mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.7K
active users

#postquantum

1 post1 participant0 posts today

there's a post-quantum federated key service that #infosec may be interested in:

> FOKS provides a secure, end-to-end encrypted Git hosting service. [...] the server never sees data or filenames in unencrypted form. This means that even if the server is compromised, your data is safe. FOKS is federated [...]

> Additionally, FOKS uses modern PQ-secure public-key cryptography, so all end-to-end encrypted data is safe from quantum attacks.

#postQuantum #encryption #git

foks.pub/

foks.pubFederated Open Key Service (FOKS)

Daniel J. Bernstein (#djb, to those who know and love him [1]) has a new blog entry about the NIST post-quantum #cryptography standardization process that's been ongoing for some years. Also, follow him @djb .

If you're not aware of some of the controversy about how NIST is running this process, it's a must-read.

blog.cr.yp.to/20250423-mceliec

My $0.02: it sure looks like NIST is backstopping an attempt by the NSA to get everyone to standardize on cryptography #standards that the #NSA knows how to break.

Again.

Yes, they did it before. If you read up on the Dual_EC calamity and its fallout, and how this time it was supposed to be different - open, transparent, secure - then prepare to be disappointed. NIST is playing #Calvinball with their rules for this contest, yanking the rug out from under contenders that appear to be more #secure and better understood, while pushing alternatives that are objectively worse (#weaker encryption, less studied, poorer #performance).

Frankly, I think organizations outside of the #USA would be foolish to trust anything that comes out of #NIST's current work. Well, those inside the USA too, but some of those may be forced by law to use whatever NIST certifies.

[1] Some people think djb is "prickly", not lovable. Oddly, it seems that the only people who say this are those who are wildly incorrect about code/algorithms and are being gently but publicly corrected about by djb at the time

blog.cr.yp.tocr.yp.to: 2025.04.23: McEliece standardization

The post-quantum era is closer than you think!

It’s time to tighten up that security hygiene and future-proof your organization’s data before quantum computing renders today’s encryption obsolete.

Here’s your crypto checklist:
🔐 Audit your encryption infrastructure
⚙️ Automate certificate/key management
🧠 Educate teams on quantum risk
🧪 Pilot NIST’s post-quantum algorithms
📅 Start now—retrofitting later will cost you

Quantum threats don’t wait. Neither should we.

#CyberSecurity #PostQuantum #Encryption #CISO #ITOps #QuantumComputing #CyberResilience

darkreading.com/vulnerabilitie

Continued thread