home.social

#cryptography — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cryptography, aggregated by home.social.

  1. Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅

    Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇

    juncotic.com/copyfail-vulnerab

    #gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic

  2. Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅

    Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇

    juncotic.com/copyfail-vulnerab

    #gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic

  3. Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅

    Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇

    juncotic.com/copyfail-vulnerab

    #gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic

  4. Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅

    Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇

    juncotic.com/copyfail-vulnerab

    #gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic

  5. Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅

    Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇

    juncotic.com/copyfail-vulnerab

    #gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic

  6. Arthur Scherbius, who died OTD in 1929, invented the electro-mechanical Enigma cipher machine used by Germany before and during #WorldWarII cromwell-intl.com/cybersecurit #cryptography

  7. Arthur Scherbius, who died OTD in 1929, invented the electro-mechanical Enigma cipher machine used by Germany before and during #WorldWarII cromwell-intl.com/cybersecurit #cryptography

  8. Arthur Scherbius, who died OTD in 1929, invented the electro-mechanical Enigma cipher machine used by Germany before and during #WorldWarII; see where the Allies worked to break it cromwell-intl.com/travel/uk/bl #travel #history #cryptography

  9. Nueva tarde de grabación! Seguimos sumando contenido al curso de Hardening Linux!

    Hoy, actualizando un video de hace unos 10 años en el canal... sí, Linux cambió las reglas del juego en cuestión de entropía, y vale la pena actualizarse sobre valores aleatorios y dispositivos random 😜

    Estén atentos/as que pronto estará online la continuación!

    #gnu #linux #entropia #entropy #random #cryptography #criptografia #ciberseguridad #infosec #cybersecurity #hardening #juncotic

  10. Nueva tarde de grabación! Seguimos sumando contenido al curso de Hardening Linux!

    Hoy, actualizando un video de hace unos 10 años en el canal... sí, Linux cambió las reglas del juego en cuestión de entropía, y vale la pena actualizarse sobre valores aleatorios y dispositivos random 😜

    Estén atentos/as que pronto estará online la continuación!

    #gnu #linux #entropia #entropy #random #cryptography #criptografia #ciberseguridad #infosec #cybersecurity #hardening #juncotic

  11. Nueva tarde de grabación! Seguimos sumando contenido al curso de Hardening Linux!

    Hoy, actualizando un video de hace unos 10 años en el canal... sí, Linux cambió las reglas del juego en cuestión de entropía, y vale la pena actualizarse sobre valores aleatorios y dispositivos random 😜

    Estén atentos/as que pronto estará online la continuación!

    #gnu #linux #entropia #entropy #random #cryptography #criptografia #ciberseguridad #infosec #cybersecurity #hardening #juncotic

  12. Nueva tarde de grabación! Seguimos sumando contenido al curso de Hardening Linux!

    Hoy, actualizando un video de hace unos 10 años en el canal... sí, Linux cambió las reglas del juego en cuestión de entropía, y vale la pena actualizarse sobre valores aleatorios y dispositivos random 😜

    Estén atentos/as que pronto estará online la continuación!

    #gnu #linux #entropia #entropy #random #cryptography #criptografia #ciberseguridad #infosec #cybersecurity #hardening #juncotic

  13. Nueva tarde de grabación! Seguimos sumando contenido al curso de Hardening Linux!

    Hoy, actualizando un video de hace unos 10 años en el canal... sí, Linux cambió las reglas del juego en cuestión de entropía, y vale la pena actualizarse sobre valores aleatorios y dispositivos random 😜

    Estén atentos/as que pronto estará online la continuación!

