Best tech video I watched in 2025: a demo of 2012 about Mosh (http://mosh.mit.edu), a remote terminal application alternative to SSH. https://www.youtube.com/watch?v=XsIxNYl0oyU Mosh supports poor connections, mobile roaming, better interactive response over high-latency paths.
#usenix
Mosh: the mobile shell

Mobile shell that supports roaming and intelligent local echo. Like SSH secure shell, but allows mobility and more responsive and robust.

Mosh

@rk

Your best bet is the original publisher, that alas does not have the paper in its "refer" index and whose on-line request form is broken.

https://usenix.org/legacy/publications/library/proceedings/proceedings1.html#before

@cstanhope @stevendbrewer

#Unix #Usenix #Xenix

USENIX - Publications - Proceedings

Does anyone have a copy of “Porting Xenix to the Unmapped 8086” by Hare and Thomas? Proceedings of the Winter USENIX Conference 1984.

C’mon. I know one of you has to have a copy.

#unix #xenix #usenix #retrocomputing

Do I know anyone who's had a talk accepted at SRECon in the past who might be willing to share your proposal?

#usenix #srecon

50 years ago today: My first #UNIX users' group conference - the organization that became #USENIX.
Made by Hackers

The Bright Side of Hackers

Oh, geez, another #USENIX conference #ATC seems to have fallen to trending events...

Zusätzlich zu den beiden bereits angekündigten Beiträgen wurde ein dritter Beitrag unserer Forschenden bei der Konferenz #USENIX Security 2025 angenommen. Weitere Beiträge könnten folgen.

3️⃣ BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention – Jan Bormet; Prof. Sebastian Faust; Hussien Othman; Ziyan Qu

Zum Paper: https://eprint.iacr.org/2024/1533

BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention

In decentralized finance (DeFi), the public availability of pending transactions presents significant privacy concerns, enabling market manipulation through miner extractable value (MEV). MEV occurs when block proposers exploit the ability to reorder, omit, or include transactions, causing financial loss to users from frontrunning. Recent research has focused on encrypting pending transactions, hiding transaction data until block finalization. To this end, Choudhuri et al. (USENIX '24) introduce an elegant new primitive called Batched Threshold Encryption (BTE) where a batch of encrypted transactions is selected by a committee and only decrypted after block finalization. Crucially, BTE achieves low communication complexity during decryption and guarantees that all encrypted transactions outside the batch remain private. An important shortcoming of their construction is, however, that it progresses in epochs and requires a costly setup in MPC for each batch decryption. In this work, we introduce a novel BTE scheme addressing the limitations by eliminating the need for an expensive epoch setup while achieving practical encryption and decryption times. Additionally, we explore a previously ignored question of how users can coordinate their transactions, which is crucial for the functionality of the system. Along the way, we present several optimizations and trade-offs between communication and computational complexity that allows us to achieve practical performance on standard hardware ($<2$ ms for encryption and $<440$ ms for decrypting $512$ transactions). Finally, we prove our constructions secure in a model that captures practical attacks on MEV-prevention mechanisms.

IACR Cryptology ePrint Archive
#usenix and #worldcon are sharing the Seattle convention center today and we entered on the wrong end. Walking around looking at people and thinking, "Beards, check. T-shirts, not colorful enough. Hats, too stiff. Something is not right."

I’m attending the Usenix Security Symposium in downtown Seattle the rest of the week. Hit me up if you’re also around and want to chat.

#seattle
#usenix
#usenixsecurity

https://www.usenix.org/conference/usenixsecurity25