Discover and read the best of Twitter Threads about #REALWORLDCRYPTO

Most recents (9)

LIVE FROM TOKYO, IT'S #REALWORLDCRYPTO
(for a preview discussion of the whole program, check out our episode: securitycryptographywhatever.com/2023/03/24/rwc…)
First up in the PQC session is "How We Broke a Fifth-Order Masked Kyber Implementation by Copy-Paste" presented by Elena Dubrova
Read 863 tweets
LIVE, IN THE FLESH, FROM AMSTERDAM, IT'S #REALWORLDCRYPTO!
@cryptojedi kicking off with logistics Image
Kicking off with in fact, side channels: Spectre Declassified
Read 747 tweets
🤞 fingers crossed 🤞 that #realworldcrypto 2022 will actually be in Amsterdam IRL 🦠
First up in the Group Messaging session:

#REALWORLDCRYPTO Image
Read 456 tweets
If the attacker has <= Q guesses, access to the FSB bucket will give no advantage over baseline guessing. Higher Q, greater security loss

#realworldcrypto
Read 103 tweets
LIVE FROM COLUMBIA, IT'S DAY 3 OF #REALWORLDCRYPTO
Starting the Messaging session is "E2EE for Messenger: goals, plans and thinking"

#realworldcrypto
Zuck wants to integrate and E2E encrypt all the messaging services (messenger, Instagram, WhatsApp)

#realworldcrypto
Read 66 tweets
LIVE FROM COLUMBIA, IT'S DAY 2 OF #REALWORLDCRYPTO
I'm starting another thread because there were multiple branches in the previous one 🤦‍♀️
Second talk of the MPC session is on Apple's 'Find My Device' feature

#realworldcrypto
Read 319 tweets
LIVE FROM COLUMBIA, IT'S #REALWORLDCRYPTO
First up is the TLS session 🔒
First talk is Johanna Amann on measuring TLS 1.3 deployment in the wild with active and passive methods

#realworldcrypto
Read 250 tweets
Richard Barnes (@rlbarnes) just kicked off #RealWorldCrypto with a great overview of MLS, a new proposed standard for group message encryption. There’s still time to contribute: mlswg.github.io
Joanne Woodage (@joannewoodage) outlines a really cool attack on Facebook’s abuse reporting mechanism for encrypted messages. A great example of how popular schemes like AES-GCM can be easily misused. #RealWorldCrypto
The team also came up with a new one-pass authenticated encryption scheme based only on collision-resistant hash functions. It’s somewhat reminiscent of the Keccac team’s Keyac encryption based the a sponge construction: keccak.team/keyak.html
Read 70 tweets
I admire the cryptographers who had the patience and courage to work on Privacy Enhancing Technologies for decades before the Snowden leaks, even though the world wasn't ready for them. This quote explains it perfectly. #RealWorldCrypto “Only a crisis - actual or perceived - produces real change. When that crisis occurs, the actions that are taken depend on the ideas that are lying around. That, I believe, is our basic function: to develop alternatives to existing policies, to keep them alive and available until the politically impossible becomes the politically inevitable.” ― Milton Friedman
For many years, just about the only example of using fancy crypto (i.e., secure multiparty computation, zero-knowledge proofs, etc.) to protect privacy was the Danish sugar beet auction, which was frankly a bit silly. eprint.iacr.org/2008/068.pdf
Today, in addition to the obvious (cryptocurrencies), there are a growing number of examples of complex crypto protocols for privacy. After Snowden, tech companies have been far more willing to do the engineering. For example, this blog post by Cloudflare: blog.cloudflare.com/privacy-pass-t…
Read 7 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!