Avatar
niftynei() 🇺🇸💸🧡
cbc5ef6b01cbd1ffa2cb95a954f04c385a936c1a86e1bb9ccdf2cf0f4ebeaccb
head of instruction @npub1vmpf90hq56wzyxht6teg3llpa74rzcepw9suj5unxl3tph24zd4qgtxhm7

i really like his discussion of the branchial space (what he calls the quantum mechanics part of reality); branches world vs matter world is such a nice analogy imo

Aqua wallet's "pay me in lightning, and i'll hold it in liquid" plus the ability to have a usd-t balance is exactly the thing i was trying to talk the mutiny wallet team into building last fall lol

(they did it, but on top of e-cash, not bulletproofs)

i am *so* thrilled they launched the "receive in lightning/stack in liquid" feature!! really interested to see how it works

SO EXCITED ABOUT THE ONLINE BASE58 CLASS DROP COMING SOON, APOLOGIES IF I HAVENT SENT YOU A THING I OWE YOU YET

legit feel that one of the craziest and most bullish things about bitcoin is that it's a community that advocates/advertises for itself

there's no central organization of bitcoin messaging that sells you on bitcoin

it's bitcoiners getting the word out

nostr:note1cvmymwxt9u8tshjqhwxu4val56l59sye2ms0ea97fpuzch98fu2qznfpl9

fun fact: the “1” in secp256k1 denotes the number of subgroups for the curve (eg there aren’t any)

subgroups massively undermine the security of a crypto system!! (you avoid them by picking a prime as your field) nostr:note1yr9tzxprw44k740phrnl6ye52k765zddgyq8gtduddq8g9j0zx4qeytz9h

Replying to Avatar waxwing

I'm always a bit torn about stuff like this. On the one hand, CRT is cool and it's even cooler that people have made successful attacks on real world systems using these so-called 'twist attacks' (basically the fuck up is to not check is the "point" you're provided, is actually on the curve).

https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md

But, on the other hand, calling it a danger when using secp256k1 for encryption seems a bit wrong when the danger is specifically that you *didn't* use secp256k1!

Indeed the substance of this attack is to exploit the fact that if a curve group has small subgroups, you can apply CRT to get info about secret keys. But secp256k1 doesn't have *any* subgroups. So the attack depends on the victim not checking if an externally given public key, is actually on secp256k1. Combining that key in a DH type exchange leads to naughtiness.

ooh. can i fact check myself really fast? im working on my very short intro to elliptic curves for base58, and tell people in the video that the h=1 in the secp paper means exactly this: that there are no “subgroups” for the G group (i think i call them cycles). is that a correct explanation?

i think technically it’s “chief explaining officer” but i do really prefer “head of instruction”

education as a goal is really off-putting to me; all i care about is “do you now understand what’s going on well enough to do or say something interesting”