Skip to main content

Every encryption have vulnerabilities and now WPA2 (WiFi Protecting Access 2) algorithm has vulnerabilities




Kimmo Huosionmaa

Again hackers have made a good job and broke secrecy of the WPA2 (WiFi Protecting Access 2) algorithm. What made this good work, is that they published that data so all Internet community can begin to create new kind of secrecy, or prepare themselves that their private data can be stolen from their secured WEB-drives.  That action shows that we must keep going with creating new methods of encrypting data and keep our privacy so strong, that nobody sees our private data what is sent over the net. But as you might know, real-life hacking is more difficult than something that happens in media. Almost every kind of encryption has weakened, and one thing what creates much more vulnerabilities is human. If a person uses too difficult passwords he or she might need to write it down or in worst case use a text file, where that person copy-pastes those marks to password line.


And what makes that thing vulnerable for the system, is that somebody might take the only photograph from the screen, when that person opens his or her text file. And the question is did he or she remember to shut down the big screen if that person is giving training lessons to some audience. In that case, could the hacker get password very easily, only thing what that person need is taken photograph in the right moment, and after that hacker could slip in the system. Worst hacker-style is social hacking. The simplest way is just to find a boss of that target company and pump that person full of sodium-Amytal when those attackers are only asked for the password from that man or woman.


In that method hackers just get one director's phone in their hands, and simply ask people passwords from the telephone, and if people won't warned about that kind of hacking, could hackers steal very much information from their target system. Sometimes users of the system ask micro support to install some programs on their workstations, and that could cause terrible situation if a hacker is a member of the micro support team. That could cause information leak where hacker simply copies hard disks information to their USB-memories, and that could be very harmful to business secrets.


In those scenarios, hackers slip a man inside the system. There they can steal information for years if somebody wouldn't see what that person does. But when we are talking about cracking algorithms with the mathematical method, we must remember that modern computers speed and power have been grown from days when that WPA2 algorithm have been created. That makes that security vulnerable for modern computers when they use "brute force" attack against the system.

Comments

Popular posts from this blog

MIT's tractor beam can make the new types of SASER systems possible

   "This chip-based "tractor-beam," which uses an intensely focused beam of light to capture and manipulate biological particles without damaging the cells, could help biologists study the mechanisms of diseases."(Interesting Engineering, MIT’s Star Wars-inspired ‘tractor beam’ uses light to capture, manipulate cells) MIT's tractor beam can make the new types of SASER systems possible. The tractor beam just hovers the nanoparticle in air or medium, and then the laser or some other electromagnetic system transports oscillation into those particles. The ability to make cells and other particles hover in the system makes it possible to create particles whose energy level or resonance frequencies are accurately calculated things.  That thing makes it possible to create things that transmit wave movement accurately and cleanly. This is one version of the use of a tractor beam. Modern tractor beams are like acoustic tweezers where sound waves lock the object in its cr

The new observations tell that the thunderstorms form gamma-rays. That could make gamma-ray lasers possible.

  "An illustration of NASA’s research plane ER-2 flying over thunderstorms. Credit: University of Bergen / Mount Visual (CC BY 4.0), edited" (ScitechDaily, Surprising Discovery: NASA’s Retrofitted U2 Spy Plane Reveals Tropical Lightning Storms Are Radioactive) The new observations tell that the thunderstorms form gamma-rays. That could make gamma-ray lasers possible. The process has been observed by the NASA (Lockheed) ER-2 research plane, which is a modified U-2 spy plane. The gamma-ray formation in thunderstorms. Where lightning and electric fields release electrons that impact the air molecules and water droplets is an interesting thing. That thing opens the route to solving many mysteries.  "The general physics behind how thunderstorms create high-energy flashes of gamma radiation is not a mystery. As thunderstorms develop, swirling drafts drive water droplets, hail, and ice into a mixture that creates an electric charge much like rubbing a balloon on your shirt. Pos

Chinese innovations and space lasers are interesting combinations.

Above: "Tiangong is China's operational space station located in low Earth orbit. (Image credit: Alejomiranda via Getty Images)" (Scpace.com, China's space station, Tiangong: A complete guide) Chinese are close to making nuclear-powered spacecraft.  Almost every day, we can read about Chinese technical advances. So are, the Chinese more innovative than Western people? Or is there some kind of difference in culture and morale between Western and Chinese societies? The Chinese superiority in hypersonic technology is one of the things that tells something about the Chinese way of making things.  In China, the mission means. And the only thing that means is mission. That means that things like budgets and safety orders are far different from Western standards. If some project serves the Chinese communist party and PLA (People's Liberation Army) that guarantees unlimited resources for those projects. Chinese authorities must not care about the public opinion.  If we th