How the NSA Spies on Smartphones Including the BlackBerry

All the images were apparently taken with smartphones. A photo taken in January 2012 is especially risqué: It shows a former senior government official of a foreign country who, according to the NSA, is relaxing on his couch in front of a TV set and taking pictures of himself — with his iPhone. To protect the person’s privacy, SPIEGEL has chosen not to reveal his name or any other details.

The access to such material varies, but much of it passes through an NSA department responsible for customized surveillance operations against high-interest targets. One of the US agents’ tools is the use of backup files established by smartphones. According to one NSA document, these files contain the kind of information that is of particular interest to analysts, such as lists of contacts, call logs and drafts of text messages. To sort out such data, the analysts don’t even require access to the iPhone itself, the document indicates. The department merely needs to infiltrate the target’s computer, with which the smartphone is synchronized, in advance.

via How the NSA Spies on Smartphones Including the BlackBerry – SPIEGEL ONLINE.

New connection between stacked solar cells can handle energy of 70,000 suns

Stacked solar cells consist of several solar cells that are stacked on top of one another. Stacked cells are currently the most efficient cells on the market, converting up to 45 percent of the solar energy they absorb into electricity.

via New connection between stacked solar cells can handle energy of 70,000 suns.

This should reduce overall costs for the energy industry because, rather than creating large, expensive , you can use much smaller cells that produce just as much electricity by absorbing intensified from concentrating lenses. And concentrating lenses are relatively inexpensive,

Gear up for the school year with these open source applications

Here are five great open source applications for learning. Share this list to your favorite student or teacher!

via Gear up for the school year with these open source applications | opensource.com.

Play with math, programming, music, and art in the powerful Kojo Learning environment. Based on ideas derived from innovative programs such as Logo and Geometers Sketchpad, Kojo offers a rich platform for students to explore the synthesis of mathematical ideas, coding, creative thinking, and learning.

Weak Keys in Network Devices – Mind your RNG!

An RSA public key (e,N) consists of an exponent e and a modulus N. The modulus is the product of two randomly chosen prime numbers p and, q. If p and q are known, it is straightforward to derive the private key. However, if they are unknown, one must factor N into p and q, which requires intensive computing resources. However, let’s assume that two keys with modulus N1 and N2 share one of the factors: N1 = p1 x q and N2 = p2 x q. In this case, finding the greatest common divisor of N1 and N2, which is q, is sufficient to factor these two moduli. The task of finding the greatest common divisor of two 1024-bit integers is much simpler than factoring and can be done in microseconds…

This well known vulnerability of RSA can be exploited in the context of low entropy keys. Poor random number generation can indeed lead to multiple keys sharing one of their factors. Heninger found that more than 60’000 keys (approximately 0.5%) they had collected could be factored in this way.

via Quantis Newsletter – September 2012.

Five Indicators To Watch For On Your Networks

First, companies need to monitor the right logs, including data from firewalls, virtual private networking (VPN) appliances, Web proxies and DNS servers. Next, the security team must collect data on what “normal” looks like inside the company’s network. Third, analysts must identify the indicators of attacks in their log files. Finally, the security group must have a procedure for responding to incidents identified by log analysis.

via Five Indicators To Watch For On Your Networks — Dark Reading.

NASA aiming for moon again, this time from Va., to probe thinnest of atmospheres, lunar dust

Hitching a ride on LADEE is an experimental laser communication system designed to handle higher data rates than currently available. NASA hopes to eventually replace its traditional radio systems with laser communications, which uses less power and requires smaller transmitters and receivers, while providing lightning-fast bandwidth.

via NASA aiming for moon again, this time from Va., to probe thinnest of atmospheres, lunar dust – The Washington Post.

Toshiba has invented a quantum cryptography network that even the NSA can’t hack

A quantum network uses specially polarized photons to encode an encryption key—a very long series of numbers and letters that can unlock a digital file. The photons are then sent down a fiber optic cable until they reach their destination, a photon detector, which counts them, and delivers the key to the intended recipient. If the photons are interfered with, the individual packets of information are forever altered and the recipient can see the telltale signs of tampering.

via Toshiba has invented a quantum cryptography network that even the NSA can’t hack – Quartz.

Current quantum cryptography systems from companies like ID Quantique start at around $50,000, and only connect two parties at a time. “If up to 64 people can share a single photon detector than you can spread out those costs,” Shields said.

The Best CPU Coolers: 10-Way Roundup

With the recent arrival of Ivy Bridge-E (see our Core i7-4960X review), I felt it was a good time to check out the latest aftermarket coolers. The new chip is fully compatible with Sandy Bridge-E/EP’s LGA2011 socket. We contacted all the major players and received 10 heatsinks to test including units from Noctua, Thermalright, Xigmatek, Silverstone and Thermaltake.

via The Best CPU Coolers: 10-Way Roundup – TechSpot.