Natanael

joined 1 year ago
[–] Natanael 1 points 2 weeks ago

He holds it weird too

[–] Natanael 2 points 3 weeks ago

In USA, after 3 years of no use and no intent by the owner to use you can challenge a trademark

[–] Natanael 2 points 3 weeks ago

They went for the protocol used by Bluesky. But apparently disabling federation.

[–] Natanael 1 points 3 weeks ago (1 children)

What about surrealists

[–] Natanael 4 points 3 weeks ago

Interestingly they're basing it off the Bluesky atproto architecture. Seems like they're keeping controlled sign-ups and setting the appview to only index (and only display) their own users.

And if they don't break protocol compatibility, others could have a "read-only view" of their network from servers / clients that federate (comparable to a lemmy server which would reject incoming messages but still let you browse)

[–] Natanael 4 points 3 weeks ago* (last edited 3 weeks ago)

That meeting should've been an email anyway.

... Uh, wait a minute...

[–] Natanael 4 points 3 weeks ago (2 children)

Replying with this in a thread about fighting nazis is pretty tone deaf. Nazis never looted and terrorized anybody according to you...?

[–] Natanael 4 points 3 weeks ago

Not with those diets

Make Nazis Ballasts

[–] Natanael 2 points 3 weeks ago

It's worse than your typical creative claim on copyright of something like a poem - because prompts are by definition functional more than creative, and typically contain too few purely expressive elements to meet creative height. They managed to put prompts in a worse position than boilerplate code in terms of protection, lol

[–] Natanael 3 points 3 weeks ago

Exactly. At best you're commissioning work to a machine. You didn't provide much creativity, at best a direction and some constraints.

In the art world it's been settled ages ago that the underlying concept isn't protected, and few if any prompts go beyond just describing a vague concept.

[–] Natanael 21 points 3 weeks ago

A board of peace - after telling the Norwegian prime minister that he's not committed to peace anymore because he didn't get the peace price (and no, the PM doesn't control the peace price)

[–] Natanael 0 points 3 weeks ago

Every time the policies and suggestions and everything else was presented without names, Kamala's campaign won. When people didn't know who's proposal they was listening to, Kamala won.

So please explain what you mean about better candidate, because you have said nothing about how she was worse.

From here in Sweden, it looks like the things needing replacement is the fucking electorate and the billionaires owning the media companies

2
submitted 6 months ago* (last edited 6 months ago) by Natanael to c/crypto
 

Abstract Common verification steps in cryptographic protocols, such as signature or message authentication code checks or the validation of elliptic curve points, are crucial for the overall security of the protocol. Yet implementation errors omitting these steps easily remain unnoticed, as often the protocol will function perfectly anyways. One of the most prominent examples is Apple's goto fail bug where the erroneous certificate verification skipped over several of the required steps, marking invalid certificates as correctly verified. This vulnerability went undetected for at least 17 months.

We propose here a mechanism which supports the detection of such errors on a cryptographic level. Instead of merely returning the binary acceptance decision, we let the verification return more fine-grained information in form of what we call a confirmation code. The reader may think of the confirmation code as disposable information produced as part of the relevant verification steps. In case of an implementation error like the goto fail bug, the confirmation code would then miss essential elements.

The question arises now how to verify the confirmation code itself. We show how to use confirmation codes to tie security to basic functionality at the overall protocol level, making erroneous implementations be detected through the protocol not functioning properly. More concretely, we discuss the usage of confirmation codes in secure connections, established via a key exchange protocol and secured through the derived keys. If some verification steps in a key exchange protocol execution are faulty, then so will be the confirmation codes, and because we can let the confirmation codes enter key derivation, the connection of the two parties will eventually fail. In consequence, an implementation error like goto fail would now be detectable through a simple connection test.

3
submitted 7 months ago* (last edited 7 months ago) by Natanael to c/crypto
 

https://bsky.app/profile/tumbolia.bsky.social/post/3ltyahiem3s2u

We updated our paper on Fiat-Shamir!

We now take a closer look at the gap between what symmetric cryptography has focused on for over 10 years (indifferentiability) and what is actually needed for the soundness of ZKPs and SNARKs (something stronger!).

4
submitted 7 months ago* (last edited 7 months ago) by Natanael to c/crypto
 

Opossum is a cross-protocol application layer desynchronization attack that affects TLS-based application protocols that rely on both opportunistic and implicit TLS. Among the affected protocols are HTTP, FTP, POP3, SMTP, LMTP and NNTP.

Note: The vast majority of websites are not vulnerable as HTTP TLS upgrade (RFC 2817) was never widely adopted and no browsers support it.

2
submitted 7 months ago by Natanael to c/crypto
 

Context: https://bsky.app/profile/martin.kleppmann.com/post/3lr6ex2glkc2h

This system is baked into the Guardian's news app that millions of people have installed. Every regular user of the app generates cover traffic, and an attacker monitoring the network cannot distinguish someone using the secure messaging feature from a regular user.

Open source;

https://github.com/guardian/coverdrop

view more: ‹ prev next ›