mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.8K
active users

#cryptography

23 posts20 participants2 posts today
#cryptohagen<p>Chinese 🇨🇳 authorities have accused US 🇺🇸 intelligence services of hacking a major Chinese <a href="https://social.data.coop/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> provider</p><p>The hack allegedly took place between March and September last year</p><p>US hackers allegedly exploited a zero-day in the company's CRM app to deploy backdoors and steal data. Stolen data included source code, customer data, and order details<br><a href="https://www.globaltimes.cn/page/202504/1333032.shtml" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">globaltimes.cn/page/202504/133</span><span class="invisible">3032.shtml</span></a></p>
Lobsters<p>A New Kali Linux Archive Signing Key <a href="https://lobste.rs/s/gbyes1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/gbyes1</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a><br><a href="https://www.kali.org/blog/new-kali-archive-signing-key/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">kali.org/blog/new-kali-archive</span><span class="invisible">-signing-key/</span></a></p>
Jan Schaumann<p>System Administration</p><p>Week 12, System Security IV: Crypto means <a href="https://mstdn.social/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a></p><p>In this video, we discuss the three areas cryptography can provide threat mitigations in -- confidentiality, integrity, and authenticity -- and what some common pitfalls are with each.</p><p><a href="https://youtu.be/zLH2jwzgFfw" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/zLH2jwzgFfw</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmin</span></a> <a href="https://mstdn.social/tags/SRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SRE</span></a> <a href="https://mstdn.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://mstdn.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a></p>
Steven Carneiro<p>Decoded quantum interferometry (DQI):<br><a href="https://social.vivaldi.net/tags/quantumcomputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quantumcomputing</span></a> <a href="https://social.vivaldi.net/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://social.vivaldi.net/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://social.vivaldi.net/tags/algorithms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>algorithms</span></a> <a href="https://social.vivaldi.net/tags/innovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>innovation</span></a><br>👨‍💻</p><p><a href="https://www.wired.com/story/quantum-speedup-found-for-huge-class-of-hard-problems/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/quantum-speedu</span><span class="invisible">p-found-for-huge-class-of-hard-problems/</span></a></p>
Lobsters<p>What the heck is AEAD again? <a href="https://lobste.rs/s/zoxm37" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/zoxm37</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a><br><a href="https://ochagavia.nl/blog/what-the-heck-is-aead-again/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ochagavia.nl/blog/what-the-hec</span><span class="invisible">k-is-aead-again/</span></a></p>
Leanpub<p>CISSP: The Last Mile: Your guide to the finish line <a href="https://leanpub.com/cissplastmile" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">leanpub.com/cissplastmile</span><span class="invisible"></span></a> by Pete Zerger is the featured book 📖 on the Leanpub homepage! <a href="https://leanpub.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">leanpub.com</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/ComputerSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComputerSecurity</span></a> <a href="https://mastodon.social/tags/CloudComputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudComputing</span></a> <a href="https://mastodon.social/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a> <a href="https://mastodon.social/tags/books" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>books</span></a> <a href="https://mastodon.social/tags/ebooks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ebooks</span></a></p><p>Find it on Leanpub!</p>
Laurent Cheylus<p>A look at the Sequoia command-line interface, a promising alternative (written in Rust) to the venerable GNU Privacy Guard (GPG) Tool to sign, encrypt and verify Datas <a href="https://bsd.network/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a> <a href="https://bsd.network/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://lwn.net/Articles/1003243/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">lwn.net/Articles/1003243/</span><span class="invisible"></span></a></p>
