Matteo(@winterdeaf) 's Twitter Profileg
Matteo

@winterdeaf

\hyphenation{cryp-to-gra-phy}

Enarghephobic (afraid of unencrypted stuff) PhD student at @ETH.

Constantly retiring from CTFs @flagbot_eth @0rganizers

ID:1339530748609654784

calendar_today17-12-2020 11:20:30

42 Tweets

180 Followers

225 Following

Nick Sullivan(@grittygrease) 's Twitter Profile Photo

New from the TLS meeting at IETF 117: Encrypted Client Hello (ECH) is enabled for 1% of Chrome stable users. A big step for privacy online!

datatracker.ietf.org/doc/draft-ietf…

account_circle
Miro Haller(@miro_haller) 's Twitter Profile Photo

talks:
Matteo Scarlata Matteo will present 'why Threema failed in practice' lessons learned from 7 cryptographic attacks against a secure messenger.

The paper with Kien Tuong Truong kennyog will be presented at USENIX '23.

Full workshop program: cryptanalysis.fun

account_circle
Luca db(@cyan_pencil) 's Twitter Profile Photo

I would like to thank the chairs for letting us use heart emojis in the paper title. I think this is a very important step forward for academia and research.
Can't wait to use '👀' for related work and '🤨' for limitations on the next one

account_circle
Daniel Paleka(@dpaleka) 's Twitter Profile Photo

No one sees ChatGPT for the first time and thinks 'just some n-gram correlations' or 'no real knowledge inside'.

Those unintuitive beliefs trickle down from some experts, who should know better than to teach their controversial theories as established fact: 🧵 (1/12)

account_circle
Kien Tuong Truong(@kientuong114) 's Twitter Profile Photo

In early 2022 I started working with Kenny and Matteo on analyzing Threema, the messenger used by 🇨🇭govt, army and 🇩🇪 chancellor. Happy to say that the disclosure period is over and results are out! Fun vulnerabilities included :)

Check out our website: breakingthe3ma.app

account_circle
ETH CS Department(@CSatETH) 's Twitter Profile Photo

ETH cryptographers kennyog, Matteo and Kien Tuong Truong have conducted a security analysis and discovered various vulnerabilities in the secure messaging app Threema. Read their full paper here: breakingthe3ma.app

bit.ly/3vPkhxE

account_circle
Giacomo Fenzi(@GiacomoFenzi) 's Twitter Profile Photo

Great day for rap-based cryptography!
Kien Tuong Truong and Matilda burst onto the scene with some mellow key wrapping rap (youtube.com/watch?v=yh45Up…).
Ngoc Khanh Nguyen drops another stunner, with big names such as Lúcás Meier, Tako Boris Fouotsa 🇨🇲, and yours truly (youtube.com/watch?v=1z362x…)
🔥💣🔥💣

Great day for rap-based cryptography! @kientuong114 and Matilda burst onto the scene with some mellow key wrapping rap (youtube.com/watch?v=yh45Up…). @KhanhCrypto drops another stunner, with big names such as @cronokirby, @FouotsaB, and yours truly (youtube.com/watch?v=1z362x…) 🔥💣🔥💣
account_circle
Elvis Nava 🇺🇦(@elvisnavah) 's Twitter Profile Photo

My first 'Ultimate AI Art Competition' workshop at the VMI ETH Zürich Scientific Staff Association Retreat was a resounding success

My first 'Ultimate AI Art Competition' workshop at the VMI @ETH Scientific Staff Association Retreat was a resounding success
account_circle
kennyog(@kennyog) 's Twitter Profile Photo

MEGA - Malleable Encryption Goes Awry: I'm excited to share details of some new research on the security of MEGA. Details at: mega-awry.io (1/28)

account_circle
Fermat's Library(@fermatslibrary) 's Twitter Profile Photo

Tupper's self-referential formula is a formula that visually represents itself when graphed at a specific location in the (x, y) plane.

Tupper's self-referential formula is a formula that visually represents itself when graphed at a specific location in the (x, y) plane.
account_circle
Carmela Troncoso(@carmelatroncoso) 's Twitter Profile Photo

I was going to write about how Apple's new detector for child sexual abuse material (CSAM), promoted under the umbrella of child protection and privacy, is a firm step towards prevalent surveillance and control, but many others have already written so good stuff. Some of it 👇

account_circle