nerdculture.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
Be excellent to each other, live humanism, no nazis, no hate speech. Not only for nerds, but the domain is somewhat cool. ;) No bots in general. Languages: DE, EN, FR, NL, ES, IT

Administered by:

Server stats:

1.1K
active users

#onetimepad

0 posts0 participants0 posts today

WHO DID IT?

One of our information security “ancestors” invented the world’s only completely secure means of communication. And now we’re surrounded — night and day — by the “descendants” of that technology in new forms. It keeps our online transactions safe, and may have a renewed importance as we enter the quantum computing era.

We thought we knew who invented it, but history had a trick or two up its sleeve. It’s a bit like the mystery murder game, Clue.

➡️​ Who?
➡️​ What?
➡️​ When?
➡️​ Where?
➡️​ Why?
➡️​ How?
➡️​ How Secure Was It?
➡️​ Was It Commercially Successful?
➡️​ What Was The Underlying Technology?
➡️​ How Efficient Was Its Use? (always inefficient, or could it be massively efficient?)

Answers to all of these questions have been updated in the past 12 years.

Because of Frank Miller's implementation with a Telegraphic Code book, the use of a One-Time Pad could be, and often was, *outrageously* efficient, compared to the later use (with a cipher) which was painfully *inefficient.* This difference is only now becoming clear, since our understanding of who Frank Miller was and what he did is only about 12-13 years old.

The history of infosec got rewritten and we're all just trying to catch up.

I asked an infographic designer to create a comparison between our Old Understanding (invented in 1917) vs. our New Understanding (happened 35 years earlier, in 1882).

What do you think? Please feel free to offer your suggestions or thoughts to make this infographic more useful.

If you’d like to verify for yourself how efficient the use of a One-Time Pad could be, feel free to take this quick, 4-step challenge:

loistavainfosecurity.com/blog/

#OneTimePad
#Infosec
#infoGraphics
#Cryptography

And the answer to the poll is . . . 1882!

Yup, it’s true. Asking someone to disclose their “mother’s maiden name” as a security technique was first publicly described in 1882.

That’s the year Sacramento, CA banker — Frank Miller — published his book titled "Telegraphic Code: To Insure Privacy and Secrecy In The Transmission Of Telegrams."

This was the same book which described the first concept and implementation of the One-Time Pad.

Frank and his fellow banker buddies conducted high finance over the Internet of their day, the Telegraph, which was considered by many to be completely insecure; about as private as sending a postcard.

How did you transfer loads of your employer’s money securely over an insecure means of communication?

You used a telegraphic code book and combined it with other layers of security. Big $$$$s were involved, and no one wanted — then or now — to be the one who screwed up a transaction.

So “mother’s maiden name” became one of the layers of security used in money transfers.

As they said on Battlestar Galactica: “All this has happened before, and all this will happen again.”

Interesting how things seem to repeat over and over.

Thanks to everyone who voted in the Poll!

#Infosec
#Cybersecurity
#MothersMaidenName
#InfosecTraining
#OneTimePad

WHO DID IT?

One of our information security “ancestors” invented the world’s only completely secure means of communication. And now we’re surrounded — night and day — by the “descendants” of that technology in new forms. It keeps our online transactions safe, and may have a renewed importance as we enter the quantum computing era.

We thought we knew who invented it, but history had a trick or two up its sleeve. It’s a bit like the mystery murder game, Clue.

➡️​ Who?
➡️​ What?
➡️​ When?
➡️​ Where?
➡️​ Why?
➡️​ How?
➡️​ How Secure Was It?
➡️​ Was It Commercially Successful?
➡️​ What Was The Underlying Technology?
➡️​ How Efficient Was Its Use? (always inefficient, or could it be massively efficient?)

Answers to all of these questions have been updated in the past 12 years.

Because of Frank Miller's implementation with a Telegraphic Code book, the use of a One-Time Pad could be, and often was, *outrageously* efficient, compared to the later use (with a cipher) which was painfully *inefficient.* This difference is only now becoming clear, since our understanding of who Frank Miller was and what he did is only about 12-13 years old.

The history of infosec got rewritten and we're all just trying to catch up.

I asked an infographic designer to create a comparison between our Old Understanding (invented in 1917) vs. our New Understanding (happened 35 years earlier, in 1882).

What do you think? Please feel free to offer your suggestions or thoughts to make this infographic more useful.

If you’d like to verify for yourself how efficient the use of a One-Time Pad could be, feel free to take this quick, 4-step challenge:

loistavainfosecurity.com/blog/

#OneTimePad
#Infosec
#infoGraphics
#Cryptography

Continued thread

And the answer to the poll is . . . 1882!

