J.C. ☕/🦊/🛩️ · @coffee
221 followers · 91 posts · Server mastodon.sandwich.net

While I couldn't be at the Open Source Cryptography Workshop or to speak and collaborate in-person (because I got COVID again, woo), I recorded my Workshop talk about -FFI and , which just played there in Tokyo.

I've embedded the recording in my blogpost here: insufficient.coffee/2023/03/30

I got some good live questions about using multiple layers of statically (or dynamically) linked FFI libraries, and about compiling rustls-ffi on systems unsupported by .

#ring #curl #rustls #realworldcrypto

Last updated 1 year ago

CrashingBrain · @crashingbrain
2 followers · 25 posts · Server mstdn.social

Last day of but there are still so many people I wanted to take to :( i am really not good at jumping into random conversations. Any suggestions here before it’s too late? Or if you read this just come and talk to me 👀. I am the one with the cool hat

#RWC2023 #rwc23 #rwc #realworldcrypto

Last updated 1 year ago

Simonetta Vezzoso · @wavesblog
192 followers · 1319 posts · Server eupolicy.social

The "more technological approach" in action: DMA obligations read and interpreted by technologists - how😎 is it!?
---
RT @durumcrustulum
¯\_(ツ)_/¯


twitter.com/durumcrustulum/sta

#realworldcrypto

Last updated 1 year ago

Simonetta Vezzoso · @wavesblog
192 followers · 1319 posts · Server eupolicy.social

RT @durumcrustulum
Next up, "Interoperability in E2EE Messaging", presented by Julia Len

#realworldcrypto

Last updated 1 year ago

Mallory · @mallory
855 followers · 234 posts · Server techpolicy.social

Such great talks at as usual. Must watch, especially day 2 Julie Len on e2ee interop, @ohemorange, @senykam, @claucece youtube.com/playlist?list=PLee

#realworldcrypto

Last updated 1 year ago

str4d 🛡️ · @str4d
356 followers · 216 posts · Server abyssdomain.expert

Part of another Q&A answer:

There is no one at-risk user; there are different kinds of extremes. And any of us can become an at-risk user in around two seconds (see: social media).

A middle / common user can become an extreme user with no warning. Stresses the importance of including extreme users in the design.

#realworldcrypto #ux #design

Last updated 1 year ago

str4d 🛡️ · @str4d
356 followers · 214 posts · Server abyssdomain.expert

Q: When designing, how do you take into account the fact that software is not static, things will change over time and protocols will need to change?

A: It's hard.

One system I'd recommend is the Wireguard paper. They approached the system with very strong opinions.

Having founded opinions, documenting them, seeking feedback, and adequately describing the parameters of your design space, will help you to migrate people off it when the time comes.

#realworldcrypto #ux #design

Last updated 1 year ago

str4d 🛡️ · @str4d
356 followers · 213 posts · Server abyssdomain.expert

More excellent points from Stephan Somogyi:

"Not Edge Cases, but Stress Cases"

"Users who are outside of the middle need to be included in our design thinking."

"Design your cryptosystems for people. Don't just think about pixels and battery, think about how humans drop their phones into water."

#realworldcrypto #ux

Last updated 1 year ago

str4d 🛡️ · @str4d
356 followers · 212 posts · Server abyssdomain.expert

Stephan Somogyi is giving an excellent talk on "Design, Applied Cryptography, and Humans".

"We should strive to build tools that users can use easily and without training."

"We should be designing to the strengths of the humans."

YES YES YES

#realworldcrypto #ux #design

Last updated 1 year ago

Sam Jaques · @sejaques
117 followers · 31 posts · Server ioc.exchange

Does anyone have instances of real-world attacks/data breaches/etc. that used side-channel attacks?

#RWC #realworldcrypto

Last updated 1 year ago

str4d 🛡️ · @str4d
353 followers · 211 posts · Server abyssdomain.expert

Apple requires clients to be authorized before using , but doesn't want to link that authorization to the client's relay activity. That's great! This is what enables you to do! More people should do this!

