Alec Muffett

Last updated

Alec Muffett
Alec Muffett Head Black and White.jpg
Born
Alec David Edward Muffett

(1968-04-22) 22 April 1968 (age 56)
Occupation(s)Internet-security evangelist, architect, and software engineer

Alec David Edward Muffett (born 22 April 1968) is an Anglo-American internet security expert and software engineer. His work includes Crack, the original password cracker for Unix, and for the CrackLib password-integrity testing library. He is active in the open-source software community.

Contents

Career

Muffett joined Sun Microsystems in 1992, working initially as a systems administrator. He rose through the ranks to become the principal engineer for security, a position which he held until he was retrenched, with many others, in 2009 [1] (shortly before Oracle acquired Sun). While at Sun he was one of the researchers who worked on the factorization of the 512 bit RSA Challenge Number; RSA-155 was successfully factorized in August 1999. [2]

In 2015, Muffett was named as one of the top six influential security thinkers by SC Magazine . [3] In October of that year he co-authored [4] RFC 7686 "The '.onion' Special-Use Domain Name", with Jacob Appelbaum.

More recently, Muffett assisted the New York Times with the creation of their own Tor onion site. [5] Following that he created a temporary Onion Wikipedia site, accessible only over Tor, [6] and assisted building further onion sites for BBC News, [7] Brave, [8] Twitter, [9] The Guardian, [10] and Reddit. [11]

Related Research Articles

The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in 1992 as RFC 1321.

The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution.

A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet after the root domain. The top-level domain names are installed in the root zone of the name space. For all domains in lower levels, it is the last part of the domain name, that is, the last non-empty label of a fully qualified domain name. For example, in the domain name www.example.com, the top-level domain is .com. Responsibility for management of most top-level domains is delegated to specific organizations by the ICANN, an Internet multi-stakeholder community, which operates the Internet Assigned Numbers Authority (IANA), and is in charge of maintaining the DNS root zone.

<span class="mw-page-title-main">Daniel J. Bernstein</span> American mathematician, cryptologist and computer scientist (born 1971)

Daniel Julius Bernstein is an American mathematician, cryptologist, and computer scientist. He is a visiting professor at CASA at Ruhr University Bochum, as well as a research professor of Computer Science at the University of Illinois at Chicago. Before this, he was a visiting professor in the department of mathematics and computer science at the Eindhoven University of Technology.

Articles related to cryptography include:

SOCKS is an Internet protocol that exchanges network packets between a client and server through a proxy server. SOCKS5 optionally provides authentication so only authorized users may access a server. Practically, a SOCKS server proxies TCP connections to an arbitrary IP address, and provides a means for UDP packets to be forwarded. A SOCKS server accepts incoming client connection on TCP port 1080, as defined in RFC 1928.

In mathematics, the RSA numbers are a set of large semiprimes that were part of the RSA Factoring Challenge. The challenge was to find the prime factors of each number. It was created by RSA Laboratories in March 1991 to encourage research into computational number theory and the practical difficulty of factoring large integers. The challenge was ended in 2007.

In cryptography, PBKDF1 and PBKDF2 are key derivation functions with a sliding computational cost, used to reduce vulnerability to brute-force attacks.

<span class="mw-page-title-main">.onion</span> Pseudo–top-level internet domain

.onion is a special-use top-level domain name designating an anonymous onion service, which was formerly known as a "hidden service", reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the Tor network.

Crack is a Unix password cracking program designed to allow system administrators to locate users who may have weak passwords vulnerable to a dictionary attack. Crack was the first standalone password cracker for Unix systems and the first to introduce programmable dictionary generation as well.

<span class="mw-page-title-main">Network Security Services</span> Collection of cryptographic computer libraries

Network Security Services (NSS) is a collection of cryptographic computer libraries designed to support cross-platform development of security-enabled client and server applications with optional support for hardware TLS/SSL acceleration on the server side and hardware smart cards on the client side. NSS provides a complete open-source implementation of cryptographic libraries supporting Transport Layer Security (TLS) / Secure Sockets Layer (SSL) and S/MIME. NSS releases prior to version 3.14 are tri-licensed under the Mozilla Public License 1.1, the GNU General Public License, and the GNU Lesser General Public License. Since release 3.14, NSS releases are licensed under GPL-compatible Mozilla Public License 2.0.