    #gnu #linux #entropia #entropy #random #cryptography #criptografia #ciberseguridad #infosec #cybersecurity #hardening #juncotic

  14. Hey! If you're at Eurocrypt and do not have a CedarCrypt flyer yet do not talk to @nadim.computer , come talk to me instead! I have a deal with Nadim: if I manage to hand over all the flyers he gave me to people who still don't have one, he will join Mastodon! I have only 4 flyers left! We can do this! F**k BlueSky! 😜

    #crypto #cryptography #eurocrypt #eurocrypt2026 #cedarcrypt #fediverse #mastodon #bluesky #fun #humor #rome #italy #bet

  15. NVME erasing: Various options for wiping an SSD. There's a neat crypto option by default that is nearly instant, but only some drives have it
    drivewipe.com/guides/nvme-secu
    #cryptography #security #linux #nvme #wipe #ssd #+

  16. Weekend Reading from TechAptitude!

    Get to know new Cryptography Standards (FIPS 20-3, FIPS 204, FIPS 205, FIPS 206) developed by NIST to withstand quantum attacks and prevent the so-called “Q-Day”. Q-Day is an estimate of the point in time when quantum computers will be able to reliably break existing RSA-2048 cryptography. techaptitude.substack.com/p/qu #PQC #NIST #Cryptography #Q_Day #PostQuantumCryptography #Quantum #Encryption #CryptographyAlgorithms #TechAptitude

  17. npmjs.com/package/lvthn
    the leviathan cli crypto tool has been updated w/ the 2.1.0 fixes and enhancements.

    bun / npm i -g lvthn

    averages ~1gb per sec using serpent-256, nearly half that using xchacha20 ;D

    #crypto #cryptography #cli #bunjs #bun #npm #terminal #term

  18. The United States has criminalized the 1077th prime number and #0021C7, a shade of royal blue. Does this make America stronger as a nation? Consider the implications for #cryptography and the #visualArts alone.

  19. #TodayInHistory 1916 – Claude Shannon, is born. (d 2001)

    Known as the "father of information theory", and laid the foundations of the Information Age. The first to describe the use of Boolean algebra—essential to all digital electronic circuits—and founded the field of #AI

    His work to cryptanalysis laid the foundation for symmetric-key cryptography, including Data Encryption Standard (DES), and Advanced Encryption Standard (AES). Regarding him as the "founding father of modern #cryptography

  20. For our #eID work with @cdengler and Clement Humbert we created a reading list with several presentations of our sources related to #ZeroKnowledgeProofs. You can either look at it on github:

    eid-privacy.github.io/wp2/2026

    Or download it and open it with Obsidian to browse around. Of course we'd be very happy if you create a PR with your preferred paper on ZKPs!

    #DigitalTrust #Privacy #Cryptography #eID #EPFL #C4DT #DigitalIdentity #Innovation #swisstech

  21. MOSS Season 2 continues next week.

    🎙️ Benjamin Wesolowski (CNRS & ENS Lyon, France)

    Talk title: Random walks in number-theoretic cryptology

    🗓️ Thursday, 7 May 2026 • 🕓 4:00 PM CEST • Online

    Abstract: Cryptography met number theory in 1976, when Diffie and Hellman achieved what had long been considered impossible: a protocol for two people to exchange secret information on a public channel, even if they had never met before to establish some kind of password, a pre-shared key. Diffie and Hellman designed the protocol such that a spy attempting to find the secret would need to solve a presumably hard computational problem: the discrete logarithm problem in the multiplicative group of a finite field.

    Since then, number theory has consistently met the challenges of cryptography, offering a variety of difficult algorithmic problems and powerful tools for their analysis. In this talk, we will explore this “mathematical cryptology”, with a focus on euclidean lattices (designed to resist against quantum computers), the use of random walks, and how spectral methods in number theory apply to cryptology.

    ----------------------------------------------

    Scan the QR code in the image to join the mailing list and receive the online access link.

