Vftdan · @vftdan
379 followers · 30344 posts · Server mastodon.ml

Do I understand correctly, that with AES and other block ciphers if the plaintext has repeating 16-byte-aligned-and-long regions, they will correspond to repeating ciphertext regions?

#cryptography

Last updated 1 year ago

serrq · @serrq
9 followers · 143 posts · Server masto.nu

To have nothing to hide is not to renounce this right for fear of being accused of being at fault.

The bathrooms have darkened panels that divide the sink area from the toilets. Not because the occupant has secrets to hide, but because he/she should have his/her privacy.

Communicating in the clear is like shitting in public. No blackout panels.

#chatcontrol #surveillance #cryptography #privacy #communication #messengers #email

Last updated 1 year ago

In you proved your with .

In you proved your identity with someone else's DNS (i.e. , , )

In the you prove your identity with OAuth on someone else's DNS, just like Web1 and Web2.

In you prove your identity with , and you don't need anyone's DNS.

#cryptography #Web3 #Fediverse #oauth #Twitter #Google #facebook #web2 #dns #identity #web1

Last updated 1 year ago

bonkybot · @bonkybot
36 followers · 85 posts · Server hachyderm.io

Just published an encryption scheme/proposal for my end-to-end encrypted social media app. Always curious for feedback:

github.com/bianchidotdev/bubbl

Diagram: github.com/bianchidotdev/bubbl

#e2ee #socialmedia #encryption #cryptography

Last updated 1 year ago

ente · @ente
543 followers · 932 posts · Server mstdn.social

Brilliant documentary by @reasonmagazine about the movement that introduced as a weapon against centralization and surveillance 🔐

yewtu.be/watch?v=9vM0oIEhMag

#cryptography

Last updated 1 year ago

The Black Chamber · @TSOJ
6 followers · 131 posts · Server mathstodon.xyz
The Black Chamber · @TSOJ
6 followers · 130 posts · Server mathstodon.xyz
Tech news from Canada · @TechNews
991 followers · 27492 posts · Server mastodon.roitsystems.ca
Mr.Trunk · @mrtrunk
12 followers · 19819 posts · Server dromedary.seedoubleyou.me
IT News · @itnewsbot
3713 followers · 272623 posts · Server schleuss.online

It’s Numbers All The Way Down With This Tape Measure Number Station Antenna - For all their talk of cooperation and shared interests, the nations of the world p... - hackaday.com/2023/09/06/its-nu

#spy #sdr #radio #shortwave #espionage #radiohacks #tapemeasure #cryptography

Last updated 1 year ago

Daniel Buschek · @DBuschek
397 followers · 147 posts · Server hci.social
Dustin · @DigitalKrampus
48 followers · 680 posts · Server geekdom.social

Libbitcoin Explorer has a problem, it seems.

"in this case, practical wallet security is reduced from 128 bit, 192 bit or 256 bit to a mere 32 bit of unknown key information."

milksad.info/

Original link from Bruce Schneier's blog here:
schneier.com/blog/archives/202

#cryptography

Last updated 1 year ago

· @volkris
60 followers · 3201 posts · Server qoto.org

@chris I personally find E2EE very desirable in social networks, but different platforms have made design decisions that are favorable or hostile to it, based on their design philosophies.

, for example, in focusing on instances instead of users as being primary is not very compatible with E2EE.

And that runs right up against the above post about governance.

If the platform’s philosophy is one about promoting the governance of users, that’s going to run up against these issues of privacy and encryption, just as happens in world governments all the time.

So there’s a tradeoff to be had, distributed privacy vs centralized governance.

I find E2EE desirable in social networks, but an awful lot of people prefer governing instances.

#fediverse #governance #cryptography #privacy

Last updated 1 year ago

fragments · @fragments
136 followers · 53 posts · Server social.digital-artifacts.net
Drmike · @drmike
0 followers · 1 posts · Server mastodon.sdf.org

I have spent the last year and a half writing code and text to explain elliptic curve pairings for use in . You can find the early version here: mng.bz/D9NA This math is used in software for and multi-node .

Typically implemented by PhD's in math, elliptic curve pairing is complicated. This book gets you up to speed explaining the minimum required to get the job done. Your feedback will help improve the book for others!

#cryptography #blockchain #zero #knowledge #proofs #signatures

Last updated 1 year ago

Jim Flanagan · @jimfl
130 followers · 1232 posts · Server hachyderm.io

Trying to explain to kids.

“Cryptography is the art and science of creating problems which are easy for the right people to solve and very difficult for the wrong people to solve.”

Timmy shoots his hand into the air, and I point at him. “Who are the right and wrong people?”

“Great question. The right people are, like, your family members, or your bank, or your doctor. The wrong people are the police, or the fascist state.”

The teacher shifts nervously in the corner of the class

#cryptography

Last updated 1 year ago

Jim Flanagan · @jimfl
128 followers · 1207 posts · Server hachyderm.io

is not particularly . Seems like Eves and Mallorys are systematically being discriminated against.

#cryptography #inclusive

Last updated 1 year ago

Osman · @osman
131 followers · 50 posts · Server hachyderm.io

OH: “Encryption for data at-rest only matters if the data is resting. Data rarely rests.”

#cryptography #security

Last updated 1 year ago

GÉANT · @geant
384 followers · 462 posts · Server mstdn.social

Kristiaan De Greve is Programme Director of at , Associate Professor at and visiting researcher at University.

The Belgian NREN spoke to him about and the focus of the project. 👉connect.geant.org/2023/07/03/i

The article is also featured in the latest issue of the GÉANT CONNECT Magazine, 👉connect.geant.org/connect43

#cryptography #QKD #quantum #connect43 #beqci #QuantumKeyDistribution #Belnet #harvard #kuleuven #IMEC #quantumcomputing

Last updated 1 year ago

Will Green · @hotgazpacho
114 followers · 545 posts · Server mstdn.social

Been digging in to PKI as of late.

Today, I managed to create a new gpg master key, with sub keys that expire in 3 months. I then backed them up to external media, moved those sub keys to one of my YubiKeys, and deleted the local copy of the master key.

I need to write up what I’ve gleaned from multiple articles, so that when I go to renew the keys, it won’t be a major PITA.

#cryptography

Last updated 1 year ago