Avesta Hojjati, Ph.D.(@sudoq7) 's Twitter Profileg
Avesta Hojjati, Ph.D.

@sudoq7

VP Engineering @DigiCert. views == my own

ID:3406025692

calendar_today06-08-2015 17:54:00

1,7K Tweets

788 Followers

1,0K Following

Kostas Kryptos(@kostascrypto) 's Twitter Profile Photo

Boom! Time-capsules are coming to Sui. TL;DR encrypt messages and NFTs into the future. Crazy interesting applications, see attached!
๐Ÿ’ that tech was my PhD presented to NIST w/ Foteini Baldimtsi back in 2008 & we still have the fastest algorithm :), we were also the 1st to deploy it

Boom! Time-capsules are coming to Sui. TL;DR encrypt messages and NFTs into the future. Crazy interesting applications, see attached! ๐Ÿ’ that tech was my PhD presented to NIST w/ @FBaldimtsi back in 2008 & we still have the fastest algorithm :), we were also the 1st to deploy it
account_circle
Matthew Green(@matthew_d_green) 's Twitter Profile Photo

So the overall point here, that E2E services leak a ton of metadata through key updates, is a good one. Same thing goes for Apple: you can more or less enumerate all devices if you reverse the Apple Directory Service APIs.

account_circle
Andrew Miller(@socrates1024) 's Twitter Profile Photo

debunking TEE fud: a short argument reset to start the new year. collab with Quintus
collective.flashbots.net/t/debunking-teโ€ฆ
Myth 1: โ€œSGX is being deprecated!' Trusted hardware is over.โ€ Actually Confidential Compute is booming. Normies are going to use this whether or not web3 does too

account_circle
Matthew Green(@matthew_d_green) 's Twitter Profile Photo

I threw together a quick blog post explaining the recent attack on AirDrop privacy, and how Chinese law enforcement is exploiting it. blog.cryptographyengineering.com/2024/01/11/attโ€ฆ

account_circle
Joseph Thacker(@rez0__) 's Twitter Profile Photo

๐Ÿšจ Massive AI Security Release ๐Ÿšจ

National Institute of Standards and Technology just put out the best AI Security Publication that I've ever seen.

It is 106 pages of deep, technical content. It references real-world practical attacks. In this thread is the link and I'm going to cover a few highlights. ๐Ÿ‘‡

๐Ÿšจ Massive AI Security Release ๐Ÿšจ @NIST just put out the best AI Security Publication that I've ever seen. It is 106 pages of deep, technical content. It references real-world practical attacks. In this thread is the link and I'm going to cover a few highlights. ๐Ÿ‘‡
account_circle
Eva(@evacide) 's Twitter Profile Photo

'Cybersecurity experts are warning of 'significant' data privacy risks after a Vancouver rape crisis centre told clients and donors a computer server containing their sensitive personal information & banking details was stolen from its office last month.'

cbc.ca/news/canada/brโ€ฆ

account_circle
Matthew Green(@matthew_d_green) 's Twitter Profile Photo

Article on some new research that finds ways to balance privacy and stalker detection for AirTags and other location trackers. This is a collaboration with my students Gabrielle Beck, Harry Eldridge and colleagues Abhishek Jain and Nadia Heninger. wired.com/story/apple-aiโ€ฆ

account_circle
Matthew Green(@matthew_d_green) 's Twitter Profile Photo

Google is changing the way it stores and collects user location data, so that this data will remain on the phone and be encrypted in the cloud. The upshot is that Geofence warrants may become obsolete. EFF: eff.org/deeplinks/2023โ€ฆ

account_circle
Chris Peikert(@ChrisPeikert) 's Twitter Profile Photo

๐Ÿ’ฅNew short paper with Yi Tang:

We ๐’„๐’๐’Ž๐’‘๐’๐’†๐’•๐’†๐’๐’š ๐’ƒ๐’“๐’†๐’‚๐’Œ the assumption underlying the lattice-based 'proof of sequential work' candidate from CRYPTO'23.

This solves a problem that was conjectured to require depth T... in depth poly(log T).

web.eecs.umich.edu/~cpeikert/pubsโ€ฆ

๐Ÿ’ฅNew short paper with Yi Tang: We ๐’„๐’๐’Ž๐’‘๐’๐’†๐’•๐’†๐’๐’š ๐’ƒ๐’“๐’†๐’‚๐’Œ the assumption underlying the lattice-based 'proof of sequential work' candidate from CRYPTO'23. This solves a problem that was conjectured to require depth T... in depth poly(log T). web.eecs.umich.edu/~cpeikert/pubsโ€ฆ
account_circle
Lukasz Olejnik(@lukOlejnik) 's Twitter Profile Photo

They HACKED A TRAIN. For real. Train operators asked for this to see why their trains didn't run after servicing. Turns out that vendor/producer implemented a geofence lock for trains serviced somewhere else. Amazing story, one of the best hacks in 2023. social.hackerspace.pl/@q3k/111528165โ€ฆ

They HACKED A TRAIN. For real. Train operators asked for this to see why their trains didn't run after servicing. Turns out that vendor/producer implemented a geofence lock for trains serviced somewhere else. Amazing story, one of the best hacks in 2023. social.hackerspace.pl/@q3k/111528165โ€ฆ
account_circle
Matthew Green(@matthew_d_green) 's Twitter Profile Photo

I wrote a second, long (wonky) post on Schnorr signatures, diving into the Dilithium PQC signature scheme. blog.cryptographyengineering.com/2023/11/30/to-โ€ฆ

account_circle
Matthew Green(@matthew_d_green) 's Twitter Profile Photo

Iโ€™m very happy to see that the EU parliament is making progress in beating back these mass-message scanning proposals. But Iโ€™m still pretty nervous that the EU Commission will find some way to bring these back. edri.org/our-work/csar-โ€ฆ

account_circle
Ryan Hurst(@rmhrisk) 's Twitter Profile Photo

OpenSSL 3.2.0 has support for using Windows OS trust stores, raw public keys for TLS and third-party signature schemes enabling PQC signatures to be experimented with, certificate compression which is important for PQC certificates, and Hybrid Public Key Encryption (HPKE). All

OpenSSL 3.2.0 has support for using Windows OS trust stores, raw public keys for TLS and third-party signature schemes enabling PQC signatures to be experimented with, certificate compression which is important for PQC certificates, and Hybrid Public Key Encryption (HPKE). All
account_circle
Sanaz(@sanazahari) 's Twitter Profile Photo

Everyone should have secure and modern messaging regardless of what phone they have. Excited to see Apple joining our ongoing work with the GSMA to evolve RCS. ๐Ÿ’š+๐Ÿ’™ cnet.com/tech/mobile/apโ€ฆ

account_circle
Matthew Green(@matthew_d_green) 's Twitter Profile Photo

Me: quits my โ€œanonymous-credentials for age verificationโ€ project, starts working on โ€œanonymous-credentials for social media identification.โ€

Me: quits my โ€œanonymous-credentials for age verificationโ€ project, starts working on โ€œanonymous-credentials for social media identification.โ€
account_circle
Nicolas Krassas(@Dinosn) 's Twitter Profile Photo

Reptar: New Intel CPU Vulnerability Impacts Multi-Tenant Virtualized Environments thehackernews.com/2023/11/reptarโ€ฆ

account_circle