Auckland Security Consultant uses PS3 for Cryptography

As the title states, a Senior Security Consultant by the name of Nick Breese is using a PS3 to crack MD5 hashes. Aside from this article incorrectly stating that the security expert is stealing passwords, as of now he has only shown how fast the machines can process MD5 hashes. This is just a small glimpse of what the software and hardware can do, the article compares how many cycles can be completed using Vector Computing:

As the title states, a Senior Security Consultant by the name of Nick Breese is using a PS3 to crack MD5 hashes. Aside from this article incorrectly stating that the security expert is stealing passwords, as of now he has only shown how fast the machines can process MD5 hashes. This is just a small glimpse of what the software and hardware can do, the article compares how many cycles can be completed using Vector Computing:

By implementing common ciphers and hash functions using vector computing, Breese has pushed the current upper limit of 10–15 million cycles per second — in Intel-based architecture — up to 1.4 billion cycles per second.

The project that Nick Breese is working on is called Crackstation, which he has been developing for a better part of 6 months. A lot of writers are saying that this is a “Hacking” tool and saying that its down right malicious. But they fail to realize that the PS3 hardware, combined with the software that is being developed by Nick Breese will in fact allow for some of the most commonly used encryption methods to be tested and seen for what they’re. Strong or weak.

But the biggest thing that erks me, is the phrases these technology writers use at the various new sites. They seem to love to use the word “hacker” even though it is the most mis-understood word you could use in the security and technology industry. But the amount of attention the word gets from the mass audiences is astounding, anything on the front page of any article that states “HACKER” will have people reading. But why? Is it because our entire day to day life revolves around technology?

Good job Nick Breese, if we didn’t have people like you, then we would still be using cryptography from the 70’s.

Read the PCWorld article.
Read the Gizmodo article.
Article about Crackstation Software for the PS3


Did you like this article?


0 Shares:
You May Also Like

DIY: Make a laptop sleeve with a FedEx envelope

DIY: Make a laptop sleeve with a FedEx envelope - diyfedexlapsleeve.jpg

DIY site Instructables posts a tutorial on making a laptop sleeve from FedEx envelopes:

I was looking for a strong and waterproof material to make my own sleeve from and remembered that FedEx and the US Postal Service both use Tyvek (or similar) material for their envelopes. My sleeve fits a MacBook, but the design is easily adaptable for other sized laptops.

The project requires 3-4 envelopes, some felt and some sewing, and the result is a pretty good camouflage for your lappie as well. Thanks, Annie!

[LifeHacker]
Read More

Samsung’s Sexy Hybrid Hard Drive

Good Idea, but is it practical? Will there really be a difference while booting and loading data? Waiting for Solid State Disk's will be a better choice, Dell's new M series laptops will have 32G SSD's.
Samsung’s Sexy Hybrid Hard Drive -

hybridhdd_lg.jpgNo, this hybrid hard drive isn’t actually sexy (though it is topless) and it is difficult to get excited about hard drives in general. But, since Samsung’s still an underdog in the category, the company’s doing its best to innovate the space instead of just cranking out larger sizes (though it did that, too). The 2.5-inch MH80 notebook hard drives feature 256MB of integrated flash memory to help you boot faster (though only about 10 seconds faster), wake from hibernation mode faster and get up to 25 percent more battery life for your laptop (though that’s compared to Samsung’s own M80 HDDs).

(more…)

[CrunchGear]
Read More

Drupal Day 1

So, this is what Day 1 is like. I have a nice theme that I got off the main Drupal site. As you can see its sleep and colorful but not overwhelming. Aside from messing with the general configuration of Drupal, there is a lot more you need to do to make it even remotely functional/organized. Lets take categories for instance. At first I didn't know exactly how these worked. However after some playing around, and further posting. I was able to separate my blog entries and the HOWTO's. I just create a new Category for each, and then provide terms to place them under which is a great feature.
Read More

Firefox Extensions Waiting to Be Exploited

With anything that is open source, bugs and exploits will be found. However, this makes it easy for developers to patch these issues. As they know the code that is causing the problem, and usually the hacker will provide a patch for them that just needs to be reviewed. However, this is a real concern for myself, since I use over 10 FireFox extension.
Firefox Extensions Waiting to Be Exploited - Do you think you are safe with Firefox? In general, I would agree with you. But at the same time, I would also point out that there is a fairly sizable security concern that may be addressed, as effectively as some security experts might like. It's called the Firefox extension. [WArp2Search]
Read More