Quantcast
Channel: Bharatkalyan97
Viewing all articles
Browse latest Browse all 11039

Flaw discovered in internet's key security methods. Revert to Meluhha hieroglyphs.

$
0
0
Experts Find a Door Ajar in an Internet Security Method Thought Safe



On Monday, several security researchers, including from Google, uncovered a major vulnerability called “Heartbleed” in the technology that powers encryption across the Internet.On Monday, several security researchers, including from Google, uncovered a major vulnerability called “Heartbleed” in the technology that powers encryption across the Internet.
Updated, 10:24 p.m. | A flaw has been discovered in one of the Internet’s key security methods, potentially forcing a wide swath of websites to make changes to protect the security of consumers.
The problem was first discovered by a team of Finnish security experts and researchers at Google last week and disclosed on Monday. By Tuesday afternoon, a number of large websites, including Yahoo, Facebook, Google and Amazon Web Services, said they were fixing the problem or had already fixed it.
Researchers were still looking at the impact on consumers but warned it could be significant. Users’ most sensitive information — passwords, stored files, bank details, even Social Security numbers — could be vulnerable because of the flaw.
The most immediate advice from security experts to consumers was to wait or at least be cautious before changing passwords. Changing a password on a site that hasn’t been fixed could simply hand the new password over to hackers. Experts recommended that, before making any changes, users check a site for an announcement that it has dealt with the issue. “This is a good reminder that there are many risks online and it’s important to keep a watchful eye around what you’re doing, just as you would in the physical world,” said Zulfikar Ramzan, the chief technology officer of Elastica, a security company.
The extent of the vulnerability was unclear. Up to two-thirds of websites rely on the affected technology, called OpenSSL. But some organizations appeared to have had advance notice of the issue and had already fixed the problem by Tuesday afternoon. Many others were still working on restoring security.
Because attackers can use the bug to steal information unnoticed, it is unclear how widely the bug has been exploited — although it has existed for about two years. On Github, a website where developers gather to share code, some were posting ways to use the bug to dump information from servers. The Finnish security researchers, working for Codenomicon, a security company in Saratoga, Calif., and security researchers at Google found the bug in a portion of the OpenSSL protocol — which encrypts sessions between consumer devices and websites — called the “heartbeat” because it pings messages back and forth. The researchers called the bug “Heartbleed.”
“It’s a serious bug in that it doesn’t leave any trace,” said David Chartier, chief executive at Codenomicon. “Bad guys can access the memory on a machine and take encryption keys, usernames, passwords, valuable intellectual property, and there’s no trace they’ve been there.”

Then companies began taking inventory of what they may have lost. But because the flaw would allow attackers to surreptitiously steal the keys that protect communication, user passwords and anything stored in the memory of a vulnerable web server, it was virtually impossible to assess whether damage had been done.
Organizations were advised to download immediately the newest version of the OpenSSL protocol, which includes a fix, and quickly swap out their encryption keys. It also meant organizations needed to change their corporate passwords, log out users and advise them to change their own passwords.
Security researchers say they found evidence that suggests attackers were aware of the bug. Researchers monitoring various “honey pots” — stashes of fake data on the web aimed at luring hackers so researchers can learn more about their tools and techniques — found evidence that attackers had used the Heartbleed bug to access the fake data.
Actual victims may be out of luck. “Unless an attacker blackmails you, or publishes your information online, or steals a trade secret and uses it, you won’t know if you’ve been compromised,” Mr. Chartier said. “That’s what makes it so vicious.”
Mr. Chartier advised users to consider their passwords compromised and urged companies to deal with the issue quickly. “Companies need to get new encryption keys and users need to get new passwords,” he said.
Security researchers say it is most important for people to change passwords to sensitive accounts like their online banking, email, file storage and e-commerce accounts, after first making sure that the website involved has addressed the security gap.
By Tuesday afternoon, many organizations were heeding the warning. Companies across the web, including Yahoo, Amazon and PayPal, began notifying users of the bug and what was being done to mitigate it. Tumblr, the social network owned by Yahoo, said it had issued fixes and warned users to immediately swap out their passwords.
“This still means that the little lock icon (HTTPS) we all trusted to keep our passwords, personal emails and credit cards safe was actually making all that private information accessible to anyone who knew about the exploit,” the security team at Tumblr, which is part of Yahoo, wrote on its site. “This might be a good day to call in sick and take some time to change your passwords everywhere — especially your high-security services like email, file storage and banking, which may have been compromised by this bug.”
Steve Lohr and Vindu Goel contributed reporting.

