Dennis Jackson

122 Followers
187 Following
31 Posts
Cryptography @ Mozilla
Websitehttps://dennis-jackson.uk/

VIII. PERSECUTION

Victims are identified and separated out because of their national, ethnic, racial or religious identity. The victim group’s most basic human rights are systematically violated through extrajudicial killings, torture and forced displacement.

In state sponsored genocide, members of victim groups may be forced to wear identifying symbols. Their property is often expropriated. Sometimes they are segregated into ghettoes, deported to concentration camps, or confined to a famine-struck region and starved. They are deliberately deprived of resources such as water or food in order to slowly destroy the group.

🧵 The Ten Stages of Genocide

> Genocide is a process that develops in ten stages that are predictable but not inexorable.

https://www.genocidewatch.com/tenstages

Genocide Watch- Ten Stages of Genocide

The Ten Stages of Genocide by Founder and President, Dr. Gregory Stanton: Classification, Symbolization, Discrimination, Dehumanization, Organization, more...

genocidewatch
My research group has open positions for PhD students and Postdoctoral Researchers, starting fall 2025 or early 2026. Interested in advancing the state-of-the-art in automated verification of security or the cryptography underlying modern secure communications? Check out our website ( https://people.cispa.io/cas.cremers/index.html ) and application details ( https://people.cispa.io/cas.cremers/positions/ ).
Home | Cas Cremers

Cas Cremers' publications

"Yet beneath their ideological differences, the American and Chinese models are converging in function. One is driven by market logic, the other by political imperatives—but both prioritize efficiency over accountability, control over consent, and scale over individual rights. In a world where authority accrues to those who control the digital space, it may matter less whether power resides in public or private hands than how effectively it can be centralized."

https://www.foreignaffairs.com/united-states/technopolar-paradox-ian-bremmer-fusion-tech-state-power

The Technopolar Paradox

The frightening fusion of tech power and state power.

Foreign Affairs

Very excited to submit the Tuscolo Certificate Transparency logs for inclusion today! 🧾🪵☀️

These logs are Sunlight-based, and operated by Geomys and Port 179 LTD on bare metal. They cost 50 times less than RFC 6962 logs in the cloud.

https://groups.google.com/a/chromium.org/g/ct-policy/c/KCzYEIIZSxg

The Tuscolo Static CT log

We are proud to announce the formation of the PQC League of Evil.

For too long have do-good organizations like the PQC Alliance or the PQC Consortium had a beneficial influence on the PQC standardization process and migration. No more! The PQC League of Evil is here to finally inject some evilness into the discussion, to counteract this obvious imbalance.

We have several exciting projects planned, stay tuned for more information.

The Open Source Cryptography Workshop will be held the Thursday after #RWC, on 28 March, at the University of Toronto Chestnut Conference Center. Pre-registration is required, registration is now open, and some of the sessions are announced. See https://oscwork.shop/2024/ #OSCW #OSCW2024
OSCW 2024: Toronto, Canada :: Open Source Cryptography Workshop

OSCW 2024 took place after Real World Crypto on 28 March 2024 at the University of Toronto Chestnut Conference Center in Toronto, Canada.

Open Source Cryptography Workshop
Last Chance for eIDAS

13 days before the first eIDAS vote, still no public text

Last Chance for eIDAS

13 days before the first eIDAS vote, still no public text

Last Chance for eIDAS

13 days before the first eIDAS vote, still no public text