Advertisement ยท 728 ร— 90

Posts by Eric Rescorla

Preview
Build fast. Run any code fearlessly. Build fast. Run any code fearlessly.

Yeah I think you just end up having to run some kind of micro-server. I've had good luck with fly.io and Coudflare workers for this kind of thing,

2 weeks ago 2 0 0 0

Of possible relevance to @matthewdgreen.bsky.social @alecmuffett.bsky.social

3 weeks ago 1 0 0 0
Preview
How not to mandate device-based age assurance Software design by legal mandate

This week on the newsletter: "How not to mandate device-based age assurance"

educatedguesswork.org/posts/device...

In this post, we examine a number of enacted or proposed requirements for device-based age assurance and some of the ways they can go wrong.

3 weeks ago 5 4 1 0

Also, why not make a bomb that consists of a shield generator + a lasgun + fuse that activates the shield and lasgun at the same time. I guess it's unpredictable how big the explosion would be but still....

3 weeks ago 1 0 0 0

Correction: 2025.

1 month ago 0 0 0 0

Again, I wouldn't sign up for a marathon if I expected it to be that hot, but it's not like it's some exceptional situation that requires shortening the race.

1 month ago 0 0 0 0

For reference, the Badwater 135 takes place in Death Valley in July, so we're talking about running much more than a marathon in temperatures exceeding 100 F. That's exceptionally hot, but 86 F just isn't that hot.

1 month ago 0 0 1 0

I'm not saying I'd want to race in that, but running in those temperatures is well within the limits of human performance; mostly you need to slow down and hydrate a lot better. I've trained in hotter temps lots of times.

1 month ago 0 0 1 0
Advertisement

Moreover, the whole thing is just kind of odd because the forecast for LA is a high of 86 F (merrysky.net/forecast/los%2
0angeles/us
) and that's at 3 PM so it's cooler most of the race.

1 month ago 0 0 1 0

None of this applies to marathons, which are a strictly defined distance. Nothing wrong with racing 18 miles (~30K); I've done it myself. But it's not a marathon and just giving someone a finisher medal doesn't make it one.

1 month ago 0 0 1 0
Preview
Ultra Tour Monte Rosa (UTMR) Race Report

For example, I ran the 2026 Ultra Tour Monte Rosa, where they cut off the last 15 or so miles because of a rock fall. educatedguesswork.org/posts/utmr/
. And in fact it doesn't count as a finish for some purposes, like Hard Rock qualifying. hardrock100.com/hardrock-qua...

1 month ago 0 0 2 0

The finished or not question can be a bit confusing in some events like mountain races where the course is always a bit fluid and organizers might need to change or shorten the race for reasons outside their control.

1 month ago 0 0 1 0
Post image

Some real map/territory confusion in this report by the LA Marathon to give people medals if they drop out after 18 miles (because it's hot). The finisher's medal commemorates that you finished, but it doesn't make you a finisher.

www.nytimes.com/2026/03/07/u...

1 month ago 0 0 1 0
Preview
Let's build a tool-using agent giving hands to the brain in a vat
1 month ago 0 0 0 0

Now up on the newsletter: Let's build a tool-using agent

In this post, I walk through in some detail how AI agent tool calling works, including digging into the inputs and outputs of the LLM before they get translated into a coherent-looking JS API.

educatedguesswork.org/posts/tool-c...

1 month ago 0 0 1 0
Advertisement
Preview
Age Assurance Online: A Technical Assessment of Current Systems and their Limitations โ€“ Knight-Georgetown Institute

๐Ÿ“ฃ New from KGI: Age Assurance Online explores how age assurance systems work and their tradeoffs in accuracy, circumvention, availability, and privacy. A must-read for policymakers, service providers + users to understand the consequences of these systems: kgi.georgetown.edu/research-and...

2 months ago 4 3 0 2

The standard way to avoid cross-protocol attacks is now to use ALPN In the TLS handshake.

2 years ago 1 0 0 0


Now up, part II in my series about transparency systems: Certificate Transparency in Reality

educatedguesswork.org/posts/transp...

2 years ago 0 0 0 0

Welcome to Bluesky @rtfm.com !

Folks might recognize EKR from such hits as TLS 1.3, Let's Encrypt, and being Firefox CTO. He also writes a really good blog. Y'all should all follow him.

2 years ago 2 2 0 0

Of course, actually deploying this in practice turns out to be a lot harder than it sounds, which I'll get to in the next post.

educatedguesswork.org/posts/transp...

2 years ago 0 1 0 0

3. Site operators can then download all certificates, make sure they match the consensus, and then check for bogus certificates in their name. Mission accomplished.

2 years ago 0 0 1 0

If all goes well, this gives you a closed loop that makes it impossible to surreptitiously issue a certificate. 1. The consensus system requires the CA to commit to all its certificates. 2. Clients verify that certificates have been committed to.

2 years ago 0 0 1 0

The post has more detail, but the idea behind the proof is to show that there is a path from your certificate back to the root of the true, thus demonstrating that the tree was computed over your certificate.

2 years ago 0 0 1 0
Post image

Finally, when you go to the Web server, it proves that it's certificate matches the summary. What this means technically is that it gives you a Merkle inclusion proof that goes back to the root.

2 years ago 1 0 1 0
Advertisement

Next, you need some mechanism whereby each element in the system can assure itself that it has the same summary as everyone else (this is actually the hard part).

2 years ago 1 0 1 0
Post image

The standard solution here is what's called a consensus system. Effectively, you compute a summary of all the published certificates (typically by assembling them into a Merkle hash tree).

2 years ago 0 0 1 0
Post image

For instance, if the CA has it on their web site and sends it to clients but not to sites when they check, then the system breaks down.

2 years ago 0 0 1 0
Post image


The first step is to have the client (i.e., the browser) check that the certificate was published, thus hopefully forcing the CA to publish it. But now we have to confront the definition of "publish". How do we know the CA published to everyone?

2 years ago 0 0 1 0

The challenge here is ensuring that CAs are actually publishing every certificate. If your concern is that the CA was intentionally misissuing, it might just choose not to publish the bogus certificate.

2 years ago 0 0 1 0

A misissued certificate can be revoked, and, if investigation reveals improper practices, browsers might choose to distrust the CA, thus rendering all of its certificates invalid.

2 years ago 0 0 1 0