Probabilita

@kora@chaos.social
553 Followers
601 Following
1.2K Posts
Karolin Varner (they/them). Queer Pope. Wednesday Friday Addams is my primary pokemon. Chaotic good engineer.
“We need some sort of 🇪🇺 crypto. We shouldn't depend on #NIST. That's what we're building, and we wouldn't have been able to do without #NGI funding.” — Karolin Varner from @rosenpass #NGIForum25 #OpenSource

Post-quantum encryption!

@rosenpass is presenting their work at #NGIForum25 on how they - already now - are building post-quantum encryption for the VPN @wireguardvpn

Much interesting..

#post-quantum-encryption #VPN

FOSS scaling challenges:

@renchap: Scaling technology is easy. Scaling the other parts, like trust and safety, is hard. NGI funds the tech. Need to have funding for scaling other parts.

Ali Gonzalez: We are looking for public investment, not VC.

@ldubost: Goal is to grow product revenue alongside grant funding. One funds dev, one funds non-dev needs.

@kora: Need to ask where do we want to grow? When growth directions arent aligned with standard growth paths, funding can be hard.

#NGIForum25

Panel on NGI impact stories from grantees

Martin Schanzenberger shared TalDir, enabling the "PayPal use case" for @Taler

@renchap shared quote posts and the decentralized content discovery features coming to @Mastodon

@ldubost shared how NGI funding brought stability to the funding for professional developers and credibility to @CryptPad

@kora shared Rosenpass.eu, a post-quantum-secure add-on for WireGuard

Ali Gonzalez shared @decidim to digitally engage citizens in governance

#NGIForum25

“I measure all software by its ability to support peace and democracy.” —@kora, answering their prior audience question about what the moonshot goal should be

#NGIForum25

I think I found the first use of AIs that would actually interest me: A lemma search engine.

You input a semi-formal lemma in whatever grammar and the search engine spits out papers and other resources that use, prove, or otherwise relate to the lemma.

Is there something like a coversation guide for stalling and diverting border police who are using racial profiling?
We’re excited to share more details about the #SovereignTechFund’s investment in @rosenpass which enables quantum-safe, resilient encryption for internet infrastructure.
The commissioned work on the key-exchange protocol enhances stability, improves software production security, and prepares for the use of alternative post-quantum ciphers, enhancing cryptographic agility.
âžť https://www.sovereign.tech/tech/rosenpass
@kora
Rosenpass | Sovereign Tech Agency

Sovereign Tech Agency
Wir freuen uns, mehr Details zur Investition des #SovereignTechFund in @rosenpass zu teilen. Rosenpass ermöglicht eine quantensichere Verschlüsselung für die moderne Internetinfrastruktur.
Die beauftragten Arbeiten am Schlüsselaustauschprotokoll erhöhen die Stabilität, verbessern die Sicherheit und bereiten den Einsatz alternativer Post-Quanten-Verschlüsselungsalgorithmen vor, um flexible kryptografische Anpassungen in Zukunft einfacher zu ermöglichen.
âžž https://www.sovereign.tech/de/tech/rosenpass
@kora
Rosenpass | Sovereign Tech Agency

Wir stärken digitale Infrastrukturen und Open-Source-Ökosysteme im öffentlichen Interesse.

Sovereign Tech Agency
Agile, post-quantum secure cryptography in avionics - CEAS Aeronautical Journal

To introduce a post-quantum-secure encryption scheme specifically for use in flight-computers, we used avionics’ module-isolation methods to wrap a recent encryption standard (HPKE-Hybrid Public Key Encryption) within a software partition. This solution proposes an upgrade to HPKE, using quantum-resistant ciphers (Kyber/ML-KEM and Dilithium/ML-DSA) redundantly alongside well-established ciphers, to achieve post-quantum security. Because cryptographic technology can suddenly become obsolete as attacks become more sophisticated, “crypto-agility”—the ability to swiftly replace ciphers—represents the key challenge to deployment of software like ours. Partitioning is a crucial method for establishing such agility, as it enables the replacement of compromised software without affecting software on other partitions, greatly simplifying the certification process necessary in an avionics environment. Our performance measurements (Sect. 5) provide initial evidence that both the memory and cpu performance characteristics of this solution are suitable for deployment in flight-computers. Performance measurements show a memory use of 5 MB of RAM and under 200 KB of stack usage for encryption, compared to a baseline implementation without any encryption; decryption is much more lightweight (under 300 KB RAM overhead, under 100 KB of stack requirement overhead). Generally, the post-quantum algorithms benchmarked where faster than their pre-quantum alternatives; due to the use of hybrid security this leads to a performance overhead of just about 90% compared to the pre-quantum only variant. The implementations benchmarked are optimized for CPU-performance and alternative, lower quality implementations showed much more modest memory requirements, leading us to conclude that there is much room for optimization, targeting use-case specific tradeoffs between memory use and performance.

SpringerLink