#cryptography — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #cryptography, aggregated by home.social.
-
https://www.europesays.com/britain/36447/ UK sets out cyber resilience Bill & digital ID plans #CriticalInfrastructure #Cryptography #CyberResilience #CyberTraining #Cybersecurity #Data/Privacy #DataProtection #DigitalIdentity #DigitalTransformation #Entrust #IdentityVerification #Infosec #NationalCyberSecurityCentre(NCSC) #NationalSecurity #NCCGroup #OnlineSecurity #Risk&Compliance #RiskManagement #SupplyChain #SupplyChainSecurity #ThreatLandscape #UK #UkGovernment #UnitedKingdom #UnitedKingdom(UK)
-
Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅
Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇
https://juncotic.com/copyfail-vulnerabilidad-del-sistema-criptografico-de-linux/
#gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic
-
Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅
Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇
https://juncotic.com/copyfail-vulnerabilidad-del-sistema-criptografico-de-linux/
#gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic
-
Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅
Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇
https://juncotic.com/copyfail-vulnerabilidad-del-sistema-criptografico-de-linux/
#gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic
-
Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅
Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇
https://juncotic.com/copyfail-vulnerabilidad-del-sistema-criptografico-de-linux/
#gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic
-
Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅
Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇
https://juncotic.com/copyfail-vulnerabilidad-del-sistema-criptografico-de-linux/
#gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic
-
Arthur Scherbius, who died OTD in 1929, invented the electro-mechanical Enigma cipher machine used by Germany before and during #WorldWarII https://cromwell-intl.com/cybersecurity/crypto/ciphers.html?s=mb #cryptography
-
Arthur Scherbius, who died OTD in 1929, invented the electro-mechanical Enigma cipher machine used by Germany before and during #WorldWarII https://cromwell-intl.com/cybersecurity/crypto/?s=mb #cryptography
-
Arthur Scherbius, who died OTD in 1929, invented the electro-mechanical Enigma cipher machine used by Germany before and during #WorldWarII; see where the Allies worked to break it https://cromwell-intl.com/travel/uk/bletchley-park/?s=mb #travel #history #cryptography
-
Nueva tarde de grabación! Seguimos sumando contenido al curso de Hardening Linux!
Hoy, actualizando un video de hace unos 10 años en el canal... sí, Linux cambió las reglas del juego en cuestión de entropía, y vale la pena actualizarse sobre valores aleatorios y dispositivos random 😜
Estén atentos/as que pronto estará online la continuación!
#gnu #linux #entropia #entropy #random #cryptography #criptografia #ciberseguridad #infosec #cybersecurity #hardening #juncotic
-
Nueva tarde de grabación! Seguimos sumando contenido al curso de Hardening Linux!
Hoy, actualizando un video de hace unos 10 años en el canal... sí, Linux cambió las reglas del juego en cuestión de entropía, y vale la pena actualizarse sobre valores aleatorios y dispositivos random 😜
Estén atentos/as que pronto estará online la continuación!
#gnu #linux #entropia #entropy #random #cryptography #criptografia #ciberseguridad #infosec #cybersecurity #hardening #juncotic
-
Nueva tarde de grabación! Seguimos sumando contenido al curso de Hardening Linux!
Hoy, actualizando un video de hace unos 10 años en el canal... sí, Linux cambió las reglas del juego en cuestión de entropía, y vale la pena actualizarse sobre valores aleatorios y dispositivos random 😜
Estén atentos/as que pronto estará online la continuación!
#gnu #linux #entropia #entropy #random #cryptography #criptografia #ciberseguridad #infosec #cybersecurity #hardening #juncotic
-
Nueva tarde de grabación! Seguimos sumando contenido al curso de Hardening Linux!
Hoy, actualizando un video de hace unos 10 años en el canal... sí, Linux cambió las reglas del juego en cuestión de entropía, y vale la pena actualizarse sobre valores aleatorios y dispositivos random 😜
Estén atentos/as que pronto estará online la continuación!
#gnu #linux #entropia #entropy #random #cryptography #criptografia #ciberseguridad #infosec #cybersecurity #hardening #juncotic
-
Nueva tarde de grabación! Seguimos sumando contenido al curso de Hardening Linux!
Hoy, actualizando un video de hace unos 10 años en el canal... sí, Linux cambió las reglas del juego en cuestión de entropía, y vale la pena actualizarse sobre valores aleatorios y dispositivos random 😜
Estén atentos/as que pronto estará online la continuación!
#gnu #linux #entropia #entropy #random #cryptography #criptografia #ciberseguridad #infosec #cybersecurity #hardening #juncotic
-
Hey! If you're at Eurocrypt and do not have a CedarCrypt flyer yet do not talk to @nadim.computer , come talk to me instead! I have a deal with Nadim: if I manage to hand over all the flyers he gave me to people who still don't have one, he will join Mastodon! I have only 4 flyers left! We can do this! F**k BlueSky! 😜
#crypto #cryptography #eurocrypt #eurocrypt2026 #cedarcrypt #fediverse #mastodon #bluesky #fun #humor #rome #italy #bet
-
NVME erasing: Various options for wiping an SSD. There's a neat crypto option by default that is nearly instant, but only some drives have it
https://www.drivewipe.com/guides/nvme-secure-erase
#cryptography #security #linux #nvme #wipe #ssd #+ -
Thanks to the #CAW #caw2026 organizers at #iacr #eurocrypt #eurocrypt2026 in #rome #italy for hosting my #shufflecake talk, great engagement, questions and audience feedback!
#crypto #cryptography #security #privacy #cypherpunk #foss #libre #opensource
-
Weekend Reading from TechAptitude!
Get to know new Cryptography Standards (FIPS 20-3, FIPS 204, FIPS 205, FIPS 206) developed by NIST to withstand quantum attacks and prevent the so-called “Q-Day”. Q-Day is an estimate of the point in time when quantum computers will be able to reliably break existing RSA-2048 cryptography. https://techaptitude.substack.com/p/quantum-technologies-nist-drives #PQC #NIST #Cryptography #Q_Day #PostQuantumCryptography #Quantum #Encryption #CryptographyAlgorithms #TechAptitude
-
A Tale of Two Worlds, a Formal Story of WireGuard Hybridization via @RunxiYu https://lobste.rs/s/aeyi20 #pdf #cryptography
https://www.usenix.org/system/files/usenixsecurity25-lafourcade.pdf -
https://npmjs.com/package/lvthn
the leviathan cli crypto tool has been updated w/ the 2.1.0 fixes and enhancements.bun / npm i -g lvthn
averages ~1gb per sec using serpent-256, nearly half that using xchacha20 ;D
-
The United States has criminalized the 1077th prime number and #0021C7, a shade of royal blue. Does this make America stronger as a nation? Consider the implications for #cryptography and the #visualArts alone.
-
#TodayInHistory 1916 – Claude Shannon, is born. (d 2001)
Known as the "father of information theory", and laid the foundations of the Information Age. The first to describe the use of Boolean algebra—essential to all digital electronic circuits—and founded the field of #AI
His work to cryptanalysis laid the foundation for symmetric-key cryptography, including Data Encryption Standard (DES), and Advanced Encryption Standard (AES). Regarding him as the "founding father of modern #cryptography
-
For our #eID work with @cdengler and Clement Humbert we created a reading list with several presentations of our sources related to #ZeroKnowledgeProofs. You can either look at it on github:
https://eid-privacy.github.io/wp2/2026/04/22/zkp-vault.html
Or download it and open it with Obsidian to browse around. Of course we'd be very happy if you create a PR with your preferred paper on ZKPs!
#DigitalTrust #Privacy #Cryptography #eID #EPFL #C4DT #DigitalIdentity #Innovation #swisstech
-
Go's crypto library got FIPS 140-3 certified
https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/5247
-
MOSS Season 2 continues next week.
🎙️ Benjamin Wesolowski (CNRS & ENS Lyon, France)
Talk title: Random walks in number-theoretic cryptology
🗓️ Thursday, 7 May 2026 • 🕓 4:00 PM CEST • Online
Abstract: Cryptography met number theory in 1976, when Diffie and Hellman achieved what had long been considered impossible: a protocol for two people to exchange secret information on a public channel, even if they had never met before to establish some kind of password, a pre-shared key. Diffie and Hellman designed the protocol such that a spy attempting to find the secret would need to solve a presumably hard computational problem: the discrete logarithm problem in the multiplicative group of a finite field.
Since then, number theory has consistently met the challenges of cryptography, offering a variety of difficult algorithmic problems and powerful tools for their analysis. In this talk, we will explore this “mathematical cryptology”, with a focus on euclidean lattices (designed to resist against quantum computers), the use of random walks, and how spectral methods in number theory apply to cryptology.
----------------------------------------------
Scan the QR code in the image to join the mailing list and receive the online access link.
#Mathematics #NumberTheory #Cryptography #Lattices #PostQuantum #MOSS #EMS
-
MOSS Season 2 continues next week.
🎙️ Benjamin Wesolowski (CNRS & ENS Lyon, France)
Talk title: Random walks in number-theoretic cryptology
🗓️ Thursday, 7 May 2026 • 🕓 4:00 PM CEST • Online
Abstract: Cryptography met number theory in 1976, when Diffie and Hellman achieved what had long been considered impossible: a protocol for two people to exchange secret information on a public channel, even if they had never met before to establish some kind of password, a pre-shared key. Diffie and Hellman designed the protocol such that a spy attempting to find the secret would need to solve a presumably hard computational problem: the discrete logarithm problem in the multiplicative group of a finite field.
Since then, number theory has consistently met the challenges of cryptography, offering a variety of difficult algorithmic problems and powerful tools for their analysis. In this talk, we will explore this “mathematical cryptology”, with a focus on euclidean lattices (designed to resist against quantum computers), the use of random walks, and how spectral methods in number theory apply to cryptology.
----------------------------------------------
Scan the QR code in the image to join the mailing list and receive the online access link.
#Mathematics #NumberTheory #Cryptography #Lattices #PostQuantum #MOSS #EMS
-
MOSS Season 2 continues next week.
🎙️ Benjamin Wesolowski (CNRS & ENS Lyon, France)
Talk title: Random walks in number-theoretic cryptology
🗓️ Thursday, 7 May 2026 • 🕓 4:00 PM CEST • Online
Abstract: Cryptography met number theory in 1976, when Diffie and Hellman achieved what had long been considered impossible: a protocol for two people to exchange secret information on a public channel, even if they had never met before to establish some kind of password, a pre-shared key. Diffie and Hellman designed the protocol such that a spy attempting to find the secret would need to solve a presumably hard computational problem: the discrete logarithm problem in the multiplicative group of a finite field.
Since then, number theory has consistently met the challenges of cryptography, offering a variety of difficult algorithmic problems and powerful tools for their analysis. In this talk, we will explore this “mathematical cryptology”, with a focus on euclidean lattices (designed to resist against quantum computers), the use of random walks, and how spectral methods in number theory apply to cryptology.
----------------------------------------------
Scan the QR code in the image to join the mailing list and receive the online access link.
#Mathematics #NumberTheory #Cryptography #Lattices #PostQuantum #MOSS #EMS
-
MOSS Season 2 continues next week.
🎙️ Benjamin Wesolowski (CNRS & ENS Lyon, France)
Talk title: Random walks in number-theoretic cryptology
🗓️ Thursday, 7 May 2026 • 🕓 4:00 PM CEST • Online
Abstract: Cryptography met number theory in 1976, when Diffie and Hellman achieved what had long been considered impossible: a protocol for two people to exchange secret information on a public channel, even if they had never met before to establish some kind of password, a pre-shared key. Diffie and Hellman designed the protocol such that a spy attempting to find the secret would need to solve a presumably hard computational problem: the discrete logarithm problem in the multiplicative group of a finite field.
Since then, number theory has consistently met the challenges of cryptography, offering a variety of difficult algorithmic problems and powerful tools for their analysis. In this talk, we will explore this “mathematical cryptology”, with a focus on euclidean lattices (designed to resist against quantum computers), the use of random walks, and how spectral methods in number theory apply to cryptology.
----------------------------------------------
Scan the QR code in the image to join the mailing list and receive the online access link.
#Mathematics #NumberTheory #Cryptography #Lattices #PostQuantum #MOSS #EMS
-
MOSS Season 2 continues next week.
🎙️ Benjamin Wesolowski (CNRS & ENS Lyon, France)
Talk title: Random walks in number-theoretic cryptology
🗓️ Thursday, 7 May 2026 • 🕓 4:00 PM CEST • Online
Abstract: Cryptography met number theory in 1976, when Diffie and Hellman achieved what had long been considered impossible: a protocol for two people to exchange secret information on a public channel, even if they had never met before to establish some kind of password, a pre-shared key. Diffie and Hellman designed the protocol such that a spy attempting to find the secret would need to solve a presumably hard computational problem: the discrete logarithm problem in the multiplicative group of a finite field.
Since then, number theory has consistently met the challenges of cryptography, offering a variety of difficult algorithmic problems and powerful tools for their analysis. In this talk, we will explore this “mathematical cryptology”, with a focus on euclidean lattices (designed to resist against quantum computers), the use of random walks, and how spectral methods in number theory apply to cryptology.
----------------------------------------------
Scan the QR code in the image to join the mailing list and receive the online access link.
#Mathematics #NumberTheory #Cryptography #Lattices #PostQuantum #MOSS #EMS
-
Tracking BitCoin "Q-Day".
Researcher cracks 15-bit elliptic curve key, aka an Elliptic Curve Cryptography (ECC) Key using public quantum hardware and is awarded the “Q-Day Prize bounty" of 1 BTC.
BitCoin and Ethereum utilize ECC - the larger 256 bit key - specifically the secp256k1 curve, for securing wallets and transactions. https://decrypt.co/365444/bitcoin-q-day-draws-nearer-quantum-researcher-breaks-simplified-key #Bitcoin #Cryptography #Ethereum #Crypto #CryptoCurrencies #Encryption #Security #ECC #EllipticCurve #QDay #DigitalSignature #BlockChain #QuantumComputing #Quantum #BTC
-
BREAKING! GnuPG introduces quantum-resistant ML-KEM (Kyber) as encryption algorithm!
https://lists.gnupg.org/pipermail/gnupg-announce/2026q2/000504.html
This is great news! However, as I've been saying for a while, we should stop considering Harvest-Now-Decrypt-Later as the only thing to be immediately concerned about. The problem of signatures (Trust-Now-Forge-Later) is wrongly assumed to be way less urgent, but the reality is that rolling out a certificate migration will be extremely painful, and quantum attacks against signatures will be stealthy and of difficult attribution initially. Especially for a project like GnuPG, it's extremely important to adopt quantum-resistant signatures ASAP.
#crypto #cryptography #PGP #GnuPG #quantum #security #privacy #cypherpunk
-
Contrary to popular superstition, #AES 128 is just fine in a post-quantum world
-
FYI, I'll be schmoozing around at EUROCRYPT 2026, May 10-14 in Rome. My employer Horizen Labs is a sponsor of this amazing cryptography conference. I'll be giving a talk at the affiliated event CAW (Cryptography Applications Workshop) on the latest updates of Shufflecake, including juicy news on hidden OS. Pass by to say hi!
#cryptography #crypto #security #privacy #eurocrypt #iacr #horizenlabs #shufflecake #caw2026
-
Shufflecake will be presented at the Crypto Applications Workshop (CAW) in Rome, Italy (co-located with EUROCRYPT 2026 and many other crypto events), on May 10th, 2026. This talk is going to be an update of the latest news and status of the project in 2026, including juicy news on the Hidden OS!
https://shufflecake.net/#20260422-caw2026
#cryptography #crypto #security #privacy #eurocrypt #iacr #shufflecake #caw2026
-
A lot can be achieved 3 years. Famously the Empire State Building rose to its full 102 stories in less than 2 years; the Berlin Wall fell and Germany was officially reunified in less than three; and in a similar timeframe Wikipedia went from zero to a million articles.
Astonishingly, three years is about the time it takes a company to discover and replace its vulnerable cryptographic algorithms. Why?
-
OpenSSL 4.0 Strengthens Privacy and Removes Legacy Protocols
OpenSSL 4.0.0 adds Encrypted Client Hello to protect browsing privacy, removes obsolete protocols, and introduces post-quantum cryptography.https://yoota.it/en/openssl-4-0-strengthens-privacy-and-removes-legacy-protocols/
-
OpenSSL 4.0 Strengthens Privacy and Removes Legacy Protocols
OpenSSL 4.0.0 adds Encrypted Client Hello to protect browsing privacy, removes obsolete protocols, and introduces post-quantum cryptography.https://yoota.it/en/openssl-4-0-strengthens-privacy-and-removes-legacy-protocols/
-
Cloud Native Security: Exam Objective 704.1 of the LPI DevOps Tools Engineer v2.0 covers the key principles, risks, and mitigation strategies specific to cloud-native environments.
