Avatar
Paul Miller
7cb13cde0670e590f02cbe9ea0fcf1e05edbc5cc8a409731fa5436440181cf1d
Noble cryptography. OSS, infosec.

Falcon is 4+ weeks of full time work. It's also unreliable while being implemented, due to the fact it needs floating point math. Maybe fips 206 will fix quirks.

noble cryptography v2 is out. Improvements include Schnorr implementation in 5kb noble-secp256k1, hybrid pq algorithms, OPRFs, friendly wrappers around native WebCrypto, better security, and much more.

Live on GitHub, NPM & JSR.

Announcing noble-post-quantum: minimal JS implementation of ML-KEM, ML-DSA and SLH-DSA.

Also known as Kyber, Dilithium and SPHINCS+. Only 2000 lines of code - great learning resource for anyone who’s messing with PQ stuff.

Check out README for algorithm comparison and usage guidelines. https://github.com/paulmillr/noble-post-quantum

2023 progress on JS cryptography:

- noble-hashes: 400K => 1.7M downloads per week

- noble-curves: ~0 => 0.9M, got 2 audits

- noble-ciphers: 0 => 25K

- Finally adopted by ProtonMail, MetаMасk, Rainbow, Rabby, ethers, web3.js, viem

Takes time, but we’re getting there.

sphincs looks good, kyber not quite. I think Signal's decision is proper and other should follow, because it's hybrid. In the end, everything is a placeholder, and the only question is: "for how long?".

> We're sacrificing almost all the values we stand for

I'm not sure what are you talking about. SimpleX is not a silver bullet. It's trivially decrypt-able by quantum computers. It's also not popular, which means, if/when it becomes popular, only then we'll see how it holds up.

Again - if you think simplex would work - go ahead and implement it. If you can convince the community your solution is better, everyone will switch to it.

nostr is open for everyone. We're just a bunch of folks who've spent some time on the issue we thought was important. No one paid us for it.

It's possible to deduce who messages whom (timing / correlation attack). All user contacts are uploaded to Signal servers (they say it's stored in SGX - which may be broken). Groups also store some data on Signal servers. And - most important - Signal relies on phone numbers.

It's not as good as Signal for now - but it's open and permissionless.

I think we can eat some share of other messengers, yes. It's not as good as Signal for now - but it's open and permissionless.

The problem you're mentioning (metadata leakage) can't be solved by cryptography alone.

It's solved separately by specifying which relays can be responsible for your DMs. You will set up a preferred DM relay and only this relay would be used for all chats.

There is no certainty. Two words for you: Cheon's attack.