With previous improvements + avx2 finding a fully entangled tag (one that will match for 2 different tagging/verification keys) now takes ~79 seconds on a consumer desktop.
That's much less than my original estimates of ~15 minutes prior to any of these optimizations - and pushes entangled tags from a curiosity into something that is potentially practical.
One potential application is as acknowledgements of honest mixing in niwl (
Alice could tag a message to both Bob *and* herself. Alice can then tell if a mixer and the untrusted server is honestly carrying forward her message if she receives it back.
The mixer is never in possession of the detection key and so gains no information from this process.
The routing server will observe a message for some % of participants (including Alice *and* Bob) - which could be true of *any* arbitrary message.
Encoding acks within messages themselves doesn't prove that Bob received the message, but it does show the mixer(s) decrypted and routed the messages honestly, and that the untrusted server honestly presented a message potentially for Alice, to Alice.
It's still much more expensive to generate a fully entangled tag (79s) v.s. a regular tag (>1ms) - so Alice might not want to do it for every message, but if enough parties do it at random it provides a strong check on the honesty of the whole system.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Need a break from research, ask me any cryptocurrency/blockchain related question and I will give you my honest, unfiltered answer.
Only if we consider all transactions as equally valuable to store - which their not. Ultimately blockchain space is a limited resource and is subject to the same economic constraints as other limited resources.
Any legitimacy that smart contracts might have had died when the DAO was reversed. Either code is law damn the consequences, or smart contracts are just as fragile as any other mechanism when it comes to mob justice.
The most important understanding I've come to involving cryptocurrency is that there exists are large portion of people who absolutely don't understand the point of decentralization (of power) and consider the expense of decentralization a defect (that they can "fix").
Prior to that, I had some ridiculously frustrating conversations regarding e.g. why some structure wasn't actually "decentralized" because the power was concentrated in some entity.
Then I realized that those teams weren't actually interested in decentralizing power.
Decentralization ultimately became a marketing term used to describe the number of entities involved in a consensus, rather than the mechanisms over which power was transferred to and between those entities.
It was a sunny day today so I did some more satellite captures. Fixed up the antenna a little, and also dug out an LNA and tested some passes with/without. I had 2 passes clobbered by METEOR-M2, and the rest were pretty low, but overall I think this setup is improving.
Decided to stay out late since the last pass of the evening was pretty high, and I'm glad I did...
This the definitely the best capture I've ever had, the LNA definitely helps with the new antenna. I think if I could get it up a little higher it would do even better. I'd like to eventually build a QFH but the performance of the v-dipole is awesome considering the limitations.
I see that we are talking about "Hypocrite Commits" again and I want to clarify a few things.
Despite what their paper says they didn't get an IRB-exemption until *after* they posted about their IEEESP paper acceptance and a group of researchers (inc myself) expressed concern...
They lied to people in order to assess their response, with no system in place for prior informed consent or debriefing.
That any IRB could conclude that it wasn't a deception study on human subjects speaks to the overall ability of many IRBs to reason about internet studies.
As an aside, I love the way that the NSPCC tell on themselves in this ridiculous report by contrasting the rights of children with the rights of "LGBTQ+ young people"
Refusing to even acknowledge the intersectionality of their own client base if a great way to provide "balance".
Anyway we do this dance every 6 weeks or so now, and I'm busy building actual privacy tools so I will let past-Sarah explain why all of this is bullshit.
I regret to inform you that the tone in which I tweet about vulnerabilities in my free time has no bearing on how impactful that vulnerability may be to you.
The nice thing about public demonstrations of vulnerabilities is that you can't argue about them until you've fixed them, after that I don't particularly care if you think I should have been nicer about it.
I've been called every name in the book at this point, some not in the book, threatened with lawsuits, prison, one comedian even remarked that I look like I might have been burned at the stake after a disclosure.