    #Mathematics #NumberTheory #Cryptography #Lattices #PostQuantum #MOSS #EMS

  22. MOSS Season 2 continues next week.

    🎙️ Benjamin Wesolowski (CNRS & ENS Lyon, France)

    Talk title: Random walks in number-theoretic cryptology

    🗓️ Thursday, 7 May 2026 • 🕓 4:00 PM CEST • Online

    Abstract: Cryptography met number theory in 1976, when Diffie and Hellman achieved what had long been considered impossible: a protocol for two people to exchange secret information on a public channel, even if they had never met before to establish some kind of password, a pre-shared key. Diffie and Hellman designed the protocol such that a spy attempting to find the secret would need to solve a presumably hard computational problem: the discrete logarithm problem in the multiplicative group of a finite field.

    Since then, number theory has consistently met the challenges of cryptography, offering a variety of difficult algorithmic problems and powerful tools for their analysis. In this talk, we will explore this “mathematical cryptology”, with a focus on euclidean lattices (designed to resist against quantum computers), the use of random walks, and how spectral methods in number theory apply to cryptology.

    ----------------------------------------------

    Scan the QR code in the image to join the mailing list and receive the online access link.

    #Mathematics #NumberTheory #Cryptography #Lattices #PostQuantum #MOSS #EMS

  23. MOSS Season 2 continues next week.

    🎙️ Benjamin Wesolowski (CNRS & ENS Lyon, France)

    Talk title: Random walks in number-theoretic cryptology

    🗓️ Thursday, 7 May 2026 • 🕓 4:00 PM CEST • Online

    Abstract: Cryptography met number theory in 1976, when Diffie and Hellman achieved what had long been considered impossible: a protocol for two people to exchange secret information on a public channel, even if they had never met before to establish some kind of password, a pre-shared key. Diffie and Hellman designed the protocol such that a spy attempting to find the secret would need to solve a presumably hard computational problem: the discrete logarithm problem in the multiplicative group of a finite field.

    Since then, number theory has consistently met the challenges of cryptography, offering a variety of difficult algorithmic problems and powerful tools for their analysis. In this talk, we will explore this “mathematical cryptology”, with a focus on euclidean lattices (designed to resist against quantum computers), the use of random walks, and how spectral methods in number theory apply to cryptology.

    ----------------------------------------------

    Scan the QR code in the image to join the mailing list and receive the online access link.

    #Mathematics #NumberTheory #Cryptography #Lattices #PostQuantum #MOSS #EMS

  24. MOSS Season 2 continues next week.

    🎙️ Benjamin Wesolowski (CNRS & ENS Lyon, France)

    Talk title: Random walks in number-theoretic cryptology

    🗓️ Thursday, 7 May 2026 • 🕓 4:00 PM CEST • Online

    Abstract: Cryptography met number theory in 1976, when Diffie and Hellman achieved what had long been considered impossible: a protocol for two people to exchange secret information on a public channel, even if they had never met before to establish some kind of password, a pre-shared key. Diffie and Hellman designed the protocol such that a spy attempting to find the secret would need to solve a presumably hard computational problem: the discrete logarithm problem in the multiplicative group of a finite field.

    Since then, number theory has consistently met the challenges of cryptography, offering a variety of difficult algorithmic problems and powerful tools for their analysis. In this talk, we will explore this “mathematical cryptology”, with a focus on euclidean lattices (designed to resist against quantum computers), the use of random walks, and how spectral methods in number theory apply to cryptology.

    ----------------------------------------------

    Scan the QR code in the image to join the mailing list and receive the online access link.

    #Mathematics #NumberTheory #Cryptography #Lattices #PostQuantum #MOSS #EMS

  25. MOSS Season 2 continues next week.

    🎙️ Benjamin Wesolowski (CNRS & ENS Lyon, France)

    Talk title: Random walks in number-theoretic cryptology

    🗓️ Thursday, 7 May 2026 • 🕓 4:00 PM CEST • Online

    Abstract: Cryptography met number theory in 1976, when Diffie and Hellman achieved what had long been considered impossible: a protocol for two people to exchange secret information on a public channel, even if they had never met before to establish some kind of password, a pre-shared key. Diffie and Hellman designed the protocol such that a spy attempting to find the secret would need to solve a presumably hard computational problem: the discrete logarithm problem in the multiplicative group of a finite field.

