Dennis Jackson

122 Followers
187 Following
31 Posts
Cryptography @ Mozilla
Websitehttps://dennis-jackson.uk/
@filippo Thinking through the scenario with retry packets and on/off path attackers, I think it's only the latter, v. weak notion of security that is needed.

@filippo I don't think a MAC is the right model since the key+nonce is public and fixed - more akin to a hash function chosen from a family of PRFs. MAC CCA security doesn't apply (since key is known). MAC Committing security is too strong (since key is fixed / not attacker controlled).

So it's more akin to whether GCM with a fixed public key and nonce is first/second pre image resistant? Even if not, it still retains some security provided the function image is large enough.

[TLS] Device Pairing - PAKEs v SAS

Search IETF mail list archives

VIII. PERSECUTION

Victims are identified and separated out because of their national, ethnic, racial or religious identity. The victim group’s most basic human rights are systematically violated through extrajudicial killings, torture and forced displacement.

In state sponsored genocide, members of victim groups may be forced to wear identifying symbols. Their property is often expropriated. Sometimes they are segregated into ghettoes, deported to concentration camps, or confined to a famine-struck region and starved. They are deliberately deprived of resources such as water or food in order to slowly destroy the group.

🧵 The Ten Stages of Genocide

> Genocide is a process that develops in ten stages that are predictable but not inexorable.

https://www.genocidewatch.com/tenstages

Genocide Watch- Ten Stages of Genocide

The Ten Stages of Genocide by Founder and President, Dr. Gregory Stanton: Classification, Symbolization, Discrimination, Dehumanization, Organization, more...

genocidewatch
My research group has open positions for PhD students and Postdoctoral Researchers, starting fall 2025 or early 2026. Interested in advancing the state-of-the-art in automated verification of security or the cryptography underlying modern secure communications? Check out our website ( https://people.cispa.io/cas.cremers/index.html ) and application details ( https://people.cispa.io/cas.cremers/positions/ ).
Home | Cas Cremers

Cas Cremers' publications

"Yet beneath their ideological differences, the American and Chinese models are converging in function. One is driven by market logic, the other by political imperatives—but both prioritize efficiency over accountability, control over consent, and scale over individual rights. In a world where authority accrues to those who control the digital space, it may matter less whether power resides in public or private hands than how effectively it can be centralized."

https://www.foreignaffairs.com/united-states/technopolar-paradox-ian-bremmer-fusion-tech-state-power

The Technopolar Paradox

The frightening fusion of tech power and state power.

Foreign Affairs

Very excited to submit the Tuscolo Certificate Transparency logs for inclusion today! 🧾🪵☀️

These logs are Sunlight-based, and operated by Geomys and Port 179 LTD on bare metal. They cost 50 times less than RFC 6962 logs in the cloud.

https://groups.google.com/a/chromium.org/g/ct-policy/c/KCzYEIIZSxg

The Tuscolo Static CT log

@hanno Even in the worst case of "no more lattices", the three remaining candidates in NIST's 4th round are unaffected (BIKE, HQC, McEliece). We'd probably have to bring back the dial up modem noise though.
@sophieschmieg Join a browser team.. FIPS is more like guidelines than actual rules.