med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

363
active users

#cryptography

11 posts11 participants1 post today

is it weird that "I built a toy cryptography system" is treated sooo much worse compared to "I built a hobby kernel", or "I built a toy DB" or "I built an orchestrator for my home lab"? I've seen people be like "just use postgres/sqlite", sure - but that's different from "[clutches pearls], No SQL? How dare you. Perish the thought! It's not ACID! How will we ever... Never use this in production. Microkernels? They'll never be practical!"

Replied in thread

@rebeccawatson There actually *are* ways of performing age verification in a privacy-preserving way, thanks to zero-knowledge proof cryptography:

github.com/zkpassport

StRanGeLY tHoUgH, governments don't seem interested in merely knowing that a user truly is >=$some_age, and not knowing anything else about them. They really, *really* wanna know who the perverts^W adults are.

Unforgeable Proof of Identity. Privacy-preserving. Self-sovereign. Built for Web3. - ZKPassport
GitHubZKPassportUnforgeable Proof of Identity. Privacy-preserving. Self-sovereign. Built for Web3. - ZKPassport

> Researchers claim to have used a #quantumComputer to factor a 2,048-bit #RSA integer.

> But the RSA number evaluated was the product of two prime factors that were too close together.

> As with a parlor magician's card deck that's been stacked for a card trick

> #Quantum #factorization is performed using sleight-of-hand numbers that have been selected to make them very easy to factorize using a #physics experiment

theregister.com/2025/07/17/qua

The Register · Quantum code breaking? You'd get further with an 8-bit computer, an abacus, and a dogBy Thomas Claburn

Interested in theoretical cryptography and/or formal methods? Boston University is hosting a summer school on Universally Composable Security and the EasyUC framework for formalizing UC models and proofs.

The school is from August 11 - 14, 2025. Registration is free, and we're supporting both in person and Zoom participation.

For more information and to register, visit:

bu.edu/riscs/events/uc-easyuc-

www.bu.eduUC/EasyUC Summer School | Center for Reliable Information Systems & Cyber Security

I remember reading a blog series claiming that popular cryptographic primitives (I think the example given was RSA?) even if they are not *mathematically* impossible to break, can nevertheless be so computationally difficult that they are *physically* impossible to break on current computers.

Does anyone know what I'm talking about?