Logo
facts about dan kaminsky.html

26 Facts About Dan Kaminsky

facts about dan kaminsky.html1.

Daniel Kaminsky was an American computer security researcher.

2.

Dan Kaminsky was a co-founder and chief scientist of Human Security, a computer security company.

3.

Dan Kaminsky previously worked for Cisco, Avaya, and IOActive, where he was the director of penetration testing.

4.

Dan Kaminsky was known among computer security experts for his work on DNS cache poisoning, for showing that the Sony rootkit had infected at least 568,000 computers, and for his talks at the Black Hat Briefings.

5.

Daniel Kaminsky was born in San Francisco on February 7,1979, to Marshall Kaminsky and Trudy Maurer.

6.

Dan Kaminsky's mother told The New York Times that after his father bought him a RadioShack computer at age four, Kaminsky had taught himself to code by age five.

7.

At 11, his mother received a call from a government security administrator who told her that Dan Kaminsky had used penetration testing to intrude into military computers, and that the family's Internet would be cut off.

8.

Dan Kaminsky's mother responded by saying if their access was cut, she would take out an advertisement in the San Francisco Chronicle to publicize the fact that an 11-year-old could break military computer security.

9.

In 2008, after Dan Kaminsky found and coordinated a fix for a fundamental DNS flaw, he was approached by the administrator, who thanked him and asked to be introduced to his mother.

10.

Dan Kaminsky attended St Ignatius College Preparatory and Santa Clara University.

11.

Dan Kaminsky used this technique to estimate that there were at least 568,000 networks that had computers with the rootkit.

12.

Dan Kaminsky then used his research to bring more awareness to the issue while Sony executives were trying to play it down.

13.

Dan Kaminsky demonstrated this process by setting up Rickrolls on Facebook and PayPal.

14.

Dan Kaminsky went public after working with the ad networks in question to eliminate the immediate cross-site scripting vulnerability.

15.

In 2008, Dan Kaminsky discovered a fundamental flaw in the Domain Name System protocol that could allow attackers to easily perform cache poisoning attacks on most nameservers.

16.

Dan Kaminsky worked with DNS vendors in secret to develop a patch to make exploiting the vulnerability more difficult, releasing it on July 8,2008.

17.

Dan Kaminsky had intended not to publicize details of the attack until 30 days after the release of the patch, but details were leaked on July 21,2008.

18.

Dan Kaminsky later presented his findings at the Black Hat Briefings, at which he wore both a suit and rollerskates.

19.

Dan Kaminsky received a substantial amount of mainstream press after disclosing this vulnerability, but experienced some backlash from the computer security community for not immediately disclosing his attack.

20.

DNSSEC, which Dan Kaminsky spoke in favor of, has since been widely deployed, bringing cryptographic assurance to results provided by DNS.

21.

On March 27,2009, Dan Kaminsky discovered that Conficker-infected hosts have a detectable signature when scanned remotely.

22.

In 2009, in cooperation with Meredith L Patterson and Len Sassaman, Kaminsky discovered numerous flaws in the SSL protocol.

23.

In June 2010, Dan Kaminsky released Interpolique, a beta framework for addressing injection attacks such as SQL injection and cross-site scripting in a manner comfortable to developers.

24.

At various points in his career, Dan Kaminsky shifted his focus to work on projects related to his friends' and family's health, developing an app that helps colorblind people, working on hearing aid technology, and developing telemedicine tools related to AIDS among refugees for Academic Model Providing Access to Healthcare.

25.

Dan Kaminsky died on April 23,2021, of diabetic ketoacidosis at his home in San Francisco.

26.

Dan Kaminsky had been frequently hospitalized for the disease in prior years.