Thái | Hacker | Kỹ sư tin tặc

Thái | Hacker | Kỹ sư tin tặc is a Substack focused on cybersecurity, technological innovation, and the personal experiences of a Vietnamese engineer navigating the tech industry. It covers online security challenges in Vietnam, ethical hacking, personal journeys within the tech sector, and insights on living a balanced life amidst tech advancements.

Cybersecurity Technological Innovation Personal Development Vietnamese Technology Scene Ethical Hacking Career Growth Cultural Insights Online Privacy

The hottest Substack posts of Thái | Hacker | Kỹ sư tin tặc

And their main takeaways
0 implied HN points 02 Mar 16
  1. Diffie & Hellman won the Nobel prize in computer science for their groundbreaking work in cryptography.
  2. Their invention of Diffie-Hellman is a crucial component of internet security, used when connecting to major platforms like Google and Facebook.
  3. Despite its complexity, the math trick behind Diffie-Hellman is surprisingly simple and has remained unsolved for over 40 years.
0 implied HN points 03 Feb 16
  1. The Diffie-Hellman bug in socat involved a vulnerability where the hard-coded DH p parameter was not prime, making the key exchange weaker and potentially insecure.
  2. Knowing the factors of the p parameter can allow one to solve the discrete log problem (DLP) on Z_p through the Chinese Remainder Theorem, which can be a powerful cryptanalysis tool.
  3. To exploit the bug, one can factor p completely, reduce DLP on Z_p to a smaller group, use Pollard's rho or index calculus, sniff socat traffic, and profit - highlighting the potential risks and methods involved in exploiting this vulnerability.
0 implied HN points 18 Jan 16
  1. Android has a unique feature that allows voice recognition in Vietnamese.
  2. The voice recognition feature on Android can understand Vietnamese commands, like searching for places or ordering food.
  3. This blog post was entirely written using the voice recognition program on Android, with the exception of punctuations.
0 implied HN points 18 Jan 16
  1. Thằng Tư was known for his strong demeanor and not backing down from fights.
  2. Growing up in poverty, Thằng Tư's family struggled to make ends meet, leading to tough circumstances.
  3. Thằng Tư's life took a tragic turn due to drug use, showcasing the harsh realities faced by many in similar situations.
Get a weekly roundup of the best Substack posts, by hacker news affinity:
0 implied HN points 17 Jan 16
  1. The Dual EC backdoor involves knowing a specific value $d$ to create $P$ and $Q$.
  2. The extended Euclidean algorithm played a role in finding $d$ to enable creating the backdoor.
  3. Consider the power of the extended Euclidean algorithm and the Chinese Remainder Theorem in cryptanalysis when designing or analyzing systems.
0 implied HN points 15 Jan 16
  1. The math/rsa bug in Go impacted crypto/tls and crypto/openpgp, prompting the need to change RSA private keys.
  2. Go uses Montgomery reduction and Chinese Remainder Theorem to speed up modular operations, but a small mistake led to leaking RSA private keys.
  3. By exploiting the bug, one can potentially obtain the RSA private key values and learn how multiple modular results can help determine values like 'q'.
0 implied HN points 10 Jan 16
  1. The imaginary number $i$ has a square of $-1$ and when raised to the power of $i$, it yields approximately 0.2, an unexpected real number result.
  2. Euler's identity is a beautiful and seemingly magical equation that involves $e$, $i$, $ extit{ extbf{ extgreek{π}}}$, $0$, and $1$, which are all fundamental mathematical constants.
  3. Leonhard Euler, a prolific mathematician, produced an incredible amount of work under challenging circumstances, with impressive achievements and contributions to mathematics.
0 implied HN points 08 Jan 16
  1. In politics, it's common to have different factions and conflicts. It's important to have the freedom to express dissenting opinions and protect those who speak out, even if they criticize those in power.
  2. The foundation of a sustainable country lies in upholding the constitution and allowing people to voice their opinions without fear of retribution. It's vital to listen to divergent views and engage in constructive debates for development.
  3. Ultimately, it's the people who hold the power in a country. It's crucial for the citizens to stand up for individuals like journalists who speak truth to power, even if their views may not align with everyone.
0 implied HN points 08 Jan 16
  1. Start product security early to save time and cost - fixing issues during design phase is cheaper than after product development.
  2. Segment product security project into vulnerability assessment and penetration testing phases for thorough evaluation.
  3. Balance time between breaking and building software for security expertise and lead a team specialized in cryptography solutions.
0 implied HN points 08 Jan 16
  1. Slides from TetCon 2016 are available for download on the conference website, with the exception of one speaker who chose not to release their slides.
  2. The TetCon 2016 conference at Sheraton had around 280 attendees, mostly male, indicating a need for more female participation in hacking events.
  3. Despite initial financial concerns, TetCon 2016 ended up with a positive net income, thanks to sponsorships and ticket sales, enabling plans for a larger and more diverse conference in the future.
0 implied HN points 30 Dec 15
  1. The atmosphere at Dreamplex is exciting with people actively working on their projects and goals, creating a productive environment.
  2. The office spaces at Dreamplex are modern with high-quality equipment and fast WiFi, giving a comfortable and tech-savvy setting for work.
  3. Reflecting on past accomplishments and experiences can sometimes make one appreciate personal growth and the journey taken over time.
0 implied HN points 28 Dec 15
  1. A competition is being held to find the shortest code implementation of memset, with a 10-byte submission being the current record.
  2. Scholarships for a training class are offered to college students through this challenge, where the best code implementation wins.
  3. A Q&A session with Bruce Dang and Thai Duong is scheduled to share insights with computer science and computer security students.
0 implied HN points 28 Dec 15
