Interesting short blog post on how electronic passports cryptography works
blog.trailofbits.com/2025/10/31/t...
Credits Joop van de Pol
#infosec #embedded
blog.trailofbits.com/2025/10/31/t...
Credits Joop van de Pol
#infosec #embedded
November 9, 2025 at 10:44 AM
Interesting short blog post on how electronic passports cryptography works
blog.trailofbits.com/2025/10/31/t...
Credits Joop van de Pol
#infosec #embedded
blog.trailofbits.com/2025/10/31/t...
Credits Joop van de Pol
#infosec #embedded
I hired a director recently and this was my screening question: can you please explain the difference between public-key and symmetric-key cryptography.
Virtually all the candidates, who universally claimed security engineering expertise of some kind (some cryptography-related) could not. At all.
Virtually all the candidates, who universally claimed security engineering expertise of some kind (some cryptography-related) could not. At all.
November 7, 2025 at 4:57 PM
I hired a director recently and this was my screening question: can you please explain the difference between public-key and symmetric-key cryptography.
Virtually all the candidates, who universally claimed security engineering expertise of some kind (some cryptography-related) could not. At all.
Virtually all the candidates, who universally claimed security engineering expertise of some kind (some cryptography-related) could not. At all.
Obligatory disclaimer: do not roll your own cryptography if you're not a cryptographer it is subtle and quick to anger
November 7, 2025 at 5:00 PM
Obligatory disclaimer: do not roll your own cryptography if you're not a cryptographer it is subtle and quick to anger
The difference between symmetric and pubic key cryptography is critical not only to the security properties of a system -- it's critical to system performance, scaling, and reliability.
November 7, 2025 at 4:57 PM
The difference between symmetric and pubic key cryptography is critical not only to the security properties of a system -- it's critical to system performance, scaling, and reliability.
Me: "I'll make a Discord for the class to enhance their cryptography learning experience"
The students:
The students:
November 10, 2025 at 6:20 PM
Me: "I'll make a Discord for the class to enhance their cryptography learning experience"
The students:
The students:
And like I suck at math!!! I hate it! I only know about this because I was really into cryptography as a teenager
Moreover, ICE must be destroyed
Moreover, ICE must be destroyed
November 6, 2025 at 3:59 AM
And like I suck at math!!! I hate it! I only know about this because I was really into cryptography as a teenager
Moreover, ICE must be destroyed
Moreover, ICE must be destroyed
Can you decipher this sentence? 🔠
#puzzlegame #cryptography #indiegame #gamedev #indiedev #mystery #videogame
#puzzlegame #cryptography #indiegame #gamedev #indiedev #mystery #videogame
November 6, 2025 at 10:53 PM
Can you decipher this sentence? 🔠
#puzzlegame #cryptography #indiegame #gamedev #indiedev #mystery #videogame
#puzzlegame #cryptography #indiegame #gamedev #indiedev #mystery #videogame
The field of Cryptography is all about securing data & communication. In this course, you'll learn the basics like hashing, symmetric & asymmetric encryption, and more. By the end, you'll have built a fully-functioning command line cryptography tool in Python.
www.freecodecamp.org/news/cryptog...
www.freecodecamp.org/news/cryptog...
November 7, 2025 at 9:02 PM
The field of Cryptography is all about securing data & communication. In this course, you'll learn the basics like hashing, symmetric & asymmetric encryption, and more. By the end, you'll have built a fully-functioning command line cryptography tool in Python.
www.freecodecamp.org/news/cryptog...
www.freecodecamp.org/news/cryptog...