AJCxZ0<p>"Many things are necessary to lead a full, free life--good health, economic and educational opportunity, and a fair break in the marketplace, to name a few. But none of these is more important than the most basic of all individual rights, the right to privacy. A system that fails to respect its citizens' right to privacy fails to respect the citizens themselves. ... At no time in the past has our Government known so much about so many of its individual citizens.<br> ...<br> Advanced technology has created new opportunities for America as a nation, but it has also created the possibility for new abuses of the individual American citizen. Adequate safeguards must always stand watch so that man remains the master-and never becomes the victim--of the computer."</p><p>Radio Address About the American Right of Privacy - Richard M. Nixon, 23 February 1974</p><p><a href="https://www.presidency.ucsb.edu/documents/radio-address-about-the-american-right-privacy" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">presidency.ucsb.edu/documents/</span><span class="invisible">radio-address-about-the-american-right-privacy</span></a></p><p>Part of this speech is featured in an excerpt from the 1981 NOVA documentary, "Computers, Spies and Private Lives", restored by the Computer History Archives Project (CHAP).</p><p><a href="https://www.youtube.com/watch?v=lvGgeb0RVyY" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=lvGgeb0RVyY</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <span class="h-card" translate="no"><a href="https://mas.to/@PrivacyDigest" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>PrivacyDigest</span></a></span> <a href="https://infosec.exchange/tags/BigData" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BigData</span></a> <a href="https://infosec.exchange/tags/USGov" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USGov</span></a> <a href="https://infosec.exchange/tags/NationalSecurityAgency" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NationalSecurityAgency</span></a> <a href="https://infosec.exchange/tags/NSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSA</span></a> <a href="https://infosec.exchange/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a> <a href="https://infosec.exchange/tags/Cryptology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptology</span></a> <a href="https://infosec.exchange/tags/RichardMNixon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RichardMNixon</span></a> <a href="https://infosec.exchange/tags/RichardNixon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RichardNixon</span></a> <a href="https://infosec.exchange/tags/NOVA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NOVA</span></a> <a href="https://infosec.exchange/tags/CHAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CHAP</span></a> <a href="https://infosec.exchange/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InformationSecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a></p>
Lobsters<p>Audit of the Rust p256 Crate <a href="https://lobste.rs/s/7ousya" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/7ousya</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rust</span></a><br><a href="https://reports.zksecurity.xyz/reports/near-p256/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">reports.zksecurity.xyz/reports</span><span class="invisible">/near-p256/</span></a></p>
Neil Madden<p>Two nice things from the UK’s NCSC today:</p><ol><li><p>This good whitepaper on “advanced cryptography” for privacy (FHE, MPC): <a href="https://www.ncsc.gov.uk/whitepaper/advanced-cryptography" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ncsc.gov.uk/whitepaper/advance</span><span class="invisible">d-cryptography</span></a></p></li><li><p>I submitted feedback last week that it would be great to be able to download their guidance as a single file for offline viewing, and today that seems already implemented! (Not sure if that is them being super-responsive to feedback or lots of other people requesting the same feature before me). </p></li></ol><p><a href="https://infosec.exchange/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a></p>
Leon P Smith<p>As a followup to the Combinatorics of Crypographic Continuations, I've written new sections on the Cryptoacoustic Transmission Medium, followed by example threat scenarios it is relevant to.</p><p>"The goal that pervades every part of G3P's design is to adversarially pass messages inside password hash algorithms via the mathematics of game theory. [...]</p><p>Cryptoacoustics is a logical converse of cryptography, not unlike the way Statistics is a logical converse of Probability. Cryptography ensures that if you have access to the plaintext of a key, then you can run an algorithm. [...] Cryptoacoustics ensures that if you can run an algorithm, then you will have access to the plaintext of a key. These types of keys are what we call "tags".</p><p>[...]</p><p>Thus cryptoacoustics is a transmission medium of woke mind viruses that cannot be deleted."</p><p><a href="https://github.com/auth-global/self-documenting-cryptography/blob/534d54590c619bc21dffb0c299c8327f09a9bce5/design-documents/g3pb2.md#the-cryptoacoustic-transmission-medium" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/auth-global/self-do</span><span class="invisible">cumenting-cryptography/blob/534d54590c619bc21dffb0c299c8327f09a9bce5/design-documents/g3pb2.md#the-cryptoacoustic-transmission-medium</span></a></p><p><a href="https://ioc.exchange/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://ioc.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
Stefen Auris 🖖​<p>The "periodic table of primes"<br><a href="https://www.earth.com/news/prime-numbers-discovery-upends-millennia-old-math-beliefs-security-issues/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">earth.com/news/prime-numbers-d</span><span class="invisible">iscovery-upends-millennia-old-math-beliefs-security-issues/</span></a></p><p><a href="https://furry.engineer/tags/math" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>math</span></a> <a href="https://furry.engineer/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a></p>
