[Cryptography] quantum computers & crypto
Christian Huitema
huitema at huitema.net
Mon Nov 1 21:32:41 EDT 2021
On 11/1/2021 3:19 PM, cherry wrote:
> Well, when originally written into the protocol decades ago they were
> most useful for state level actors, but today, they are in reach of
> everyone. Today, if you want to do a ransomware attack against a
> business, first you go on a wardrive, collect a pile of passwords,
> look for wifi networks of interesting businesses, and then start
> hacking their network from the inside. You will find plenty of
> information in the clear on the inside to mount a spearfishing attack,
> not to mention you will be able to collect a pile of hashes of
> passwords used on the internal network, and then find a pile of
> administrative passwords.
The most serious flaw shown here is the delusion that "inside" is more
secure than "outside". The good old crunchy on the outside, chewy on the
inside... If you are not managing your network with the assumption that
the barbarians are already inside, then you are setting yourself for
trouble.
-- Christian Huitema
More information about the cryptography
mailing list