    Since then, number theory has consistently met the challenges of cryptography, offering a variety of difficult algorithmic problems and powerful tools for their analysis. In this talk, we will explore this “mathematical cryptology”, with a focus on euclidean lattices (designed to resist against quantum computers), the use of random walks, and how spectral methods in number theory apply to cryptology.

    ----------------------------------------------

    Scan the QR code in the image to join the mailing list and receive the online access link.

    #Mathematics #NumberTheory #Cryptography #Lattices #PostQuantum #MOSS #EMS

  26. Tracking BitCoin "Q-Day".

    Researcher cracks 15-bit elliptic curve key, aka an Elliptic Curve Cryptography (ECC) Key using public quantum hardware and is awarded the “Q-Day Prize bounty" of 1 BTC.

    BitCoin and Ethereum utilize ECC - the larger 256 bit key - specifically the secp256k1 curve, for securing wallets and transactions. decrypt.co/365444/bitcoin-q-da #Bitcoin #Cryptography #Ethereum #Crypto #CryptoCurrencies #Encryption #Security #ECC #EllipticCurve #QDay #DigitalSignature #BlockChain #QuantumComputing #Quantum #BTC

  27. BREAKING! GnuPG introduces quantum-resistant ML-KEM (Kyber) as encryption algorithm!

    lists.gnupg.org/pipermail/gnup

    This is great news! However, as I've been saying for a while, we should stop considering Harvest-Now-Decrypt-Later as the only thing to be immediately concerned about. The problem of signatures (Trust-Now-Forge-Later) is wrongly assumed to be way less urgent, but the reality is that rolling out a certificate migration will be extremely painful, and quantum attacks against signatures will be stealthy and of difficult attribution initially. Especially for a project like GnuPG, it's extremely important to adopt quantum-resistant signatures ASAP.

    #crypto #cryptography #PGP #GnuPG #quantum #security #privacy #cypherpunk

  28. FYI, I'll be schmoozing around at EUROCRYPT 2026, May 10-14 in Rome. My employer Horizen Labs is a sponsor of this amazing cryptography conference. I'll be giving a talk at the affiliated event CAW (Cryptography Applications Workshop) on the latest updates of Shufflecake, including juicy news on hidden OS. Pass by to say hi!

    #cryptography #crypto #security #privacy #eurocrypt #iacr #horizenlabs #shufflecake #caw2026

  29. Shufflecake will be presented at the Crypto Applications Workshop (CAW) in Rome, Italy (co-located with EUROCRYPT 2026 and many other crypto events), on May 10th, 2026. This talk is going to be an update of the latest news and status of the project in 2026, including juicy news on the Hidden OS!

    shufflecake.net/#20260422-caw2

  30. A lot can be achieved 3 years. Famously the Empire State Building rose to its full 102 stories in less than 2 years; the Berlin Wall fell and Germany was officially reunified in less than three; and in a similar timeframe Wikipedia went from zero to a million articles.

    Astonishingly, three years is about the time it takes a company to discover and replace its vulnerable cryptographic algorithms. Why?

    computing.co.uk/research/2026/

    #quantum #pqc #cryptography #technews #google #qday

  31. OpenSSL 4.0 Strengthens Privacy and Removes Legacy Protocols

    OpenSSL 4.0.0 adds Encrypted Client Hello to protect browsing privacy, removes obsolete protocols, and introduces post-quantum cryptography.

    yoota.it/en/openssl-4-0-streng

  32. OpenSSL 4.0 Strengthens Privacy and Removes Legacy Protocols

    OpenSSL 4.0.0 adds Encrypted Client Hello to protect browsing privacy, removes obsolete protocols, and introduces post-quantum cryptography.

    yoota.it/en/openssl-4-0-streng

  33. Cloud Native Security: Exam Objective 704.1 of the LPI DevOps Tools Engineer v2.0 covers the key principles, risks, and mitigation strategies specific to cloud-native environments.

