Do people who live in Europe ever have to grapple with this insanity? I’ll move tomorrow if the answer is “no”.

Maybe one of the greatest Presidents we’ve ever had. I don’t usually do politics on social media anymore, but I have to say it.
Google has a blog post up discussing their threat modeling when deploying “post-quantum” (PQC) cryptographic algorithms. It’s an interesting read. https://bughunters.google.com/blog/5108747984306176/google-s-threat-model-for-post-quantum-cryptography
My daughter received an invitation for a Bar Mitzvah with a “World War II theme.” What am I supposed to do with this.
But all this data had to be authenticated, to keep bad guys from broadcasting false data and screwing up traffic. At the same time, the crypto used had to preserve *privacy* so you couldn’t use it to track cars. You also needed the ability to revoke signing authority.
The idea was that every car would constantly broadcast a message containing its GPS coordinates and speed, so every other car on the road would be able to do stuff like… I don’t really know. Avoid rear-ending other people? Also traffic lights and road signs would also broadcast.
I wonder who exactly is paying for the ads and what their specific business interests are.

For some context, here is the initial leak from 2013 that doesn’t name any vendors.

nostr:npub143w05y7xvyhu85h93gpw3uun0zwza9qtmxlt3qm9y0x2re3a8apq5xpykj remember when you wanted to put a backdoor in zcash? Lol
nostr:npub1x2uevsyg56qtad7et96swrne5duyfvqqqvxnweuwcjt42cccfktssk3j8v What’s that a reference to?
This article with quotes from Apple on why it killed the CSAM photo scanning initiative is the first thing I’ve seen from the company explaining their decision. https://www.wired.com/story/apple-csam-scanning-heat-initiative-letter/


It’s days like these you realize the human brain is a computer that runs on about five ounces of weird chemicals, and if you use it too much they all run out.
Really wish this place had search.
Some folks on HN were confidently asserting that Apple escrows its encryption keys with Chinese-government owned hosting providers “to facilitate mass surveillance.” This statement is messy because it’s 1/4-true, 1/4-false, 1/2 unknown. https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html?smid=nytcore-ios-share&referringSource=articleShare
Back in 2018, Apple struck a deal where the iCloud data of Chinese users would be hosted in a Chinese state-owned cloud provider. This includes the servers that hold encryption keys for iCloud backups. That much is true.
Some folks on HN were confidently asserting that Apple escrows its encryption keys with Chinese-government owned hosting providers “to facilitate mass surveillance.” This statement is messy because it’s 1/4-true, 1/4-false, 1/2 unknown. https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html?smid=nytcore-ios-share&referringSource=articleShare
Someone found a buffer overflow in NIST SHA3 implementations and used it to make hash collisions 🤣 https://eprint.iacr.org/2023/331 h/t my student Aditya
#[0] Yup.