this post was submitted on 07 Aug 2025
26 points (100.0% liked)

Pulse of Truth

1457 readers
41 users here now

Cyber Security news and links to cyber security stories that could make you go hmmm. The content is exactly as it is consumed through RSS feeds and wont be edited (except for the occasional encoding errors).

This community is automagically fed by an instance of Dittybopper.

founded 2 years ago
MODERATORS
 

Researchers found that an encryption algorithm likely used by law enforcement and special forces can have weaknesses that could allow an attacker to listen in.

top 3 comments
sorted by: hot top controversial new old
[–] DahGangalang@infosec.pub 5 points 2 days ago

bUt ItS mIlITaRy GrAdE eNcRyPtIoN!!1!

[–] LodeMike@lemmy.today 3 points 2 days ago* (last edited 2 days ago)

found that at least one implementation of the end-to-end encryption solution endorsed by ETSI has a similar issue that makes it equally vulnerable to eavesdropping. The encryption algorithm used for the device they examined starts with a 128-bit key, but this gets compressed to 56 bits before it encrypts traffic, making it easier to crack. It’s not clear who is using this implementation of the end-to-end encryption algorithm, nor if anyone using devices with the end-to-end encryption is aware of the security vulnerability in them.

STOP DOING THIS. Just like.... Stop doing it. I thought this would be a MITM handshake thing but no. Use your brain. 128 bits of entropy minimum. 56 bits is a million CPU seconds at 1Billion gesses a second.