101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

483
active users

#cryptography

7 posts7 participants0 posts today
Peter N. M. Hansteen<p>Post-Quantum Cryptography Advice Added to OpenSSH Website <a href="https://www.undeadly.org/cgi?action=article;sid=20250811110058" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20250811110058</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/openssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openssh</span></a> <a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/postquantum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postquantum</span></a> <a href="https://mastodon.social/tags/postq" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postq</span></a> <a href="https://mastodon.social/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/libresoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libresoftware</span></a> <a href="https://mastodon.social/tags/freesoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freesoftware</span></a> <a href="https://mastodon.social/tags/bsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bsd</span></a></p>
Lobsters<p>ChaCha12-BLAKE3: Secure, Simple and Fast authenticated and committing encryption via <span class="h-card" translate="no"><a href="https://messydesk.social/@robey" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>robey</span></a></span> <a href="https://lobste.rs/s/picrzd" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/picrzd</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/release" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>release</span></a><br><a href="https://kerkour.com/chacha12-blake3" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">kerkour.com/chacha12-blake3</span><span class="invisible"></span></a></p>
Lobsters<p>Improving Geographical Resilience For Distributed Open Source Teams with FREON <a href="https://lobste.rs/s/jy5b80" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/jy5b80</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a><br><a href="https://soatok.blog/2025/08/09/improving-geographical-resilience-for-distributed-open-source-teams-with-freon/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">soatok.blog/2025/08/09/improvi</span><span class="invisible">ng-geographical-resilience-for-distributed-open-source-teams-with-freon/</span></a></p>
Conan the Sysadmin<p>None can be a <a href="https://mstdn.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> warrior without knowing the basics of <a href="https://mstdn.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a>. <a href="https://cromwell-intl.com/cybersecurity/crypto/?s=mc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cromwell-intl.com/cybersecurit</span><span class="invisible">y/crypto/?s=mc</span></a></p>
Nick<p>Do <a href="https://mathstodon.xyz/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> folks out there at least know whether Messages (a.k.a. iMessage) on <a href="https://mathstodon.xyz/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> uses one of the above mentioned methods to provide end-to-end encryption of the content of push notifications (which in general contain portions of messages)? I know that the messages themselves are end-to-end encrypted, I'm specifically asking about the content of the notifications.</p><p><a href="https://mathstodon.xyz/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mathstodon.xyz/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mathstodon.xyz/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
OCTADEI'm looking for more <a href="https://soc.octade.net?t=cryptology" class="mention hashtag" rel="nofollow noopener" target="_blank">#cryptology</a> and <a href="https://soc.octade.net?t=cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#cryptography</a> related profiles to follow. Recommends appreciated.<br>
Tommaso Gagliardoni<p>I emailed italian politicians about the EU's "ChatControl" proposal. Here I include email addresses and templates (in Italian) for my fellow Italians who want to help.</p><p><a href="https://gagliardoni.net/#20250805_chatcontrol" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gagliardoni.net/#20250805_chat</span><span class="invisible">control</span></a></p><p><a href="https://infosec.exchange/tags/eu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eu</span></a> <a href="https://infosec.exchange/tags/CSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSA</span></a> <a href="https://infosec.exchange/tags/CSAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSAM</span></a> <a href="https://infosec.exchange/tags/ChatControl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChatControl</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://infosec.exchange/tags/authoritarianism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authoritarianism</span></a> <a href="https://infosec.exchange/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://infosec.exchange/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://infosec.exchange/tags/civilrights" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>civilrights</span></a></p>
