<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 24 Apr 2026 23:24:54 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Entropy”</title>
    <link>https://techsnap.systems/tags/entropy</link>
    <pubDate>Fri, 23 Aug 2019 00:00:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>410: Epyc Encryption</title>
  <link>https://techsnap.systems/410</link>
  <guid isPermaLink="false">31d2ecad-fd20-405f-bbbe-e2e6bc566e0c</guid>
  <pubDate>Fri, 23 Aug 2019 00:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/31d2ecad-fd20-405f-bbbe-e2e6bc566e0c.mp3" length="36093724" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>It's CPU release season and we get excited about AMD's new line of server chips. Plus our take on AMD's approach to memory encryption, and our struggle to make sense of Intel's Comet Lake line.</itunes:subtitle>
  <itunes:duration>50:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>It's CPU release season and we get excited about AMD's new line of server chips. Plus our take on AMD's approach to memory encryption, and our struggle to make sense of Intel's Comet Lake line.
Also, a few Windows worms you should know about, the end of the road for EV certs, and an embarrassing new Bluetooth attack. 
</description>
  <itunes:keywords>AMD, AMD rome, amd epyc, CPU, intel, comet lake, ice lake, cpu benchmarks, SGX, SEV, SEM, security, encryption, virtualization, memory encryption, intel me, amd psp, windows, text services framework, ctftool security, bluekeep, rdp, vulnerabilities, worms, bluetooth, entropy, bruteforce, KNOB, knob attack, https, ssl, tls, ev certs, extended validation, ssl certifications, certificate lifespace, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s CPU release season and we get excited about AMD&#39;s new line of server chips. Plus our take on AMD&#39;s approach to memory encryption, and our struggle to make sense of Intel&#39;s Comet Lake line.</p>

<p>Also, a few Windows worms you should know about, the end of the road for EV certs, and an embarrassing new Bluetooth attack.</p><p>Links:</p><ul><li><a title="A detailed look at AMD’s new Epyc “Rome” 7nm server CPUs | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/08/a-detailed-look-at-amds-new-epyc-rome-7nm-server-cpus/">A detailed look at AMD’s new Epyc “Rome” 7nm server CPUs | Ars Technica</a> &mdash; The short version of the story is, Epyc "Rome" is to the server what Ryzen 3000 was to the desktop—bringing significantly improved IPC, more cores, and better thermal efficiency than either its current-generation Intel equivalents or its first-generation Epyc predecessors.</li><li><a title="AMD Rome Second Generation EPYC Review: 2x 64-core Benchmarked" rel="nofollow" href="https://www.anandtech.com/show/14694/amd-rome-epyc-2nd-gen">AMD Rome Second Generation EPYC Review: 2x 64-core Benchmarked</a> &mdash; Ever since the Opteron days, AMD's market share has been rounded to zero percent, and with its first generation of EPYC processors using its new Zen microarchitecture, that number skipped up a small handful of points, but everyone has been waiting with bated breath for the second swing at the ball. AMD's Rome platform solves the concerns that first gen Naples had, plus this CPU family is designed to do many things: a new CPU microarchitecture on 7nm, offer up to 64 cores, offer 128 lanes of PCIe 4.0, offer 8 memory channels, and offer a unified memory architecture based on chiplets. </li><li><a title="AMD EPYC Rome Still Conquering Cascadelake Even Without Mitigations - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=epyc-rome-mitigations&amp;num=1">AMD EPYC Rome Still Conquering Cascadelake Even Without Mitigations - Phoronix</a> &mdash; Out of curiosity, I've run some unmitigated benchmarks for the various relevant CPU speculative execution vulnerabilities on both the Intel Xeon Platinum 8280 Cascadelake and AMD EPYC 7742 Rome processors for seeing how the performance differs.