sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

599
active users

#cryptography

10 posts10 participants0 posts today
Lobsters<p>OpenPGP for application developers <a href="https://lobste.rs/s/8kxhxe" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/8kxhxe</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a><br><a href="https://openpgp.dev/book/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">openpgp.dev/book/index.html</span><span class="invisible"></span></a></p>
Aaron Toponce ⚛️:debian:<p>I'm reading the paper by Bruce Schneier and Niels Ferguson on the Fortuna CSPRNG from 2003.</p><p>You can read it here: <a href="https://www.schneier.com/wp-content/uploads/2015/12/fortuna.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/wp-content/upload</span><span class="invisible">s/2015/12/fortuna.pdf</span></a></p><p>Note the highlighted section. This describes precisely fast key erasure that Daniel J. Bernstein describes in his 2017 blog post: <a href="https://blog.cr.yp.to/20170723-random.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.cr.yp.to/20170723-random.</span><span class="invisible">html</span></a></p><p><a href="https://fosstodon.org/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://fosstodon.org/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Cryptomator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptomator</span></a>: Our Roadmap to Post-Quantum <a href="https://mastodon.thenewoil.org/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a></p><p><a href="https://cryptomator.org/blog/2025/07/24/post-quantum-roadmap/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cryptomator.org/blog/2025/07/2</span><span class="invisible">4/post-quantum-roadmap/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/PQC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PQC</span></a></p>
TechnoTenshi :verified_trans: :Fire_Lesbian:<p>A new proof shows quantum cryptography can be built on problems even harder than NP, offering security beyond classical encryption. Researchers introduced "one-way puzzles" to replace traditional cryptographic foundations.</p><p><a href="https://www.quantamagazine.org/quantum-scientists-have-built-a-new-math-of-cryptography-20250725/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">quantamagazine.org/quantum-sci</span><span class="invisible">entists-have-built-a-new-math-of-cryptography-20250725/</span></a></p><p><a href="https://infosec.exchange/tags/QuantumComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuantumComputing</span></a> <a href="https://infosec.exchange/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/PostQuantum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PostQuantum</span></a></p>
Victoria Stuart 🇨🇦 🏳️‍⚧️<p>These are clever people: Quantum Scientists Building New Math of Cryptography<br><a href="https://www.quantamagazine.org/quantum-scientists-have-built-a-new-math-of-cryptography-20250725/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">quantamagazine.org/quantum-sci</span><span class="invisible">entists-have-built-a-new-math-of-cryptography-20250725/</span></a><br>One-way function<br><a href="https://en.wikipedia.org/wiki/One-way_function" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/One-way_</span><span class="invisible">function</span></a><br>Quantum cryptography<br><a href="https://en.wikipedia.org/wiki/Quantum_cryptography" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Quantum_</span><span class="invisible">cryptography</span></a><br>Permanent (mathematics)<br><a href="https://en.wikipedia.org/wiki/Permanent_(mathematics)" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Permanen</span><span class="invisible">t_(mathematics)</span></a><br>♯P-completeness of 01-permanent<br><a href="https://en.wikipedia.org/wiki/%E2%99%AFP-completeness_of_01-permanent" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/%E2%99%A</span><span class="invisible">FP-completeness_of_01-permanent</span></a></p><p><a href="https://mastodon.social/tags/mathematics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mathematics</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/OneWayFunctions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OneWayFunctions</span></a> <a href="https://mastodon.social/tags/LinearAlgebra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinearAlgebra</span></a> <a href="https://mastodon.social/tags/matrices" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>matrices</span></a> <a href="https://mastodon.social/tags/QuantumCryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuantumCryptography</span></a> <a href="https://mastodon.social/tags/NPhard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NPhard</span></a></p>
CosicBe<p>Curious about the latest in <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> and <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> research? The new COSIC newsletter gives you a two-month snapshot of our key achievements and updates. Read it here: <a href="https://www.esat.kuleuven.be/cosic/sites/newsletter/2025/07/24/cosic-newsletter-june-july/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">esat.kuleuven.be/cosic/sites/n</span><span class="invisible">ewsletter/2025/07/24/cosic-newsletter-june-july/</span></a></p>
Laurent Cheylus<p>A good Introduction at Fully Homomorphic Encryption (FHE): it allows arbitrary computations on ciphertext (encrypted data) — without needing to decrypt it first - Article by Barış Özmen <a href="https://bsd.network/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://bozmen.io/fhe" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">bozmen.io/fhe</span><span class="invisible"></span></a></p>
Aaron Toponce ⚛️:debian:<p>I finally finished by browser-based randomness nonsense. Let me know what you think.</p><p><a href="https://atoponce.github.io" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">atoponce.github.io</span><span class="invisible"></span></a></p><p><a href="https://fosstodon.org/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://fosstodon.org/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://fosstodon.org/tags/passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwords</span></a></p>