I'm sad that part of that authorization is baked-in geoblocking restrictions, but I'm guessing that was a necessary restriction in order for websites to not block the egress relay IPs (which does occur to exit nodes).

#privaterelay #privacypass #tor #realworldcrypto

Last updated 1 year ago

str4d 🛡️ · @str4d
353 followers · 211 posts · Server abyssdomain.expert

Apple requires clients to be authorized before using , but doesn't want to link that authorization to the client's relay activity. That's great! This is what enables you to do! More people should do this!

I'm sad that part of that authorization is baked-in geoblocking restrictions, but I'm guessing that was a necessary restriction in order for websites to not block the egress relay IPs (which does occur to exit nodes).

#privaterelay #privacypass #tor #realworldcrypto

Last updated 1 year ago

CrashingBrain · @crashingbrain
2 followers · 23 posts · Server mstdn.social

The jetlag is strong among the audience of
I see people falling asleep left and right 😅

#rwc23 #realworldcrypto

Last updated 1 year ago

str4d 🛡️ · @str4d
353 followers · 210 posts · Server abyssdomain.expert

Single-shot tunnel building is necessary because tunnels are unidirectional. Tunnel hops only route half of the communication traffic, making traffic analysis harder. It also means more peers are involved in round-trip traffic, which can create reliability issues.

For which is not trying to do any traffic hiding and prioritises performance, using bidirectional tunnels and interactive tunnel building makes sense.

#i2p #privaterelay #realworldcrypto

Last updated 1 year ago

str4d 🛡️ · @str4d
353 followers · 209 posts · Server abyssdomain.expert

Apple describing their system (two-hop client IP privacy).

Tunnel establishment looks pretty similar to : build the first hop, extend new hops through earlier hops.

by comparision has single-shot tunnel building: it uses nested encryption to send a single message out, each hop stores its reply in its message layer and forwards it on, and the last hop is given a different tunnel to send the reply through to reach the client.

iacr.org/submit/files/slides/2

#privaterelay #tor #i2p #realworldcrypto

Last updated 1 year ago

str4d 🛡️ · @str4d
353 followers · 208 posts · Server abyssdomain.expert

This was a common thread at yesterday's conference as well: hashing is dominating the costs of post-quantum algorithms! (c/f using classical elliptic-curve crypto, where the cost is usually dominated by point addition and scalar multiplication).

iacr.org/submit/files/slides/2

#realworldpqc #realworldcrypto #postquantum #dilithium

Last updated 1 year ago

str4d 🛡️ · @str4d
353 followers · 207 posts · Server abyssdomain.expert

Meta: It would be really helpful if the RWC website provided linkable handles into the program so I could directly point to the abstracts. It does at least provide URLs to the talk slides, so that's what I'll link to where relevant.

#realworldcrypto #ux

Last updated 1 year ago

str4d 🛡️ · @str4d
353 followers · 207 posts · Server abyssdomain.expert

Meta: It would be really helpful if the RWC website provided linkable handles into the program so I could directly point to the abstracts. It does at least provide slides

#realworldcrypto #ux

Last updated 1 year ago

str4d 🛡️ · @str4d
352 followers · 205 posts · Server abyssdomain.expert

First day of ! Looking forward to some great talks and great discussions.

Find me if you want to chat about cryptographic implementations, zero-knowledge proofs, Rust, or how great it would be if RWC went to New Zealand! 😁

#realworldcrypto

Last updated 1 year ago

Chelsea Komlo · @chelseakomlo
769 followers · 125 posts · Server mathstodon.xyz

Finishing up my slides for my talk on the theory and practice of multi-party Schnorr signatures, can’t wait to give it! If there are any topics/questions folks have, I would love to know- hoping this will be a useful snapshot of where we’ve come and where we are going next.

#realworldcrypto

Last updated 1 year ago