SLOTH Attacks Weaken HTTPS Privacy

by Tracy Knauer •

Security vulnerabilities based on the MD5 hashing function make it possible to decrypt network data or impersonate servers in order to steal private information, according to researchers from the INRIA institute in France. MD5 is a cryptographic hash function. That means it translates data into a “hash,” or jumbled piece of information. In theory, the jumbled data cannot be reverse-translated …

South Korea Revises Law Affecting Online Censorship

by Tracy Knauer •

South Korea’s modification of a law that regulates online content could lead to more Internet censorship in the country, critics say. Korea Times reports that the Korea Communications Standards Commission, or KCSC, has revised a law that allows people to dispute online content that may be defamatory in nature. In its previous form, the law only granted the alleged victims …

CacheBrowser Offers New Method for Beating Internet Censorship

by Tracy Knauer •

Two American professors say they have a new, virtually foolproof way to beat Internet censorship using a tool they call CacheBrowser, which they promise to be especially effective against censorship in China. The professors, John Holowczak and Amir Houmansadr, describe the tool in a paper published earlier this year. As they explain, their technique for circumventing censorship centers on leveraging …

Australia’s New Internet Censorship Law Will Be Tested

by Tracy Knauer •

A legal demand is testing Internet censorship policies for the first time in Australia, where an Internet service provider, or ISP, has been threatened with a lawsuit if it does not block online content. The case centers on a website owned by an Australian construction company. Another construction company says the site infringes its copyright. It hired a legal firm …