<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<img alt="<crypto class image>"
src="cid:part1.71410B08.E6D37B24@immunityinc.com" height="340"
width="462">
<p>So I've been writing a bit about the larger "War on Crypto" here:
<a class="moz-txt-link-freetext" href="https://cybersecpolitics.blogspot.com/2017/01/the-csis-paper-review-part-1.html">https://cybersecpolitics.blogspot.com/2017/01/the-csis-paper-review-part-1.html</a></p>
<p>I know a lot of you hate reading policy stuff (and I'm not fond
of how much a part of my life it has become) but the CSIS paper
had a "who's who" of the policy world on it and is worth
critiquing in a larger space (here on this list, if you like). So
much of the policy world right now is buried under an avalanche of
epiphanies on how cryptography connects to information security.<br>
</p>
<p>But also, this morning the admin team took a few orders for our
April class on Cryptographic Analysis for Hackers, and so today I
reread the slides. It's one of the few Immunity classes I haven't
taken myself and I always like to see if I'm too far removed from
day to day attacks to understand them.<br>
</p>
<p>Just like we created <a
href="https://immunityproducts.blogspot.com/2013/02/visualsploit-20.html">Visualsploit
</a>for <a
href="https://www.youtube.com/watch?v=0e5ksusmPoM&t=2266s">teaching
people</a> with no programming experience assembly language and
how to write a buffer overflow in three days, we use Sage to teach
people what they need from abstract algebra and crypt-analysis to
get them to writing cryptographic attacks, which is not to say we
try to turn people into cryptographers. It's just that many modern
exploit attacks also involve building a cloud computing network
that solves for private keys on the fly given a partial
information leak. In a sense, the question we are trying to answer
is "How do I get root-shells with symbolic calculus?" I mean, the
future is unevenly distributed, but we, the class of people for
whom it is unacceptable to no longer have root-shells, have to
prepare somehow.<br>
</p>
<p>Anyways, you can still sign up here, although like all of the
Master class sections at INFILTRATE, it does sell out:
<a class="moz-txt-link-freetext" href="http://infiltratecon.com/training.html">http://infiltratecon.com/training.html</a><br>
</p>
<p><img alt="<it's dangerous to go alone image here>"
src="cid:part4.22A2C973.E8DC7011@immunityinc.com" height="854"
width="624"></p>
</body>
</html>