gitmo234
Line Up and Wait
I run it on Firefox all the time. No issues
I keep getting a security notice.
Secure Connection Failed
The connection to the server was reset while the page was loading.
The page you are trying to view cannot be shown because the authenticity of the received data could not be verified.
Please contact the website owners to inform them of this problem.
Maybe it is a setting in firefox.
I keep getting a security notice.
Secure Connection Failed
The connection to the server was reset while the page was loading.
The page you are trying to view cannot be shown because the authenticity of the received data could not be verified.
Please contact the website owners to inform them of this problem.
Maybe it is a setting in firefox.
As far as the password vaults go, they're a security problem waiting to happen, not good security. Encryption always gets cracked eventually. Ask the Germans.
I like their convenience, not their security.
That's the notice I was getting when I said that it was"crashing," and I was using Firefox.
What URL were you using? I use https://www.lmfsweb.afss.com/Website/ (via Chrome).
As far as the password vaults go, they're a security problem waiting to happen, not good security. Encryption always gets cracked eventually. Ask the Germans.
That's one of the things I'm worried about. It seems like it's setting up a "single point of failure."
The theory is that "eventually" occurs after your lifetime or the lifetime of the information you're trying to protect. DES had a good run and AES seems to be doing well so far.
I'm more concerned about system-level security rather than the encryption algorithm. If I were trying to hack you I'd attempt a bit of social engineering, perhaps facilitate a side-channel attack.
Eh, not quite Nate, Pretty much anyone that's protecting anything even barely important these days is using AES-128 at minimum but really AES-256.I do know it doesn't take much money to build a massive cracking farm with the use of dedicated GPUs and government has enough bucks to build and buy ASICs custom made for the job, but they don't really need them with a cluster of GPU laden machines. Let's just say someone I know, knows just how much heat load a typical server box can handle stuffed with "video" cards and how much cooling each rack of them needs.
Apples and Oranges. Yes, sites are using 2048 bit larger, some 4096 keys these days. That's not because something like AES-128 or AES-256 are broken that's because of the difference between asymmetric and symmetric encryption.denverpilot said:It's just a Cold War of compute horsepower vs key size at this point. Given enough time, they'll all be broken. Many sites are using 2048-bit or larger keys and I sure remember being told in the early part of my career that 64 or 128 bit would be plenty for personal encryption protection for a looooooong time.
I thought the first iterations of DES were cracked by distributed.net in the 90s and the answer was just to up the key length. Could be misremembering though.
Seen the info on who was involved in AES and how much of it wasn't peer-reviewed? That's the real attack vector... Lets just hope those involved keep whatever they did a true secret. Many very serious security researchers won't use it or combine it with something else treating it as if it's already backdoored.
To sum this all up, if you want to break a strong encryption like AES-256, even if you are the Feds, you're going to do so by stealing the key which will be a HELL of a lot easier than brute forcing which really isn't an option no matter how much money you have.
I clicked on a post about VFR weather and somehow ended up reading a rant about encryption.