Do I understand correctly, that with AES and other block ciphers if the plaintext has repeating 16-byte-aligned-and-long regions, they will correspond to repeating ciphertext regions?
To have nothing to hide is not to renounce this right for fear of being accused of being at fault.
The bathrooms have darkened panels that divide the sink area from the toilets. Not because the occupant has secrets to hide, but because he/she should have his/her privacy.
Communicating in the clear is like shitting in public. No blackout panels.
#chatcontrol #surveillance #cryptography #privacy #communication #messengers #email
#chatcontrol #surveillance #cryptography #privacy #communication #messengers #email
In #Web1 you proved your #identity with #DNS.
In #Web2 you proved your identity with someone else's DNS (i.e. #Facebook, #Google, #Twitter) #OAuth
In the #Fediverse you prove your identity with OAuth on someone else's DNS, just like Web1 and Web2.
In #Web3 you prove your identity with #cryptography, and you don't need anyone's DNS.
#cryptography #Web3 #Fediverse #oauth #Twitter #Google #facebook #web2 #dns #identity #web1
Just published an encryption scheme/proposal for my end-to-end encrypted social media app. Always curious for feedback:
https://github.com/bianchidotdev/bubbli#encryption-scheme
Diagram: https://github.com/bianchidotdev/bubbli/blob/main/encryption-scheme.mmd
#e2ee #socialmedia #encryption #cryptography
Brilliant documentary by @reasonmagazine about the movement that introduced #cryptography as a weapon against centralization and surveillance 🔐
Python GUI 012 - Cryptarithm Solver, part 3, Magic Square Solver
https://theblackchamber552383191.wordpress.com/2023/09/09/python-gui-012-cryptarithm-solver-part-3-magic-square-solver/
#python #cryptography
Python GUI 011 - Cryptarithm Solver, part 2, Cryptarithm Utils
https://theblackchamber552383191.wordpress.com/2023/09/08/python-gui-011-cryptarithm-solver-part-2-cryptarithm-utils/
#python #cryptography
Wired: The Comedy of Errors That Let China-Backed Hackers Steal Microsoft’s Signing Key https://www.wired.com/story/china-backed-hackers-steal-microsofts-signing-key-post-mortem/ #Tech #wired #TechNews #IT #Technology via @morganeogerbc #Security/CyberattacksandHacks #vulnerabilities #cybersecurity #cryptography #tokengesture #Microsoft #Security #hacks
#Tech #wired #technews #it #technology #security #vulnerabilities #cybersecurity #cryptography #tokengesture #microsoft #hacks
Wired: The Comedy of Errors That Let China-Backed Hackers Steal Microsoft’s Signing Key https://www.wired.com/story/china-backed-hackers-steal-microsofts-signing-key-post-mortem/ #Security/CyberattacksandHacks #vulnerabilities #cybersecurity #cryptography #tokengesture #Microsoft #Security #hacks
#security #vulnerabilities #cybersecurity #cryptography #tokengesture #microsoft #hacks
It’s Numbers All The Way Down With This Tape Measure Number Station Antenna - For all their talk of cooperation and shared interests, the nations of the world p... - https://hackaday.com/2023/09/06/its-numbers-all-the-way-down-with-this-tape-measure-number-station-antenna/ #cryptography #tapemeasure #radiohacks #espionage #shortwave #radio #sdr #spy
#spy #sdr #radio #shortwave #espionage #radiohacks #tapemeasure #cryptography
📢 We're looking for a new colleague in #Cybersecurity to join us at #UniBayreuth on a tenure track position! 🤩Deadline September 30. Please share. Details here: https://www.uni-bayreuth.de/junior-professor-of-cybersecurity-salary-grade-w1-with-tenure-track-to-w3-cb59c2f254e1f6b6
#professorship #tenuretrack #security #privacy #cryptography #forensics
#cybersecurity #unibayreuth #Professorship #tenuretrack #security #privacy #cryptography #forensics
Libbitcoin Explorer has a problem, it seems.
"in this case, practical wallet security is reduced from 128 bit, 192 bit or 256 bit to a mere 32 bit of unknown key information."
Original link from Bruce Schneier's blog here:
https://www.schneier.com/blog/archives/2023/08/cryptographic-flaw-in-libbitcoin-explorer-cryptocurrency-wallet.html
@chris I personally find E2EE very desirable in social networks, but different platforms have made design decisions that are favorable or hostile to it, based on their design philosophies.
#Fediverse , for example, in focusing on instances instead of users as being primary is not very compatible with E2EE.
And that runs right up against the above post about governance.
If the platform’s philosophy is one about promoting the governance of users, that’s going to run up against these issues of privacy and encryption, just as happens in world governments all the time.
So there’s a tradeoff to be had, distributed privacy vs centralized governance.
I find E2EE desirable in social networks, but an awful lot of people prefer governing instances.
#fediverse #governance #cryptography #privacy
somehow reminds me of the early days of #ipv6
#ipv6 #postquantumcryptography #openquantumsafe #software #prototyping #quantumresistant #cryptography
I have spent the last year and a half writing code and text to explain elliptic curve pairings for use in #cryptography. You can find the early version here: http://mng.bz/D9NA This math is used in #blockchain software for #zero #knowledge #proofs and multi-node #signatures.
Typically implemented by PhD's in math, elliptic curve pairing is complicated. This book gets you up to speed explaining the minimum required to get the job done. Your feedback will help improve the book for others!
#cryptography #blockchain #zero #knowledge #proofs #signatures
Trying to explain #cryptography to kids.
“Cryptography is the art and science of creating problems which are easy for the right people to solve and very difficult for the wrong people to solve.”
Timmy shoots his hand into the air, and I point at him. “Who are the right and wrong people?”
“Great question. The right people are, like, your family members, or your bank, or your doctor. The wrong people are the police, or the fascist state.”
The teacher shifts nervously in the corner of the class
#Cryptography is not particularly #inclusive. Seems like Eves and Mallorys are systematically being discriminated against.
OH: “Encryption for data at-rest only matters if the data is resting. Data rarely rests.”
Kristiaan De Greve is Programme Director of #QuantumComputing at #imec, Associate Professor at #KULeuven and visiting researcher at #Harvard University.
The Belgian NREN #Belnet spoke to him about #QuantumKeyDistribution and the focus of the #BeQCI project. 👉https://connect.geant.org/2023/07/03/interview-with-kristiaan-de-greve-imec-expert-in-quantum-computing
The article is also featured in the latest issue of the GÉANT CONNECT Magazine, #CONNECT43 👉https://connect.geant.org/connect43
#cryptography #QKD #quantum #connect43 #beqci #QuantumKeyDistribution #Belnet #harvard #kuleuven #IMEC #quantumcomputing
Been digging in to PKI #cryptography as of late.
Today, I managed to create a new gpg master key, with sub keys that expire in 3 months. I then backed them up to external media, moved those sub keys to one of my YubiKeys, and deleted the local copy of the master key.
I need to write up what I’ve gleaned from multiple articles, so that when I go to renew the keys, it won’t be a major PITA.