Insecurity Princess πŸŒˆπŸ’–πŸ”₯

3.4K Followers
337 Following
9.5K Posts

I write about power dynamics in engineering management

Insecurity Princess. Clod Security leader. Queer femme mathematician. Dismantling systemic barriers in tech, one fencepost problem at a time

Wife of https://infosec.exchange/@sophieschmieg

Websitehttps://www.sar.ai
LocationBay Area, CA, USA
tootfinderhttps://tootfinder.ch/index.php?join=1
Leadership Writinghttps://mitm.blog
Security Writinghttps://keymaterial.net
Pronounsshe/her

Audre Lorde's "master's tools" speech was not about tech platforms. So why does tech discourse keep citing it as if it were? I write about what happens when a Black feminist theorist's words get borrowed, stripped of context, and made to do work they were never meant to do.

https://tarakiyee.com/on-the-enshittification-of-audre-lorde-the-masters-tools-in-tech-discourse/ #enshittification #AudreLorde #techpolicy

On The Enshittification of Audre Lorde: "The Master's Tools" in Tech Discourse

πŸ–ΌοΈCover Photo: Train at the Nairobi terminus of the Mombasa–Nairobi Standard Gauge Railway. It runs parallel to the Uganda Railway that was completed in 1901. The first fare-paying passengers boarded the "Madaraka Express" on Madaraka Day (1 June 2017), the 54th anniversary of Kenya's attainment of self-rule from Great

Do Flamingos Know They're Pink

Oh, and in case you weren't having enough fun, here are some updated resource estimates for running Shor's on elliptic curves, unfortunately weirdly focused on cryptocurrencies.

Fun fact: I almost found a soundness problem in that zero knowledge proof that was based on a quine. Unfortunately the circuit cannot produce quines.

https://research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/

Safeguarding cryptocurrency by disclosing quantum vulnerabilities responsibly

Are we having fun yet?

https://arxiv.org/abs/2603.28627

Shor's algorithm is possible with as few as 10,000 reconfigurable atomic qubits

Quantum computers have the potential to perform computational tasks beyond the reach of classical machines. A prominent example is Shor's algorithm for integer factorization and discrete logarithms, which is of both fundamental importance and practical relevance to cryptography. However, due to the high overhead of quantum error correction, optimized resource estimates for cryptographically relevant instances of Shor's algorithm require millions of physical qubits. Here, by leveraging advances in high-rate quantum error-correcting codes, efficient logical instruction sets, and circuit design, we show that Shor's algorithm can be executed at cryptographically relevant scales with as few as 10,000 reconfigurable atomic qubits. Increasing the number of physical qubits improves time efficiency by enabling greater parallelism; under plausible assumptions, the runtime for discrete logarithms on the P-256 elliptic curve could be just a few days for a system with 26,000 physical qubits, while the runtime for factoring RSA-2048 integers is one to two orders of magnitude longer. Recent neutral-atom experiments have demonstrated universal fault-tolerant operations below the error-correction threshold, computation on arrays of hundreds of qubits, and trapping arrays with more than 6,000 highly coherent qubits. Although substantial engineering challenges remain, our theoretical analysis indicates that an appropriately designed neutral-atom architecture could support quantum computation at cryptographically relevant scales. More broadly, these results highlight the capability of neutral atoms for fault-tolerant quantum computing with wide-ranging scientific and technological applications.

arXiv.org
Your daily fortune:
You haven't yet met all the people in your life that you are going to disappoint. Take comfort in that.

Friendly reminder: last year I built FediMod FIRES, a protocol and reference server implementation for sharing moderation data.

I haven't yet been able to get anyone to adopt it or even signal intent to adopt. But regularly I see people complaining about the lack of data sharing when it comes to moderation, especially for combating spam, scams, and harassment. The tool is there, please use it!

Whilst I'm not actively working on FediMod FIRES this quarter, I did apply in November for a grant to continue that work, and last I heard a few weeks ago is that the grant made it to the next stage, so I may have some money again to fund development.

It's not 1.0.0 yet, because I decided it needed more work for me to be happy to call it that, but it is usable!

Installation is also super simple for data producers, literally two commands on debian or ubuntu boxes.

Learn more: https://fires.fedimod.org/manuals/reference-server/

#moderation #fediblock #administration

FIRES Reference Server | FediMod FIRES

Fediverse moderation Intelligence Replication Endpoint Server

FediMod FIRES
You must picture Sam Altman holding a knife to Tim Berner-Lee's throat. We are in a truly existential level of danger when it comes to the survival of the open web, across every front. This year is when it all comes to a head. https://anildash.com/2026/03/27/endgame-open-web/
Endgame for the Open Web

A blog about making culture. Since 1999.

Anil Dash

And they are reacting to something real: Our β€œWestern” societies have indeed become more pluralistic, less white, less overwhelmingly Christian.

In that sense, it was not some perfectly stable liberal democracy that suddenly fell into crisis (because such an order never existed).

Yael's post demonstrates something about digital privacy/security that I think a lot of people miss: there is no right answer, just a series of trade-offs. And every person has to make their own decisions about which trade-offs are worthwhile. https://blog.yaelwrites.com/options-for-phones-at-protests/
Options for Phones at Protests

Simply showing up to a protest leaves you susceptible to all sorts of surveillance, including cameras, drones, facial recognition, and more. There's not always a lot you can do about pernicious street-level surveillance, but you do have a lot of choices when it comes to your phone. Because there's no

String Literal