br00t4c, to random
@br00t4c@mastodon.social avatar
br00t4c, to random
@br00t4c@mastodon.social avatar
LukaszOlejnik, to privacy
@LukaszOlejnik@mastodon.social avatar

Exciting news for the privacy community! A blind signature protocol has been standardized for practical use. Originally introduced by Chaum for untraceable payments, this cryptographic construct is now available for a wider range of applications. Check out the details and expect more privacy in technology products near you. While it is not resistant to attacks using theoretical (today) quantum computers, it is #GDPR compliant.

https://www.rfc-editor.org/rfc/rfc9474.html #privacy #cybersecurity #cryptography

image/png

nono2357, to random
conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

A #cybersecurity warrior always has more to learn. Especially about the wizardry of #cryptography. https://cromwell-intl.com/cybersecurity/crypto/reading.html?s=mc

Taffer, to random
@Taffer@mastodon.gamedev.place avatar

Matthew Green's got a great blog post up talking about how Schnorr signature schemes and identification schemes (aka key agreement) work: https://blog.cryptographyengineering.com/2023/10/06/to-schnorr-and-beyond-part-1/

Part 2 is going to talk about Dilithium, one of my favourites from NIST's post-quantum cryptography competition.

#cryptography #keyagreement #keyexchange #identification #signatures

odr_k4tana, to privacy

The recent #dataleak at 23andme means that a lot of people suddenly lost the ability to:

  • do DNA/RNA based biometric #authentication & #cryptography
  • have #privacy about health info (think genetic disorders)
  • be anonymous in terms of DNA-person match (which means ethically working researchers can not include their data in studies, e.g. GWAS etc.)

Sensitive data matters. Biodata is one of the most sensitive types of data you can think of. My advice: Don't use it as a first auth factor. And definitely not as a sole key for crypto.

Link to leak press release: https://www.bleepingcomputer.com/news/security/genetics-firm-23andme-says-user-data-stolen-in-credential-stuffing-attack/

johnl, to security
@johnl@mastodon.social avatar

NIST "botched" security analysis of Kyber in order to ensure it's selection, have kept the reasons secret and also happen to be working with the NSA. Doesn't look great does it: https://blog.cr.yp.to/20231003-countcorrectly.html

#cryptography #nsa #security #nist

ashar, to random
exa, to random
@exa@mastodon.online avatar
fosslife, to opensource
@fosslife@fosstodon.org avatar
Taffer, to random
@Taffer@mastodon.gamedev.place avatar
fkooman, to web
@fkooman@floss.social avatar

Does ECH (Encrypted Client Hello) make sense in the context of "small tech", i.e. hosting your own services, or only when using global CDNs / platforms? I'm guessing the latter...

It is tough place to be in. ECH makes some sense and could "protect" the users, but only if you use Cloudflare. But then Cloudflare gets all the data 🤷

https://blog.mozilla.org/en/products/firefox/encrypted-hello/

#tls #web #cryptography #privacy

leanpub, to books
@leanpub@mastodon.social avatar

Between the standard Java Runtime and the Bouncy Castle APIs there is a rich tool set of APIs to help work with the maze of standards and protocols needed for secure communication, storage and identity management. This book will help you navigate that maze and shine light into some of the darker corridors. https://leanpub.com/javacryptotoolsandtech #books #cryptography #Java

YourAnonRiots, to random Japanese

Core cryptographic algorithms can stand up to evolving cyberattacks right now, but for how much longer?

In the first part of our post-quantum #cryptography series, we look at contemporary cryptography and how #quantumcomputers could change it all: https://www.trendmicro.com/vinfo/us/security/news/security-technology/diving-deep-into-quantum-computing-modern-cryptography?utm_source=trendmicroresearch&utm_medium=smk&utm_campaign=0923_quantumcrypto1

Frederik_Borgesius, to Law

'Fundamental rights assessment
of the framework for detection orders under the CSAM proposal', by Ot van Daalen at IViR. Thorough and well-written legal analysis. Highly recommended.
https://www.ivir.nl/publicaties/download/CSAMreport.pdf
#law #eu #security #cybersecurity #politics #cryptography #ai #tech

Frederik_Borgesius, to Law

Remarks on “Chat Control”. By @matthew_d_green

Very clear, very informative - also for a lawyer like me. I highly recommend this.

https://blog.cryptographyengineering.com/2023/03/23/remarks-on-chat-control/

#law #eu #security #cybersecurity #politics #cryptography #ai #tech

ericmann, to php
@ericmann@tekton.network avatar

Gauging interest ...

Would you pay for a book (ebook or print) that walks through #cryptography ideas from PRNGs through XOR through simple ciphers through Libsodium with detailed examples in #PHP

Similar to the series I did on my blog a while back: https://eric.mann.blog/basic-cryptography-the-caesar-cipher/

atoponce, to random
@atoponce@fosstodon.org avatar

As I'm sure with many of you, I have a fascination with #cryptography by hand.

There's something intriguing about agents behind enemy lines, tuned into shortwave radio, transcribing numbers, and decrypting messages with a one-time pad.

Impractical for 99% of use cases, highly error-prone, insecure, and mind-numbingly slow to execute. Still, learning such things can be educational and fun.

But instead of encryption, what about randomness? What can we do by hand here?

1/10

edri, to random
@edri@eupolicy.social avatar

1/2 🚨Today, we’re welcoming in Brussels @signalapp's @Mer__edith, @CommissionerHR @dunja_mijatovic & @epfl's @carmelatroncoso among other experts & policymakers to discuss #encryption & privacy.

We're also pleased to have @cdteurope's Iverna McGowan moderate the discussion 🌟 & to hear from Noémie Levain, Legal Expert at @LaQuadrature, Beatriz Ramalho da Silva, Investigative Journalist at @lhreports & Bart Staszewski LGBTI+ activist, founder and chairman of Basta Fundacja 🤩

kkarhan,

@grin @edri @euronews @signalapp @fdroidorg
If "just use #Signal" was a working strategy, it would be illegal around the globe and would've gotten hacked like #EncroChat...

Oh wait, #CloudAct means they'll already have to integrate #Govware #Backdoors and #ITAR means they can't "export" secure #cryptography.

cendyne, to security
@cendyne@furry.engineer avatar
muzej, to Slovenia
@muzej@mastodon.social avatar
YourAnonRiots, to random Japanese

Core cryptographic algorithms can stand up to evolving cyberattacks right now, but for how much longer?

In the first part of our post-quantum #cryptography series, we look at contemporary cryptography and how #quantumcomputers could change it all: ⬇️
https://www.trendmicro.com/vinfo/us/security/news/security-technology/diving-deep-into-quantum-computing-modern-cryptography?utm_source=trendmicroresearch&utm_medium=smk&utm_campaign=0923_quantumcrypto1&s=09

vascorsd, to rust
@vascorsd@mastodon.social avatar

Let's Build a FIPS-validated Rust Crypto Library - https://briansmith.org/lets-build-a-fips-rust-crypto

#rust #cryptography #security

kibernick, to privacy
  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • modclub
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • GTA5RPClips
  • tacticalgear
  • normalnudes
  • tester
  • osvaldo12
  • everett
  • cubers
  • ethstaker
  • anitta
  • provamag3
  • Leos
  • cisconetworking
  • lostlight
  • All magazines