Online text binning tool

I was doing my crypto homework and found that there was no text binning tool available online. Hence, I decided to write my own. A text binning tool is useful for: Encryption using a rail cipher Cryptanalysis of a vigenere cipher after you know the key length - useful to separate each bin so ...

Public Private Partnerships in Cybersecurity

Living in DC has accorded me a number of privileges. Chief among them is the proximity to government offices as well as many NGOs. I am literally walking distance away from their offices. As a result, I have attended a number of press conferences and panel discussions led by current and former ...

On Physical Authentication

Recently, I moved into a new environment and had the opportunity to witness a number of processes. This experience further reinforced in me the importance of policies over technical measures. Physical authentication is simple compared to its online equivalent. For a small sized population, we ...

Dumping Aztech DSL1015EN firmware

Recently, I had the fortune to come across a spare DSL1015EN router cum modem. After dismantling the external case, this is what the internals look like. On the left, we can see 2 u.fl connectors for the antennaes. If I wanted to, I could get a RP-SMA adapter and hook up some 9-dbi antennaes ...

Cloning Mifare 1K cards

Disclaimer : The information provided here is solely for educational purposes. The system I would be looking at is the ST Electronics' ST8100 Securnet. This is an integrated security management system that includes an access control module that manages physical access to facilities. One of the ...

A different kind of birthday attack

Considering how many people actually use their birthday as their ATM pin, this is bad from a security standpoint.

Flaws of a single ecosystem

The post is triggered by the recent leak of celebrity nude photos. Apple has claimed that the iCloud ecosystem is secure and the leak was the result of targeted attempts. Nevertheless, they eventually decided to tighten the security of the ecosystem. This is not an isolated incident as I ...

Problems with Distributed Architecture

As reported here, a bitcoin mining pool has contributed 51% of total hashing output which theoretically allows them to double spend bitcoins or to deny other miner's transactions. I am not an expert at bitcoins but it appears that the distributed architecture is a crucial feature in ensuring ...