Leanpub<p>CISSP: The Last Mile: Your guide to the finish line <a href="https://leanpub.com/cissplastmile" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">leanpub.com/cissplastmile</span><span class="invisible"></span></a> by Pete Zerger is the featured book on the Leanpub homepage! <a href="https://leanpub.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">leanpub.com</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/ComputerSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComputerSecurity</span></a> <a href="https://mastodon.social/tags/CloudComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudComputing</span></a> <a href="https://mastodon.social/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://mastodon.social/tags/books" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>books</span></a> <a href="https://mastodon.social/tags/ebooks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ebooks</span></a></p><p>Find it on Leanpub!</p>
OCTADENEWSCARD: Decentralized, Encrypted Paste Bin via Usenet Newsgroups<br><br><i> NEWSCARD </i> Publish and fetch permanent named records via Network News<br><br>Newscard creates a decentralized, encrypted, named record paste bin.<br><br>[git repo] <a href="https://codeberg.org/OCTADE/newscard" rel="nofollow noopener" target="_blank">https://codeberg.org/OCTADE/newscard</a> (use most recent version only)<br><br>With a single command, name the card, snarf the file and encrypt it.<br><br>With another command, push the encrypted file to the public network.<br><br>With another short command, snarf a file from the network.<br><br>Only users knowing the name [key] of the record will be able to decrypt it.<br><br>If a strong passphrase is used to name the file, it will be very secure.<br><br>This is useful for quickly snarfing, encrypting, and publishing a text file:<br><br>$~: card enc [passphrase] [file]<br>$~: card put [passphrase]<br><br>It is useful for retrieving a text file with just a key:<br><br>$~: card get [passphrase]<br>$~: card show [passphrase]<br><br>If and when you want the general public to access the record just share the keyword.<br><br>Newscard uses nine (9) (NINE) layers of encryption with OpenSSL chacha20 cipher.<br><br>Newscard generates 9 each of: cipher keys, salts, key iteration parameters.<br><br>It would be nice if something like this were added to the ActivityPub protocol, such that keyword[@]host.url would do the same thing. Then secret text records could be stored securely for later retrieval or revelation.<br><br><a href="https://soc.octade.net?t=newscard" class="mention hashtag" rel="nofollow noopener" target="_blank">#NewsCard</a> <a href="https://soc.octade.net?t=pastebin" class="mention hashtag" rel="nofollow noopener" target="_blank">#Pastebin</a> <a href="https://soc.octade.net?t=usenet" class="mention hashtag" rel="nofollow noopener" target="_blank">#Usenet</a> <a href="https://soc.octade.net?t=nntp" class="mention hashtag" rel="nofollow noopener" target="_blank">#NNTP</a> <a href="https://soc.octade.net?t=networknews" class="mention hashtag" rel="nofollow noopener" target="_blank">#NetworkNews</a> <a href="https://soc.octade.net?t=encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#Encryption</a> <a href="https://soc.octade.net?t=cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#Cryptography</a> <a href="https://soc.octade.net?t=messaging" class="mention hashtag" rel="nofollow noopener" target="_blank">#Messaging</a> <a href="https://soc.octade.net?t=anonymity" class="mention hashtag" rel="nofollow noopener" target="_blank">#Anonymity</a> <a href="https://soc.octade.net?t=protocols" class="mention hashtag" rel="nofollow noopener" target="_blank">#Protocols</a> <a href="https://soc.octade.net?t=opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#OpenSource</a> <a href="https://soc.octade.net?t=freesoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#FreeSoftware</a> <a href="https://soc.octade.net?t=blackhackjack" class="mention hashtag" rel="nofollow noopener" target="_blank">#BlackHackJack</a> <a href="https://soc.octade.net?t=censorship" class="mention hashtag" rel="nofollow noopener" target="_blank">#Censorship</a> <a href="https://soc.octade.net?t=retro" class="mention hashtag" rel="nofollow noopener" target="_blank">#Retro</a> <a href="https://soc.octade.net?t=infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#InfoSec</a> <a href="https://soc.octade.net?t=ciphers" class="mention hashtag" rel="nofollow noopener" target="_blank">#Ciphers</a> <a href="https://soc.octade.net?t=codes" class="mention hashtag" rel="nofollow noopener" target="_blank">#Codes</a> <a href="https://soc.octade.net?t=foss" class="mention hashtag" rel="nofollow noopener" target="_blank">#FOSS</a><br><br><span class="h-card"><a href="https://a.gup.pe/u/infostorm" class="u-url mention" rel="nofollow noopener" target="_blank">@infostorm@a.gup.pe</a></span> <span class="h-card"><a href="https://a.gup.pe/u/crypto" class="u-url mention" rel="nofollow noopener" target="_blank">@crypto@a.gup.pe</a></span> <span class="h-card"><a href="https://a.gup.pe/u/infosec" class="u-url mention" rel="nofollow noopener" target="_blank">@infosec@a.gup.pe</a></span> <span class="h-card"><a href="https://a.gup.pe/u/selfhosting" class="u-url mention" rel="nofollow noopener" target="_blank">@selfhosting@a.gup.pe</a></span><br>