  1. Juniper, RSA, and other companies were found to use the Dual EC algorithm which had a backdoor installed by the NSA, compromising security.
  2. Using closed-source security products without thorough scrutiny can lead to vulnerabilities in the system, highlighting the importance of investing in in-house expertise for secure solutions.
  3. Generating truly random numbers for encryption is a complex task, and backdoors in algorithms can pose serious security risks, emphasizing the need for caution in technology choices.
0 implied HN points 17 Dec 15
  1. The final program for TetCon 2016 has been released, promising a day filled with talks on hacking, security, and building security tools.
  2. The event will feature 10 out of 20 submitted talks, showcasing content on finding vulnerabilities in Microsoft Edge, hacking Android phones, and more.
  3. The event is scheduled to take place at the Sheraton Saigon soon, inviting hackers and security researchers to connect and learn together.
0 implied HN points 16 Dec 15
  1. Upcoming talks at TetCon 2016 will cover tools for analyzing malware, writing exploits, and working with CPUs, making them essential for low-level enthusiasts.
  2. Free tickets have already been distributed to students who reached out, with only a limited number of discounted tickets remaining.
  3. Confirmation is pending from the last two speakers for TetCon 2016; stay tuned for updates on their participation.
0 implied HN points 15 Dec 15
  1. The TetCon 2016 conference program is almost ready, with talks on building security tools and advancing security research in the community.
  2. Organizers are looking for sponsors to host a lunch party for attendees to promote networking and interaction between speakers and participants.
  3. Discounted tickets for TetCon 2016 are selling out quickly, so it's advisable to grab one soon to save money before prices go up.
0 implied HN points 10 Dec 15
  1. The first batch of TetCon 2016 talks features young, talented hackers with diverse skills like reverse engineering, exploit writing, and cryptography.
  2. Over the years, the Vietnamese hacker community has evolved, with a new generation of exceptional individuals paving the way for groundbreaking discoveries.
  3. Acknowledgment is given to the pioneers of the community like rd, aquynh, lamer, and others who have been a source of inspiration and knowledge sharing for the community.
0 implied HN points 08 Dec 15
  1. Tickets for TetCon 2016 are on sale! Get yours now before they run out.
  2. Early birds get a discount! Purchase tickets before December 21 for VND350,000 instead of VND500,000.
  3. Free tickets are available for eligible students. Fill out the form to secure yours.
0 implied HN points 05 Dec 15
  1. The deadline for submitting papers to TetCon 2016 is approaching, and the committee is providing feedback to the submissions.
  2. There are 13 submissions so far, with a mix of Vietnamese and foreign participants, but more sign-ups are needed to avoid cancelling the training program.
  3. Attendees have the chance to learn about Bitcoin, Windows kernel reversing, and crypto at a competitive price compared to other conferences.
0 implied HN points 30 Nov 15
  1. Traversing Half Dome in Yosemite National Park involves a challenging hike with steep climbs and the need to use cables for the final ascent.
  2. Obtaining a permit to climb Half Dome is crucial with limited daily permits available and potential penalties for climbing without one.
  3. The experience of reaching the summit of Half Dome, despite the physical and mental challenges, offers a breathtaking view and a sense of accomplishment.
0 implied HN points 19 Nov 15
  1. Preparing for skiing involves investing in equipment like boots, skis, and safety gear, which can be expensive but durable if chosen wisely.
  2. Skiing requires skill and technique, even though it may appear effortless, especially when navigating slopes at high speeds.
  3. Ski resort landscapes are stunning with picturesque views, providing a thrilling and enjoyable experience for skiers of all levels.
0 implied HN points 09 Nov 15
  1. Encourage more local Vietnamese hackers, especially women and minority groups, to submit to TetCon for a chance to shine in the community.
  2. TetCon 2016 will be held in a new, more affordable venue with good reputation in Ben Nghe channel.
  3. Ticket information for the conference and training sign-ups will be announced this week.
0 implied HN points 06 Nov 15
  1. Cryptographers have demonstrated attacks against supposedly secure encryption algorithms, highlighting the importance of continuously testing security measures.
  2. Public key recovery attacks, exploiting even small vulnerabilities, can still be effective against implementations years after the initial vulnerabilities are discovered.
  3. Challenges and criticisms of cryptographic implementations often lead to the discovery of key and plaintext recovery vulnerabilities, emphasizing the need for rigorous security testing and scrutiny.
0 implied HN points 06 Nov 15
  1. Learning complex mathematical theories like Galois Theory can be accessible and engaging through practical problem-solving and exploring related topics.
  2. Understanding the concepts and applications of field extensions and automorphisms is crucial in grasping the fundamental ideas of Galois Theory.
  3. Galois Theory provides powerful tools to solve mathematical problems, such as finding the minimal polynomial with specific roots, and has practical implications in fields like cryptography.
0 implied HN points 04 Nov 15
  1. When working with polynomial equations with complex roots, Galois theory provides a powerful tool to understand and solve them.
  2. Field extensions, such as adding roots of numbers to the rational field, play a key role in finding all roots of a polynomial.
  3. Galois theory reveals the importance of group theory in understanding the symmetries and roots of polynomial equations.
0 implied HN points 04 Nov 15
  1. Pineapple guava has a delicious sweet and slightly tangy taste, reminiscent of a fruit cocktail.
  2. This year, while apples are not in season, there is an abundance of crispy, fresh, and mildly sweet persimmons available.
  3. Despite a small, bushy tree, it can yield around 200 fruits, highlighting the productivity of compact fruit plants.

