When you were it like that, it’s called an iSatchel
Posts by Thad
In the early hours of this morning, 87 years ago, Nazis entered the stores, schools and homes of their Jewish neighbors smashing and destroying. Thousands of men were rounded up and sent to concentration camps.
The world watched #kristallnacht happen. Some people took action.
McMahon meme illustrating that it's the little things in life that generate the most vigorous discussion.
No, but the ground under that roost ain’t gonna be very desirable…
October is Cybersecurity Awareness Month! Please be aware of cybersecurity. If you encounter cybersecurity, DO NOT APPROACH IT. Back away slowly. Protect children and pets. Make noises to scare it away.
TFW you realize it's likely that your kids have gotten around to reading more banned books than you have. www.ala.org/bbooks/frequ...
Passkeys feel like they lend themselves to being a long(er) lived credential. Would your direction advocate regularly rotating them?
Note: not just Jews - disabled Germans. Often, the families didn’t even know they had been transferred out of the care institutions they were at, to a place to be killed. They just received a letter with a made up illness as the cause of death.
And now all I can think about is whether a lightsaber (built from Kyber crystals) can block an X-Wing's blasters. Thanks for that.
Never change, Internet security people.
Lurking a mailing list debate while in a completely different headspace and the acronym 'QSF' keeps popping up. I have zero recollection for it. Go back and check the paper: 'Quantum Superiority Fighter'.
Appropriation, after the messy divorce
If we could trade off, I’d gladly have tech people only understand tech, and everyone else be versed in ethics and philosophy. It’s unfortunate we spent so long pushing the idea of “get an education to get a good job” when what we needed was “get an education to help build a healthy society.”
The AWS team published a key-committing variant of XAES (https://words.filippo.io/xaes-256-gcm/
Still FIPS-compliant, and with a proof.
Key commitment ensures the ciphertext can only be decrypted with one key, to avoid issues in higher-level protocols.
https://eprint.iacr.org/2025/758.pdf
This weekend I realized my daughter needed a particular sand toy for her kinetic sand standing sandbox.
I described it to ChatGPT, o3 thought about it for a minute and gave me the requested OpenSCAD and I hit print.
45 min later we had the part in the sandbox.
"Tea, Earl Grey, hot.", yo.
This seems pretty reasonable. On a “big” system one might have all kinds of allocation strategies. On embedded, I’ll have an upper bounded message size and my “allocator” is trivial (maybe a double/triple buffer), with numbers I’m managing in Excel with the rest of my memory budget.
Gather bacon, eggs and butter the night before. Put them on a George Foreman grill next to my bed. Put the grill on a timer so it turns on a few minutes before my alarm. I wake up and eat a delicious breakfast in bed.
“We all thought it was a joke, ‘Ah, it won’t amount to nothing, just another political party.'”
- Edward Adler, Holocaust survivor, on the rise of the National Socialists in Germany
collections.ushmm.org/search/catal...
"We must always take sides. Neutrality helps the oppressor, never the victim."
- Elie Wiesel, Holocaust survivor, Nobel Prize Acceptance Speech, 1986
www.nobelprize.org/prizes/peace...
I know, I just haven’t dug into it enough to know what I’m talking about yet. Now that Filippo’s ML-KEM implementation has landed in mainline Go, I was planning on adding both to my HPKE library.
That makes sense, thanks!
Got it. Sooo, any idea where a totally normal person could get some test vectors for HPKE-ML-KEM?
“Pre-history” - sounds like something my teenager would say about me. I’d say more but I’m not sure how to engage with ancient people on here.
and thus was the phrase “Malort Code” introduced
Yeah, I should have read that closer. Digging more, even KeyGen_internal is supposed to be hidden from applications and key generation “shall be performed by the cryptographic module”. The wording does everything but yell at us not to use a seed 🙄 What a pain
A quote from FIPS 203 ML-KEM, describing that you may store and use a seed to derive a decapsulation key.
Am I misunderstanding, or is that use case not addressed rather explicitly on page 16-17 of FIPS 203 for ML-KEM?
Yes, 100x. Individual systems can KDF something, or encode/protect seeds however they like, but please let’s have “load private key” just take a seed.