Explore the objective to sharpen your DevOps skills: https://lpi.org/unns
#cloudnativesecurity #LPI #devsecops #IAM #cloudsecurity #devops #cryptography #cloudnative -
We asked 100 UK IT leaders what one question they’d like answered about the quantum threat. Here are some pointers.
#quantum #quantumcomputing #pqc #cryptography #qday #technews
-
Ah, another riveting #dissertation on how you’re hopelessly mangling your data structures—because clearly, you aren't confused enough already. 😵💫 Yes, let's obsess over canonical outputs and domain separation, because who doesn’t love getting lost in a cryptographic quagmire? 🙄 Spoiler alert: nobody knows how to do it right, but keep trying!
https://blog.foks.pub/posts/domain-separation-in-idl/ #dataStructures #confusion #cryptography #techHumor #codingChallenges #HackerNews #ngated -
Is this a #secure #MessagingApp? Maybe not yet, but it’s time to think about #DigitalPrivacy.
Imagine a #Messaging platform that’s as #secure as #Signal but requires #NoRegistration and #NoInstallation. By leveraging #WebRTC for direct #BrowserToBrowser communication, this #OpenSource project eliminates the #Middleman entirely. Simply share a unique #URL to establish an #Encrypted #PrivateChannel. It is a #Lightweight, #Disposable method to bypass #DataHarvesting and reclaim #DigitalSovereignty.
This project introduces a new #Paradigm in #ClientSide managed #Encryption. Send #Secure messages with #NoSetup, #NoCloud, and #NoTrace.
Experience the #Features:
* #PWA (#ProgressiveWebApp) for instant access
* #P2P (#PeerToPeer) connectivity
* #EndToEndEncryption (#E2EE)
* #SignalProtocol & #PostQuantum #Cryptography
* #Multimedia, #FileTransfer, & #VideoCalls
* #NoDatabase & #Stateless architecture
* #TURN server support for reliable connectionsWhile not yet a direct replacement for #Simplex or #WhatsApp, this introduces a unique approach to #SecureCommunication.
Try the #LiveDemo now:
https://p2p.positive-intentions.com/iframe.html?globals=&id=demo-p2p-messaging--p-2-p-messaging&viewMode=storyExplore the #Technical roadmap:
https://positive-intentions.com/docs/technical/p2p-messaging-technical-breakdownRead the full #Documentation:
https://positive-intentions.com/docs/technical#PrivacyTech #Privacy #CyberSecurity #Infosec #WebDev #JavaScript #Decentralized #EncryptionProtocol #QuantumResistant #Tech #FOSS #SoftwareEngineering #DataPrivacy #SecureChat #NoLog #P2PChat #WebRTCProtocol #Coding #DevCommunity #DigitalPrivacy #InternetFreedom #SecureMessaging #WebTech #AppDevelopment #CryptographyResearch #PrivateMessaging #WebPlatform #ZeroTrust #Innovation
-
Is this a #secure #MessagingApp? Maybe not yet, but it’s time to think about #DigitalPrivacy.
Imagine a #Messaging platform that’s as #secure as #Signal but requires #NoRegistration and #NoInstallation. By leveraging #WebRTC for direct #BrowserToBrowser communication, this #OpenSource project eliminates the #Middleman entirely. Simply share a unique #URL to establish an #Encrypted #PrivateChannel. It is a #Lightweight, #Disposable method to bypass #DataHarvesting and reclaim #DigitalSovereignty.
This project introduces a new #Paradigm in #ClientSide managed #Encryption. Send #Secure messages with #NoSetup, #NoCloud, and #NoTrace.
