Mantej Rajpal (@mantej) 's Twitter Profile
Mantej Rajpal

@mantej

security engineering and applied cryptography

ID: 27356870

linkhttp://saltshaker.blog calendar_today29-03-2009 01:54:40

1,1K Tweet

2,2K Takipçi

559 Takip Edilen

solst/ICE (@icesolst) 's Twitter Profile Photo

I made a React app to help me teach students how to read binary and hexadecimal. But more importantly, I documented the entire process below, step by step on how I made it with Cursor. So you can copy the steps and prompts to make your own apps.

Mantej Rajpal (@mantej) 's Twitter Profile Photo

The Stag Hunt is a better thought experiment than the Prisoner’s Dilemma because there’s an outcome—(Stag, Stag)—that is both Pareto optimal and a Nash equilibrium.

Mantej Rajpal (@mantej) 's Twitter Profile Photo

Requiring candidates to install a keylogger prior to interviewing is a great way to thwart cheating because no viable engineer will interview at your company—can’t be cheating if there’s no interview to cheat on 🧠

Mantej Rajpal (@mantej) 's Twitter Profile Photo

Take the long view: As the cost of generating secure code goes to 0, consistency and predictability will go up, which inherently means risk will go down.

Mantej Rajpal (@mantej) 's Twitter Profile Photo

Missing the bigger picture. The problem isn’t the reporter reading the messages—it’s that they had access to them in the first place.

Matthew Green is on BlueSky (@matthew_d_green) 's Twitter Profile Photo

Ok, look people: Signal as a *protocol* is excellent. As a service it’s excellent. But as an application running on your phone, it’s… an application running on your consumer-grade phone. The targeted attacks people use on those devices are well known.

Ok, look people: Signal as a *protocol* is excellent. As a service it’s excellent. But as an application running on your phone, it’s… an application running on your consumer-grade phone. The targeted attacks people use on those devices are well known.
Balaji (@balajis) 's Twitter Profile Photo

Here’s a reframe. AI doesn’t take your job. AI allows you to do any job. So a coder can now make films. And a filmmaker can now write code. It allows a non-specialist to get started. But a specialist will be needed for polish.

Dino A. Dai Zovi (@dinodaizovi) 's Twitter Profile Photo

With the writing of code getting easier and faster, senior engineers are being reminded that our primary job is figuring out *what should be done* rather than how (writing the code to do it). That's why we write design docs approved by other teams as an artifact of alignment.

Dino A. Dai Zovi (@dinodaizovi) 's Twitter Profile Photo

This is the threat model now. AI agents are going to be scary good at executing cyberattack playbooks: technologyreview.com/2025/04/04/111…

Mantej Rajpal (@mantej) 's Twitter Profile Photo

downstream effects: untracked vulnerabilities in widely used systems, increased exploitation risk, inconsistent IDs and general chaos

Dino A. Dai Zovi (@dinodaizovi) 's Twitter Profile Photo

The architecture of the future is a mix of TEEs, ZKPs, and the like to reduce the scope of sensitive data held by online service providers. It massively simplifies the security problem when you don't hold that scale of sensitive, monetizable data.

Ian Miers (@secparam) 's Twitter Profile Photo

We should rename zk-rollups to k-rollups. It's more succinct. It accurately reflects that they aren't zero-knowledge. And when someone wants to tell you about their cool 'zk' rollup, you can just respond with: k.

Dino A. Dai Zovi (@dinodaizovi) 's Twitter Profile Photo

Yet another example of how session auth credentials that aren't device-bound are a massive security risk. Ideally, device-bound credentials are provisioned after a strongly authenticated user login from a cryptographically verified trusted device.