djb

0 implied HN points 30 Sep 15
  1. Daniel J. Bernstein, also known as djb, created qmail and djbdns to replace Sendmail and BIND9 due to security vulnerabilities, with qmail and djbdns being crucial services on the Internet.
  2. Despite skepticism, only a single security vulnerability has been found in qmail and djbdns each, cementing djb's reputation as a legendary figure in Internet infrastructure.
  3. Besides his contributions to email and DNS services, djb is a renowned cryptographer, striving to encrypt the entire Internet with his high-speed cryptography algorithms, impacting the security of online services like Gmail.
0 implied HN points 28 Sep 15
  1. TetCon Saigon 2016 event will be held again, with details like time, venue, CFP, tickets, and volunteer opportunities to be announced soon
  2. There will be training sessions at TetCon Saigon 2016 on subjects like crypto and reversing, with scholarships available for promising students and young researchers
  3. Profits from the event and classes will go to charity and civil society organizations in Vietnam
0 implied HN points 12 Sep 15
  1. It is important to quantify and highlight achievements when introducing individuals, whether they are programmers, entrepreneurs, or cybersecurity experts.
  2. When introducing a programmer, emphasize details like the lines of code written and where they are published, to showcase their experience and skills.
  3. For entrepreneurs, highlight their innovative ideas, successful ventures, and social media following to demonstrate their accomplishments and potential.
0 implied HN points 12 Sep 15
  1. Curve25519 public keys should be validated to prevent potential vulnerabilities in protocols that require contributory behavior.
  2. Protocols like TLS <= 1.2 may be vulnerable to attacks if Curve25519 public keys are not validated.
  3. An important solution is to check the shared value and raise exceptions if it is zero when working with Curve25519 public keys.
0 implied HN points 09 Aug 15
  1. Vietnamese swimmer Anh Vien ranked 10th in the 400m individual medley, while previously trailing in the 200m discipline.
  2. Singaporean Joseph Schooling won the first-ever Olympic gold for Singapore.
  3. American Katie Ledecky, at 18 years old, secured 5 gold medals and broke three world records.
0 implied HN points 15 Jun 15
  1. The author wrote a letter to a newspaper discussing the issue of quickly accusing innocent people without a court trial.
  2. The newspaper did not respond to the author's letter, but the author found a related news article later on.
  3. A recent article raised a point about needing the court to determine the accuracy of information shared on anti-celebrity websites.
0 implied HN points 12 Jun 15
  1. The process of investigation, trial, and imprisonment in our legal system is explained humorously, highlighting the seriousness of each step.
  2. The writer suggests a satirical approach to assigning blame, proposing a shift towards a more efficient method of determining guilt without the need for extensive legal proceedings.
  3. There is a call for the potential restructuring of certain positions within the legal system, with a humorous suggestion of transitioning retired officials to circus roles.
0 implied HN points 08 Jun 15
  1. The ingredients for canh chua rau muống và tép ram include sour soup vegetable, me powder or fresh me, water spinach, shrimp, and coconut.
  2. Steps to prepare canh chua involve boiling water with sour soup, adding shrimp, water spinach, and seasoning with garlic, salt, sugar, and fish sauce.
  3. To make tép ram, sauté shrimp with garlic, season with salt, sugar, coconut milk, and simmer until cooked, then serve.
0 implied HN points 22 May 15
  1. Before the resistance against the French, Ho Chi Minh was highly admired for his patriotism and dedication to achieving independence for Vietnam.
  2. Ho Chi Minh's decision to align with China for fighting against the French was a major mistake that led to division and consequences that Vietnam continues to face.
  3. It's essential to think critically and not blindly believe everything we hear or read, especially in today's society where information can be manipulated.