http://bits.blogs.nytimes.com/2014/04/08/flaw-found-in-key-method-for-protecting-data-on-the-internet/?hp


How to Devise Passwords That Drive Hackers Away



Minh Uong/The New York Times
http://www.nytimes.com/2012/11/08/technology/personaltech/how-to-devise-passwords-that-drive-hackers-away.html?pagewanted=all&_r=0

In a remarkable coincidence, the following book is in pubication process which describes a cipher which was discovered about 5500 years ago and used as Meluhha hieroglyphs and deployed on cuneiform and other tablets of clay. Maybe, the cipher offers a more reliable solution to the security of today's electronic tablets. 

Clearly, there are insecure tablets and there are secure tablets for business transactions of Bronze Age.

Await the publication announcement. (Note: The ancient cipher is so safe and reliable, that it has defied meaning for nearly 150 years since the discovery of the first tablet of Bronze Age!!).

Kalyanaraman
Sarasvati Research Center
April 9, 2014


Philosophy of symbolic forms in Meluhha cipher


The thesis reports re-discovery of lexical repertoire of Meluhha language. Meluhha language was in vogue during the Bronze Age from ca. 5th millennium BCE. Meluhha hieroglyphs of symbolic forms relate to Meluhha life-experiences as sphoā‘burst forth’ expressions in Meluhha language. The function of Meluhha writing system deploying Meluhha cipher as mudrā  is to catalog wheelwright-lapidary artifacts of stone, shell, metal traded by maritime seafaring merchants and artisan-merchant caravans along the famed, extensively documented  Tin Road. The cipher key here is artha translated as composite of entities and also ‘meaning’. In the Indian tradition, the word artha is a gloss which signifies both ‘meaning’ and also ‘wealth’ as seem in the compound Arthaśāstra used as a title for Kauilya’s treatise on wealth-creation and polity. This meaning is consistent with the word used for a polity Rāṣṭram (lit. ‘the firm, lighted path’) personified as divinity, vāk.
sphoāvāda elaborates on philosophical foundations of symbolic forms as media for ‘meanings’. In Indian rhetoric tradition mudra refers to ‘the natural expression of things by words , calling things by their right names’ (Kuvalayānanda). It is an energetic seal of authenticity. The gloss mudrā also signifies a seal, stamp, or impression made by a seal. Thus, by definition, the process of ‘sealing’ to create a ‘seal impression’ is an expression of words deploying symbolic forms. To call things by their right names, a rebus cipher with glosses of underlying glosses and related sounds of Meluhha language are used. The semantics get expanded to evolve mudra as a particular branch of education (e.g., reckoning by the fingers). In Tantra 108 mudrā are used; in Yoga, mudrā are used together with praanaayaama (breathing exercises) and  āsana-s ("seated postures"). Nāyaśāstra lists 24 asamyuta ("separated", meaning "one-hand and fingers") and 13 samyuta("joined", meaning "two-hand and fingers") mudrā-s. A commentary on Hevajra Tantra  refers to symbolic bone ornaments as seals or mudrā -s. (Sanskrit: aṣṭhiamudrā).
In the entire corpora of Meluhha hieroglyphs there are only two significant symbolic forms which may relate to ‘veneration’ or ‘worship’. Even these two symbolic forms are read rebus and are consistent with the archaeological context of working with ores, minerals, metals and alloys as life-activities. One form is of a person seated in a penance and is read rebus: kamaha‘penance’ Rebus: kammaa‘coiner, mint’. The second form is of a pair of persons flanking a person seated in persons; the pair of persons are shown using a mudrā‘with folded hands – as salutation’; this is called in Indian tradition añci- ‘to reverence’ read rebus: añjana’antimony’ (Chemical symbol: Sb).
This is a sequel to Meluhha – tree of life  which evaluated hieroglyphs as sacred carvings incised, to convey rebus substantive messages in Meluhha as we traverse, in a pilgrim’s progress, through mists of time into the Bronze Age. Language glosses tag to symbolic forms and get associated with divinities and tree of life are Meluhha sacred carvings; they connote -- rebus -- metal artifacts of a kole.l'smithy/forge' which is, kole.l'temple'.
Archaeological evidences from Ancient Near East point to the practice of worship in temples of divinities associated with these hieroglyphs. Kabbalah of the Ancient Near East tradition is a synonym of aagama of Indian tradition with the roots found in Meluhha as a visible language. Both traditions venerate altars as models of temples. Many metal artifacts are shown as aayudha ‘weapons’ in the hands of Pratimā in Indian iconographic tradition with an intimation of memories of smithy traditions of ancestors. In Indian tradition. Pratimā lakaa, bimba reflections in a tranquil pool of consciousness transform into stone or metal or wood hieroglyphs in a temple. Pratimā or mudrā -s are not mere abstractions but firmly premised on language sememes.

