Twitter | Pretraživanje | |
Josh Baron
Program manager . Interested in cryptography, privacy, anonymity & cybersecurity. Formerly . All opinions are mine alone. he/him
1.471
Tweetovi
428
Pratim
1.186
Osobe koje vas prate
Tweetovi
Josh Baron 1. velj
Ah wow that means a lot, ! You were the one to run with it and make some really cool tech.
Reply Retweet Označi sa "sviđa mi se"
Josh Baron 31. sij
Odgovor korisniku/ci @SmartCryptology
Then we can make zero knowledge proofs on them (maybe) 😀
Reply Retweet Označi sa "sviđa mi se"
Josh Baron proslijedio/la je tweet
Real World Crypto 28. sij
Many of the slide-decks from Real World Crypto 2020 are now available online via: Videos at: Feedback survey at:
Reply Retweet Označi sa "sviđa mi se"
Josh Baron 27. sij
Reply Retweet Označi sa "sviđa mi se"
Josh Baron proslijedio/la je tweet
Rob Joyce 26. sij
Some didn’t want to use the charging station last year at . Wonder if I would get takers for these?
Reply Retweet Označi sa "sviđa mi se"
Josh Baron 24. sij
Odgovor korisniku/ci @LindellYehuda
Ah I get it, so it’s “standard *model*, falsifiable assumptions”, not “standard assumptions”, that they claim (and then define “standard model” in a footnote). Ah crypto theory 🙃
Reply Retweet Označi sa "sviđa mi se"
Josh Baron proslijedio/la je tweet
Yehuda Lindell 24. sij
Odgovor korisniku/ci @JoshuaWBaron
There is a big difference between falsifiable and standard, although falsifiable is a good step forward. Of course, standard is subjective. In 2001, my advisor Oded Goldreich did not agree for me to say “standard assumption” for DDH 😊. It’s a different world today!
Reply Retweet Označi sa "sviđa mi se"
Josh Baron 24. sij
Odgovor korisniku/ci @LindellYehuda
Right, this is what I thought (but was worried I was missing something)
Reply Retweet Označi sa "sviđa mi se"
Josh Baron 24. sij
This is a really interesting EUROCRYPT 2020 paper. They seem to get “almost” the algebraic group model from “standard assumptions”... but those assumptions include subexponentially strong indistinguishability obfuscation. Is that kind of iO known from standard assumptions?
Reply Retweet Označi sa "sviđa mi se"
Josh Baron 16. sij
Odgovor korisniku/ci @bodinebaron
So I’ll admit the analogy only goes so far. But even then, I’d argue that we’d still be thinking of things as a population-scale, versus individual, issue.
Reply Retweet Označi sa "sviđa mi se"
Josh Baron 16. sij
Odgovor korisniku/ci @JoshuaWBaron
Unfortunately we don’t understand these statistics well. Last year I sponsored a DARPA Young Faculty Award on quantifying vulnerability longevity, but the truth is we need much more study. (Cyber ITL is also doing important related work in this space I think) 3/2
Reply Retweet Označi sa "sviđa mi se"
Josh Baron 16. sij
Odgovor korisniku/ci @JoshuaWBaron
I liken this to the flu or other health issues. We don’t (or shouldn’t) blame people for being sick but are always looking to blame people who run vulnerable systems. We should think of these as *populstions* governed, at scaled, with statistics. 2/2
Reply Retweet Označi sa "sviđa mi se"
Josh Baron 16. sij
Our understanding of vulnerabilities and their impact on a *population* or systems is super immature, especially when it comes to operational technology that is 1) mission critical but also then 2) slow to change. (1/2)
Reply Retweet Označi sa "sviđa mi se"
Josh Baron proslijedio/la je tweet
Dan Goodin 16. sij
Critical Windows 10 vulnerability used to Rickroll the NSA and Github
Reply Retweet Označi sa "sviđa mi se"
Josh Baron proslijedio/la je tweet
Michael Martelle 15. sij
Worst intelligence failure in Star Wars franchise is missing Palpatine’s fleet acquisition program. But I’m entertaining alternatives.
Reply Retweet Označi sa "sviđa mi se"
Josh Baron 15. sij
Great line: “Technically, the apps aren't classified as malware because they limit their hidden functions to displaying ads.”
Reply Retweet Označi sa "sviđa mi se"
Josh Baron 14. sij
This is a really good thread on today’s announced crypto software vulnerability.
Reply Retweet Označi sa "sviđa mi se"
Josh Baron proslijedio/la je tweet
NSA/CSS 14. sij
This you are strongly encouraged to implement the recently released CVE-2020-0601 patch immediately.
Reply Retweet Označi sa "sviđa mi se"
Josh Baron 13. sij
Odgovor korisniku/ci @dankrad @socrates1024 @WardBeullens
Wouldn’t the best test be to actually tie it a current mining effort? Bitcoin seems like the most effective way possible of demonstrating that SHA-2 is secure.
Reply Retweet Označi sa "sviđa mi se"
Josh Baron proslijedio/la je tweet
Fermat's Library 11. sij
A visual proof why 1+3+5+...+(2n-1)=n² ⚪⚫⚪⚫⚪⚫ ⚫⚫⚪⚫⚪⚫ ⚪⚪⚪⚫⚪⚫ ⚫⚫⚫⚫⚪⚫ ⚪⚪⚪⚪⚪⚫ ⚫⚫⚫⚫⚫⚫
Reply Retweet Označi sa "sviđa mi se"