lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 13 Nov 2017 12:57:06 +0100
From: Security Explorations <contact@...urity-explorations.com>
To: bugtraq@...urityfocus.com, fulldisclosure@...lists.org
Subject: [FD] [SE-2011-01] Some ideas regarding security of ST DVB chipsets


Hello All,

We decided to release a short document revealing some of the unexplored
ideas we had with respect to security of ST DVB chipsets:

http://www.security-explorations.com/materials/se-2011-01_ideas.pdf

We appreciate any feedback, especially the one regarding the feasibility
to conduct the described crypto attack (this bothered us for years, but
unfortunately we lack expertise in breaking real life crypto and crypto
analysis in particular to properly evaluate if it all makes any sense -
we are usually lucky to find some way around crypto through SW loopholes).

Additionally, we decided to reveal some of our experiences regarding SAT
TV ecosystem as well. This can be found in the "Final words" section of
the aforementioned document and our updated FAQ:

http://www.security-explorations.com/materials/se-faq.pdf

Thank you.

Best Regards,
Adam Gowdiak

---------------------------------------------
Security Explorations
http://www.security-explorations.com
"We bring security research to the new level"
---------------------------------------------


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