Skip to main content

Every encryption have vulnerabilities and now WPA2 (WiFi Protecting Access 2) algorithm has vulnerabilities




Kimmo Huosionmaa

Again hackers have made a good job and broke secrecy of the WPA2 (WiFi Protecting Access 2) algorithm. What made this good work, is that they published that data so all Internet community can begin to create new kind of secrecy, or prepare themselves that their private data can be stolen from their secured WEB-drives.  That action shows that we must keep going with creating new methods of encrypting data and keep our privacy so strong, that nobody sees our private data what is sent over the net. But as you might know, real-life hacking is more difficult than something that happens in media. Almost every kind of encryption has weakened, and one thing what creates much more vulnerabilities is human. If a person uses too difficult passwords he or she might need to write it down or in worst case use a text file, where that person copy-pastes those marks to password line.


And what makes that thing vulnerable for the system, is that somebody might take the only photograph from the screen, when that person opens his or her text file. And the question is did he or she remember to shut down the big screen if that person is giving training lessons to some audience. In that case, could the hacker get password very easily, only thing what that person need is taken photograph in the right moment, and after that hacker could slip in the system. Worst hacker-style is social hacking. The simplest way is just to find a boss of that target company and pump that person full of sodium-Amytal when those attackers are only asked for the password from that man or woman.


In that method hackers just get one director's phone in their hands, and simply ask people passwords from the telephone, and if people won't warned about that kind of hacking, could hackers steal very much information from their target system. Sometimes users of the system ask micro support to install some programs on their workstations, and that could cause terrible situation if a hacker is a member of the micro support team. That could cause information leak where hacker simply copies hard disks information to their USB-memories, and that could be very harmful to business secrets.


In those scenarios, hackers slip a man inside the system. There they can steal information for years if somebody wouldn't see what that person does. But when we are talking about cracking algorithms with the mathematical method, we must remember that modern computers speed and power have been grown from days when that WPA2 algorithm have been created. That makes that security vulnerable for modern computers when they use "brute force" attack against the system.

https://crisisofdemocracticstates.blogspot.fi/

Comments

Popular posts from this blog

There is a suggestion that dark matter may have deformed another universe.

The researchers suggest that dark matter is the deformed dark universe. Or in the most exciting theories, dark matter is the dark universe inside our universe. In that theory dark matter is entangled with the visible material. That theory is taken from the multiverse theory. There our visible universe is one of many universes. The other universes can be invisible because their electrons and quarks are different sizes. And that thing makes those other universes invisible to us.  Another hypothesis is that the hypothetical other universes send radiation that radiation from our universe pushes away. Things like invisible 9th. planet causes ideas that maybe there is another universe in our universe. The thing that makes the mysterious dark matter interesting is that. The dark matter can form structures that can be similar to visible material. But those structures are not visible.  The multiverse theory is not new. The thing in that theory is that there are multiple universes at this moment

The neuroscientists get a new tool, the 1400 terabyte model of human brains.

"Six layers of excitatory neurons color-coded by depth. Credit: Google Research and Lichtman Lab" (SciteechDaily, Harvard and Google Neuroscience Breakthrough: Intricately Detailed 1,400 Terabyte 3D Brain Map) Harvard and Google created the first comprehensive model of human brains. The new computer model consists of 1400 terabytes of data. That thing would be the model. That consists comprehensive dataset about axons and their connections. And that model is the path to the new models or the human brain's digital twins.  The digital twin of human brains can mean the AI-based digital model. That consists of data about the blood vessels and neural connections. However, the more advanced models can simulate electric and chemical interactions in the human brain.  This project was impossible without AI. That can collect the dataset for that model. The human brain is one of the most complicated structures and interactions between neurotransmitters, axons, and the electrochemica

Nano-acoustic systems make new types of acoustic observation systems possible.

' Acoustic diamonds are a new tool in acoustics.  Another way to make very accurate soundwaves is to take a frame of 2D materials like graphene square there is a hole. And then electrons or laser beams can make that structure resonate. Another way is to use the electromagnetic field that resonates with the frame and turns electromagnetic energy into an oscillation in the frame.  Nano-acoustic systems can be the next tool for researching the human body. The new sound-wave-based systems make it possible to see individual cells. Those soundwave-based systems or nano-sonars are tools that can have bigger accuracy. Than ever before. The nano-sonar can use nanodiamonds or nanotubes as so-called nano-LRAD systems that send coherent sound waves to the target. In nanotube-based systems, the nanotube can be in the nanodiamond.  The term acoustic diamond means a diamond whose system oscillates. The system can create oscillation sending acoustic or electromagnetic waves to the diamond. Diamond