Advertisement · 728 × 90

Posts by Eli Grubb

Quantum Computers Are Not a Threat to 128-bit Symmetric Keys
words.filippo.io/128-bits/

18 hours ago 1 0 0 0
Post image

>Weighed confidence against fabrication, opted for honesty

lol

5 days ago 0 0 0 0
The Nice Guys movie poster

The Nice Guys movie poster

now rewatching

3 weeks ago 0 0 0 0
Post image

participating in my very normal hobby (niche domain name window shopping) and I have a sudden urge to get a new windshield

1 month ago 1 0 0 0

small consolations:
- the billionaires buying ski resorts and pricing out locals also lose out
- my grandfather lived a long, full life in utah and never experienced any of these insipid, fake winters. Truly god's favorite

1 month ago 0 0 0 0

it's telling that of the top 5: 2 pre-date my grandparents and the other 3 fall after I graduated high school. What are the odds 2025-2026 is the oldest season in the top 5 once the utah olympics roll around?

1 month ago 0 0 1 0
Post image

SLC is wrapping up its least snowy winter ever and second place isn't close.

It's hard to articulate just how bad it's been.

1 month ago 1 0 1 0
Preview
Large-scale online deanonymization with LLMs We show that large language models can be used to perform at-scale deanonymization. With full Internet access, our agent can re-identify Hacker News users and Anthropic Interviewer participants at...

Link to the substack: simonlermen.substack.com/p/large-sca...
And the paper: arxiv.org/abs/2602.16800

1 month ago 1 0 0 0
Post image

Did recent events leave you wondering "how could LLMs be used to surveil citizens"? Here's just one concrete example:

1 month ago 1 0 1 0
Preview
Please, please, please stop using passkeys for encrypting user data Passkeys are the future of authentication, but using them for data encryption is a disaster waiting to happen. Overloading these credentials creates a dangerous blast radius that can lead to the irreversible loss of a user's most sacred memories and documents.

"When you overload a credential used for authentication by also using it for encryption, the 'blast radius' for losing that credential becomes immeasurably larger."

Please, please, please stop using passkeys for encrypting user data blog.timcappalli.me/p/passkeys-...

1 month ago 2 0 0 0
Advertisement
Buddy Guy: Tiny Desk Concert
Buddy Guy: Tiny Desk Concert Mitra I. Arthur | February 27, 2026Buddy Guy displays a youthful spirit during his Tiny Desk that makes you question if he really turns 90 this year. Once th...

Buddy Guy brought the house down at Tiny Desk, with a feature from rising-superstar Miles Caton.

(once again, thank you Sinners)

youtu.be/m5XxOLdMSS8

1 month ago 0 0 0 0
Post image

opened PR #801 - as my mom regularly reminds me, no such thing as a coincidence!

1 month ago 0 0 0 0
Preview
Cryptography Engineering Has An Intrinsic Duty of Care - Dhole Moments To understand my point, I need to first explain three different cryptography attack papers / blog posts. I promise this won’t be boring. Three Little Disclosures Misuse-Prone Ciphers For All …

Cryptography Engineering Has An Intrinsic Duty of Care soatok.blog/2026/02/25/...

1 month ago 0 0 0 0
The Birdcage Movie Poster

The Birdcage Movie Poster

now watching

2 months ago 1 0 0 0

I bet his substack responding to something big is happening popped off

2 months ago 0 0 0 0

I know Greg Kinnear’s character felt so vindicated the first time he learned about llm psychosis

2 months ago 0 0 1 0
Movie poster for You’ve Got Mail.

