Chelsea Komlo

@chelseakomlo

Cryptography and privacy researcher.

Geregistreerd in mei 2009

Tweets

Je hebt @chelseakomlo geblokkeerd

Weet je zeker dat je deze Tweets wilt bekijken? @chelseakomlo wordt niet gedeblokkeerd door Tweets te bekijken.

  1. 25 okt.

    The answer is literally always polynomials

    Ongedaan maken
  2. heeft geretweet
    24 okt.
    Als antwoord op

    If you’re interested in what is known, I remember this survey being a good summary, at least as of a few years ago

    Ongedaan maken
  3. heeft geretweet
    24 okt.

    This is a bizarre claim that makes no sense on its face, and plays directly into the hands of the vehemently anti-encryption UK Home Office and US FBI/DOJ. If users in repressive countries don't have good encryption, that makes it *easier* for their governments to spy on them.

    Deze collectie tonen
    Ongedaan maken
  4. heeft geretweet
    22 okt.

    Censorship infrastructure in Russia. Great reporting on the current situation

    Ongedaan maken
  5. 21 okt.
    Ongedaan maken
  6. heeft geretweet
    18 okt.

    Have you put your online security and privacy back into your hands yet? Pledge to to end-to-end encrypted products or services.

    Ongedaan maken
  7. heeft geretweet
    20 okt.

    Solid reporting on geofencing in Louisville, KY. Seems that so far the police aren’t using geofencing frivolously, but it is not the power tool you might think. Meaning that lots of innocent people are caught in the net, without a suspect being found.

    Ongedaan maken
  8. heeft geretweet
    17 okt.

    Tell Congress: The Fourth Amendment is not for sale. Your Senators and Representatives need to hear that the government should be barred from purchasing personal data it would otherwise need a warrant to acquire. 

    Ongedaan maken
  9. heeft geretweet
    15 okt.

    I’ve been known to criticize Microsoft for having a lot of bark and not much bite when it comes to protecting Internet users’ rights. But this LinkedIn China pullout is a serious move and they are to be congratulated.

    Deze collectie tonen
    Ongedaan maken
  10. heeft geretweet

    A new white paper on the risks of client-side scanning, by Hal Abelson, , Josh Benaloh, , , Whit Diffie, Susan Landau, Peter Neumann, Ron Rivest, Jeff Schiller, , , and , and myself:

    Ongedaan maken
  11. 14 okt.

    I was told that I buried an important detail here, so here it is! The performance improvements shown in this new work by Elizabeth Crites, myself, and Mary Maller will be incorporated into the next FROST CFRG draft update.

    Ongedaan maken
  12. 13 okt.

    I'm excited to see how these techniques can be used in the future to prove the security of extensions to Schnorr multi and threshold signatures, such as privacy-preserving variants or specific implementation settings.

    Deze collectie tonen
    Ongedaan maken
  13. 13 okt.

    Most interestingly, our proof techniques allow us to prove *more efficient* variants of MuSig2 and FROST; we are able to reduce the number of group operations from linear in the number of signers to constant. The schemes we prove are the most efficient to date in the literature

    Deze collectie tonen
    Ongedaan maken
  14. 13 okt.

    Proofs of security for these schemes in the past had subtle bugs by overlooking a concurrent adversary. Existing proofs that do consider concurrent adversaries are extremely complex, and so having a simplified framework ensures that thoughtful analysis/review is easier to provide

    Deze collectie tonen
    Ongedaan maken
  15. 13 okt.

    Proving the security of Schnorr multi/threshold signatures is notoriously difficult (due to concurrency). We just put out new work on improved techniques to prove security of these schemes, and use these techniques to prove the security of MuSig2 and FROST

    Deze collectie tonen
    Ongedaan maken
  16. 13 okt.
    Ongedaan maken
  17. heeft geretweet
    9 okt.

    Take everything you know about online trolls, abusers, brigaders, spammers, and coordinated inauthentic behavior-ers. Then think about how those people can (and do, and will even more if we screw this up) weaponize the systems where users flag content for removal.

    Deze collectie tonen
    Ongedaan maken
  18. heeft geretweet
    8 okt.

    I don’t care if Facebook goes down but if Overleaf dies I’m walking into the sea.

    Ongedaan maken
  19. heeft geretweet
    7 okt.
    Ongedaan maken
  20. heeft geretweet
    6 okt.

    Have you ever wondered why Threshold ECDSA is painful, Threshold Schnorr is straightforward, and Threshold BLS is trivial? Here's an informal explanation:

    Deze collectie tonen
    Ongedaan maken

Het laden lijkt wat langer te duren.

Twitter is mogelijk overbelast of ondervindt een tijdelijke onderbreking. Probeer het opnieuw of bekijk de Twitter-status voor meer informatie.

    Je bent misschien ook geïnteresseerd in

    ·