Hacker Newsnew | past | comments | ask | show | jobs | submit | 2013-04-16login
Stories from April 16, 2013
Go back a day, month, or year. Go forward a day, month, or year.
1.If you're in Boston without phone service, use this website to call your family (twilio.ly)
398 points by chrisacky on April 16, 2013 | 66 comments
2.Researchers Finally Replicated Reinhart-Rogoff, and There Are Serious Problems (nextnewdeal.net)
367 points by rdp on April 16, 2013 | 282 comments
3.Parallella, a $99 Linux Supercomputer (zdnet.com)
354 points by microwise on April 16, 2013 | 167 comments
4.Security incident update (linode.com)
318 points by asb on April 16, 2013 | 272 comments
5.If I Made Another Monkey Island... (grumpygamer.com)
309 points by skardan on April 16, 2013 | 83 comments
6.Data journalism busts speeding cops, wins Pulitzer (sun-sentinel.com)
306 points by auctiontheory on April 16, 2013 | 153 comments
7.Webcam Pulse Detector (github.com/thearn)
259 points by theschwa on April 16, 2013 | 79 comments
8.1Password GPU brute-force with 3M hash/s (hashcat.net)
239 points by rmoriz on April 16, 2013 | 96 comments
9.The bomb that changed my life (2011) (swombat.com)
226 points by jacquesm on April 16, 2013 | 74 comments
10.Your First iOS App – 100% Programmatically (austinlouden.com)
225 points by austinl on April 16, 2013 | 107 comments
11.What is the rule for adjective order? (english.stackexchange.com)
219 points by ColinWright on April 16, 2013 | 131 comments
12.New GitHub Logo (github.com/blog)
222 points by hoov on April 16, 2013 | 102 comments
13.Google Glass API Documentation (developers.google.com)
220 points by aray on April 16, 2013 | 75 comments
14.OKCupid starts accepting Bitcoin using Coinbase (coinbase.tumblr.com)
189 points by FredEE on April 16, 2013 | 80 comments
15.The best QBasic game ever? (pcworld.com)
173 points by tonteldoos on April 16, 2013 | 99 comments
16.All American Airlines Flights Grounded, Experiencing Nationwide Computer Outage (techcrunch.com)
155 points by jstreebin on April 16, 2013 | 135 comments
17.Buyer sued for posting factual negative review on eBay (popehat.com)
155 points by greenyoda on April 16, 2013 | 115 comments
18.Mike Pall: Ramblings on languages and architectures (freelists.org)
146 points by asb on April 16, 2013 | 96 comments
19.Twitter is forcing us to drop ability to flattr creators by favoriting tweets (flattr.net)
148 points by chinmoy on April 16, 2013 | 80 comments

This is making the rounds on Twitter. I think the narrative is pretty unfair to 1Password, and that they're bending over backwards to seem reasonable and attentive†.

The problem as I understand it is that 1Pw runs PBKDF2-HMAC-SHA1 twice. 1Pw stores encrypted passwords using AES-CBC. It derives a 128 bit AES key from the first run of PBKDF2, and the 128 bit CBC IV from the balance of the first and the first bits of the second. Based on that design, it appears that 1Pw believed that the secrecy of the IV would contribute to the difficulty of cracking the encrypted blob, but of course it doesn't, because the trailing bytes of the blob are known plaintext and an attacker can use the key without knowing the IV to check if their password guess is right.

This is not a great design. But it's bad in a way that wastes cycles for users. The fact that 1Pw does extra PBKDF2 work that doesn't bind on attackers don't make 1Pw meaningfully weaker than any other app that uses PBKDF2, because it was already weird that they were tapping PBKDF2 twice to begin with. A more idiomatic use of PBKDF2 in this situation would be to tap PBKDF2 once, and then expand it (say with SHA2) to 256 bits. That design, which is totally reasonable and would not be the subject of a news story, would be equivalently secure to the "flawed" approach 1Pw took.

There is another problem with the construction 1Pw uses, which is that they chose PBKDF2-HMAC-SHA1. PBKDF2 with SHA hashes are among the easiest KDFs to crack on GPUs††, because SHAx was designed to be fast in hardware. 1Pw would have been much better off with scrypt, or even bcrypt (which is still a pain to implement in GPUs). But PBKDF2 is an industry best practice; to ding someone for using it while the rest of the world still uses "salted hashes" seems unreasonable.

What's happening here, besides the echo-chamber effect, is that the implementation of the brute force cracker for this particular encrypt blob is clever. In a rush to applaud cleverness, Twitter seems to have lept to the conclusion that "clever attack" means "vulnerable target". That's usually a correct assumption, but it isn't in this case.

Corrections more than welcome.

They deserve some kind of medal for that, by the way, because I have no dog in this fight at all and I can't seem to shut up about the unfairness of it all.

†† It turns out there's a clever way to optimize this on a GPU by precomputing the ipad/opad in HMAC, too, which sped the cracker up.


I'm really disappointed about how shallow the discussions about Adapteva are, and have been, on HN.

To remind everyone, the H = hacker. This device is a godsend, as far as I'm concerned. For the first time ever I get fully documented access to compute array on chip. No the architecture wasn't designed for anything specific, like graphics, but that means I don't get bogged down in details I don't care about, like some obscure memory hierarchy.

The chip is plain, simple, low-power, and begging for people to have an imagination again. Stop asking what existing things you can do with it, ask what future things having something like this on a SoC would enable.

Also, you should really be thinking about the chip at the instruction level, writing toy DSL to asm compilers. Thinking along the lines of, oh yeah I'll use OpenCL so I can be hardware agnostic, is never going to allow you to see what can be possible with it. If you read the docs you'll see what a simple and regular design it is, perfect for writing your own simple tooling.

It's been a long time, but I feel like a kid again. Like when I first discovered assembly on my 8086. Finally a simple device I can tinker with, play, and wring performance out of.

Hallelujah! :)

22.The Node.js Community is Quietly Changing the Face of Open Source (caines.ca)
134 points by apunic on April 16, 2013 | 101 comments
23.I've created a community and learning platform for math, physics and CS lovers (functionspace.org)
132 points by aditgupta on April 16, 2013 | 67 comments
24.Ask HN: Can we help the police sort through the photos of the Boston Marathon?
116 points by jbaudanza on April 16, 2013 | 80 comments
25.Congress Quietly Repeals Congressional Insider Trading Ban (nyulocal.com)
114 points by uptown on April 16, 2013 | 24 comments
26.Show HN: Pinterest for text (quotered.com)
115 points by tlyleung on April 16, 2013 | 82 comments
27.Fat startup: Learn the lessons of my failed Lean Startup (wordsting.com)
109 points by casca on April 16, 2013 | 71 comments
28.Xamarin Test Cloud (xamarin.com)
102 points by dcope on April 16, 2013 | 14 comments

Refreshingly honest and clear response from vendor:

http://hashcat.net/forum/thread-2238-post-13402.html#pid1340...

Here's a taste:

This design flaw is certainly real, and is one of the many reasons why we have started migrating to a new design. In short, when the Agile Keychain Format was designed (in 2008), we weren't aware of all of the various problems that come from using unauthenticated CBC mode encryption.

I could plead that we were in reasonably good company in making that kind of error, but as I've since learned, research in academic cryptography had been telling people not to use unauthenticated encryption for more than a decade. This is why today we aren't just looking at the kinds of attacks that seem practical, but we are also paying attention to security theorems.

30.The little things I learned from the Valley (gigpeppers.com)
91 points by Cherian on April 16, 2013 | 90 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: