<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="de">
	<id>https://geopin-wiki.de/index.php?action=history&amp;feed=atom&amp;title=Newly_Found_Online_Security_Flaw_Stems_From_1990s</id>
	<title>Newly Found Online Security Flaw Stems From 1990s - Versionsgeschichte</title>
	<link rel="self" type="application/atom+xml" href="https://geopin-wiki.de/index.php?action=history&amp;feed=atom&amp;title=Newly_Found_Online_Security_Flaw_Stems_From_1990s"/>
	<link rel="alternate" type="text/html" href="https://geopin-wiki.de/index.php?title=Newly_Found_Online_Security_Flaw_Stems_From_1990s&amp;action=history"/>
	<updated>2026-05-14T14:57:17Z</updated>
	<subtitle>Versionsgeschichte dieser Seite in Geopin-Wiki.de</subtitle>
	<generator>MediaWiki 1.31.0</generator>
	<entry>
		<id>https://geopin-wiki.de/index.php?title=Newly_Found_Online_Security_Flaw_Stems_From_1990s&amp;diff=40440&amp;oldid=prev</id>
		<title>Lenora9000: Die Seite wurde neu angelegt: „Newly found online security flaw stems from 1990s By Afp &lt;br&gt;  Published:  22:57, 3 March 2015   |  Updated:  22:57, 3 March 2015   &lt;br&gt;             e-mail…“</title>
		<link rel="alternate" type="text/html" href="https://geopin-wiki.de/index.php?title=Newly_Found_Online_Security_Flaw_Stems_From_1990s&amp;diff=40440&amp;oldid=prev"/>
		<updated>2022-03-21T02:26:53Z</updated>

		<summary type="html">&lt;p&gt;Die Seite wurde neu angelegt: „Newly found online security flaw stems from 1990s By Afp &amp;lt;br&amp;gt;  Published:  22:57, 3 March 2015   |  Updated:  22:57, 3 March 2015   &amp;lt;br&amp;gt;             e-mail…“&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Neue Seite&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Newly found online security flaw stems from 1990s By Afp &amp;lt;br&amp;gt;  Published:  22:57, 3 March 2015   |  Updated:  22:57, 3 March 2015   &amp;lt;br&amp;gt;             e-mail      6 shares    &amp;lt;br&amp;gt;A newly discovered Internet security flaw could leave many websites vulnerable to hackers because of weak US encryption standards in the 1990s, researchers said Tuesday.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The flaw dubbed &amp;quot;FREAK&amp;quot; could leave thousands of websites open to attacks if the problem is not patched, according to papers released by French and US researchers.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The flaw was discovered by a team led by Karthikeyan Bhargavan at INRIA in Paris -- the French Institute for Research in Computer Science and Automation -- and disclosure coordinated by Matthew Green, a cryptographer at Johns Hopkins University.&amp;lt;br&amp;gt;        A newly discovered Internet security flaw could leave many websites vulnerable to hackers because of weak US encryption standards in the 1990s,   researchers said Tuesday ©Thomas Samson (AFP/File)&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;A research paper said the flaw comes from &amp;quot;a class of deliberately weak export cipher suites... introduced under the pressure of US government agencies to ensure that the NSA would be able to decrypt all foreign encrypted communication.&amp;quot;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Green said in a blog post that even some sites maintained by the National Security Agency and FBI appeared to be vulnerable.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;quot;Since the NSA was the organization that demanded export-grade crypto, it's only fitting that they should be the first site affected by this vulnerability,&amp;quot; Green said.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Green and other researchers said the flaw stems from US government-imposed standards for encryption in software that was exported -- a short-lived effort to allow the United States to be able to access software exported to unfriendly regimes.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;- Part of the software -&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Even after it became legal to export strong encryption, the export mode feature was not removed from because some software still depended on it, according to Ed Felten, a Princeton University computer science professor.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;quot;The flaw is significant in itself, but it is also a good example of what can go wrong when government asks to build weaknesses into security systems,&amp;quot; said Felten in a blog post.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;quot;Many web sites are vulnerable to this attack, allowing an adversary in the network to spoof or spy on traffic to vulnerable sites.&amp;quot;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Felten said that the vulnerability on the NSA site is &amp;quot;not a big national security problem in itself because NSA doesn't distribute state secrets from its public site. But there is an important lesson here about the consequences of crypto policy decisions.&amp;quot;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Green said Facebook's site which operates the &amp;quot;like&amp;quot; button was identified as vulnerable but later patched.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Green said the most of the flaws &amp;quot;will soon be patched&amp;quot; but that the flaw is important at a time when the NSA is seeking to maintain access to encrypted software and devices for national security reasons.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;quot;The moral of this story is pretty simple: Encryption backdoors will always turn around and bite you in the ass,&amp;quot; he wrote.&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Lenora9000</name></author>
		
	</entry>
</feed>