Opens profile photo
Follow
Click to Follow robot__dreams
Elliott
@robot__dreams
Room of Spirit and Timeyoutube.com/channel/UC1usQ…Joined May 2020

Elliott’s Tweets

Pinned Tweet
"The Future of Learning" with - Emotional and psychological blockers to learning - Supporting children in following their curiosity - Verification vs. trust - Lying with the truth - "Knowledge Bootstrapping" and many more topics!
1
12
Show this thread
ROAST is an async. protocol that makes t-of-n FROST signing robust: t honest signers can produce a Schnorr signature even if other signers disrupt. Joint work with my awesome co-authors Viktoria Ronge Non-technical explanation in Section 3
Quote Tweet
#ePrint ROAST: Robust Asynchronous Schnorr Threshold Signatures: T Ruffing, V Ronge, E Jin, J Schneider-Bensch, D Schröder ia.cr/2022/550
29
131
Realized in Argentina: cryptocurrencies introduce competition against the government monopoly on currency. I’m not the target user - in the US, there isn’t reason to switch. But in Argentina, with 100% inflation y/y, ability to access competing currencies makes a huge difference.
2
21
Show this thread
I had a great time solving these cryptographic challenges. Highly recommend it for folks trying to get a deeper understanding of BIP-340. Damn those x-only keys for complicating the rogue key attack.
Quote Tweet
Here's a Bitcoin-flavored cryptography challenge in the spirit of Cryptopals. First one, so it's a warm up 👹 Lots of people warn against nonce reuse in Schnorr signatures, but can you *actually* carry out the attack and extract the signer's private key? gist.github.com/robot-dreams/6
Show this thread
1
3
Show this thread
Whaaaat there's going to be a libsecp PR review club? And we have not 1 but 2 weekends to study for it???
Will Smith What GIF
GIF
Quote Tweet
Heads up: on February 2nd, we will have our first review club on a libsecp256k1 PR. The PR is #748: "Add usage examples", authored by @Elichai2 and hosted by @n1ckler. In case you want extra time to study your crypto, the notes are already on the website: bitcoincore.reviews/748
1
37
I can't think of any obvious problem (especially since the security proof using ROM + Forking Lemma still seems to work—solve for r then solve for x), but I might've made a mistake in the proof or missed some subtle problem.
1
Show this thread
Cryptography experts, could anything go wrong if you swap the private key and private nonce in Schnorr signatures? s = x + H(X, R, m)*r instead of s = r + H(X, R, M)*x (I'm just curious, not actually planning to do this!)
9
18
Show this thread
Fortunately, in Shamir's Secret Sharing we care about polynomials as functions (rather than as expressions). So we can still recover the unique value of the secret p(0) after handing out shares p(1), ..., p(n), even if there's multiple ways to write p as an expression.
Quote Tweet
This came up recently, while I was teaching Lagrange interpolation. Over R or C, the interpolation problem has a unique solution, but over finite fields we lose uniqueness; we can always add a "zero" polynomial to our answer, and still get the interpolation right.
Show this thread
2
Probability puzzle (related to "Forking Lemma" from MuSig security proof): Let X be a random variable that outputs 1, 2, ..., q How do you set all P(X = i) to minimize probability of collision (2 independent draws of X are equal)? What's the collision probability in that case?
1
Serious kudos to whoever made the libraries so hard to misuse that a developer *actively trying* to force nonce reuse wasn't able to do it after 12 hours!
Quote Tweet
@bertcmiller built a bot trap to prove that ECDSA nonce reuse would lead to loss of funds youtu.be/Uw_HhWp3NkY watch this space, i hear more details are forthcoming ...
Show this thread
1
3
Hey probability experts, does this proof seem reasonable? (I'm rusty on probability so I want to make sure I didn't sneak in some weird error)
Image
2
4
- Modify the code in subtle ways to see what breaks (or not!) - (If there's an API) Try writing short example programs that use the API - (If there's an executable) Add lots of print statements before running, or step through with a debugger (2/3)
1
3
Show this thread
Ways to do code review that are much more interesting (and effective) than just "stare at the code": - Re-implement parts of the PR yourself to (i) get a better understanding of what the author did, (ii) consider if there are alternative approaches (1/3)
Quote Tweet
Replying to @jairunet @jfnewbery and @bitcoinbrink
Review PRs, PR review club, review PRs Always more review needed
3
8
Show this thread
Two general policies I have: - Don't get the annual subscription - Don't buy stuff during Black Friday sale I think I come out net ahead from (1) not getting 11 unused months of subscriptions, (2) not buying shit I don't need
7
These days it feels like I see "sorry, this content is not available in your country" everywhere So much for the vision of a global, borderless internet
Quote Tweet
Replying to @balajis
The conclusions in The Sovereign Individual assume a global, borderless internet. "Let's shut down international tech platforms" sounds like "let's attempt to extend national borders into cyberspace". Are encrypted protocols (TLS, VPNs, Tor) enough to resist such attempts?
5
What are your preferred alternatives to YouTube?
Quote Tweet
To reduce targeted dislike attacks & their impact on creators (esp on smaller creators), you’ll no longer see a public dislike *count* on YouTube starting today (the dislike button is staying). This comes after lots of research, testing & consideration → youtube.com/watch?v=kxOuG8
5
Well, even in university I always felt like I was supposed to "have a life" instead of studying. Whenever I hit the books I felt guilty for "being uncool". I think the answer is to just do whatever you personally find fun, whether that's dressing up, working out, studying, etc.
Quote Tweet
It’s crazy how much guilt I carried as a student. Always feeling like I should be studying, not realizing that play is an integral part of it all. In truth, there’s always something to study for, but gotta make time for the fun things, too.
Show this thread
4
Oops, I used to think SHA256(key || message) was a reasonable way to get message authentication. It's such an "obvious" construction, and it looks good; too bad it's completely broken under chosen message attack.
3
Ah, "don't roll your own crypto" doesn't mean "you're not skilled enough". It means "NOBODY is skilled enough (on their own)". You need lots of experienced collaborators, careful review, stress testing, etc.
2
12
My entire 20s I thought "you'd be looked down on if you express a desire to work on hard, interesting problems cause there's too many people like that and not enough interesting work to go around" Glad I was wrong, wish I figured it out sooner 😅
5
Show this thread
For me, the most mind-expanding part of the discussion was when you helped us realize THERE'S ACTUALLY HIGH DEMAND for people who want to (and have the skills to) work on hard, interesting problems 🤯
Quote Tweet
People were surprised to hear that not everyone wants to do hard systems programming for a living!! Not everyone wants to bang their head digging through assembly code every day. In the beginning, systems programming might be about aptitude but at some point it's about grit. 5/
Show this thread
1
11
Show this thread
Thanks so much for stopping by, Jean! That was a really fun discussion.
Quote Tweet
Yesterday, @robot__dreams invited me to talk with a group of @BradfieldCS students, mostly from nontraditional/non-CS backgrounds, about how to get into "interesting" systems programming work. Here are some of my answers, in case it's helpful for others. And pls chime in! 1/
Show this thread
1
4
Show this thread
In the past year, I’ve talked to many bright, curious, ambitious people who believed they couldn’t do research. That was me, not long ago. Here I share my improved understanding in hopes of offering a more empowering model of what research entails:
54
804
Show this thread
After implementing it, in some ways it feels less like a black box, but in other ways it feels a LOT more mysterious. Like, how the hell did the inventors come up with these definitions and convince themselves they're secure?
Image
Image
Image
2
Show this thread