shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

246
active users

#cryptography

3 posts3 participants0 posts today

Got to the good part of my nighttime reading: Substitution-Permutation Networks. This book is great because the equations, examples and diagrams all support each other in a way that I just keep flipping between the three for each concept until I understand the sum of the parts. #cryptography

OSIRIS, the student-run #cybersecurity research lab at NYU, is seeking #challenge writers for our upcoming CSAW #CTF later this year! (For those who don't know CSAW, it's one of the largest student-run #cybersec events in the world: csaw.io ) Web, #ReverseEngineering, #pwn, and #cryptography challenges are prioritized, and all experience levels welcome. Interested? Shoot me a DM or email osiris@osiris.cyber.nyu.edu.

CSAWHome | CSAWCSAW is the most comprehensive student-run cyber security event in the world, featuring 8 cyber competitions, workshops, and industry events. Final events are hosted by 5 global academic centers.

youtu.be/DtPKBngQcEQ?si=lyLhi-

During the Cold War, the US government tried to stop the export of strong cryptography, Classifying strong encryption algorithms as "arms".

This video will (briefly) delve into the history behind this event, how software (mainly Phil Zimmerman & PGP) fought the government & won.

We need to KEEP fighting, and not let oppressive governments, restrict the use of Encryption.

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

They were an odd crew: the thin old man with his head slightly cocked, the stocky girl running her thumb over a raspberry cane, the small boy watching individual leaves on the maple tree quiver as they were struck by the first drops of rain.

"What's with them?" Marius asked.

"They're #code-breakers," Quentin replied. "The old man knows the code of changing air pressure. The girl reads the code in plants' defensive barbs. And the boy interprets rain."

In a Muskian Cybercoup, Mr. Big Balls parades into your server room, and copies all of your data. It is the ultimate (quasi-)insider threat.

What can you do to protect yourself against such an adversary? You can collect less data, especially focused on reducing the collection of the most sensitive bits of data.

You can have in place retention policies that involve deleting most of the data that you do collect after a period of time.

And you can salt your password hashes with self-documenting plaintext tags, so that anybody who knows how to crack your passwords must know how to contact your organization:

github.com/auth-global/self-do

GitHubself-documenting-cryptography/design-documents/g3pb2.md at 1cc48cd10a9324f8b4dd777be1c57607bcaba19d · auth-global/self-documenting-cryptographyContribute to auth-global/self-documenting-cryptography development by creating an account on GitHub.