</li><li><a title="Intel’s line of notebook CPUs gets more confusing with 14nm Comet Lake | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/08/intels-line-of-notebook-cpus-gets-more-confusing-with-14nm-comet-lake/">Intel’s line of notebook CPUs gets more confusing with 14nm Comet Lake | Ars Technica</a> &mdash; Going by Intel's numbers, Comet Lake looks like a competent upgrade to its predecessor Whiskey Lake. The interesting question—and one largely left unanswered by Intel—is why the company has decided to launch a new line of 14nm notebook CPUs less than a month after launching Ice Lake, its first 10nm notebook CPUs.</li><li><a title="A look at the Windows 10 exploit Google Zero disclosed this week | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/08/a-look-at-the-windows-10-exploit-google-zero-disclosed-this-week/">A look at the Windows 10 exploit Google Zero disclosed this week | Ars Technica</a> &mdash; On Tuesday, Tavis Ormandy of Google's Project Zero released an exploit kit called ctftool, which uses and abuses Microsoft's Text Services Framework in ways that can effectively get anyone root—er, system that is—on any unpatched Windows 10 system they're able to log in to</li><li><a title="Patch new wormable vulnerabilities in Remote Desktop Services (CVE-2019-1181/1182) – Microsoft Security Response Center" rel="nofollow" href="https://msrc-blog.microsoft.com/2019/08/13/patch-new-wormable-vulnerabilities-in-remote-desktop-services-cve-2019-1181-1182/">Patch new wormable vulnerabilities in Remote Desktop Services (CVE-2019-1181/1182) – Microsoft Security Response Center</a> &mdash; Today Microsoft released a set of fixes for Remote Desktop Services that include two critical Remote Code Execution (RCE) vulnerabilities, CVE-2019-1181 and CVE-2019-1182. Like the previously-fixed ‘BlueKeep’ vulnerability (CVE-2019-0708), these two vulnerabilities are also ‘wormable’, meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without user interaction.

</li><li><a title="KNOB Attack" rel="nofollow" href="https://knobattack.com/">KNOB Attack</a> &mdash; TL;DR: The specification of Bluetooth includes an encryption key negotiation protocol that allows to negotiate encryption keys with 1 Byte of entropy without protecting the integrity of the negotiation process. A remote attacker can manipulate the entropy negotiation to let any standard compliant Bluetooth device negotiate encryption keys with 1 byte of entropy and then brute force the low entropy keys in real time.
</li><li><a title="Troy Hunt: Extended Validation Certificates are (Really, Really) Dead" rel="nofollow" href="https://www.troyhunt.com/extended-validation-certificates-are-really-really-dead/">Troy Hunt: Extended Validation Certificates are (Really, Really) Dead</a> &mdash; With both browsers auto-updating for most people, we're about 10 weeks out from no more EV and the vast majority of web users no longer seeing something they didn't even know was there to begin with! Oh sure, you can still drill down into the certificate and see the entity name, but who's really going to do that? You and I, perhaps, but we're not exactly in the meat of the browser demographics.</li><li><a title="Google wants to reduce lifespan for HTTPS certificates to one year | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/google-wants-to-reduce-lifespan-for-https-certificates-to-one-year/">Google wants to reduce lifespan for HTTPS certificates to one year | ZDNet</a> &mdash; Scott Helme argues that the security benefits of shorter SSL certificate lifespans have nothing to do with phishing or malware sites, but instead with the SSL certificate revocation process. Helme claims that this process is broken and that bad SSL certificates continue to live on for years after being mississued and revoked.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s CPU release season and we get excited about AMD&#39;s new line of server chips. Plus our take on AMD&#39;s approach to memory encryption, and our struggle to make sense of Intel&#39;s Comet Lake line.</p>

<p>Also, a few Windows worms you should know about, the end of the road for EV certs, and an embarrassing new Bluetooth attack.</p><p>Links:</p><ul><li><a title="A detailed look at AMD’s new Epyc “Rome” 7nm server CPUs | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/08/a-detailed-look-at-amds-new-epyc-rome-7nm-server-cpus/">A detailed look at AMD’s new Epyc “Rome” 7nm server CPUs | Ars Technica</a> &mdash; The short version of the story is, Epyc "Rome" is to the server what Ryzen 3000 was to the desktop—bringing significantly improved IPC, more cores, and better thermal efficiency than either its current-generation Intel equivalents or its first-generation Epyc predecessors.</li><li><a title="AMD Rome Second Generation EPYC Review: 2x 64-core Benchmarked" rel="nofollow" href="https://www.anandtech.com/show/14694/amd-rome-epyc-2nd-gen">AMD Rome Second Generation EPYC Review: 2x 64-core Benchmarked</a> &mdash; Ever since the Opteron days, AMD's market share has been rounded to zero percent, and with its first generation of EPYC processors using its new Zen microarchitecture, that number skipped up a small handful of points, but everyone has been waiting with bated breath for the second swing at the ball. AMD's Rome platform solves the concerns that first gen Naples had, plus this CPU family is designed to do many things: a new CPU microarchitecture on 7nm, offer up to 64 cores, offer 128 lanes of PCIe 4.0, offer 8 memory channels, and offer a unified memory architecture based on chiplets. </li><li><a title="AMD EPYC Rome Still Conquering Cascadelake Even Without Mitigations - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=epyc-rome-mitigations&amp;num=1">AMD EPYC Rome Still Conquering Cascadelake Even Without Mitigations - Phoronix</a> &mdash; Out of curiosity, I've run some unmitigated benchmarks for the various relevant CPU speculative execution vulnerabilities on both the Intel Xeon Platinum 8280 Cascadelake and AMD EPYC 7742 Rome processors for seeing how the performance differs.</li><li><a title="Intel’s line of notebook CPUs gets more confusing with 14nm Comet Lake | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/08/intels-line-of-notebook-cpus-gets-more-confusing-with-14nm-comet-lake/">Intel’s line of notebook CPUs gets more confusing with 14nm Comet Lake | Ars Technica</a> &mdash; Going by Intel's numbers, Comet Lake looks like a competent upgrade to its predecessor Whiskey Lake. The interesting question—and one largely left unanswered by Intel—is why the company has decided to launch a new line of 14nm notebook CPUs less than a month after launching Ice Lake, its first 10nm notebook CPUs.</li><li><a title="A look at the Windows 10 exploit Google Zero disclosed this week | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/08/a-look-at-the-windows-10-exploit-google-zero-disclosed-this-week/">A look at the Windows 10 exploit Google Zero disclosed this week | Ars Technica</a> &mdash; On Tuesday, Tavis Ormandy of Google's Project Zero released an exploit kit called ctftool, which uses and abuses Microsoft's Text Services Framework in ways that can effectively get anyone root—er, system that is—on any unpatched Windows 10 system they're able to log in to</li><li><a title="Patch new wormable vulnerabilities in Remote Desktop Services (CVE-2019-1181/1182) – Microsoft Security Response Center" rel="nofollow" href="https://msrc-blog.microsoft.com/2019/08/13/patch-new-wormable-vulnerabilities-in-remote-desktop-services-cve-2019-1181-1182/">Patch new wormable vulnerabilities in Remote Desktop Services (CVE-2019-1181/1182) – Microsoft Security Response Center</a> &mdash; Today Microsoft released a set of fixes for Remote Desktop Services that include two critical Remote Code Execution (RCE) vulnerabilities, CVE-2019-1181 and CVE-2019-1182. Like the previously-fixed ‘BlueKeep’ vulnerability (CVE-2019-0708), these two vulnerabilities are also ‘wormable’, meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without user interaction.

</li><li><a title="KNOB Attack" rel="nofollow" href="https://knobattack.com/">KNOB Attack</a> &mdash; TL;DR: The specification of Bluetooth includes an encryption key negotiation protocol that allows to negotiate encryption keys with 1 Byte of entropy without protecting the integrity of the negotiation process. A remote attacker can manipulate the entropy negotiation to let any standard compliant Bluetooth device negotiate encryption keys with 1 byte of entropy and then brute force the low entropy keys in real time.