Neiman<p>We tried to build a p2p board game in Rust. The challenge is to do it without a server or blockchain, but still maintain trust between players.</p><p>We ended up using two lesser-known mechanisms: <br>➡️Proof of Sequential Work (PoSW), and <br>➡️Verifiable Delay Function (VDF).</p><p>These are cryptography elements that are not known enough, right? Great motivation to write about them! </p><p>This thread is about PoSW only. VDF will have to wait for a later time.</p><p><a href="https://social.hastily.cc/tags/math" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>math</span></a> <a href="https://social.hastily.cc/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> (1/10)</p>
Peter N. M. Hansteen<p>Recent new features in OpenSSH <a href="https://www.undeadly.org/cgi?action=article;sid=20250802084523" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20250802084523</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/openssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openssh</span></a> <a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/newfeatures" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newfeatures</span></a> <a href="https://mastodon.social/tags/development" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>development</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/freesoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freesoftware</span></a> <a href="https://mastodon.social/tags/libresoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libresoftware</span></a> <a href="https://mastodon.social/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a></p>
Lobsters<p>Age Verification Doesn’t Need to Be a Privacy Footgun <a href="https://lobste.rs/s/axr1la" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/axr1la</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a><br><a href="https://soatok.blog/2025/07/31/age-verification-doesnt-need-to-be-a-privacy-footgun/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">soatok.blog/2025/07/31/age-ver</span><span class="invisible">ification-doesnt-need-to-be-a-privacy-footgun/</span></a></p>
Aaron Toponce ⚛️:debian:<p>After typing up my <a href="https://fosstodon.org/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a> TRNG* with von Neumann's randomness extractor, I revisited my curiosity to see if I can improve its efficiency. von Neumann throws out a lot of bits, likely including quality entropy.</p><p>My intuition was to pool the discarded bits and iterate over those again, perhaps with XOR. Turns out my intuition wasn't far off.</p><p><a href="https://gist.github.com/atoponce/0a659da0ab53b093629c4facb32e9547" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gist.github.com/atoponce/0a659</span><span class="invisible">da0ab53b093629c4facb32e9547</span></a></p><p>* Software CAN produce information theoretic entropy. Stating otherwise is a bad meme that needs to die.</p><p><a href="https://fosstodon.org/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://fosstodon.org/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a></p>
Tommaso Gagliardoni<p>The war on crypto never ends. The war on privacy, civil rights, security and freedom of speech never ends.</p><p>This time we are dangerously close to lose. The "Child Sexual Abuse" (CSA) EU regulation proposal, more aptly nicknamed "ChatControl", will be voted <em>AGAIN</em> this October, and many countries who opposed it last year are now undecided. The proposal at its roots aims at allowing authorities to break end-to-end encryption for the usual reason: "because of the children". As a father of two, I am disgusted by this recurring, cheap rhetoric.</p><p>What you can do: <a href="https://www.patrick-breyer.de/en/posts/chat-control/#WhatYouCanDo" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">patrick-breyer.de/en/posts/cha</span><span class="invisible">t-control/#WhatYouCanDo</span></a></p><p><a href="https://infosec.exchange/tags/eu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eu</span></a> <a href="https://infosec.exchange/tags/CSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSA</span></a> <a href="https://infosec.exchange/tags/CSAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSAM</span></a> <a href="https://infosec.exchange/tags/ChatControl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChatControl</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://infosec.exchange/tags/authoritarianism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authoritarianism</span></a> <a href="https://infosec.exchange/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://infosec.exchange/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://infosec.exchange/tags/civilrights" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>civilrights</span></a></p>
Lobsters<p>Nadim Kobeissi's Applied Cryptography Course <a href="https://lobste.rs/s/2qrwtx" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/2qrwtx</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/video" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>video</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/education" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>education</span></a><br><a href="https://www.youtube.com/watch?v=z6kK7rIbyB0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=z6kK7rIbyB0</span><span class="invisible"></span></a></p>
