Cipher Zenith

@Cipher_Zenith
3 Followers
15 Following
16 Posts
Local-Only Post-Quantum Encryption
No Cloud. No Analytics.
Full control of your keys.
#PQC #PostQuantum #PostQuantumCryptography #QuantumSafe #Kyber - 2015 #Dilithium-5 #Encryption #ML‑KEM‑1024 #ML‑DSA‑87 #cipher #CipherZenith #NIST
RolePost‑quantum encryption developer
ProjectBuilding a local post‑quantum Cipher Zenith
InterestsSecurity, cryptography, AI, PQC ,
About meDreamer obsessed with digital security

Cipher Zenith is finally breathing. 🌿

More than an app, it's a fort of digital sovereignty built in Chile. Implementing NIST Category 5 (ML-KEM/ML-DSA) has been a brutal but rewarding journey. 🔒

Seeing high-level defense tech become a fluid, local-first experience makes the code worth it. Real privacy: no clouds, no masters. Just you and your data. ✨

@infosec
@matthew_d_green
@hyperelliptic
@filippo
#PQC #CyberSecurity #BuildInPublic #NIST #Cryptography #Privacy

I am just steps away from launching my first desktop application. It has been a long journey of more than eight months, but we are now just steps away from seeing the light of day.
#indieDev #DesktopApp #CyberSecurity #PostQuantum #Encryption #MadeWithLove #SoloDev #DevLife #LaunchSoon

I wrote a small game simulating the transition to a solar-powered economy. You can build solar panels, batteries, hydrogen storage and sell your generated electricity at market prices. Electricity demand, pricing, and weather conditions are based on realistic models for Germany.

https://sonnenwende.codeberg.page/

#gaming #games #simulation #solar #solarpunk #renewables #godot #opensource #germany

Anyway, read Russ Cox's take on AI tool use in the Go project.

https://groups.google.com/g/golang-dev/c/4Li4Ovd_ehE/m/8L9s_jq4BAAJ

What should we do with CLs generated by AI?

this update from 2025-10-30 has some more details about PQC adoption within Google Cloud but still lacks any kind of service-specific roadmap. If they're already universally supporting TLS 1.3 with hybrid key exchange, they should be shouting that from the rooftops ... https://cloud.google.com/blog/products/identity-security/how-were-helping-customers-prepare-for-a-quantum-safe-future
How we're helping customers prepare for a quantum-safe future | Google Cloud Blog

Google has been working on quantum-safe computing for nearly a decade. Here’s our latest on protecting data in transit, digital signatures, and PKI.

Google Cloud Blog
Gratitude is the antidote to so much of what we struggle with as people, but it does not come naturally to most of us. I have found that the intentional practice of explicitly acknowledging and recounting the things I am thankful for has profound health benefits (mental, emotional, spiritual, and physical) that I experience nowhere else.
https://infosec.exchange/@darkuncle/111455819559532422
Scott Francis (@[email protected])

My status in chat has said simply "grateful." for a while now, and one of the things I'm doing this week (taking some overdue vacation) is just sitting around reflecting on all I have to be grateful for (especially the people in my life, past and present, who helped support and guide and shape me). There's no remedy for pride or anxiety that I have found half as effective as regularly and consistently practicing gratitude.

Infosec Exchange

It is a matter of time before Quantum Computing gains the ability to crack today’s core public key encryption methods.

Our latest post on TechAptitude outlines the efforts by NIST to generate new cryptography standards to help withstand future quantum powered cyber attacks. Check it out!

https://techaptitude.substack.com/p/quantum-technologies-nist-drives #Cryptography #Quantum #QuantumTechnology #QuantumComputing #NIST #FIPS #CodeBreaker #Encryption #QDay #PQC #PostQuantumCryptography #Passwords #Ciphers #Algorithm #TechAptitude

@patrickcmiller

Interesting case. Every time a new ransomware group pops up, people rush to analyze payloads and TTPs, but almost nobody stops to ask the basic question: “What would actually happen if they got full access to my storage?”
For most organizations, the real problem isn’t the next group’s name — it’s that critical data is still sitting unencrypted, online, and fully recoverable only through third‑party infrastructure.

RE: https://ioc.exchange/@chemaalonso/116045206643089703

todo es necesario en un futuro cercano , pero yo confío mas en lo mío .

RE: https://ioc.exchange/@chemaalonso/116045206643089703

todo es necesario en un futuro cercano , pero yo confío mas en lo mío .