Table of Contents

Re-discovery of Meluhha language
Indian linguistic area: pre-aryan, pre-Munda and pre-dravidian in India
Intimations of casting, soldering, riveting work, working with zinc (pewter), ivory
Evidence from Vālmīki Rāmāyaa
Evidence from Śatapatha Brāhmaa for mleccha Vācas
Evidence related to proto-Indian or proto-Indic or Indus language
Proto-Munda continuity and Language X
Reconstructing mleccha of 5th millennium BCE

Tin road caravan documentation

Historical background

Mleccha as bhāratam janam

Harappan control over the Oman Sea

Meluhha, Mleccha  areas: Sarasvati River Basin and Coastal Regions  of Gujarat, Baluchistan, Ancient Near East

Sphōavāda, theory of bursting forth
Three Samarra bowls: morakkhaka loha, pisācī loha
morakkhaka loha  'a kind of copper'
pisācī loha, ‘a kind of copper
Tin Road: Ashur-Kultepe and Meluhha hieroglyphs
Function served by the ‘standard device’ in Meluhha cultural, life-activities
Shahdad standard
Hieroglyphs on Warka vase read rebus as epigraphs
Tabernae montana as a hieroglyph
Seafaring metal merchants
One Meluhhan village in Akkad (3rd millennium BCE)
Forge: stone, minerals, gemstones
Meluhhans had travelled, traded and settled in Ancient Near East
Meluhha artisans had blazed the trail of lost-wax metallurgy
Dhokra as a Meluhha hieroglyph
Reduplication and homonyms with rebus readings as ‘areal universals’
Starting with verbs depicted as hieroglyphs
Structural characteristics of hieroglyphs
Indus script “fish-eyes” traded with Ur
‘Fish’ hieroglyph on Susa pot connotes alloy metal
Functions of tablets and seals: an archeological context

Appendix A: tagar symbolic forms
Appendix B: krəm‘neck’ symbolic forms
Appendix C:काणa‘one-eyed’, āra‘six’, ‘six rings of hair’ symbolic forms
Appendix D: kol ‘tiger’ symbolic forms
Appendix E: eaka'upraised arm'
Appendix F: dhokra kamar‘lost-wax metal caster’
Appendix G: Processions of stone-/metal-ware competence
Appendix H: Interpretation of Māyā's dream in Bauddham
Appendix I: Sphōavāda
Appendix J: Meluhha glosses related to symbolic form: helmsman, cargo kārī account
Appendix K: Metals trade catalog on a seal
Appendix L: Seal number 198 from Legrain 1921
Appendix M: Rebus as dream, as literacy
Appendix N: Bronze Age Linguistic Doctrine
Appendix O: Eagle and snake hieroglyphs
Appendix P: Meluhha hieroglyphs on a Proto-Cuneiform tablet
Appendix Q: Archaeological context is a cultural context for symbolic forms of ‘meanings’
Appendix R: ran:ga‘pewter or alloy of tin (ran:ku), lead (nāga) and antimony (añjana)’
Bibliography
Index
End Notes
5

22

25
32
38

45
54
61
73
79
86
89

95
130
132
144
153
163

165
182
184
186
201
208
210

220
259
263

271
274
285
288
304
313

317
327

328
351
362
368
392
484
538

578
585
639
655
689
693

717

723

729
735
739
750


Viewing all articles
Browse latest Browse all 11039

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>