|
Josh Baron
@
JoshuaWBaron
RTs ≠ endorsements
|
|
Program manager @DARPA. Interested in cryptography, privacy, anonymity & cybersecurity. Formerly @RANDCorporation. All opinions are mine alone. he/him
|
|
|
1.471
Tweetovi
|
428
Pratim
|
1.186
Osobe koje vas prate
|
| Tweetovi |
|
Josh Baron
@JoshuaWBaron
|
1. velj |
|
Ah wow that means a lot, @anjaninna! You were the one to run with it and make some really cool tech. twitter.com/anjaninna/stat…
|
||
|
|
||
|
Josh Baron
@JoshuaWBaron
|
31. sij |
|
Then we can make zero knowledge proofs on them (maybe) 😀
|
||
|
|
||
| Josh Baron proslijedio/la je tweet | ||
|
Real World Crypto
@RealWorldCrypto
|
28. sij |
|
Many of the slide-decks from Real World Crypto 2020 are now available online via: rwc.iacr.org/2020/program.h…
Videos at: totalwebcasting.com/view/?func=VOF…
Feedback survey at: surveymonkey.com/r/6X3MM92
#realworldcrypto
|
||
|
|
||
|
Josh Baron
@JoshuaWBaron
|
27. sij |
|
Seems legit pic.twitter.com/V6Ro7RIPBo
|
||
|
|
||
| Josh Baron proslijedio/la je tweet | ||
|
Rob Joyce
@RGB_Lights
|
26. sij |
|
Some didn’t want to use the @NSAgov charging station last year at @shmoocon. Wonder if I would get takers for these? pic.twitter.com/ar0N9WSn5d
|
||
|
|
||
|
Josh Baron
@JoshuaWBaron
|
24. sij |
|
Ah I get it, so it’s “standard *model*, falsifiable assumptions”, not “standard assumptions”, that they claim (and then define “standard model” in a footnote). Ah crypto theory 🙃
|
||
|
|
||
| Josh Baron proslijedio/la je tweet | ||
|
Yehuda Lindell
@LindellYehuda
|
24. sij |
|
There is a big difference between falsifiable and standard, although falsifiable is a good step forward. Of course, standard is subjective. In 2001, my advisor Oded Goldreich did not agree for me to say “standard assumption” for DDH 😊. It’s a different world today!
|
||
|
|
||
|
Josh Baron
@JoshuaWBaron
|
24. sij |
|
Right, this is what I thought (but was worried I was missing something)
|
||
|
|
||
|
Josh Baron
@JoshuaWBaron
|
24. sij |
|
This is a really interesting EUROCRYPT 2020 paper. They seem to get “almost” the algebraic group model from “standard assumptions”... but those assumptions include subexponentially strong indistinguishability obfuscation. Is that kind of iO known from standard assumptions? twitter.com/IACR_News/stat…
|
||
|
|
||
|
Josh Baron
@JoshuaWBaron
|
16. sij |
|
So I’ll admit the analogy only goes so far. But even then, I’d argue that we’d still be thinking of things as a population-scale, versus individual, issue.
|
||
|
|
||
|
Josh Baron
@JoshuaWBaron
|
16. sij |
|
Unfortunately we don’t understand these statistics well. Last year I sponsored a DARPA Young Faculty Award on quantifying vulnerability longevity, but the truth is we need much more study. (Cyber ITL is also doing important related work in this space I think) 3/2
|
||
|
|
||
|
Josh Baron
@JoshuaWBaron
|
16. sij |
|
I liken this to the flu or other health issues. We don’t (or shouldn’t) blame people for being sick but are always looking to blame people who run vulnerable systems. We should think of these as *populstions* governed, at scaled, with statistics. 2/2
|
||
|
|
||
|
Josh Baron
@JoshuaWBaron
|
16. sij |
|
Our understanding of vulnerabilities and their impact on a *population* or systems is super immature, especially when it comes to operational technology that is 1) mission critical but also then 2) slow to change. (1/2) twitter.com/kennwhite/stat…
|
||
|
|
||
| Josh Baron proslijedio/la je tweet | ||
|
Dan Goodin
@dangoodin001
|
16. sij |
|
Critical Windows 10 vulnerability used to Rickroll the NSA and Github arstechnica.com/information-te…
|
||
|
|
||
| Josh Baron proslijedio/la je tweet | ||
|
Michael Martelle
@MartelleMichael
|
15. sij |
|
Worst intelligence failure in Star Wars franchise is missing Palpatine’s fleet acquisition program. But I’m entertaining alternatives.
|
||
|
|
||
|
Josh Baron
@JoshuaWBaron
|
15. sij |
|
Great line: “Technically, the apps aren't classified as malware because they limit their hidden functions to displaying ads.” arstechnica.com/information-te…
|
||
|
|
||
|
Josh Baron
@JoshuaWBaron
|
14. sij |
|
This is a really good thread on today’s announced crypto software vulnerability. twitter.com/SwiftOnSecurit…
|
||
|
|
||
| Josh Baron proslijedio/la je tweet | ||
|
NSA/CSS
@NSAGov
|
14. sij |
|
This #PatchTuesday you are strongly encouraged to implement the recently released CVE-2020-0601 patch immediately.
media.defense.gov/2020/Jan/14/20… pic.twitter.com/log6OU93cV
|
||
|
|
||
|
Josh Baron
@JoshuaWBaron
|
13. sij |
|
Wouldn’t the best test be to actually tie it a current mining effort? Bitcoin seems like the most effective way possible of demonstrating that SHA-2 is secure.
|
||
|
|
||
| Josh Baron proslijedio/la je tweet | ||
|
Fermat's Library
@fermatslibrary
|
11. sij |
|
A visual proof why 1+3+5+...+(2n-1)=n²
⚪⚫⚪⚫⚪⚫
⚫⚫⚪⚫⚪⚫
⚪⚪⚪⚫⚪⚫
⚫⚫⚫⚫⚪⚫
⚪⚪⚪⚪⚪⚫
⚫⚫⚫⚫⚫⚫
|
||
|
|
||