nist-cybersecurity-framework-20/ipd

Screenshot of the list of people or organisations who commented on the concept paper.

nil, to Lisp
@nil@functional.cafe avatar

Did all the other people know about from ? I only stumbled upon it whilst searching for a process network definition language. Not exactly what I had in mind but pleasantly surprised to see !
https://nvlpubs.nist.gov/nistpubs/Legacy/IR/nistir6459.pdf

heiseonline, to news German

NSA: Kryptologe warnt vor Unterwanderung quantengesicherter Verschlüsselung

Die US-Normungsbehörde NIST hat sich beim Einschätzen der Stärke des Post-Quanten-Systems Kyber-512 völlig verrechnet. Der Experte Dan Bernstein ist besorgt.

https://www.heise.de/news/NSA-Kryptologe-warnt-vor-Unterwanderung-quantengesicherter-Verschluesselung-9334827.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege

johnl, to security
@johnl@mastodon.social avatar

NIST "botched" security analysis of Kyber in order to ensure it's selection, have kept the reasons secret and also happen to be working with the NSA. Doesn't look great does it: https://blog.cr.yp.to/20231003-countcorrectly.html

exa, to random
@exa@mastodon.online avatar
pludikovsky, to random
@pludikovsky@chaos.social avatar

So… apparently "accidentally" overestimated the cryptographic strength of (a post-quantum cipher candidate), quite likely because of influence.

https://blog.cr.yp.to/20231003-countcorrectly.html

osma, to random
@osma@mas.to avatar

While other messengers like Matrix/Element have only recently rolled out E2EE at all, Telegram continuing to pretend that encrypting only some comms, and those with proprietary algorithms is enough, and others like Mastodon just don't even try, Signal is now rolling out post-quantum cryptography with an upgrade to what they call PQXDH.

Now the rest of us would just have to trust that this time, NIST specs haven't been spiked with backdoors..

https://signal.org/blog/pqxdh/

osma,
@osma@mas.to avatar

I guess my idle suspicion regarding post-quantum cryptographic algorithm standards wasn't entirely idle, after all...

https://www.newscientist.com/article/2396510-mathematician-warns-us-spies-may-be-weakening-next-gen-encryption/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • tacticalgear
  • cubers
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • osvaldo12
  • ngwrru68w68
  • GTA5RPClips
  • provamag3
  • InstantRegret
  • everett
  • Durango
  • cisconetworking
  • khanakhh
  • ethstaker
  • tester
  • anitta
  • Leos
  • normalnudes
  • modclub
  • megavids
  • lostlight
  • All magazines