Skip to main content

Every encryption have vulnerabilities and now WPA2 (WiFi Protecting Access 2) algorithm has vulnerabilities




Kimmo Huosionmaa

Again hackers have made a good job and broke secrecy of the WPA2 (WiFi Protecting Access 2) algorithm. What made this good work, is that they published that data so all Internet community can begin to create new kind of secrecy, or prepare themselves that their private data can be stolen from their secured WEB-drives.  That action shows that we must keep going with creating new methods of encrypting data and keep our privacy so strong, that nobody sees our private data what is sent over the net. But as you might know, real-life hacking is more difficult than something that happens in media. Almost every kind of encryption has weakened, and one thing what creates much more vulnerabilities is human. If a person uses too difficult passwords he or she might need to write it down or in worst case use a text file, where that person copy-pastes those marks to password line.


And what makes that thing vulnerable for the system, is that somebody might take the only photograph from the screen, when that person opens his or her text file. And the question is did he or she remember to shut down the big screen if that person is giving training lessons to some audience. In that case, could the hacker get password very easily, only thing what that person need is taken photograph in the right moment, and after that hacker could slip in the system. Worst hacker-style is social hacking. The simplest way is just to find a boss of that target company and pump that person full of sodium-Amytal when those attackers are only asked for the password from that man or woman.


In that method hackers just get one director's phone in their hands, and simply ask people passwords from the telephone, and if people won't warned about that kind of hacking, could hackers steal very much information from their target system. Sometimes users of the system ask micro support to install some programs on their workstations, and that could cause terrible situation if a hacker is a member of the micro support team. That could cause information leak where hacker simply copies hard disks information to their USB-memories, and that could be very harmful to business secrets.


In those scenarios, hackers slip a man inside the system. There they can steal information for years if somebody wouldn't see what that person does. But when we are talking about cracking algorithms with the mathematical method, we must remember that modern computers speed and power have been grown from days when that WPA2 algorithm have been created. That makes that security vulnerable for modern computers when they use "brute force" attack against the system.

https://crisisofdemocracticstates.blogspot.fi/

Comments

Popular posts from this blog

Antigravity will be the greatest thing. That we have ever created.

"Artistic depiction of a fictional anti-gravity vehicle" (Wikipedia, Anti-gravity) Sometimes, if the airships have the same lifting power as the weight of the airship.  It can act like some “antigravity system”. Those systems are based on lighter-than-air gas or hot air. The system can have a helium tank. And the hot-air section whose temperature can be adjusted using microwaves or particles that lasers warm. Those systems are faster to control than some gas flames. This makes it possible. To adjust the lifting power.  If a thing like a balloon has the same lifting power as its weight, the balloon can be lifted to a certain point and altitude. And the balloon stands at that point until something moves it. That kind of thing can make an impression. On the antigravity systems. Modern airships. Like Lockheed-Martin P-791 can look. Like a “UFO”. The system can use systems to move the craft. Or maybe those ion systems are used for plasma stealth systems, if those airships' mis...

The first test flight of X-59 QueSST

The X-59 QueSST (Quiet Supersonic Technology) demonstrator is the next generation of aircraft design. The QueSST technology means. The aircraft creates a gentler sonic boom. Because its wings are radically long and narrow delta wings, and its nose is also radically long, which makes the sonic pressure cone thinner. That technology makes the sonic boom quieter.  The QueSST technology in X-59 is a new and radical design. All of those systems are caricatures. And the final solutions might look far different than the prototypes. The QueSST technology is one of the things. That is planned to be used. It is used in military and civil applications. If that technology is successful. It can be used in manned and unmanned systems. But that requires more work.  The X-59 also uses fundamental technology. Where the pilot must not have windows. To see outside. The camera and other sensors replace traditional windows. And that can be useful in more advanced aircraft that operate at hypersoni...

The theory about paralleled universes

http://crisisofdemocracticstates.blogspot.fi/p/the-theory-about-paralleled-universes.html Kimmo Huosionmaa There is the quite unknown theory about paralleled universes. In this theory, there is not a single universe. Universes are like pearls in the pearl necklace, and there could be the connection between those universes. The connection to other universes would make possible the channel what is forming when the black hole would make the gravity tunnel to another universe. And in the paralleled universe theory, there could be millions of universes in the line, and this is also known as "Multiverse-theory". This theory was established when the galaxy-groups were noticed by astronomers. In that time were noticed that there are so-called super-groups of the galaxy, and those super-groups, where we're so much galaxy that galaxy involved stars made some cosmologists think that maybe there is also groups of universes in the emptiness. This kind of structures is so enormo...