Eyal Ronen
banner
eyalr0.bsky.social
Eyal Ronen
@eyalr0.bsky.social
Researching applied cryptography and security. School of Computer Science at Tel Aviv University.
https://eyalro.net
Reposted by Eyal Ronen
Until now, if you lost or broke your phone, your Signal message history was *gone,* a real challenge for everyone whose most important conversations happen in Signal. So, with careful design and development, we’re rolling out opt-in secure backups.

signal.org/blog/introducing-secure-backups
Introducing Signal Secure Backups
In the past, if you broke or lost your phone, your Signal message history was gone. This has been a challenge for people whose most important conversations happen on Signal. Think family photos, sweet...
signal.org
September 8, 2025 at 4:03 PM
Reposted by Eyal Ronen
This battle will keep playing out over and over again until they achieve something that their own citizens have made it clear they don’t want. www.techradar.com/vpn/vpn-priv...
The EU wants to decrypt your private data by 2030
The EU Commission unveiled the first step in its security strategy to ensure "lawful and effective" law enforcement access to data
www.techradar.com
July 5, 2025 at 5:39 PM
Reposted by Eyal Ronen
Well, this horrible idea refuses to die so we should refuse to let it pass and start organizing again.

ec.europa.eu/commission/p...
Commission presents Roadmap for effective and lawful access to data for law enforcement
The European Commission presented today a Roadmap setting out the way forward to ensure law enforcement authorities in the EU have effective and lawful access to data.
ec.europa.eu
July 5, 2025 at 5:25 PM
If any Iron Maiden fans are in the Birmingham area tomorrow (the 21st), I have a couple of Premier Lounge tickets that I unfortunately can't use due to the current situation.
#IronMaiden #RunForYourLivesWorldTour #IronMaiden50
@ironmaiden.bsky.social
June 20, 2025 at 7:57 AM
Reposted by Eyal Ronen
New blog post on our (with @rikkebjerg.bsky.social and @mikaelabrough.bsky.social) USENIX'25 paper "On the Virtues of Information Security in the UK Climate Movement" where I end up reflecting on writing this, for me, unusual work.

martinralbrecht.wordpress.com/2025/06/14/o...
On the Virtues of Information Security in the UK Climate Movement
Our paper – titled “On the Virtues of Information Security in the UK Climate Movement” – was accepted at USENIX Security’25. Here’s the abstract: We report on an ethnographic study with members of …
martinralbrecht.wordpress.com
June 14, 2025 at 2:27 PM
After a long debate about whether this small typo was worth resubmitting the PDF or not, @IEEESSP 's server stopped responding one minute before the deadline and solved it for us.
June 6, 2025 at 12:17 PM
Reposted by Eyal Ronen
All papers should publish their code. Help realize this by becoming an artifact reviewer at NDSS'26, apply here: docs.google.com/forms/d/e/1F...

You'll review artifacts of accepted papers. We especially encourage junior/senior PhD students & PostDocs to help. Distinguished reviews will get awards!
Self-nomination for the Artifact Evaluation Committee of NDSS 2026
We are looking for members of the Artifact Evaluation Committee (AEC) of NDSS 2026. The Network and Distributed System Security symposium adopts an Artifact Evaluation (AE) process allowing authors t...
docs.google.com
May 25, 2025 at 1:25 PM
Reposted by Eyal Ronen
uASC 2026 will take place on February 3, 2026, in Leuven, Belgium, hosted by KU Leuven. We can't wait to see you next year!

Cycle 1 Paper Submission Deadline is July 15, 2025!
👉 uasc.cc #uasc26
May 19, 2025 at 3:58 PM
Reposted by Eyal Ronen
New version of the IEEE 802.11 standard that underpins Wi-Fi was has been released. A total of 5969 pages!

The number of pages clearly keeps increasing. That includes more features to defend networks, but also more features to potentially abuse 👀
May 7, 2025 at 10:28 PM
Reposted by Eyal Ronen
Bradley Morgan, Gal Horowitz, Sioli O'Connell, Stephan van Schaik, Chitchanok Chuengsatiansup, Daniel Genkin, Olaf Maennel, Paul Montague, Eyal Ronen, Yuval Yarom
Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye
https://arxiv.org/abs/2504.11208
April 16, 2025 at 4:09 AM
Reposted by Eyal Ronen
Congratulations to the new IACR fellows....