    Explore the objective to sharpen your DevOps skills: lpi.org/unns

  34. Ah, another riveting #dissertation on how you’re hopelessly mangling your data structures—because clearly, you aren't confused enough already. 😵‍💫 Yes, let's obsess over canonical outputs and domain separation, because who doesn’t love getting lost in a cryptographic quagmire? 🙄 Spoiler alert: nobody knows how to do it right, but keep trying!
    blog.foks.pub/posts/domain-sep #dataStructures #confusion #cryptography #techHumor #codingChallenges #HackerNews #ngated

  35. Is this a #secure #MessagingApp? Maybe not yet, but it’s time to think about #DigitalPrivacy.

    Imagine a #Messaging platform that’s as #secure as #Signal but requires #NoRegistration and #NoInstallation. By leveraging #WebRTC for direct #BrowserToBrowser communication, this #OpenSource project eliminates the #Middleman entirely. Simply share a unique #URL to establish an #Encrypted #PrivateChannel. It is a #Lightweight, #Disposable method to bypass #DataHarvesting and reclaim #DigitalSovereignty.

    This project introduces a new #Paradigm in #ClientSide managed #Encryption. Send #Secure messages with #NoSetup, #NoCloud, and #NoTrace.

    Experience the #Features:
    * #PWA (#ProgressiveWebApp) for instant access
    * #P2P (#PeerToPeer) connectivity
    * #EndToEndEncryption (#E2EE)
    * #SignalProtocol & #PostQuantum #Cryptography
    * #Multimedia, #FileTransfer, & #VideoCalls
    * #NoDatabase & #Stateless architecture
    * #TURN server support for reliable connections

    While not yet a direct replacement for #Simplex or #WhatsApp, this introduces a unique approach to #SecureCommunication.

    Try the #LiveDemo now:
    p2p.positive-intentions.com/if

    Explore the #Technical roadmap:
    positive-intentions.com/docs/t

    Read the full #Documentation:
    positive-intentions.com/docs/t

    #PrivacyTech #Privacy #CyberSecurity #Infosec #WebDev #JavaScript #Decentralized #EncryptionProtocol #QuantumResistant #Tech #FOSS #SoftwareEngineering #DataPrivacy #SecureChat #NoLog #P2PChat #WebRTCProtocol #Coding #DevCommunity #DigitalPrivacy #InternetFreedom #SecureMessaging #WebTech #AppDevelopment #CryptographyResearch #PrivateMessaging #WebPlatform #ZeroTrust #Innovation

  36. Is this a #secure #MessagingApp? Maybe not yet, but it’s time to think about #DigitalPrivacy.

    Imagine a #Messaging platform that’s as #secure as #Signal but requires #NoRegistration and #NoInstallation. By leveraging #WebRTC for direct #BrowserToBrowser communication, this #OpenSource project eliminates the #Middleman entirely. Simply share a unique #URL to establish an #Encrypted #PrivateChannel. It is a #Lightweight, #Disposable method to bypass #DataHarvesting and reclaim #DigitalSovereignty.

    This project introduces a new #Paradigm in #ClientSide managed #Encryption. Send #Secure messages with #NoSetup, #NoCloud, and #NoTrace.

    Experience the #Features:
    * #PWA (#ProgressiveWebApp) for instant access
    * #P2P (#PeerToPeer) connectivity
    * #EndToEndEncryption (#E2EE)
    * #SignalProtocol & #PostQuantum #Cryptography
    * #Multimedia, #FileTransfer, & #VideoCalls
    * #NoDatabase & #Stateless architecture
    * #TURN server support for reliable connections

    While not yet a direct replacement for #Simplex or #WhatsApp, this introduces a unique approach to #SecureCommunication.

