teri

joined 2 years ago
[–] teri@discuss.tchncs.de 4 points 3 days ago (1 children)

Can you speak of 'erasing' if this value was actually never there but just fantasy numbers?

[–] teri@discuss.tchncs.de 5 points 6 days ago (2 children)

Does anybody care about people in Yemen? Such a fuzz about a stupid group chat while the big story could also be the airstrike and murder of people. What happened in Yemen?

[–] teri@discuss.tchncs.de 5 points 1 week ago

Generally seems an okay idea to me because it allows you to use the rust tool-chain and you can more easily achieve compatibility with other rust code. In fact, there's other languages which do something similar. I remember F* (f-star) which compiles to OCaml.

[–] teri@discuss.tchncs.de 3 points 1 week ago

In thie fesiverse graphic each person has exactly 1 connection to a fediverse thing. But in reality, there can be more. I guess in practice there are often more than one.

[–] teri@discuss.tchncs.de 5 points 1 week ago (1 children)

That's me most of the time. Does it mean I'm ADHD?

[–] teri@discuss.tchncs.de 5 points 1 week ago

There's nothing stopping you from using GPL.

But there is a culture - I think even explicit - of using MIT or APACHE licensing. In some sense is okay, because it simplifies crate compatibility. But it comes at the cost of feeding the usual suspects who now obviously turn against humanity.

My unconfirmed suspicion is that there are forces behind (Google, Microsoft, Amazon, Meta) who like permissive licenses because this makes it easier for them to exploit the work of the public.

[–] teri@discuss.tchncs.de 2 points 1 week ago

Maybe you could also consider to extend an existing good PQC protocol (for example https://signal.org/docs/specifications/pqxdh/) by adding a shared secret. The shared secret could flow into the key derivation functions which are used to derive the symmetric encryption keys. This way you would have quite strong guarantees (forward secrecy) as long as nobody can break the PQC algorithm and still some guarantee of confidentiality when somebody breaks asymmetric primitives. In the protocol you outlined now, there's no forward secrecy. Meaning that once a key is compromised, all past and future messages can be decrypted.

[–] teri@discuss.tchncs.de 3 points 2 weeks ago (2 children)

Interesting :)

A few quick questions & comments:

  1. I don't quite understand "If all users accept the introduction, a list of contacts is sent for each contact pair. These contacts are not used for messaging to prevent more than two parties from having encryption keys." (line 66) What exactly are the "contacts"? Is it the same data as defined on line 8? Where do the encryption keys come from? Do initiators of introduction reveal encryption keys of their existing contacts?

  2. After an introduction there's the problem that newly introduced people cannot setup secret keys in a very clean way. Because this secret keys can be computed if an attacker gets hold of the introducer, has recorded traffic and is in possession of a large enough quantum computer (which you assume in your threat model). You therefore would need some sort of 'upgrade' mechanism which would allow either two people to meet in person to 'upgrade' their secure channel. Or you could add a asymmetric key-agreement or key-exchange on top (probably post-quantum algorithm).

  3. I don't quite get the combination of "HTTPS", "Tor", "symmetric crypto because of quantum computers". Why HTTPS if Tor already provides confidentiality? HTTPS implies certificates, no? What about them?

  4. What about nonces for GCM? How do you prevent replay attacks?

  5. If you want to truly understand your protocol and get confident about it, I recommend studying something like this: https://tamarin-prover.com/ This allows you to model your protocol more formally, state your security claims and check if the protocol satisfies this claims :)

[–] teri@discuss.tchncs.de 30 points 2 weeks ago (4 children)

GNU Taler seems to be a good thing to look into. Not a crypto currency but a payment system which preserves anonymity of the buyer.

[–] teri@discuss.tchncs.de 10 points 2 weeks ago

Always have some chewing gum ready. (I would advise for cyanoacrylate but that's illegal in some places because you could use it to stick yourself to the road as a form of protest)

[–] teri@discuss.tchncs.de 50 points 2 weeks ago (2 children)

"Could lose"? We are long past this point. When you can chose between two parties and they try to manipulate the election as hard as they can, then that's a zombie democracy at best. And now? The president stands above the law. He can fire people illegally. He can disable law enforcement. Democracy in the US is gone. Hopefully only temporarily. Now it's up to people to act, take their rogue government down and repair what can be repaired.

 

Need a quick solution for a video call right now? A shared document? A poll? URL shortener? ... This website takes you to a (random) open-source service.

[–] teri@discuss.tchncs.de 2 points 1 month ago

Happy to be inspiring :)

TL; DR you just made my day :*

 

"[...] what we’re witnessing now is the systematic dismantling of this entire architecture of peace—not through external defeat, but through internal surrender"

 

[...] By the time most Americans understand what's happening, the "reboot" – the destruction of government – may already be complete.

 

The German Federal Ministry of Education and Research announces to fund the development of an open-source chip design ecosystem. This includes also design software.

 

The German Federal Ministry of Education and Research announces to fund the development of an open-source chip design ecosystem. This includes also design software.

 

The most difficult thing about hardware to have 'libre' are the silicon chips. But times start changing. Hopefully.

The program of FSiC2023 contains diverse talks about chip design with open-source CAD tools open-source hardware (FPGA, ASIC).

 

Diverse talks about chip design with open-source CAD tools open-source hardware (FPGA, ASIC)

view more: next ›