[-] Natanael@infosec.pub 37 points 1 month ago

FIFA peace price in shambles

1
submitted 2 months ago by Natanael@infosec.pub to c/crypto@infosec.pub
[-] Natanael@infosec.pub 44 points 2 months ago

That's because it doesn't, your brain does

Speakers do the simplest thing possible and literally just vibrate. A recording being played literally just recreates a recorded vibration. It's a tiny choreography that your ears are incredibly sensitive for.

All the fancy stuff happens in our brains, after our ears has split up the sound around us into different ranges of frequencies (you can think of the hairs in the inner ears as tuning forks). We learn to recognize which frequencies goes together, and then we learn how the frequencies from multiple sources can overlap, and we learn what it all means

The real crazy part is how something as simple as sound can carry so much information and how reliably our brains can tell it all apart and make sense of it

1
submitted 3 months ago by Natanael@infosec.pub to c/crypto@infosec.pub
1
submitted 4 months ago by Natanael@infosec.pub to c/crypto@infosec.pub
1
submitted 4 months ago by Natanael@infosec.pub to c/crypto@infosec.pub
[-] Natanael@infosec.pub 69 points 4 months ago

Crashing and then crashing

1
submitted 5 months ago* (last edited 5 months ago) by Natanael@infosec.pub to c/crypto@infosec.pub
1
submitted 5 months ago by Natanael@infosec.pub to c/crypto@infosec.pub
1
submitted 5 months ago by Natanael@infosec.pub to c/crypto@infosec.pub
[-] Natanael@infosec.pub 40 points 5 months ago

Every organ has their own nerves. Some have more or less their own brain cells (especially your gut). All nerves have memory to some degree - muscle memory is literally a thing

The amount of local regulatory control varies between organs, but the more complex they are the more you can assume the internal nerves control most of it and that the connection to the brain regulates it somewhat

1
submitted 5 months ago by Natanael@infosec.pub to c/crypto@infosec.pub
1
submitted 5 months ago by Natanael@infosec.pub to c/crypto@infosec.pub
[-] Natanael@infosec.pub 145 points 5 months ago

China does in fact have secret police in other countries

[-] Natanael@infosec.pub 71 points 6 months ago

This is known as a leap second, named after Usain Bolt leaping over the finish line a second faster than everybody else

[-] Natanael@infosec.pub 86 points 6 months ago* (last edited 6 months ago)

Evaporative cooling needs less water mass and less surface area for the same cooling effect. They could simply use bigger heat sinks outside the building and have a bigger water cooling system to make it closed loop, but they don't want to do that.

1
submitted 6 months ago* (last edited 6 months ago) by Natanael@infosec.pub to c/crypto@infosec.pub

Abstract Common verification steps in cryptographic protocols, such as signature or message authentication code checks or the validation of elliptic curve points, are crucial for the overall security of the protocol. Yet implementation errors omitting these steps easily remain unnoticed, as often the protocol will function perfectly anyways. One of the most prominent examples is Apple's goto fail bug where the erroneous certificate verification skipped over several of the required steps, marking invalid certificates as correctly verified. This vulnerability went undetected for at least 17 months.

We propose here a mechanism which supports the detection of such errors on a cryptographic level. Instead of merely returning the binary acceptance decision, we let the verification return more fine-grained information in form of what we call a confirmation code. The reader may think of the confirmation code as disposable information produced as part of the relevant verification steps. In case of an implementation error like the goto fail bug, the confirmation code would then miss essential elements.

The question arises now how to verify the confirmation code itself. We show how to use confirmation codes to tie security to basic functionality at the overall protocol level, making erroneous implementations be detected through the protocol not functioning properly. More concretely, we discuss the usage of confirmation codes in secure connections, established via a key exchange protocol and secured through the derived keys. If some verification steps in a key exchange protocol execution are faulty, then so will be the confirmation codes, and because we can let the confirmation codes enter key derivation, the connection of the two parties will eventually fail. In consequence, an implementation error like goto fail would now be detectable through a simple connection test.

1
submitted 6 months ago by Natanael@infosec.pub to c/crypto@infosec.pub
1
submitted 6 months ago* (last edited 6 months ago) by Natanael@infosec.pub to c/crypto@infosec.pub

https://bsky.app/profile/tumbolia.bsky.social/post/3ltyahiem3s2u

We updated our paper on Fiat-Shamir!

We now take a closer look at the gap between what symmetric cryptography has focused on for over 10 years (indifferentiability) and what is actually needed for the soundness of ZKPs and SNARKs (something stronger!).

[-] Natanael@infosec.pub 42 points 7 months ago

And "would leave rights holders liable" is completely false, no game would have offline modes if it did

[-] Natanael@infosec.pub 38 points 8 months ago* (last edited 8 months ago)

Then you want them to advertise NIST PQ standards

... Which is also not necessary for single user password databases anyway

[-] Natanael@infosec.pub 53 points 9 months ago

Archive.org

There's additional mirrors, but that's the big one

[-] Natanael@infosec.pub 68 points 1 year ago

One Rich Asshole Called Larry Ellison.

view more: next ›

Natanael

0 post score
0 comment score
joined 1 year ago