Yup, it’s true. Asking someone to disclose their “mother’s maiden name” as a security technique was first publicly described in 1882.

That’s the year Sacramento, CA banker — Frank Miller — published his book titled "Telegraphic Code: To Insure Privacy and Secrecy In The Transmission Of Telegrams."

This was the same book which described the first concept and implementation of the One-Time Pad.

Frank and his fellow banker buddies conducted high finance over the Internet of their day, the Telegraph, which was considered by many to be completely insecure; about as private as sending a postcard.

How did you transfer loads of your employer’s money securely over an insecure means of communication?

You used a telegraphic code book and combined it with other layers of security. Big $$$$s were involved, and no one wanted — then or now — to be the one who screwed up a transaction.

So “mother’s maiden name” became one of the layers of security used in money transfers.

As they said on Battlestar Galactica: “All this has happened before, and all this will happen again.”

Interesting how things seem to repeat over and over.

Thanks to everyone who voted in the Poll!

#Infosec
#Cybersecurity
#MothersMaidenName
#InfosecTraining
#OneTimePad

WHO DID IT?

One of our information security “ancestors” invented the world’s only completely secure means of communication. And now we’re surrounded — night and day — by the “descendants” of that technology in new forms. It keeps our online transactions safe, and may have a renewed importance as we enter the quantum computing era.

We thought we knew who invented it, but history had a trick or two up its sleeve. It’s a bit like the mystery murder game, Clue.

➡️​ Who?
➡️​ What?
➡️​ When?
➡️​ Where?
➡️​ Why?
➡️​ How?
➡️​ How Secure Was It?
➡️​ Was It Commercially Successful?
➡️​ What Was The Underlying Technology?
➡️​ How Efficient Was Its Use? (always inefficient, or could it be massively efficient?)

Answers to all of these questions have been updated in the past 12 years.

I asked an infographic designer to create a comparison between our Old Understanding (invented in 1917) vs. our New Understanding (happened 35 years earlier, in 1882).

This is the first draft. I’m not a huge fan of the all-caps text. I'm really open to your suggestions or thoughts to make this more useful, so please feel free to chime in.

#OneTimePad
#Infosec
#infoGraphics
#Cryptography

WHO DID IT?

One of our information security “ancestors” invented the world’s only completely secure means of communication. And now we’re surrounded — night and day — by the “descendants” of that technology in new forms. It keeps our online transactions safe, and may have a renewed importance as we enter the quantum computing era.

We thought we knew who invented it, but history had a trick or two up its sleeve. It’s a bit like the mystery murder game, Clue.

➡️​ Who?
➡️​ What?
➡️​ When?
➡️​ Where?
➡️​ Why?
➡️​ How?
➡️​ How Secure Was It?
➡️​ Was It Commercially Successful?
➡️​ What Was The Underlying Technology?
➡️​ How Efficient Was Its Use? (always inefficient, or could it be massively efficient?)

Answers to all of these questions have been updated in the past 12 years.

I asked an infographic designer to create a comparison between our Old Understanding (invented in 1917) vs. our New Understanding (happened 35 years earlier, in 1882).

This is the first draft. I’m not a fan of the all-caps text. If you have any suggestions or thoughts to make this more useful, please feel free to chime in.

#OneTimePad
#Infosec
#infoGraphics
#Cryptography

Continued thread

And the answer to the poll is . . . 1882!

Yup, it’s true. Asking someone to disclose their “mother’s maiden name” as a security technique was first publicly described in 1882.

That’s the year Sacramento, CA banker — Frank Miller — published his book titled "Telegraphic Code: To Insure Privacy and Secrecy In The Transmission Of Telegrams."

This was the same book which described the first concept and implementation of the One-Time Pad.

Frank and his fellow banker buddies conducted high finance over the Internet of their day, the Telegraph, which was considered by many to be completely insecure; about as private as sending a postcard.

How did you transfer loads of your employer’s money securely over an insecure means of communication?

You used a telegraphic code book and combined it with other layers of security. Big $$$$s were involved, and no one wanted — then or now — to be the one who screwed up a transaction.

So “mother’s maiden name” became one of the layers of security used in money transfers.

As they said on Battlestar Galactica: “All this has happened before, and all this will happen again.”

Interesting how things seem to repeat over and over.

#Infosec
#Cybersecurity
#MothersMaidenName
#InfosecTraining
#OneTimePad