</li><li><a title="Troy Hunt: Extended Validation Certificates are (Really, Really) Dead" rel="nofollow" href="https://www.troyhunt.com/extended-validation-certificates-are-really-really-dead/">Troy Hunt: Extended Validation Certificates are (Really, Really) Dead</a> &mdash; With both browsers auto-updating for most people, we're about 10 weeks out from no more EV and the vast majority of web users no longer seeing something they didn't even know was there to begin with! Oh sure, you can still drill down into the certificate and see the entity name, but who's really going to do that? You and I, perhaps, but we're not exactly in the meat of the browser demographics.</li><li><a title="Google wants to reduce lifespan for HTTPS certificates to one year | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/google-wants-to-reduce-lifespan-for-https-certificates-to-one-year/">Google wants to reduce lifespan for HTTPS certificates to one year | ZDNet</a> &mdash; Scott Helme argues that the security benefits of shorter SSL certificate lifespans have nothing to do with phishing or malware sites, but instead with the SSL certificate revocation process. Helme claims that this process is broken and that bad SSL certificates continue to live on for years after being mississued and revoked.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>398: Proper Password Procedures</title>
  <link>https://techsnap.systems/398</link>
  <guid isPermaLink="false">9c4e48b3-6aef-470f-82d5-d954c5bca39a</guid>
  <pubDate>Thu, 28 Feb 2019 18:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/9c4e48b3-6aef-470f-82d5-d954c5bca39a.mp3" length="22603569" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage.</itunes:subtitle>
  <itunes:duration>31:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage.
Plus the benefits of passphrases, and what you can do to keep your local providers on the up and up. 
</description>
  <itunes:keywords>Passwords, Password Salt, Cryptography, Cryptographic Hash, Utility, power company, SEDC, OWASP, entropy, password manager, plaintext, hashing algorithms, bcrypt, scrypt, pbkdf2, encryption, keepass, lastpass, 1password, offline encryption, PCI-DSS, standards, compliance, ethics, burp intruder, pivot, security, security research, software development, cracking, rainbow tables, brute force, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage.</p>

<p>Plus the benefits of passphrases, and what you can do to keep your local providers on the up and up.</p><p>Links:</p><ul><li><a title="Plain wrong: Millions of utility customers’ passwords stored in plain text | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/02/plain-wrong-millions-of-utility-customers-passwords-stored-in-plain-text/">Plain wrong: Millions of utility customers’ passwords stored in plain text | Ars Technica</a> &mdash; In September of 2018, an anonymous independent security researcher (who we'll call X) noticed that their power company's website was offering to email—not reset!—lost account passwords to forgetful users. Startled, X fed the online form the utility account number and the last four phone number digits it was asking for. Sure enough, a few minutes later the account password, in plain text, was sitting in X's inbox.</li><li><a title="The LinkedIn Hack: Understanding Why It Was So Easy to Crack the Passwords |" rel="nofollow" href="https://inspiredelearning.com/blog/the-linkedin-hack-understanding-why-it-was-so-easy-to-crack-the-passwords-2/">The LinkedIn Hack: Understanding Why It Was So Easy to Crack the Passwords |</a> &mdash; LinkedIn stated that after the initial 2012 breach, they added enhanced protection, most likely adding the “salt” functionality to their passwords. However, if you have not changed your password since 2012, you do not have the added protection of a salted password hash. You may be asking yourself–what on earth are hashing and salting and how does this all work?</li><li><a title="How Developers got Password Security so Wrong" rel="nofollow" href="https://blog.cloudflare.com/how-developers-got-password-security-so-wrong/">How Developers got Password Security so Wrong</a> &mdash; As time has gone on; developers have continued to store passwords insecurely, and users have continued to set them weakly. Despite this, no viable alternative has been created for password security.</li><li><a title="Adding Salt to Hashing: A Better Way to Store Passwords" rel="nofollow" href="https://auth0.com/blog/adding-salt-to-hashing-a-better-way-to-store-passwords/">Adding Salt to Hashing: A Better Way to Store Passwords</a> &mdash; A salt is added to the hashing process to force their uniqueness, increase their complexity without increasing user requirements, and to mitigate password attacks like rainbow tables.