Joan Daemen,
Thomas Johansson,
Anna Lysyanskaya,
Pascal Paillier,
J.R. Rao,
Alon Rosen,
Elaine Shi,
Bo-Yin Yang.

iacr.org/fellows/

#cryptography
IACR Fellows
iacr.org
April 14, 2025 at 6:16 PM
Reposted by Eyal Ronen
Taking this trans day of visibility as a moment to say I am loudly and unapologetically in support of trans rights. 🏳️‍⚧️
March 31, 2025 at 5:04 PM
Reposted by Eyal Ronen
If you’re a FOSS project dealing with overwhelming AI scraper bots, we will provide free security services for your project at no cost to you ❤️ #TeamSleep thelibre.news/foss-infrast...
FOSS infrastructure is under attack by AI companies
LLM scrapers are taking down FOSS projects' infrastructure, and it's getting worse.
thelibre.news
March 20, 2025 at 3:18 PM
Reposted by Eyal Ronen
Congratulations to the legendary Adi Shamir on his Levchin Prize win! Dr. Shamir donated the $10K prize money to students sponsorships.
March 26, 2025 at 9:16 AM
Reposted by Eyal Ronen
Now we have Adi Shamir's invited talk on 'How to Securely Implement Cryptography in Deep Neural Networks'

eprint.iacr.org/2025/288.pdf

#realworldcrypto
March 26, 2025 at 9:29 AM
Reposted by Eyal Ronen
In 25 years of covering national security, I’ve never seen a story like this: Senior Trump officials discussed planning for the U.S. attack on Yemen in a Signal group--and inadvertently added the editor-in-chief of The Atlantic. www.theatlantic.com/politics/arc...
The Trump Administration Accidentally Texted Me Its War Plans
U.S. national-security leaders included me in a group chat about upcoming military strikes in Yemen. I didn’t think it could be real. Then the bombs started falling.
www.theatlantic.com
March 24, 2025 at 4:11 PM
Reposted by Eyal Ronen
*Friends don’t let friends deploy a cryptographic protocol without a formal cryptographic analysis* martinralbrecht.wordpress.com/2025/03/16/a... @kennyog.bsky.social @eyalr0.bsky.social @lenka.sh
March 16, 2025 at 11:38 AM
Reposted by Eyal Ronen
It’s finally out - our 107-page analysis of key exchange in Telegram in which we proved (after massive effort) that the bespoke protocol is ok, if you’re willing to make some uncomfy assumptions on the home-grown KDF. With @malb.bsky.social, @eyalr0.bsky.social, Lenka Mareková and Igors Stepanovs.
Analysis of the Telegram Key Exchange (Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Eyal Ronen, Igors Stepanovs) ia.cr/2025/451
March 11, 2025 at 5:19 PM
Reposted by Eyal Ronen
The tentative program for Real World Crypto 2025 is live!

rwc.iacr.org/2025/program...

A huge thanks to my co-chair @malb.bsky.social and all the amazing program committee members for helping put this together. I'm looking forward to seeing everyone in Sofia!

#realworldcrypto
RWC 2025 program
Real World Crypto Symposium
rwc.iacr.org
February 19, 2025 at 12:25 PM
Reposted by Eyal Ronen
Because of new tariffs, submissions to crypto with a non US author have a 20% reduction to their page limit.
February 4, 2025 at 5:48 AM
Reposted by Eyal Ronen
The list of accepted talk at @rwc.iacr.org is now available: rwc.iacr.org/2025/accepte... Early registration ends 26 February. CC: programme co-chair @nicksullivan.org
RWC 2025 accepted papers
Real World Crypto Symposium
rwc.iacr.org
February 2, 2025 at 12:14 PM
Reposted by Eyal Ronen
How to Prove False Statements: Practical Attacks on Fiat-Shamir (Dmitry Khovratovich, Ron D. Rothblum, Lev Soukhanov) ia.cr/2025/118
January 27, 2025 at 1:59 AM
Reposted by Eyal Ronen
Registration for RWC 2025 is open!

register.iacr.org/conferences/...
Before proceeding • IACR
register.iacr.org
January 14, 2025 at 7:14 PM
Reposted by Eyal Ronen
After an embargo of 8 months, we are glad to finally share our USENIX Security '25 paper! We found more than 4 MILLION vulnerable tunneling servers by scanning the Internet.

These vulnerable servers can be abused as proxies to launch DDoS attacks and possibly to access internal networks.
January 14, 2025 at 2:12 PM