If you lose your private key, you lose, and get to start over.
6 day certificate expiration is security theatre. Why not 6 minutes?
If you want to do this, use ECC, not RSA. Well, you should be using 25519 anyway.
A #cybersecurity warrior always has more to learn. Especially about the wizardry of #cryptography. https://cromwell-intl.com/cybersecurity/crypto/reading.html?s=mc
If a monastery filled with monks calculated forever, would they discover all possible numbers? #cryptography https://cromwell-intl.com/cybersecurity/crypto/hash-search.html?s=mc
Great read on benchmarking the POSIX getentropy() function versus RAND_bytes() found in OpenSSL and forks for getting cryptographically secure random numbers.
I'm not running the exact system that @fanf is, but I'm seeing very different BoringSSL benchmark numbers (if I'm reading it correctly):
$ ./bentropy-boring
init openssl 48852
len entropy openssl
16 691 7156
64 758 6931
256 1362 7037
1024 5549 7707
https://www.europesays.com/uk/6166/ Quantum computing threat demands urgent CISO action plan #Australia(Australian) #BorderlessCS #CISA #Computing #Cryptography #Cybersecurity #DataSecurity #Encryption #QuantumComputing #Risk&Compliance #RiskManagement #Technology #UK #UnitedKingdom
The paper I co-authored (“A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography”) was accepted for publication by “EPJ Quantum Technology” today.
You can find the preprint here, Nick will eventually update it with the final changes.
In short: We looked into existing use-cases for #QuantumKeyDistribution and whether they make any sense and did so as a joint team between people with a QKD-background and cryptographers who started out very critical of QKD. (I’m firmly in the latter camp.)
My personal summary (though some of my co-authors won’t share it to this extend): #QKD is bullshit and not useful for practical purposes as it stands.
#crypto #cryptography #cryptology #postquantumcrypto #PQC
I’m at ICMC in Toronto this week, anybody else here?
This would probably get more action if I was on infosec.exchange…
It is not really progress, but the Home Office a notoriously cavalier and badly run organisation (remember Windrush amongst others) needs to be held to public account. There is nothing they would like more than absolute secrecy, a cowed press and a frightened and subdued opopulation.
Governments of all shades have encouraged them to act in this way since they were established.
None can be a #cybersecurity warrior without knowing the basics of #cryptography. https://cromwell-intl.com/cybersecurity/crypto/?s=mc
My Steganographia class is now available on #Patreon! Learn about the secret codes AND the angel magic, and how to use them together. #magic #occult #cryptography #renaissance https://www.patreon.com/posts/hidden-code-of-125690868?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_link
What's the current consensus on whether I should worry about Grover's algorithm when choosing symmetric cryptography?
If I have a #codeberg account set up, with a verified #ssh key on my account and the corresponding public and private keys in `~/.ssh/`, is there a way that I can make it so that it doesn't ask me for my keyphrase every time I push? I'm sure VSCode could do this, but since I've switched to #Helix, which doesn't have git built-in I've been manually doing the git stuff.
My knowledge of #cryptography and #git are well and truly at the 'barely enough to get myself into trouble' level.
#AskFedi
#FBI raids home of prominent computer scientist who has gone incommunicado
Ars Technica: FBI raids home of prominent computer scientist who has gone incommunicado . “A prominent computer scientist who has spent 20 years publishing academic papers on cryptography, privacy, and cybersecurity has gone incommunicado, had his professor profile, email account, and phone number removed by his employer, Indiana University, and had his homes raided by the FBI. No one knows […]
There has been some speculation that Dr. Xiaofeng Wang of Indiana University was an operative working for China https://arstechnica.com/security/2025/03/computer-scientist-goes-silent-after-fbi-raid-and-purging-from-university-website/ #cybersecurity #cryptography #IndianaUniversity #uspol #espionage
AIs as Trusted Third Parties
This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as tr... https://www.schneier.com/blog/archives/2025/03/ais-as-trusted-third-parties.html