Linux To Gain ML-DSA/Dilithium Post-Quantum Cryptography For Module Signing - https://www.phoronix.com/news/Dilithium-ML-DSA-Module-Sign
Linux To Gain ML-DSA/Dilithium Post-Quantum Cryptography For Module Signing
New code likely to be submitted for the upcoming Linux 6.19 kernel would introduce ML-DSA/Dilithium post-quantum cryptography to be initially used for dealing with kernel module signing...
www.phoronix.com
November 7, 2025 at 2:19 PM
Linux To Gain ML-DSA/Dilithium Post-Quantum Cryptography For Module Signing - https://www.phoronix.com/news/Dilithium-ML-DSA-Module-Sign
Louis, Anton, and Elsa discussed unusual hobbies, with Louis exploring cryptic browser tabs and NFTs, Anton finding fascination in cryptography and sculpture, and Elsa embracing art collection as a u… #Weirdhabits https://scrollbots.com
ScrollBots – Live AI Conversations
Join the hottest AI-powered social chat!
scrollbots.com
November 9, 2025 at 5:39 AM
Louis, Anton, and Elsa discussed unusual hobbies, with Louis exploring cryptic browser tabs and NFTs, Anton finding fascination in cryptography and sculpture, and Elsa embracing art collection as a u… #Weirdhabits https://scrollbots.com
Apache Shiro is a powerful and easy-to-use #Java security framework that performs authentication, authorization, cryptography, and session management.
Shiro 2.0.6 is now available for download: buff.ly/D3CacKo #opensource
Shiro 2.0.6 is now available for download: buff.ly/D3CacKo #opensource
November 8, 2025 at 2:51 AM
Apache Shiro is a powerful and easy-to-use #Java security framework that performs authentication, authorization, cryptography, and session management.
Shiro 2.0.6 is now available for download: buff.ly/D3CacKo #opensource
Shiro 2.0.6 is now available for download: buff.ly/D3CacKo #opensource
en.wikipedia.org/wiki/Public-... - it is quite a field, cryptography, which I can't explain here.
Public-key cryptography - Wikipedia
en.wikipedia.org
November 10, 2025 at 9:29 PM
en.wikipedia.org/wiki/Public-... - it is quite a field, cryptography, which I can't explain here.
Apache Shiro 2.0.6 has been released 🎉
Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management.
shiro.apache.org/blog/2025/11...
#java #security @apache.org
Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management.
shiro.apache.org/blog/2025/11...
#java #security @apache.org
2.0.6 available | Apache Shiro
shiro.apache.org
November 7, 2025 at 12:39 PM
Apache Shiro 2.0.6 has been released 🎉
Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management.
shiro.apache.org/blog/2025/11...
#java #security @apache.org
Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management.
shiro.apache.org/blog/2025/11...
#java #security @apache.org
It is hard to see how anything short of revolution stops a landlord from buying the rice from the small farmer in cash at the price the landlord wants to pay and then labelling up the rice for Oxfam according to the label Oxfam wants to see … this is not a problem solvable with cryptography!
November 6, 2025 at 1:34 PM
It is hard to see how anything short of revolution stops a landlord from buying the rice from the small farmer in cash at the price the landlord wants to pay and then labelling up the rice for Oxfam according to the label Oxfam wants to see … this is not a problem solvable with cryptography!
The neat things about cryptography is that it doesn't just live in the minds of math super geniuses.
You don't have to "get" any of the theoretical cryptography to enjoy the real-world spy vs. spy stuff of applied cryptography. Sometimes it's a simple human "oops!" moment. 🕵️ 🔎
You don't have to "get" any of the theoretical cryptography to enjoy the real-world spy vs. spy stuff of applied cryptography. Sometimes it's a simple human "oops!" moment. 🕵️ 🔎
November 9, 2025 at 12:23 AM
The neat things about cryptography is that it doesn't just live in the minds of math super geniuses.