Will Berard 🫳🎤🫶<p>Scientists claim to have found some arcane periodicity in prime numbers, allowing their prediction at a lower computational expense. </p><p>Yes, you read that right.</p><p>Li, Han-Lin and Fang, Shu-Cherng and Kuo, Way, The Periodic Table of Primes (April 6, 2024). Available at SSRN: <a href="https://ssrn.com/abstract=4742238" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">ssrn.com/abstract=4742238</span><span class="invisible"></span></a> or <a href="http://dx.doi.org/10.2139/ssrn.4742238" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="ellipsis">dx.doi.org/10.2139/ssrn.474223</span><span class="invisible">8</span></a></p><p><a href="https://mastodon.acm.org/tags/Maths" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Maths</span></a> <a href="https://mastodon.acm.org/tags/Primes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Primes</span></a> <a href="https://mastodon.acm.org/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a></p>
LavX News<p>Unlocking Secure Cryptography with TPM2-PKCS11: A Deep Dive</p><p>Explore the powerful capabilities of TPM2-PKCS11, a project that bridges the gap between hardware security modules and cryptographic standards. This article delves into its architecture, usage example...</p><p><a href="https://news.lavx.hu/article/unlocking-secure-cryptography-with-tpm2-pkcs11-a-deep-dive" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/unlocking</span><span class="invisible">-secure-cryptography-with-tpm2-pkcs11-a-deep-dive</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a> <a href="https://mastodon.cloud/tags/TPM2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPM2</span></a> <a href="https://mastodon.cloud/tags/PKCS11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKCS11</span></a></p>
Bob 🇨🇦🇲🇽🇺🇦<p><a href="https://www.earth.com/news/prime-numbers-discovery-upends-millennia-old-math-beliefs-security-issues/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">earth.com/news/prime-numbers-d</span><span class="invisible">iscovery-upends-millennia-old-math-beliefs-security-issues/</span></a></p><p><a href="https://infosec.exchange/tags/mathematics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mathematics</span></a> <a href="https://infosec.exchange/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a></p>
Bob the Traveler<p>Italian mathematician Leon Battista Alberti, who died OTD in 1472, developed the first polyalphabetic cipher, and his "De componendis cifris" was the first Western cryptanalysis text <a href="https://cromwell-intl.com/cybersecurity/crypto/cipher-strength.html?s=mb" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cromwell-intl.com/cybersecurit</span><span class="invisible">y/crypto/cipher-strength.html?s=mb</span></a> <a href="https://mastodon.world/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.world/tags/history" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>history</span></a></p>
Lobsters<p>McEliece standardization <a href="https://lobste.rs/s/yzjiqj" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/yzjiqj</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a><br><a href="https://blog.cr.yp.to/20250423-mceliece.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.cr.yp.to/20250423-mceliec</span><span class="invisible">e.html</span></a></p>
Bob the Traveler<p>Italian Renaissance man Leon Battista Alberti, who died OTD in 1472, developed the first polyalphabetic cipher, and his "De componendis cifris" was the first Western exposition of cryptanalysis <a href="https://cromwell-intl.com/cybersecurity/crypto/?s=mb" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cromwell-intl.com/cybersecurit</span><span class="invisible">y/crypto/?s=mb</span></a> <a href="https://mastodon.world/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.world/tags/history" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>history</span></a></p>
Lobsters<p>The cryptoint library <a href="https://lobste.rs/s/h201mp" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/h201mp</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/pdf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pdf</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a><br><a href="https://cr.yp.to/papers/cryptoint-20250424.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cr.yp.to/papers/cryptoint-2025</span><span class="invisible">0424.pdf</span></a></p>
Jason 🦓 Gerard 🦀 DeRose<p>Do you like <a href="https://fosstodon.org/tags/Rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rust</span></a> and <a href="https://fosstodon.org/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a> ? Are you looking for an open source project to hack on? Well, I happily invite you to work on ZebraChain with me!</p><p><a href="https://github.com/zebrafactory/zebrachain" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/zebrafactory/zebrac</span><span class="invisible">hain</span></a></p><p><a href="https://fosstodon.org/tags/Rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rust</span></a> <a href="https://fosstodon.org/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a> <a href="https://fosstodon.org/tags/pull_request" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pull_request</span></a></p>