    Try the #LiveDemo now:
    p2p.positive-intentions.com/if

    Explore the #Technical roadmap:
    positive-intentions.com/docs/t

    Read the full #Documentation:
    positive-intentions.com/docs/t

    #PrivacyTech #Privacy #CyberSecurity #Infosec #WebDev #JavaScript #Decentralized #EncryptionProtocol #QuantumResistant #Tech #FOSS #SoftwareEngineering #DataPrivacy #SecureChat #NoLog #P2PChat #WebRTCProtocol #Coding #DevCommunity #DigitalPrivacy #InternetFreedom #SecureMessaging #WebTech #AppDevelopment #CryptographyResearch #PrivateMessaging #WebPlatform #ZeroTrust #Innovation

  37. Is this a #secure #MessagingApp? Maybe not yet, but it’s time to think about #DigitalPrivacy.

    Imagine a #Messaging platform that’s as #secure as #Signal but requires #NoRegistration and #NoInstallation. By leveraging #WebRTC for direct #BrowserToBrowser communication, this #OpenSource project eliminates the #Middleman entirely. Simply share a unique #URL to establish an #Encrypted #PrivateChannel. It is a #Lightweight, #Disposable method to bypass #DataHarvesting and reclaim #DigitalSovereignty.

    This project introduces a new #Paradigm in #ClientSide managed #Encryption. Send #Secure messages with #NoSetup, #NoCloud, and #NoTrace.

    Experience the #Features:
    * #PWA (#ProgressiveWebApp) for instant access
    * #P2P (#PeerToPeer) connectivity
    * #EndToEndEncryption (#E2EE)
    * #SignalProtocol & #PostQuantum #Cryptography
    * #Multimedia, #FileTransfer, & #VideoCalls
    * #NoDatabase & #Stateless architecture
    * #TURN server support for reliable connections

    While not yet a direct replacement for #Simplex or #WhatsApp, this introduces a unique approach to #SecureCommunication.

    Try the #LiveDemo now:
    p2p.positive-intentions.com/if

    Explore the #Technical roadmap:
    positive-intentions.com/docs/t

    Read the full #Documentation:
    positive-intentions.com/docs/t

    #PrivacyTech #Privacy #CyberSecurity #Infosec #WebDev #JavaScript #Decentralized #EncryptionProtocol #QuantumResistant #Tech #FOSS #SoftwareEngineering #DataPrivacy #SecureChat #NoLog #P2PChat #WebRTCProtocol #Coding #DevCommunity #DigitalPrivacy #InternetFreedom #SecureMessaging #WebTech #AppDevelopment #CryptographyResearch #PrivateMessaging #WebPlatform #ZeroTrust #Innovation

  38. Is this a #secure #MessagingApp? Maybe not yet, but it’s time to think about #DigitalPrivacy.

    Imagine a #Messaging platform that’s as #secure as #Signal but requires #NoRegistration and #NoInstallation. By leveraging #WebRTC for direct #BrowserToBrowser communication, this #OpenSource project eliminates the #Middleman entirely. Simply share a unique #URL to establish an #Encrypted #PrivateChannel. It is a #Lightweight, #Disposable method to bypass #DataHarvesting and reclaim #DigitalSovereignty.

    This project introduces a new #Paradigm in #ClientSide managed #Encryption. Send #Secure messages with #NoSetup, #NoCloud, and #NoTrace.

    Experience the #Features:
    * #PWA (#ProgressiveWebApp) for instant access
    * #P2P (#PeerToPeer) connectivity
    * #EndToEndEncryption (#E2EE)
    * #SignalProtocol & #PostQuantum #Cryptography
    * #Multimedia, #FileTransfer, & #VideoCalls
    * #NoDatabase & #Stateless architecture
    * #TURN server support for reliable connections

    While not yet a direct replacement for #Simplex or #WhatsApp, this introduces a unique approach to #SecureCommunication.