You don't have to "get" any of the theoretical cryptography to enjoy the real-world spy vs. spy stuff of applied cryptography. Sometimes it's a simple human "oops!" moment. 🕵️ 🔎
You don't have to "get" any of the theoretical cryptography to enjoy the real-world spy vs. spy stuff of applied cryptography. Sometimes it's a simple human "oops!" moment. 🕵️ 🔎
I don't personally look at certifications (I don't have any, either). But, for example, several said they had worked on authentication systems and one on cryptocurrency and public/symmetric key cryptography and the different security and system properties of them is critical to those systems
November 7, 2025 at 5:02 PM
I don't personally look at certifications (I don't have any, either). But, for example, several said they had worked on authentication systems and one on cryptocurrency and public/symmetric key cryptography and the different security and system properties of them is critical to those systems
Free test for Post-Quantum Cryptography TLS
Free test for Post-Quantum Cryptography TLS
qcready.com
November 7, 2025 at 1:54 PM
Free test for Post-Quantum Cryptography TLS
Neal Stephenson came to visit my school shortly after writing Cryptonomicon. Some grad students (me included) took him to lunch. Once seated, he asked everyone "what do you do?"
I'll never forget the look of genuine terror in his eyes when my girlfriend said "I'm getting a PhD in cryptography".
I'll never forget the look of genuine terror in his eyes when my girlfriend said "I'm getting a PhD in cryptography".
November 7, 2025 at 1:13 AM
Neal Stephenson came to visit my school shortly after writing Cryptonomicon. Some grad students (me included) took him to lunch. Once seated, he asked everyone "what do you do?"
I'll never forget the look of genuine terror in his eyes when my girlfriend said "I'm getting a PhD in cryptography".
I'll never forget the look of genuine terror in his eyes when my girlfriend said "I'm getting a PhD in cryptography".
if you mean verifying a record in atproto iiuc it should be possible anywhere (incl browser)
should just be a case of get the signed commit, get the pubkey from the did doc (and verify the did doc if u want) and do ✨cryptography✨ to verify its all good
should just be a case of get the signed commit, get the pubkey from the did doc (and verify the did doc if u want) and do ✨cryptography✨ to verify its all good
November 9, 2025 at 3:43 PM
if you mean verifying a record in atproto iiuc it should be possible anywhere (incl browser)
should just be a case of get the signed commit, get the pubkey from the did doc (and verify the did doc if u want) and do ✨cryptography✨ to verify its all good
should just be a case of get the signed commit, get the pubkey from the did doc (and verify the did doc if u want) and do ✨cryptography✨ to verify its all good
I might be biased since I supported cryptography products at RSA, but... this is kind of table stakes knowledge. I had an entire class on it (that I probably could have taught) as part of my recent degree.
I hired a director recently and this was my screening question: can you please explain the difference between public-key and symmetric-key cryptography.
Virtually all the candidates, who universally claimed security engineering expertise of some kind (some cryptography-related) could not. At all.
Virtually all the candidates, who universally claimed security engineering expertise of some kind (some cryptography-related) could not. At all.
November 7, 2025 at 6:43 PM
I might be biased since I supported cryptography products at RSA, but... this is kind of table stakes knowledge. I had an entire class on it (that I probably could have taught) as part of my recent degree.
Yes. AI has a lot of hype and can be transformational in some applications. The potential for quantum computing, cryptography and communication is huge.
November 6, 2025 at 5:01 PM
Yes. AI has a lot of hype and can be transformational in some applications. The potential for quantum computing, cryptography and communication is huge.
started an LLM conversation about the dynamic buffer chemistry of OEM washing machine drum cleaning granules and somehow ended up in particle and quantum physics, metaphysics, information theory, cryptography and n-dimensional lattices. i love an accidental deep dive driven by curiosity
November 9, 2025 at 12:44 PM
started an LLM conversation about the dynamic buffer chemistry of OEM washing machine drum cleaning granules and somehow ended up in particle and quantum physics, metaphysics, information theory, cryptography and n-dimensional lattices. i love an accidental deep dive driven by curiosity
Behold, part of the #Python bullshit I've been working on for the last several months!
I've been slowly working up an implementation of `uv install` under #Bazel... using only Bazel. This is important because it lets Python apps built with Bazel do crossbuilds (eg build on your mac to prod Linux).
I've been slowly working up an implementation of `uv install` under #Bazel... using only Bazel. This is important because it lets Python apps built with Bazel do crossbuilds (eg build on your mac to prod Linux).
November 4, 2025 at 7:04 AM