<span class="mw-page-title-main">Tor (network)</span> Free and open-source anonymity network based on onion routing

Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic via a free, worldwide volunteer overlay network that consists of more than seven thousand relays.

The following outline is provided as an overview of and topical guide to cryptography:

<span class="mw-page-title-main">Texas Instruments signing key controversy</span> Refers to Texas Instruments response to a project to factorize cryptographic keys.

The Texas Instruments signing key controversy resulted from Texas Instruments' (TI) response to a project to factorize the 512-bit RSA cryptographic keys needed to write custom firmware to TI devices.

crypt is a POSIX C library function. It is typically used to compute the hash of user account passwords. The function outputs a text string which also encodes the salt, and identifies the hash algorithm used. This output string forms a password record, which is usually stored in a text file.

<span class="mw-page-title-main">Heartbleed</span> Security bug in OpenSSL

Heartbleed is a security bug in some outdated versions of the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS) protocol. It was introduced into the software in 2012 and publicly disclosed in April 2014. Heartbleed could be exploited regardless of whether the vulnerable OpenSSL instance is running as a TLS server or client. It resulted from improper input validation in the implementation of the TLS heartbeat extension. Thus, the bug's name derived from heartbeat. The vulnerability was classified as a buffer over-read, a situation where more data can be read than should be allowed.

<span class="mw-page-title-main">Proton Mail</span> End-to-end encrypted email service

Proton Mail is a Swiss end-to-end encrypted email service founded in 2013 headquartered in Plan-les-Ouates, Switzerland. It uses client-side encryption to protect email content and user data before they are sent to Proton Mail servers, unlike other common email providers such as Gmail and Outlook.com. The service can be accessed through a webmail client, the Tor network, Windows, macOS and Linux (beta) desktop apps and iOS and Android apps.

The Facebook onion address located at facebookwkhpilnemxj7asaniu7vnjjbiltxjqhye3mhbshg7kx5tfyd.onion is a site that allows access to Facebook through the Tor protocol, using its .onion top-level domain.

<span class="mw-page-title-main">Dream Market</span> Online black market

Dream Market was an online darknet market founded in late 2013. Dream Market operated on a hidden service of the Tor network, allowing online users to browse anonymously and securely while avoiding potential monitoring of traffic. The marketplace sold a variety of content, including drugs, stolen data, and counterfeit consumer goods, all using cryptocurrency. Dream provided an escrow service, with disputes handled by staff. The market also had accompanying forums, hosted on a different URL, where buyers, vendors, and other members of the community could interact. It is one of the longest running darknet markets.

References

  1. "Alec Muffett, Profile". LinkedIn. Retrieved 30 January 2020.
  2. RSA-155 is factored! Archived 2012-07-22 at the Wayback Machine , rsa.com; accessed March 23, 2017.
  3. "Top 6 influential security thinkers". SC Media. 14 December 2015.
  4. Appelbaum, J.; Muffett, A. (7 October 2015). "The ".onion" Special-Use Domain Name". doi: 10.17487/RFC7686 via www.rfc-editor.org.{{cite journal}}: Cite journal requires |journal= (help)
  5. Sandvik, Runa (27 October 2017). "The New York Times is Now Available as a Tor Onion Service". Medium. Retrieved 21 May 2023.
  6. "Wikipedia over Tor? Alec Muffett experiments with an Onion Wikipedia site". WMUK. 27 November 2017.
  7. al-Salmi, Abdallah (30 October 2019). "Leveraging the Tor Network to circumvent blocking of BBC News content". BBC . Retrieved 21 May 2023.
  8. Kero, Ben (5 October 2020). "Brave.com now has its own Tor Onion Service, providing more users with secure access to Brave". brave.com. Retrieved 21 May 2023.
  9. Robertson, Adi (9 March 2022). "Twitter is launching a Tor-friendly version of its site". The Verge . Retrieved 21 May 2023.
  10. Soul, Jon; Kokkini, Ioanna (6 October 2022). "How we built the Guardian's Tor Onion service". The Guardian . Retrieved 7 October 2022.
  11. "Reddit Onion Service Launch : r/redditsecurity". Reddit . 25 October 2022. Retrieved 21 May 2023.