Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: ntru Clear Filter

Tracking trust with Rust in the kernel

Tracking trust with Rust in the kernel Ready to give LWN a try? With a subscription to LWN, you can stay current with what is happening in the Linux and free-software community and take advantage of subscriber-only site features. We are pleased to offer you a free trial subscription, no credit card required, so that you can see for yourself. Please, join us! The Linux kernel has to handle many different sources of data that should not be trusted: user space, network connections, and removable

Tracking Trust with Rust in the Kernel

Tracking trust with Rust in the kernel Did you know...? LWN.net is a subscriber-supported publication; we rely on subscribers to keep the entire operation going. Please help out by buying a subscription and keeping LWN on the net. The Linux kernel has to handle many different sources of data that should not be trusted: user space, network connections, and removable storage, to name a few. The kernel has to remain secure even if one of these sends garbled (or malicious) data. Benno Lossin has b

Shadow IT Is Expanding Your Attack Surface. Here’s Proof

Shadow IT - the systems your security team doesn’t know about - is a persistent challenge. Policies may ban them, but unmanaged assets inevitably slip through. And if defenders don’t uncover them first, there’s always a risk attackers will. With just a few days of effort, Intruder’s security team uncovered multiple real-world examples of Shadow IT exposures: unsecured backups, open Git repositories, unauthenticated admin panels, and more. Every one of them contained highly sensitive data or cr

The X11 Security extension from the 1990s

blog - git - desktop - images - contact The X11 SECURITY extension from the 1990ies It's widely known that X11 has a problem with, for example, keyloggers. The issue is not that keyloggers are possible through security holes -- but keyloggers are trivial on X11, as they are part of normal operation and don't require exploits. It is one of the reasons why people push for Wayland. I recently came across the X11 SECURITY extension, which is part of a normal X.Org installation. Quick overview of

The X11 SECURITY extension from the 1990ies

blog - git - desktop - images - contact The X11 SECURITY extension from the 1990ies It's widely known that X11 has a problem with, for example, keyloggers. The issue is not that keyloggers are possible through security holes -- but keyloggers are trivial on X11, as they are part of normal operation and don't require exploits. It is one of the reasons why people push for Wayland. I recently came across the X11 SECURITY extension, which is part of a normal X.Org installation. Quick overview of

Parse, Don't Validate (For C)

Parse, Don’t Validate AKA Some C Safety Tips “A good programmer is someone who looks both ways before crossing a one-way street.” – Doug Linder Posted by Lelanthran 2025-03-27 If you’ve read the original post on “Parse, Don’t Validate” you may have noticed that it focuses primarily on conceptual correctness. Here, I’ll build on that by showing how this technique can be used outside of niche academic languages by demonstrating it in a language that is as practical as it is dangerous - C. In

Debunking NIST's calculation of the Kyber-512 security level (2023)

The cr.yp.to blog 2023.10.03: The inability to count correctly: Debunking NIST's calculation of the Kyber-512 security level. #nist #addition #multiplication #ntru #kyber #fiasco [Sidney Harris cartoon used with permission. Copyright holder: ScienceCartoonsPlus.com.] Quick, what's 240 plus 240? It's 280, right? No, obviously not. 40 plus 40 is 80, and 240 times 240 is 280, but 240 plus 240 is only 241. Take a deep breath and relax. When cryptographers are analyzing the security of cryptogra