Movie poster for You’ve Got Mail.

now rewatching

2 months ago 0 0 1 0
Preview
Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol WhatsApp is an end-to-end encrypted (E2EE) messaging service used by billions of people. In late 2021, WhatsApp rolled out a new protocol for backing up chat histories. The E2EE WhatsApp backup protocol (WBP) allows users to recover their chat history from passwords, leaving WhatsApp oblivious of the actual encryption keys. The WBP builds upon the OPAQUE framework for password-based key exchange, which is currently undergoing standardization. While considerable efforts have gone into the design and auditing of the WBP, the complexity of the protocol’s design and shortcomings in the existing security analyses of its building blocks make it hard to understand the actual security guarantees that the WBP provides. In this work, we provide the first formal security analysis of the WBP. Our analysis in the universal composability (UC) framework confirms that the WBP provides strong protection of users’ chat history and passwords. It also shows that a corrupted server can under certain condit

some rabbit holes I'm falling down:
- Chrome's compromised password checks: security.googleblog.com/2019/12/bet...
- Proton's user authentication: proton.me/blog/encryp...
- Whatsapp's encrypted backups: eprint.iacr.org/2023/843
- plus the meta whitepaper: www.whatsapp.com/security/Wh...

2 months ago 1 0 0 0
Post image

A curated, community-contributed list of interesting cryptographic protocols in-use today at scale.

Fancy cryptography in the wild: github.com/fancy-crypt...

2 months ago 1 0 1 0

THE ONLY THING MORE POWERFUL THAN HATE IS LOVE #badbunny 🇵🇷🇬🇺🇺🇸

2 months ago 0 0 0 0
Advertisement

finally gonna take the plunge and switch to tmux. I've enjoyed zellij immensely but there are a few design/ux choices that don't mesh with my workflow. Hoping tmux at leasts offers flexibility in that regard

2 months ago 0 0 0 0
Preview
Banning lead in gas worked. The proof is in our hair - @theU Researchers analyzed samples of Utahns' hair going back a century to document a 100-fold decrease in lead concentrations.

Banning lead in gas worked. The proof is in our hair attheu.utah.edu/health-medi...

2 months ago 0 0 0 0
Screenshot of "It’s been more than forty years since Ken Thompson delivered his famous talk, “Reflections on Trusting Trust“, which pointed out how there is no avoiding some level of trust. Hence the question here is not: should we trust someone. That decision is already taken. It’s: should we trust that WhatsApp is not running the biggest fraud in technology history."

Screenshot of "It’s been more than forty years since Ken Thompson delivered his famous talk, “Reflections on Trusting Trust“, which pointed out how there is no avoiding some level of trust. Hence the question here is not: should we trust someone. That decision is already taken. It’s: should we trust that WhatsApp is not running the biggest fraud in technology history."

WhatsApp Encryption, a Lawsuit, and a Lot of Noise blog.cryptographyengineering.com/2026/02/02/...

2 months ago 0 0 0 0

Look for what's true dubroy.com/blog/look-f...

2 months ago 0 0 0 0

Screenshot of article, with the following highlighted: "The jobs that were dependent on fundamentals of software aren't going to stop being dependent on fundamentals of software ... if you like doing software development, I don't think interesting software development jobs are going to go away."

Screenshot of article, with the following highlighted: "The jobs that were dependent on fundamentals of software aren't going to stop being dependent on fundamentals of software ... if you like doing software development, I don't think interesting software development jobs are going to go away."

LLMs and your career notes.eatonphil.com/2026-01-19-...

3 months ago 2 0 0 0
Denzel Curry covers Rage Against The Machine 'Bulls On Parade' for Like A Version
Denzel Curry covers Rage Against The Machine 'Bulls On Parade' for Like A Version Denzel Curry covers Rage Against The Machine 'Bulls On Parade' for triple j's Like A Version.Denzel Curry takes you behind 'Bulls On Parade' https://youtu.be...

Denzel Curry covering Rage Against The Machine's 'Bulls On Parade' youtu.be/ZY4ywyFXdik

3 months ago 1 0 0 0
Preview
GitHub - ctz/graviola: High quality, fast and easy to build cryptography for Rust High quality, fast and easy to build cryptography for Rust - ctz/graviola

Graviola: High quality, fast and easy to build cryptography for Rust github.com/ctz/graviola

3 months ago 0 0 0 0
Post image

More good stuff linked within:

The State of SSL Stacks www.haproxy.com/blog/state-...

3 months ago 0 0 1 0
Advertisement

The State of OpenSSL for `pyca/cryptography` cryptography.io/en/latest/s...

3 months ago 1 1 1 0
The Dropout TV Poster

The Dropout TV Poster

now watching

3 months ago 1 0 0 0