ltning<p>Why on earth was the <a class="hashtag" href="https://pleroma.anduin.net/tag/activitypub" rel="nofollow noopener" target="_blank">#ActivityPub</a> protocol even <em>let out the door</em> without a well-specified and mandatory graceful, non-destructive key rotation scheme?</p><p>Yes I know the privacy issues. Those are not valid reasons to not have such a mechanism; it's a valid reason to not enable or use one.</p><p>What we're stuck with now is a ton of instances with absurdly long, legacy-algorithm keys (RSA-4096) with no way to replace them with shorter/better keys without effectively losing everything ever posted on the instance.</p><p>The protocol is <em>only 7 years old</em>! EC crypto was well-established at the time, and should have been the default.</p><p>And what happens once everyone <em>has to</em> replace the keys, because RSA is broken by quantum computers (I know, probably 100 years to go)? The <a class="hashtag" href="https://pleroma.anduin.net/tag/fediverse" rel="nofollow noopener" target="_blank">#Fediverse</a> will be a wasteland, with no instances trusting anything from any other instance, so all <a class="hashtag" href="https://pleroma.anduin.net/tag/federation" rel="nofollow noopener" target="_blank">#Federation</a> breaks down.</p><p>Sorry if I got some details wrong about what the protocol says. If I get flamed to death for being wrong, then I'll consider that a Good Thing(TM). I've been trying to find a way to rotate/replace keys for a while and all my searching turns up is either 1) confirmation that most people don't know or care about cryptography, or 2) <a href="https://socialhub.activitypub.rocks/t/key-rotation-notification/562" rel="nofollow noopener" target="_blank">https://socialhub.activitypub.rocks/t/key-rotation-notification/562</a> - which really isn't helpful.</p><p>If it <em>is</em> possible to gracefully rotate the key(s) of an instance/user, there really has to exist some documentation that explains clearly how to implement this in a server and how to exercise it as a server operator.</p><p><a class="hashtag" href="https://pleroma.anduin.net/tag/cryptography" rel="nofollow noopener" target="_blank">#Cryptography</a> <a class="hashtag" href="https://pleroma.anduin.net/tag/rant" rel="nofollow noopener" target="_blank">#Rant</a> <a class="hashtag" href="https://pleroma.anduin.net/tag/mastodon" rel="nofollow noopener" target="_blank">#Mastodon</a></p>
Lobsters<p>OpenPGP for application developers <a href="https://lobste.rs/s/8kxhxe" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/8kxhxe</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a><br><a href="https://openpgp.dev/book/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">openpgp.dev/book/index.html</span><span class="invisible"></span></a></p>
Aaron Toponce ⚛️:debian:<p>I'm reading the paper by Bruce Schneier and Niels Ferguson on the Fortuna CSPRNG from 2003.</p><p>You can read it here: <a href="https://www.schneier.com/wp-content/uploads/2015/12/fortuna.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/wp-content/upload</span><span class="invisible">s/2015/12/fortuna.pdf</span></a></p><p>Note the highlighted section. This describes precisely fast key erasure that Daniel J. Bernstein describes in his 2017 blog post: <a href="https://blog.cr.yp.to/20170723-random.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.cr.yp.to/20170723-random.</span><span class="invisible">html</span></a></p><p><a href="https://fosstodon.org/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://fosstodon.org/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Cryptomator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptomator</span></a>: Our Roadmap to Post-Quantum <a href="https://mastodon.thenewoil.org/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a></p><p><a href="https://cryptomator.org/blog/2025/07/24/post-quantum-roadmap/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cryptomator.org/blog/2025/07/2</span><span class="invisible">4/post-quantum-roadmap/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/PQC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PQC</span></a></p>
TechnoTenshi :verified_trans: :Fire_Lesbian:<p>A new proof shows quantum cryptography can be built on problems even harder than NP, offering security beyond classical encryption. Researchers introduced "one-way puzzles" to replace traditional cryptographic foundations.</p><p><a href="https://www.quantamagazine.org/quantum-scientists-have-built-a-new-math-of-cryptography-20250725/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">quantamagazine.org/quantum-sci</span><span class="invisible">entists-have-built-a-new-math-of-cryptography-20250725/</span></a></p><p><a href="https://infosec.exchange/tags/QuantumComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuantumComputing</span></a> <a href="https://infosec.exchange/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/PostQuantum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PostQuantum</span></a></p>