</li><li><a title="Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study" rel="nofollow" href="https://arxiv.org/abs/1708.08759">Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study</a> &mdash; We were interested in exploring two particular aspects: Firstly, do developers get things wrong because they do not think about security and thus do not include security features (but could if they wanted to)? Or do they write insecure code because the complexity of the task is too great for them? Secondly, a common suggestion to increase security is to offer secure defaults.</li><li><a title="OWASP Password Storage Cheatsheet" rel="nofollow" href="https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Password_Storage_Cheat_Sheet.md">OWASP Password Storage Cheatsheet</a> &mdash; This article provides guidance on properly storing passwords, secret question responses, and similar credential information.</li><li><a title="Secure Salted Password Hashing - How to do it Properly" rel="nofollow" href="https://crackstation.net/hashing-security.htm">Secure Salted Password Hashing - How to do it Properly</a> &mdash; If you're a web developer, you've probably had to make a user account system. The most important aspect of a user account system is how user passwords are protected. User account databases are hacked frequently, so you absolutely must do something to protect your users' passwords if your website is ever breached. The best way to protect passwords is to employ salted password hashing. This page will explain why it's done the way it is.</li><li><a title="Plain Text Offenders" rel="nofollow" href="http://plaintextoffenders.com/">Plain Text Offenders</a> &mdash; We’re tired of websites abusing our trust and storing our passwords in plain text, exposing us to danger. Here we put websites we believe to be practicing this to shame.</li><li><a title="Cybersecurity 101: Why you need to use a password manager | TechCrunch" rel="nofollow" href="https://techcrunch.com/2018/12/25/cybersecurity-101-guide-password-manager/">Cybersecurity 101: Why you need to use a password manager | TechCrunch</a> &mdash; Think of a password manager like a book of your passwords, locked by a master key that only you know.</li><li><a title="On the Security of Password Managers - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2019/02/on_the_security_1.html">On the Security of Password Managers - Schneier on Security</a> &mdash; There's new research on the security of password managers, specifically 1Password, Dashlane, KeePass, and Lastpass. This work specifically looks at password leakage on the host computer. That is, does the password manager accidentally leave plaintext copies of the password lying around memory?</li><li><a title="LinuxFest Northwest 2019" rel="nofollow" href="https://linuxfestnorthwest.org/conferences/2019">LinuxFest Northwest 2019</a> &mdash; It's the 20th anniversary of LinuxFest Northwest! Come join your favorite Jupiter Broadcasting hosts at the Pacific Northwest's premier Linux event.</li><li><a title="SCALE 17x" rel="nofollow" href="https://www.socallinuxexpo.org/scale/17x">SCALE 17x</a> &mdash; The 17th annual Southern California Linux Expo – will take place on March. 7-10, 2019, at the Pasadena Convention Center. SCaLE 17x expects to host 150 exhibitors this year, along with nearly 130 sessions, tutorials and special events.</li><li><a title="Jupiter Broadcasting Meetups" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/">Jupiter Broadcasting Meetups</a> &mdash; The best place to find out when Jupiter Broadcasting has a meetup near you! Also stay tuned for upcoming virtual study groups.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage.</p>

<p>Plus the benefits of passphrases, and what you can do to keep your local providers on the up and up.</p><p>Links:</p><ul><li><a title="Plain wrong: Millions of utility customers’ passwords stored in plain text | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/02/plain-wrong-millions-of-utility-customers-passwords-stored-in-plain-text/">Plain wrong: Millions of utility customers’ passwords stored in plain text | Ars Technica</a> &mdash; In September of 2018, an anonymous independent security researcher (who we'll call X) noticed that their power company's website was offering to email—not reset!—lost account passwords to forgetful users. Startled, X fed the online form the utility account number and the last four phone number digits it was asking for. Sure enough, a few minutes later the account password, in plain text, was sitting in X's inbox.</li><li><a title="The LinkedIn Hack: Understanding Why It Was So Easy to Crack the Passwords |" rel="nofollow" href="https://inspiredelearning.com/blog/the-linkedin-hack-understanding-why-it-was-so-easy-to-crack-the-passwords-2/">The LinkedIn Hack: Understanding Why It Was So Easy to Crack the Passwords |</a> &mdash; LinkedIn stated that after the initial 2012 breach, they added enhanced protection, most likely adding the “salt” functionality to their passwords. However, if you have not changed your password since 2012, you do not have the added protection of a salted password hash. You may be asking yourself–what on earth are hashing and salting and how does this all work?</li><li><a title="How Developers got Password Security so Wrong" rel="nofollow" href="https://blog.cloudflare.com/how-developers-got-password-security-so-wrong/">How Developers got Password Security so Wrong</a> &mdash; As time has gone on; developers have continued to store passwords insecurely, and users have continued to set them weakly. Despite this, no viable alternative has been created for password security.</li><li><a title="Adding Salt to Hashing: A Better Way to Store Passwords" rel="nofollow" href="https://auth0.com/blog/adding-salt-to-hashing-a-better-way-to-store-passwords/">Adding Salt to Hashing: A Better Way to Store Passwords</a> &mdash; A salt is added to the hashing process to force their uniqueness, increase their complexity without increasing user requirements, and to mitigate password attacks like rainbow tables.

