Punching holes in nomx, the world’s “most secure” communications protocol

Enlarge / Artist's impression of a nomx product under the scrutiny of security researchers. (credit: Aurich/ThinkStock/Nomx)

This article was originally published on Scott Helme's blog and is reprinted here with his permission.

I was recently invited to take part in some research by BBC Click, alongside Professor Alan Woodward, to analyze a device that had quite a lot of people all excited. With slick marketing, catchy tag lines and some pretty bold claims about its security, nomx claims to have cracked e-mail security once and for all. Down the rabbit hole we go!

nomx

You can find the official nomx site at nomx.com and right away you will see how secure this device is.

"Everything else is insecure."

Read 88 remaining paragraphs | Comments

Punching holes in nomx, the world’s “most secure” communications protocol

Enlarge / Artist's impression of a nomx product under the scrutiny of security researchers. (credit: Aurich/ThinkStock/Nomx)

This article was originally published on Scott Helme's blog and is reprinted here with his permission.

I was recently invited to take part in some research by BBC Click, alongside Professor Alan Woodward, to analyze a device that had quite a lot of people all excited. With slick marketing, catchy tag lines and some pretty bold claims about its security, nomx claims to have cracked e-mail security once and for all. Down the rabbit hole we go!

nomx

You can find the official nomx site at nomx.com and right away you will see how secure this device is.

"Everything else is insecure."

Read 88 remaining paragraphs | Comments

pemcracker – Tool For Cracking PEM Files

pemcracker is a tool for cracking PEM files that are encrypted and have a password. The purpose is to attempt to recover the password for encrypted PEM files while utilising all the CPU cores. Inspired by Robert Graham’s pemcrack, it still uses high-level OpenSSL calls in order to guess the password. As an optimisation, instead […] The post...

Read the full post at darknet.org.uk