🧿🪬🍄🌈🎮💻🚲🥓🎃💀🏴🛻🇺🇸<p>I think that the <a href="https://mastodon.social/tags/openweb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openweb</span></a> and <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> are orthogonal. If <a href="https://mastodon.social/tags/InformationWantsToBeFree" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationWantsToBeFree</span></a> then why are you using <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a>? </p><p>They are both good things, but you can't be doing them both at the same time.</p><p><a href="https://mastodon.social/tags/cypherpunk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cypherpunk</span></a> <a href="https://mastodon.social/tags/indieweb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>indieweb</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
Tony “Abolish ICE” Arcieri🌹🦀<p>Replication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dog: a snarky take on how unimpressive these records actually are</p><p><a href="https://eprint.iacr.org/2025/1237.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">eprint.iacr.org/2025/1237.pdf</span><span class="invisible"></span></a></p><p><a href="https://mas.to/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a></p>
xoron :verified:<p><a href="https://infosec.exchange/tags/Decentralized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Decentralized</span></a> <a href="https://infosec.exchange/tags/Module" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Module</span></a> <a href="https://infosec.exchange/tags/Federation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Federation</span></a> <a href="https://infosec.exchange/tags/Microfrontend" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microfrontend</span></a> <a href="https://infosec.exchange/tags/Architecture" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Architecture</span></a> </p><p>I'm working on a <a href="https://infosec.exchange/tags/webapp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webapp</span></a> and I'm being <a href="https://infosec.exchange/tags/creative" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>creative</span></a> on the <a href="https://infosec.exchange/tags/approach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>approach</span></a>. It might be considered <a href="https://infosec.exchange/tags/overcomplicated" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>overcomplicated</span></a> (because it is), but I'm just trying something out. It's entirely possible this approach won't work <a href="https://infosec.exchange/tags/longterm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>longterm</span></a>. I see it as there is <a href="https://infosec.exchange/tags/onewaytofindout" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>onewaytofindout</span></a>. I don't recommend this approach. Just sharing what I'm trying/#investigating.</p><p>How it will be <a href="https://infosec.exchange/tags/architected" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>architected</span></a>: [<a href="https://positive-intentions.com/blog/decentralised-architecture](https://positive-intentions.com/blog/decentralised-architecture)" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">positive-intentions.com/blog/d</span><span class="invisible">ecentralised-architecture](https://positive-intentions.com/blog/decentralised-architecture)</span></a><br>Some <a href="https://infosec.exchange/tags/benefits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>benefits</span></a> of the <a href="https://infosec.exchange/tags/approach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>approach</span></a>: [<a href="https://positive-intentions.com/blog/statics-as-a-chat-app-infrastructure](https://positive-intentions.com/blog/statics-as-a-chat-app-infrastructure)" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">positive-intentions.com/blog/s</span><span class="invisible">tatics-as-a-chat-app-infrastructure](https://positive-intentions.com/blog/statics-as-a-chat-app-infrastructure)</span></a></p><p>I find that <a href="https://infosec.exchange/tags/modulefederation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>modulefederation</span></a> and <a href="https://infosec.exchange/tags/microfrontends" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microfrontends</span></a> to generally be <a href="https://infosec.exchange/tags/discouraged" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>discouraged</span></a> when I see posts, but I think it works for me in my <a href="https://infosec.exchange/tags/approach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>approach</span></a>. I'm <a href="https://infosec.exchange/tags/optimistic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>optimistic</span></a> about the approach and the <a href="https://infosec.exchange/tags/benefits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>benefits</span></a> and so I wanted to <a href="https://infosec.exchange/tags/share" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>share</span></a> details.</p><p>When I serve the <a href="https://infosec.exchange/tags/federatedmodules" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>federatedmodules</span></a>, I can also host the <a href="https://infosec.exchange/tags/storybook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>storybook</span></a> statics so I think this could be a good way to <a href="https://infosec.exchange/tags/document" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>document</span></a> the modules in <a href="https://infosec.exchange/tags/isolation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>isolation</span></a>.