Experience the #Features:
* #PWA (#ProgressiveWebApp) for instant access
* #P2P (#PeerToPeer) connectivity
* #EndToEndEncryption (#E2EE)
* #SignalProtocol & #PostQuantum #Cryptography
* #Multimedia, #FileTransfer, & #VideoCalls
* #NoDatabase & #Stateless architecture
* #TURN server support for reliable connectionsWhile not yet a direct replacement for #Simplex or #WhatsApp, this introduces a unique approach to #SecureCommunication.
Try the #LiveDemo now:
https://p2p.positive-intentions.com/iframe.html?globals=&id=demo-p2p-messaging--p-2-p-messaging&viewMode=storyExplore the #Technical roadmap:
https://positive-intentions.com/docs/technical/p2p-messaging-technical-breakdownRead the full #Documentation:
https://positive-intentions.com/docs/technical#PrivacyTech #Privacy #CyberSecurity #Infosec #WebDev #JavaScript #Decentralized #EncryptionProtocol #QuantumResistant #Tech #FOSS #SoftwareEngineering #DataPrivacy #SecureChat #NoLog #P2PChat #WebRTCProtocol #Coding #DevCommunity #DigitalPrivacy #InternetFreedom #SecureMessaging #WebTech #AppDevelopment #CryptographyResearch #PrivateMessaging #WebPlatform #ZeroTrust #Innovation
-
Is this a #secure #MessagingApp? Maybe not yet, but it’s time to think about #DigitalPrivacy.
Imagine a #Messaging platform that’s as #secure as #Signal but requires #NoRegistration and #NoInstallation. By leveraging #WebRTC for direct #BrowserToBrowser communication, this #OpenSource project eliminates the #Middleman entirely. Simply share a unique #URL to establish an #Encrypted #PrivateChannel. It is a #Lightweight, #Disposable method to bypass #DataHarvesting and reclaim #DigitalSovereignty.
This project introduces a new #Paradigm in #ClientSide managed #Encryption. Send #Secure messages with #NoSetup, #NoCloud, and #NoTrace.
Experience the #Features:
* #PWA (#ProgressiveWebApp) for instant access
* #P2P (#PeerToPeer) connectivity
* #EndToEndEncryption (#E2EE)
* #SignalProtocol & #PostQuantum #Cryptography
* #Multimedia, #FileTransfer, & #VideoCalls
* #NoDatabase & #Stateless architecture
* #TURN server support for reliable connectionsWhile not yet a direct replacement for #Simplex or #WhatsApp, this introduces a unique approach to #SecureCommunication.
Try the #LiveDemo now:
https://p2p.positive-intentions.com/iframe.html?globals=&id=demo-p2p-messaging--p-2-p-messaging&viewMode=storyExplore the #Technical roadmap:
https://positive-intentions.com/docs/technical/p2p-messaging-technical-breakdownRead the full #Documentation:
https://positive-intentions.com/docs/technical#PrivacyTech #Privacy #CyberSecurity #Infosec #WebDev #JavaScript #Decentralized #EncryptionProtocol #QuantumResistant #Tech #FOSS #SoftwareEngineering #DataPrivacy #SecureChat #NoLog #P2PChat #WebRTCProtocol #Coding #DevCommunity #DigitalPrivacy #InternetFreedom #SecureMessaging #WebTech #AppDevelopment #CryptographyResearch #PrivateMessaging #WebPlatform #ZeroTrust #Innovation
-
Is this a #secure #MessagingApp? Maybe not yet, but it’s time to think about #DigitalPrivacy.
Imagine a #Messaging platform that’s as #secure as #Signal but requires #NoRegistration and #NoInstallation. By leveraging #WebRTC for direct #BrowserToBrowser communication, this #OpenSource project eliminates the #Middleman entirely. Simply share a unique #URL to establish an #Encrypted #PrivateChannel. It is a #Lightweight, #Disposable method to bypass #DataHarvesting and reclaim #DigitalSovereignty.
This project introduces a new #Paradigm in #ClientSide managed #Encryption. Send #Secure messages with #NoSetup, #NoCloud, and #NoTrace.
Experience the #Features:
* #PWA (#ProgressiveWebApp) for instant access
* #P2P (#PeerToPeer) connectivity
* #EndToEndEncryption (#E2EE)
* #SignalProtocol & #PostQuantum #Cryptography
* #Multimedia, #FileTransfer, & #VideoCalls
* #NoDatabase & #Stateless architecture
* #TURN server support for reliable connectionsWhile not yet a direct replacement for #Simplex or #WhatsApp, this introduces a unique approach to #SecureCommunication.
