Skip to main content

Every encryption have vulnerabilities and now WPA2 (WiFi Protecting Access 2) algorithm has vulnerabilities




Kimmo Huosionmaa

Again hackers have made a good job and broke secrecy of the WPA2 (WiFi Protecting Access 2) algorithm. What made this good work, is that they published that data so all Internet community can begin to create new kind of secrecy, or prepare themselves that their private data can be stolen from their secured WEB-drives.  That action shows that we must keep going with creating new methods of encrypting data and keep our privacy so strong, that nobody sees our private data what is sent over the net. But as you might know, real-life hacking is more difficult than something that happens in media. Almost every kind of encryption has weakened, and one thing what creates much more vulnerabilities is human. If a person uses too difficult passwords he or she might need to write it down or in worst case use a text file, where that person copy-pastes those marks to password line.


And what makes that thing vulnerable for the system, is that somebody might take the only photograph from the screen, when that person opens his or her text file. And the question is did he or she remember to shut down the big screen if that person is giving training lessons to some audience. In that case, could the hacker get password very easily, only thing what that person need is taken photograph in the right moment, and after that hacker could slip in the system. Worst hacker-style is social hacking. The simplest way is just to find a boss of that target company and pump that person full of sodium-Amytal when those attackers are only asked for the password from that man or woman.


In that method hackers just get one director's phone in their hands, and simply ask people passwords from the telephone, and if people won't warned about that kind of hacking, could hackers steal very much information from their target system. Sometimes users of the system ask micro support to install some programs on their workstations, and that could cause terrible situation if a hacker is a member of the micro support team. That could cause information leak where hacker simply copies hard disks information to their USB-memories, and that could be very harmful to business secrets.


In those scenarios, hackers slip a man inside the system. There they can steal information for years if somebody wouldn't see what that person does. But when we are talking about cracking algorithms with the mathematical method, we must remember that modern computers speed and power have been grown from days when that WPA2 algorithm have been created. That makes that security vulnerable for modern computers when they use "brute force" attack against the system.

https://crisisofdemocracticstates.blogspot.fi/

Comments

Popular posts from this blog

Use virtual "perpetual motion machines" and seawater as energy sources.

   Use virtual "perpetual motion machines"  and seawater as energy sources.  The Archimedean screw can offer almost endless energy sources.  "Robert Fludd's 1618 "water screw" perpetual motion machine from a 1660 wood engraving. It is widely credited as the first attempt to describe such a device." (Wikipedia/Perpetual motion) The term "virtual perpetual motion machine" means a machine. That pulls water to the upper tank using a capillary tube. Then that water will fall through the generator or turbine wheel. The machine uses differences in pressure levels. But it looks like a "perpetual motion machine", that is impossible because of laws of thermodynamics.  The machine uses differences in pressure levels. But it looks like a " real perpetual motion machine", which is impossible because of the laws of thermodynamics.  The real perpetual motion machines don't use outside energy. And that's why they are not possible....

Will humans survive the sun's red giant stage?

"As the Sun matures into a Red Giant, the oceans will boil and Earth will become uninhabitable." (The Conversation, The sun won’t die for 5 billion years, so why do humans have only 1 billion years left on Earth?) Sooner or later, all stars use their hydrogen. And then they turn into red giants. Sun is a yellow G spectral class star that turns into a white dwarf. But before that, the sun will turn larger.  The sun turns red and that means. It starts to send more infrared radiation. This thing will turn Earth into a hellish temperature that vaporizes water from Earth.  It's possible. That Earth will also vaporize with Venus and Mercury. Some scientists say that we have only 1 billion years to move farther in the solar system. The habitable zone will go to the distance of Jupiter and Saturn, and maybe humans find a safe place in those distant moons.  It's possible that before Sun will grow too large humans make large groups of mirror satellites or large shields that sho...

Metamaterials can change their properties in an electric- or electro-optical field.

"Researchers have created a novel metamaterial that can dynamically tune its shape and properties in real-time, offering unprecedented adaptability for applications in robotics and smart materials. This development bridges the gap between current materials and the adaptability seen in nature, paving the way for the future of adaptive technologies. Credit: UNIST" (ScitechDaily, Metamaterial Magic: Scientists Develop New Material That Can Dynamically Tune Its Shape and Mechanical Properties in Real-Time) Metamaterials can change their properties in an electric- or electro-optical field.  An electro-optical activator can also be an IR state, which means. The metamorphosis in the material can thermally activate.  AI is the ultimate tool for metamaterial research. Metamaterials are nanotechnical- or quantum technical tools that can change their properties, like reflection or state from solid to liquid when the electric or optical effect hits that material. The metamaterial can cru...