</p><p><a href="https://infosec.exchange/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> modules - <a href="https://cryptography.positive-intentions.com/?path=%2Fdocs%2Fcryptography-introduction--docs" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cryptography.positive-intentio</span><span class="invisible">ns.com/?path=%2Fdocs%2Fcryptography-introduction--docs</span></a></p><p><a href="https://infosec.exchange/tags/P2P" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>P2P</span></a> framework - <a href="https://p2p.positive-intentions.com/?path=%2Fdocs%2Fe2e-tests-connectionstatus--docs" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">p2p.positive-intentions.com/?p</span><span class="invisible">ath=%2Fdocs%2Fe2e-tests-connectionstatus--docs</span></a></p><p>This way, I can create <a href="https://infosec.exchange/tags/microfrontends" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microfrontends</span></a> that consume these <a href="https://infosec.exchange/tags/modules" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>modules</span></a>. I can then <a href="https://infosec.exchange/tags/share" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>share</span></a> the <a href="https://infosec.exchange/tags/functionality" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>functionality</span></a> between <a href="https://infosec.exchange/tags/apps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apps</span></a>. The following apps are using a different codebase from each other (there is a <a href="https://infosec.exchange/tags/distinction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>distinction</span></a> between these apps in <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> and <a href="https://infosec.exchange/tags/closesource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>closesource</span></a>). Sharing those <a href="https://infosec.exchange/tags/dependencies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dependencies</span></a> could help make it easier to roll out <a href="https://infosec.exchange/tags/updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>updates</span></a> to <a href="https://infosec.exchange/tags/coremechanics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coremechanics</span></a>.</p><p><a href="https://infosec.exchange/tags/P2P" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>P2P</span></a> chat - [<a href="https://chat.positive-intentions.com/](https://chat.positive-intentions.com/)" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">chat.positive-intentions.com/]</span><span class="invisible">(https://chat.positive-intentions.com/)</span></a><br><a href="https://infosec.exchange/tags/P2P" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>P2P</span></a> file transfer - [<a href="https://file.positive-intentions.com/](https://file.positive-intentions.com/)" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">file.positive-intentions.com/]</span><span class="invisible">(https://file.positive-intentions.com/)</span></a></p><p>The <a href="https://infosec.exchange/tags/functionality" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>functionality</span></a> also works when I create an <a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> build with <a href="https://infosec.exchange/tags/Tauri" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tauri</span></a>. This could also lead to it being easier to create <a href="https://infosec.exchange/tags/newapps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newapps</span></a> that could use the <a href="https://infosec.exchange/tags/modules" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>modules</span></a> created.</p><p>I'm sure there will be some distinct <a href="https://infosec.exchange/tags/test" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>test</span></a>/#maintenance <a href="https://infosec.exchange/tags/overhead" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>overhead</span></a>, but depending on how it's <a href="https://infosec.exchange/tags/architected" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>architected</span></a> I think it could work and make it easier to <a href="https://infosec.exchange/tags/improve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>improve</span></a> on the current <a href="https://infosec.exchange/tags/implementation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>implementation</span></a>.</p><p>Everything about the <a href="https://infosec.exchange/tags/project" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>project</span></a> is far from finished. It could be seen as this is a <a href="https://infosec.exchange/tags/complicated" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>complicated</span></a> way to do what <a href="https://infosec.exchange/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> does, but I think this <a href="https://infosec.exchange/tags/approach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>approach</span></a> allows for greater <a href="https://infosec.exchange/tags/flexibility" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>flexibility</span></a> by being able to <a href="https://infosec.exchange/tags/separate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>separate</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> and <a href="https://infosec.exchange/tags/closesource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>closesource</span></a> code for the <a href="https://infosec.exchange/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a>. (Of course as <a href="https://infosec.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>javascript</span></a>, it will always be "source code available". Especially in the age of <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a>, I'm sure it's possible to <a href="https://infosec.exchange/tags/reverseengineer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineer</span></a> it like never before.)</p><p>(mastodon might not be the place for something like this, so let me know if you dont like this kind of content. i typically post on reddit and would like to shift it more towards mastodon. i also use lemmy, but mastodon has a better reach.)</p>
Risotto Bias<p>is it weird that "I built a toy cryptography system" is treated sooo much worse compared to "I built a hobby kernel", or "I built a toy DB" or "I built an orchestrator for my home lab"? I've seen people be like "just use postgres/sqlite", sure - but that's different from "[clutches pearls], No SQL? How dare you. Perish the thought! It's not ACID! How will we ever... Never use this in production. Microkernels? They'll never be practical!"</p><p><a href="https://toot.risottobias.org/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://toot.risottobias.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Stéphane Bortzmeyer<p>"Selfie attack"? It really exists?</p><p><a href="https://mastodon.gougere.fr/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.gougere.fr/tags/IETF123" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IETF123</span></a></p>