Try the #LiveDemo now:
https://p2p.positive-intentions.com/iframe.html?globals=&id=demo-p2p-messaging--p-2-p-messaging&viewMode=storyExplore the #Technical roadmap:
https://positive-intentions.com/docs/technical/p2p-messaging-technical-breakdownRead the full #Documentation:
https://positive-intentions.com/docs/technical#PrivacyTech #Privacy #CyberSecurity #Infosec #WebDev #JavaScript #Decentralized #EncryptionProtocol #QuantumResistant #Tech #FOSS #SoftwareEngineering #DataPrivacy #SecureChat #NoLog #P2PChat #WebRTCProtocol #Coding #DevCommunity #DigitalPrivacy #InternetFreedom #SecureMessaging #WebTech #AppDevelopment #CryptographyResearch #PrivateMessaging #WebPlatform #ZeroTrust #Innovation
-
Is this a #secure #MessagingApp? Maybe not yet, but it’s time to think about #DigitalPrivacy.
Imagine a #Messaging platform that’s as #secure as #Signal but requires #NoRegistration and #NoInstallation. By leveraging #WebRTC for direct #BrowserToBrowser communication, this #OpenSource project eliminates the #Middleman entirely. Simply share a unique #URL to establish an #Encrypted #PrivateChannel. It is a #Lightweight, #Disposable method to bypass #DataHarvesting and reclaim #DigitalSovereignty.
This project introduces a new #Paradigm in #ClientSide managed #Encryption. Send #Secure messages with #NoSetup, #NoCloud, and #NoTrace.
Experience the #Features:
* #PWA (#ProgressiveWebApp) for instant access
* #P2P (#PeerToPeer) connectivity
* #EndToEndEncryption (#E2EE)
* #SignalProtocol & #PostQuantum #Cryptography
* #Multimedia, #FileTransfer, & #VideoCalls
* #NoDatabase & #Stateless architecture
* #TURN server support for reliable connectionsWhile not yet a direct replacement for #Simplex or #WhatsApp, this introduces a unique approach to #SecureCommunication.
Try the #LiveDemo now:
https://p2p.positive-intentions.com/iframe.html?globals=&id=demo-p2p-messaging--p-2-p-messaging&viewMode=storyExplore the #Technical roadmap:
https://positive-intentions.com/docs/technical/p2p-messaging-technical-breakdownRead the full #Documentation:
https://positive-intentions.com/docs/technical#PrivacyTech #Privacy #CyberSecurity #Infosec #WebDev #JavaScript #Decentralized #EncryptionProtocol #QuantumResistant #Tech #FOSS #SoftwareEngineering #DataPrivacy #SecureChat #NoLog #P2PChat #WebRTCProtocol #Coding #DevCommunity #DigitalPrivacy #InternetFreedom #SecureMessaging #WebTech #AppDevelopment #CryptographyResearch #PrivateMessaging #WebPlatform #ZeroTrust #Innovation
-
Called it.
In Nov I wrote that ECC was the easier quantum target: postquantum.com/post-quantum/shor-rsa-ecc-diffie-hellman/
In March I argued Bitcoin's quantum risk was underestimated because everyone used RSA benchmarks: postquantum.com/post-quantum/bitcoin-quantum-risk-closer-ecc/
EUROCRYPT 2026 just confirmed both.
Chevignard, Fouque & Schrottenloher halved ECDLP qubit counts:
P-256: 2,124 → 1,193 (42% less than RSA-3072!)
P-224: 1,098 (21.5% less than RSA-2048)
Full writeup: https://postquantum.com/security-pqc/algorithm-quantum-ecc/
-
In a stunning display of cryptographic one-upmanship, #WolfGuard proudly announces its #WireGuard with FIPS 140-3 cryptography—because apparently, military-grade encryption is the new black! 🤷♂️ Meanwhile, #GitHub insists on reminding us that #AI and code automation are still the future 🛠️... unless, of course, you're busy securing your cat photos. 🐱🔒
https://github.com/wolfssl/wolfguard #FIPS1403 #cryptography #codeautomation #militarygradeencryption #HackerNews #ngated