</li><li><a title="Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study" rel="nofollow" href="https://arxiv.org/abs/1708.08759">Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study</a> &mdash; We were interested in exploring two particular aspects: Firstly, do developers get things wrong because they do not think about security and thus do not include security features (but could if they wanted to)? Or do they write insecure code because the complexity of the task is too great for them? Secondly, a common suggestion to increase security is to offer secure defaults.</li><li><a title="OWASP Password Storage Cheatsheet" rel="nofollow" href="https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Password_Storage_Cheat_Sheet.md">OWASP Password Storage Cheatsheet</a> &mdash; This article provides guidance on properly storing passwords, secret question responses, and similar credential information.</li><li><a title="Secure Salted Password Hashing - How to do it Properly" rel="nofollow" href="https://crackstation.net/hashing-security.htm">Secure Salted Password Hashing - How to do it Properly</a> &mdash; If you're a web developer, you've probably had to make a user account system. The most important aspect of a user account system is how user passwords are protected. User account databases are hacked frequently, so you absolutely must do something to protect your users' passwords if your website is ever breached. The best way to protect passwords is to employ salted password hashing. This page will explain why it's done the way it is.</li><li><a title="Plain Text Offenders" rel="nofollow" href="http://plaintextoffenders.com/">Plain Text Offenders</a> &mdash; We’re tired of websites abusing our trust and storing our passwords in plain text, exposing us to danger. Here we put websites we believe to be practicing this to shame.</li><li><a title="Cybersecurity 101: Why you need to use a password manager | TechCrunch" rel="nofollow" href="https://techcrunch.com/2018/12/25/cybersecurity-101-guide-password-manager/">Cybersecurity 101: Why you need to use a password manager | TechCrunch</a> &mdash; Think of a password manager like a book of your passwords, locked by a master key that only you know.</li><li><a title="On the Security of Password Managers - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2019/02/on_the_security_1.html">On the Security of Password Managers - Schneier on Security</a> &mdash; There's new research on the security of password managers, specifically 1Password, Dashlane, KeePass, and Lastpass. This work specifically looks at password leakage on the host computer. That is, does the password manager accidentally leave plaintext copies of the password lying around memory?</li><li><a title="LinuxFest Northwest 2019" rel="nofollow" href="https://linuxfestnorthwest.org/conferences/2019">LinuxFest Northwest 2019</a> &mdash; It's the 20th anniversary of LinuxFest Northwest! Come join your favorite Jupiter Broadcasting hosts at the Pacific Northwest's premier Linux event.</li><li><a title="SCALE 17x" rel="nofollow" href="https://www.socallinuxexpo.org/scale/17x">SCALE 17x</a> &mdash; The 17th annual Southern California Linux Expo – will take place on March. 7-10, 2019, at the Pasadena Convention Center. SCaLE 17x expects to host 150 exhibitors this year, along with nearly 130 sessions, tutorials and special events.</li><li><a title="Jupiter Broadcasting Meetups" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/">Jupiter Broadcasting Meetups</a> &mdash; The best place to find out when Jupiter Broadcasting has a meetup near you! Also stay tuned for upcoming virtual study groups.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
