With the small caveat that it will probably get me killed one day, my favorite tactic is blasting this and staring the guy down, expressionless, without breaking eye contact until he gets the hint.
Programs aren’t capable of generating true random numbers, so how can we? Are they even useful? Dr Valerio Giuffrida demonstrates how to get a true random number from most computers.
In this talk we will discuss the radio jailbreaking journey that enabled us to perform the first public disclosure and security analysis of the proprietary cryptography used in TETRA (Terrestrial Trunked Radio): a European standard for trunked radio globally used by government agencies, police, prisons, emergency services and...
Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography...
Sipeed Lichee Pi 4A RISC-V SBC review and Debian demo. This is the first RISC-V computer I’ve tested that’s provided a usable desktop computing experience right out of the box. End-user RISC-V is starting to arrive! :)...
You bring up some valid points about readability and auditability, and I can see where the confusion might come from. Let’s break it down a bit.
Readability vs. Auditability: With homomorphic encryption, you can perform calculations on encrypted data without needing to decrypt it first. So, yes, the data can be audited without being fully readable. Think of it like checking a locked treasure chest’s contents without actually opening it!
Selling Votes and Security Concerns: Zero-knowledge proofs are like saying, “I know the secret, but I won’t tell you what it is.” They allow the system to verify information without exposing the details. It’s a cool concept that’s been researched for decades, and it has applications in keeping things like medical records secure.
Why Blockchain? Imagine a public ledger that no one person controls and can’t be easily tampered with. That’s what blockchain brings to the table. It creates a system where we can trust the process because the data is transparent and immutable.
Here’s a real-world example: ElectionGuard uses this technology to ensure that electronic records match physical ballots. They encrypt the records in a way that can be verified without exposing individual votes.
If you’re interested in diving deeper, check out these resources:
To create the capabilities for a direct democracy that is far more secure and auditable than the current system.
I hope this helps make things clearer! Feel free to hit me back with any more questions. It’s a complex subject, but it’s super interesting once you start to get the hang of it.
Best, cy
Reworded by AI, acting as my anger translator at your “how do you figure?”:
My first espresso machine, a rocket appartamento, has turned into a testbed for all my ideas of how much technology you can pack into an espresso machine. Let me share what I’ve done, and please ask about what you would like to hear more of!...
The Unbreakable Kryptos Code (youtu.be)
Malicious Backdoor in xz liblzma (youtu.be)
Backdoor found in xz liblzma specifically targets the RSA implementation of OpenSSH. Story still developing.https://openwall.com/lists/…/2…
new linux exploit is absolutely insane (youtu.be)
Broadcast LoRa packets WITHOUT a radio (youtu.be)
AI summary of transcript:...
The Best Password Managers in 2024 (blog.thenewoil.org)
2023 was a record-breaking year for cybersecurity in a bad way. Ransomware payments hit a record high of $1.1 billion, which is likely to…
Man playing music out loud on train: What are our options? [Update: Solved]
Least passive aggressive brit...
Charles on Selective Disclosure Regimes using Midnight (youtu.be)
Hosky speaks at length about selective disclosure regimes using Midnight....
How To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKEN (youtu.be)
DO NOT try this EVER....
How to Start a War With a Flash Drive (31:45) (youtu.be)
Advanced Meshtastic Series (www.youtube.com)
Welcome to the Advanced Meshtastic Series. We’ll be getting into some of the more advanced things you can do with Meshtastic.
True Random Numbers - Computerphile (12:15) (youtu.be)
Programs aren’t capable of generating true random numbers, so how can we? Are they even useful? Dr Valerio Giuffrida demonstrates how to get a true random number from most computers.
Darknet Diaries: True stories from the dark side of the Internet (darknetdiaries.com)
I just learned about this podcast today. Enjoy!
How the Best Hackers Learn Their Craft [42:46] (youtu.be)
All cops are broadcasting: Obtaining the secret TETRA primitives after decades in the shadows (47:30) (youtu.be)
In this talk we will discuss the radio jailbreaking journey that enabled us to perform the first public disclosure and security analysis of the proprietary cryptography used in TETRA (Terrestrial Trunked Radio): a European standard for trunked radio globally used by government agencies, police, prisons, emergency services and...
Formal Methods for the Working DeFi Dev by Rikard Hjort | Devcon Bogota (1:03:31) (youtu.be)
"Formally Verifying Everybody's Cryptography" by Mike Dodds, Joey Dodds (Strange Loop 2022) (40:30) (youtu.be)
Public Key Cryptography - Computerphile (6:19) (youtu.be)
Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography...
Lichee Pi 4A: Serious RISC-V Desktop Computing (19:13) (youtu.be)
Sipeed Lichee Pi 4A RISC-V SBC review and Debian demo. This is the first RISC-V computer I’ve tested that’s provided a usable desktop computing experience right out of the box. End-user RISC-V is starting to arrive! :)...
Let's Discuss the Potential for Vulnerability Here: Why you should check your secrets into Git | Warren Parad (55:08) (youtu.be)
Slides - https://authress.io/l/codemotion...
Video-Based Cryptanalysis [3:00] (youtu.be)
Video-Based Cryptanalysis
Vitalik Buterin explains Ethereum (youtu.be)
Ethereum is a platform that makes it possible for any developer to write and distribute next-generation decentralized applications....
Blockchain is a terrible idea for elections, actually.
https://www.protocol.com/media-library/vote-check.jpg?id=24672159&width=1245&height=700&quality=85&coordinates=7%2C0%2C8%2C0...
This Guy Built an Endgame Rocket Espresso Machine | An Engineer's Rocket Appartamento Mods [12:12] (youtu.be)
My first espresso machine, a rocket appartamento, has turned into a testbed for all my ideas of how much technology you can pack into an espresso machine. Let me share what I’ve done, and please ask about what you would like to hear more of!...