the magnificent rhys<p>Apropos nothing, Daniel Bernstein's post from earlier in the year on the viability of quantum computing.</p><p><a href="https://mastodon.rhys.wtf/tags/quantum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quantum</span></a> <a href="https://mastodon.rhys.wtf/tags/PQC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PQC</span></a> <a href="https://mastodon.rhys.wtf/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> </p><p><a href="https://blog.cr.yp.to/20250118-flight.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.cr.yp.to/20250118-flight.</span><span class="invisible">html</span></a></p>
Lobsters<p>Frequently Asked Questions about FHE <a href="https://lobste.rs/s/tihya6" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/tihya6</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/math" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>math</span></a><br><a href="https://www.jeremykun.com/frequently-asked-questions-about-fhe/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">jeremykun.com/frequently-asked</span><span class="invisible">-questions-about-fhe/</span></a></p>
DeadSwitch @ T0m's 1T C4fe<p>DeadSwitch Vault - Emacs-based KeppassXC database GPG encryption for Ghosts: streamlined!</p><p><a href="https://github.com/DeadSwitch404/ds-vault" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/DeadSwitch404/ds-va</span><span class="invisible">ult</span></a></p><p>- Sane command names<br>- More helpful readme<br>- Nicer help command</p><p><a href="https://mastodon.social/tags/Emacs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Emacs</span></a> <a href="https://mastodon.social/tags/Vault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vault</span></a> <a href="https://mastodon.social/tags/KeepassXC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KeepassXC</span></a> <a href="https://mastodon.social/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://mastodon.social/tags/Encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Encryption</span></a> <a href="https://mastodon.social/tags/DeadSwitch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeadSwitch</span></a> <a href="https://mastodon.social/tags/OSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSS</span></a></p>
Preston Maness ☭<p><span class="h-card" translate="no"><a href="https://mstdn.social/@rebeccawatson" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rebeccawatson</span></a></span> There actually *are* ways of performing age verification in a privacy-preserving way, thanks to zero-knowledge proof cryptography:</p><p><a href="https://github.com/zkpassport" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/zkpassport</span><span class="invisible"></span></a></p><p>StRanGeLY tHoUgH, governments don't seem interested in merely knowing that a user truly is &gt;=$some_age, and not knowing anything else about them. They really, *really* wanna know who the perverts^W adults are.</p><p><a href="https://tenforward.social/tags/zkp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zkp</span></a> <a href="https://tenforward.social/tags/zkproof" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zkproof</span></a> <a href="https://tenforward.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://tenforward.social/tags/cryptology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptology</span></a></p>
UK<p><a href="https://www.europesays.com/uk/270957/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/uk/270957/</span><span class="invisible"></span></a> “Unlocking a Cosmic Code”: Alien Math Language Reveals Secrets of the Universe in This Groundbreaking 320-Page Report by Top Scientists <a href="https://pubeurope.com/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://pubeurope.com/tags/MathematicalDiscovery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MathematicalDiscovery</span></a> <a href="https://pubeurope.com/tags/Science" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Science</span></a> <a href="https://pubeurope.com/tags/Space" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Space</span></a> <a href="https://pubeurope.com/tags/TheoreticalPhysics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheoreticalPhysics</span></a> <a href="https://pubeurope.com/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a> <a href="https://pubeurope.com/tags/UnitedKingdom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedKingdom</span></a></p>
🧿🪬🍄🌈🎮💻🚲🥓🎃💀🏴🛻🇺🇸<p>&gt; Researchers claim to have used a <a href="https://mastodon.social/tags/quantumComputer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quantumComputer</span></a> to factor a 2,048-bit <a href="https://mastodon.social/tags/RSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RSA</span></a> integer.</p><p>&gt; But the RSA number evaluated was the product of two prime factors that were too close together.</p><p>&gt; As with a parlor magician's card deck that's been stacked for a card trick</p><p>&gt; <a href="https://mastodon.social/tags/Quantum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quantum</span></a> <a href="https://mastodon.social/tags/factorization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>factorization</span></a> is performed using sleight-of-hand numbers that have been selected to make them very easy to factorize using a <a href="https://mastodon.social/tags/physics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>physics</span></a> experiment</p><p><a href="https://www.theregister.com/2025/07/17/quantum_cryptanalysis_criticism/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/07/17/qua</span><span class="invisible">ntum_cryptanalysis_criticism/</span></a></p><p><a href="https://mastodon.social/tags/quantumComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quantumComputing</span></a> <a href="https://mastodon.social/tags/computerScience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computerScience</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a></p>
Laurent Cheylus<p>The FIPS 140-3 Go Cryptographic Module: validation of Go Cryptographic Module v1.0.0 (included in Go 1.24) to FIPS 140 standard <a href="https://bsd.network/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://bsd.network/tags/Go" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Go</span></a> <a href="https://go.dev/blog/fips140" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">go.dev/blog/fips140</span><span class="invisible"></span></a></p>