Anton Livaja (@antonlivaja) 's Twitter Profile
Anton Livaja

@antonlivaja

Co-founder & Security Engineer | Distrust.co and Caution.co

ID: 234500804

linkhttp://livaja.me calendar_today05-01-2011 20:27:45

528 Tweet

803 Followers

5 Following

Anton Livaja (@antonlivaja) 's Twitter Profile Photo

Once people understand verifiable compute, the internet will change forever. Imagine cryptographically proving exactly what is running on a server using hardware-backed trust, verifiable down to the kernel, not just the application layer. Confidential compute solutions that

Anton Livaja (@antonlivaja) 's Twitter Profile Photo

Security “thought leaders” have been dismissing PGP’s Web of Trust, arguing we should abandon it in favor of centralizing trust with large corporations. Meanwhile, the internet is overrun with bots, making it hard to distinguish humans from automated systems… The Web of Trust

sol🏴‍☠️ (@sol_plunder) 's Twitter Profile Photo

Anton Livaja Incredible work. The most striking thing is that all of these choices just seem so obvious. Umm, yes? Why doesn't everything work this way? I may explore trying to actually use this for my own machines.

zooko🛡🦓🦓🦓 ⓩ (@zooko) 's Twitter Profile Photo

banging away at a hobby project with the help of AIs. the goal: make BLAKE3 more efficient than SHA256 for almost all use cases in wasm/js/web. why? Because if all software switches to BLAKE3 by default, users will be safer, and more empowered to share data trustlessly.

Anton Livaja (@antonlivaja) 's Twitter Profile Photo

Unfortunately this is the status quo. Nearly all companies using confidential compute are last mile solution that completely miss the point of the technology.

chaser (@chaserxy) 's Twitter Profile Photo

after a decade of work by three people, the foundations were published for Plunder, a novel operating system with sovereignty as its core principle. it enables software that's simple, powerful, easy to write/understand/reason about, and highly performant. github.com/xocore-tech/PL…

Matthew Green is on BlueSky (@matthew_d_green) 's Twitter Profile Photo

Ok I just want to add one thing. Folks, for state actors, the value of having a quantum computer is massively higher if you DON’T tell people you have a quantum computer. Exploiting Bitcoin is a parlor trick. Exploiting the world’s communications is where the value is at.

Anton Livaja (@antonlivaja) 's Twitter Profile Photo

A second laptop or Qubes OS goes a long way. Safe wallet (ByBit), Axie Infinity, Drift… some of the biggest hacks were preventable just by keeping environments separate. Isolation isn’t paranoia. It’s basic hygiene.

TFTC (@tftc21) 's Twitter Profile Photo

A security researcher just documented a large-scale counterfeit Ledger Nano S Plus operation selling compromised devices across multiple online marketplaces. The fake units look identical to the real thing but contain completely different hardware. Instead of Ledger's secure

A security researcher just documented a large-scale counterfeit Ledger Nano S Plus operation selling compromised devices across multiple online marketplaces.

The fake units look identical to the real thing but contain completely different hardware. Instead of Ledger's secure
Anton Livaja (@antonlivaja) 's Twitter Profile Photo

Supply chain pwnage from package managers like npm will continue until people radically change how they think about the problem. Npm is malware roulette, and so are other package managers. Until people stop yolo installing random third party code nobody actually reviewed, this

Anton Livaja (@antonlivaja) 's Twitter Profile Photo

One possibility is the continuation of milksad.info. Weak wallet generation will eventually get you. We'll see what it turns out to be... curious.