    Try the #LiveDemo now:
    p2p.positive-intentions.com/if

    Explore the #Technical roadmap:
    positive-intentions.com/docs/t

    Read the full #Documentation:
    positive-intentions.com/docs/t

    #PrivacyTech #Privacy #CyberSecurity #Infosec #WebDev #JavaScript #Decentralized #EncryptionProtocol #QuantumResistant #Tech #FOSS #SoftwareEngineering #DataPrivacy #SecureChat #NoLog #P2PChat #WebRTCProtocol #Coding #DevCommunity #DigitalPrivacy #InternetFreedom #SecureMessaging #WebTech #AppDevelopment #CryptographyResearch #PrivateMessaging #WebPlatform #ZeroTrust #Innovation

  39. Is this a #secure #MessagingApp? Maybe not yet, but it’s time to think about #DigitalPrivacy.

    Imagine a #Messaging platform that’s as #secure as #Signal but requires #NoRegistration and #NoInstallation. By leveraging #WebRTC for direct #BrowserToBrowser communication, this #OpenSource project eliminates the #Middleman entirely. Simply share a unique #URL to establish an #Encrypted #PrivateChannel. It is a #Lightweight, #Disposable method to bypass #DataHarvesting and reclaim #DigitalSovereignty.

    This project introduces a new #Paradigm in #ClientSide managed #Encryption. Send #Secure messages with #NoSetup, #NoCloud, and #NoTrace.

    Experience the #Features:
    * #PWA (#ProgressiveWebApp) for instant access
    * #P2P (#PeerToPeer) connectivity
    * #EndToEndEncryption (#E2EE)
    * #SignalProtocol & #PostQuantum #Cryptography
    * #Multimedia, #FileTransfer, & #VideoCalls
    * #NoDatabase & #Stateless architecture
    * #TURN server support for reliable connections

    While not yet a direct replacement for #Simplex or #WhatsApp, this introduces a unique approach to #SecureCommunication.

    Try the #LiveDemo now:
    p2p.positive-intentions.com/if

    Explore the #Technical roadmap:
    positive-intentions.com/docs/t

    Read the full #Documentation:
    positive-intentions.com/docs/t

    #PrivacyTech #Privacy #CyberSecurity #Infosec #WebDev #JavaScript #Decentralized #EncryptionProtocol #QuantumResistant #Tech #FOSS #SoftwareEngineering #DataPrivacy #SecureChat #NoLog #P2PChat #WebRTCProtocol #Coding #DevCommunity #DigitalPrivacy #InternetFreedom #SecureMessaging #WebTech #AppDevelopment #CryptographyResearch #PrivateMessaging #WebPlatform #ZeroTrust #Innovation

  40. Called it.

    In Nov I wrote that ECC was the easier quantum target: postquantum.com/post-quantum/shor-rsa-ecc-diffie-hellman/

    In March I argued Bitcoin's quantum risk was underestimated because everyone used RSA benchmarks: postquantum.com/post-quantum/bitcoin-quantum-risk-closer-ecc/

    EUROCRYPT 2026 just confirmed both.

    Chevignard, Fouque & Schrottenloher halved ECDLP qubit counts:

    P-256: 2,124 → 1,193 (42% less than RSA-3072!)

    P-224: 1,098 (21.5% less than RSA-2048)

    Full writeup: postquantum.com/security-pqc/a

    #infosec #quantum #cryptography #postquantum #ecc #bitcoin

  41. In a stunning display of cryptographic one-upmanship, #WolfGuard proudly announces its #WireGuard with FIPS 140-3 cryptography—because apparently, military-grade encryption is the new black! 🤷‍♂️ Meanwhile, #GitHub insists on reminding us that #AI and code automation are still the future 🛠️... unless, of course, you're busy securing your cat photos. 🐱🔒
    github.com/wolfssl/wolfguard #FIPS1403 #cryptography #codeautomation #militarygradeencryption #HackerNews #ngated