also hero-coded behavior from this behavior in a footnote
We explicitly cite the extended version [19] for results that are not captured in the
CRYPTO 2018 proceedings [20].
there is of course two version of the initial (not eurocrypt) paper with the cryptographer fuckboy, one of which references i'm pretty sure an earlier version of the same paper (the initial) at a conference, specifically to justify "40 bytes" (no context) as "from signal". earlier version of this paper? if you read it? specifically says "oh yeah signal doesn't do user research so i created this interaction graph with uniform distributions to model sender and recipient interactions"
spends like half a page on this:
(1) like "oh yeah signal doesn't do user research" doesn't sound like the most tech bro way to say "i didn't ask users because i don't care" and pretend anyone thinks signal is gonna start adding malware if they ask users or provide some opt-in?
(2) zero citations for the entire stretch, like LITERALLY NO ONE has EVER modelled sending a message back and forth. probabilistically.
(3) choice of uniform distributions for whether someone sends a message over the hour/day and absolutely zero attempt to acknowledge that a """mathematician""" could spend a whole paper on distributional assumptions, particularly CRYPTOGRAPHER
so then he's like ok now i'm going to forget that these are random variables and create this other set of models defined in terms of these distributional assumptions you know what i need to find the way he abuses italics too
yeah love this shit https://www.usenix.org/system/files/usenixsecurity25-auerbach.pdf
A new method to quantify security.
sir i am a scientist we don't need new methods to quantify things that is the last thing anyone needs
oh this is so great
The mismatch between epochs and compromised messages discussed above
will have a rather simple solution in this work,
definitely not allowed to say that about the paper which is currently on page 2 and hasn't finished talking about how simple it is
where we will define SM security
brain destroying acronym usage. "secure messaging". defined as?
applications, including WhatsApp, Signal, Google RCS, and Facebook Messenger, have taken over the world.
defined as corporations. ok
Used by billions of people daily, these appli-
cations achieve extremely strong security properties,
honestly who do you think you are? google? facebook? whatsapp? billions => security?
ok. hit me with fuckboy. define SM security
in a way which explicitly looks at the set
of exposed messages.
it's SO much more fucking obnoxious to italicize half a sentence in the math latex font