encryptorium (@encryptorium) 's Twitter Profile
encryptorium

@encryptorium

🌐 Cyber & Web3 Security

ID: 1741378685112897536

linkhttps://encryptorium.medium.com/ calendar_today31-12-2023 08:40:24

311 Tweet

38 Followers

209 Following

ZKsync (∎, ∆) (@zksync) 's Twitter Profile Photo

ZKsync’s first governance proposal was posted on ZK Nation forum. Introducing ZKsync Ignite (∎, 🔥) ZKsync Ignite will turn ZKsync Era into a liquidity hub for the Elastic Chain by streaming 300M ZK tokens over 9 months to DeFi users. Join the TG: t.me/+jt7FJcWQlekxO…

Dr. Allen Harper (@allenharper) 's Twitter Profile Photo

Why bolt on security when you can bake it in? 🔒 Studies show it's 15x cheaper to integrate security from the start vs. adding it later. 1. Early Integration = Better Protection 2. Automated Security Checks Save Time 3. Shared Security Culture Reduces Risk 4. Faster Incident

Why bolt on security when you can bake it in? 🔒

Studies show it's 15x cheaper to integrate security from the start vs. adding it later.

1. Early Integration = Better Protection
2. Automated Security Checks Save Time
3. Shared Security Culture Reduces Risk
4. Faster Incident
Parrot Security (@parrotsec) 's Twitter Profile Photo

Parrot 6.2 is available to download and install 🦜 Click the link and read the changelog to find out more about this new version 👇🏼 parrotsec.org/blog/2024-10-2… #ParrotSec #ParrotOS #CyberSecurity #CybersecurityNews #Hacking #PenTest #Pentesting #linux #linuxdistro

Parrot 6.2 is available to download and install 🦜 

Click the link and read the changelog to find out more about this new version 👇🏼
parrotsec.org/blog/2024-10-2…

#ParrotSec #ParrotOS #CyberSecurity #CybersecurityNews #Hacking #PenTest #Pentesting #linux #linuxdistro
Obsidian (@obsdmd) 's Twitter Profile Photo

Web Clipper lets you highlight important passages, and select the elements you want to save to Obsidian. Your highlights are saved, so you can revisit them when you return to a page.

Web Clipper lets you highlight important passages, and select the elements you want to save to Obsidian.

Your highlights are saved, so you can revisit them when you return to a page.
encryptorium (@encryptorium) 's Twitter Profile Photo

I absolutely agree! This also ties into shift-left security, where the goal is to incorporate security as early as possible in the development cycle. Not only does this create more secure code, but it can also reduce costs and prevent headaches later on.

AndiR16 🤝 (@andir16) 's Twitter Profile Photo

Want to harden your systems with prescriptive security configurations? Learn how CIS Benchmarks provide a structured approach to secure OS, cloud, databases, and more—aligned with NIST, ISO 27001, PCI-DSS, and SOC 2. encryptorium.medium.com/an-introductio…

Patrick Collins (@patrickalphac) 's Twitter Profile Photo

Finally just about done with my deep hardware wallet testing for security-conscious developers and protocols. Hardware wallets video and article on the research coming soon. Here is a sneak peek. If anything looks wrong from this snapshot, now's the time to let me know!

Finally just about done with my deep hardware wallet testing for security-conscious developers and protocols.

Hardware wallets video and article on the research coming soon.

Here is a sneak peek.

If anything looks wrong from this snapshot, now's the time to let me know!
0xLoopTheory (@0xlooptheory) 's Twitter Profile Photo

1/10: Google Quantum AI published a whitepaper estimating the resources a future fault-tolerant quantum computer would need to break the elliptic-curve cryptography (secp256k1) used by Bitcoin and other cryptocurrencies. The reaction has been predictable. "Bitcoin is dead"

0xLoopTheory (@0xlooptheory) 's Twitter Profile Photo

I already wrote a thread breaking down Google Quantum AI's paper on breaking Bitcoin's elliptic-curve signatures. This blog post goes deeper. It covers what the thread couldn't fit. Taproot's specific exposure window: P2TR addresses leak tweaked public keys on-chain, giving an

0xLoopTheory (@0xlooptheory) 's Twitter Profile Photo

1/11: I've been working on something for a while. What started as scattered writing and tools around post-quantum cryptography has taken a shape I'm genuinely happy with. Encryptorium: an applied cryptography research platform focused on the problems practitioners actually face

0xLoopTheory (@0xlooptheory) 's Twitter Profile Photo

1/5: My take on the QSB paper by Avihu Levy ✨🐺 (StarkWare 🥷), dropped April 9. It shows how to build a Shor-resistant spend path inside today's legacy Bitcoin Script, no soft fork. Clever and narrow, it makes the case for a protocol-level PQ signature louder, not quieter.

0xLoopTheory (@0xlooptheory) 's Twitter Profile Photo

My first HackerNoon | Learn Any Technology article is live, and I won’t pretend I’m not grinning. I broke down Google Quantum AI’s new paper: fewer than 500,000 qubits to break Bitcoin’s secp256k1, a 20× cut from prior estimates. A resource estimate is not a timeline. Migration is the bottleneck.

0xLoopTheory (@0xlooptheory) 's Twitter Profile Photo

STARKs are built on hash-based commitments and coding-theoretic machinery like FRI, which avoids the main Shor-vulnerable assumptions behind pairing- and discrete-log-based proof systems. But some implementations add a final SNARK wrapper for cheaper on-chain verification. RISC

0xLoopTheory (@0xlooptheory) 's Twitter Profile Photo

The place many rollup teams surface less than they should in threat models is the final L1 verifier. Teams choose their prover, proof system, and recursion strategy. But if the proof Ethereum ultimately accepts is Groth16 on BN254, the post-quantum security of that final

The place many rollup teams surface less than they should in threat models is the final L1 verifier.

Teams choose their prover, proof system, and recursion strategy. But if the proof Ethereum ultimately accepts is Groth16 on BN254, the post-quantum security of that final
0xLoopTheory (@0xlooptheory) 's Twitter Profile Photo

Google says breaking Bitcoin's ECDSA signatures takes 500,000 physical qubits. That is ~20x fewer than prior estimates. But the paper is not a timeline forecast. It is a cost estimate. Full breakdown, 16 min: youtube.com/watch?v=wj3Y0V… #PostQuantumCryptography #Bitcoin

0xLoopTheory (@0xlooptheory) 's Twitter Profile Photo

New on Encryptorium: too much of the PQC market sells urgency before discovery. NIST, NCSC, CISA say the opposite — inventory and crypto-agility first, then algorithm choice. Three fear patterns named, with the practitioner counter to each. encryptorium.medium.com/too-much-of-th…

0xLoopTheory (@0xlooptheory) 's Twitter Profile Photo

On April 9, a paper proposed quantum-safe Bitcoin spends with no soft fork. QSB is the escape hatch. It protects legacy coins already inside a QSB-locked output, not coins still in ECDSA wallets. Full breakdown: youtube.com/watch?v=HTycKV… #PostQuantumCryptography #Bitcoin

0xLoopTheory (@0xlooptheory) 's Twitter Profile Photo

I need to get this off my chest: the way some people talk about post-quantum migration genuinely grinds my gears. Not because they are worried about quantum computers. They should be. Not because they ask about hybrid algorithms. That is a valid question. What grinds my gears