I am looking for profiles to follow.
-
I am looking for profiles to follow. Currently I am interested in following users who have an interest in or work in:
#Cryptography #Cryptology #Ciphers #Codes #Puzzles #TrapDoorMaths #Algorithms #MixNets #Encryption #HandCiphers #FieldCiphers
... and arcane math problems or trying to find a way to use them for securing information or messages. Any recommendations will be appreciated.
I'm looking for interesting new ideas and models from people who like to tinker rather than more rehashed, industry standard cryptography.
@[email protected] @[email protected]
-
@octade rehashed
-
I see what you did there.
-
@octade you might like Fred Hohman's collection of mathematical notation papers / demos / etc.
-
Thank you, Jane. I do like this kind of stuff. Great find!
-
@octade While I don't know of anyone right off hand, @drewww may frequent other circles and know of some folks. I know they have done some deeper work at the intersection of tech/analytics and I suspect there is a Venn diagram overlap of that and cryptography.
For the raw math component, I know that the academic disciplines typically have groups (either via aguppe or just hashtags on the larger instances). I'm aware of some for medicine and history, and I suspect there are some for high level math as well. -
-
-
Do you know about the #Veilid project?
What is your opinion on it?
I am thinking about becoming very involved with the project. Last I checked, they were working out a good discovery process.
Months ago, they were tentatively thinking of sharing identifying information over SMS, which I had mentioned was not a secure channel.
-
@[email protected]
I couldn't say. I don't have time to examine the project or test it. I think the combined endpoint routing is a strong idea the way their documentation explains it. Allowing users to choose longer circuits is also very good, and we used to have that in Tor a long time ago. Veilid can probably can be made quite a bit safer than Tor if an app network includes a good number of nodes.
The keyed network option is a great idea. I can't overstate how important it is to be able to have private mixnets or mixnets run in cooperation by consortia yet segregated from public access. From the documentation it looks as if the users can slice and dice for their own recipes.
One thing I think could be added is swarm routing for larger networks. Instead of sending data through a route or circuit, the data is chunked into equal-sized payloads and shuffled through a swarm of randomly-chosen routes in longer routes. This would be a nightmare for eavesdroppers, requiring much more in the way of compute power and honeypot peers for statistically correlating endpoint IP addresses.
Another problem exists with mixnets and I don't see anyone discussing this problem. In a peer-to-peer mixnet anonymity is supposed to be achieved by tunneling through multiple peers. The theory is that each peer in a circuit can only know the adjacent peers, and thus not be able to correlate endpoint IP pairs. However a determined adversary with large resources can spin up and run dozens or hundreds or even thousands of peers on a public network. Thus any route formed through a series of these hostile peers would not achieve anonymity for either endpoint. Since the adversary owns all the peers in the route, the adversary can use the timestamps and payload hashes to correlate the route and identify both endpoint IP addresses. Yet ameliorating this attack on a public network requires a certain number of tamper-proof peers for which all users can verify those peers have not been tampered with. The private key network option of Veilid amerliorates this attack. If the hostile peers can't join your network then they can't employ this kind of surveillance.
This opinion is just from a cursory glance. I can't vouch for anything without looking under the hood.
#Veilid #Mixnets #P2P #Networking #Privacy #Encryption #Cryptography
Copyright © 2025 NodeBB | Contributors