Advertisement · 728 × 90

Posts by Peter C

Notifications for deleted shouldn't remain in any OS notification database, and we've asked Apple to address this.

In the meantime, you can prevent any preview text from your Signal messages from appearing in your notifications.

Signal Settings > Notifications > Show “No Name or Content”

5 days ago 2327 1041 46 33
so far being a now-patched 27-year-old bug in OpenBSD—an operating system known primarily for its security. It also awakened a thousand year old demon spirit embedded in MS Windows 3.1 which foretold humanity's demise before escaping through a vent. We are working with Microsoft to address this issue.

so far being a now-patched 27-year-old bug in OpenBSD—an operating system known primarily for its security. It also awakened a thousand year old demon spirit embedded in MS Windows 3.1 which foretold humanity's demise before escaping through a vent. We are working with Microsoft to address this issue.

I feel like we're not addressing the most concerning news from Mythos

1 week ago 566 80 27 11
Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities:
Resource Estimates and Mitigations
Ryan Babbush,1, ∗ Adam Zalcman,1, † Craig Gidney,1, ‡ Michael Broughton,1
Tanuj Khattar,1 Hartmut Neven,1 Thiago Bergamaschi,1, 2 Justin Drake,3 and Dan Boneh4
1Google Quantum AI, Santa Barbara, CA 93111, United States
2Department of Computer Science, University of California Berkeley, Berkeley, CA 94720, United States
3Ethereum Foundation, Zeughausgasse 7a, 6300 Zug, Switzerland
4Department of Computer Science, Stanford University, Stanford, CA 94305, United States
(Dated: March 30, 2026)
The expected emergence of cryptographically relevant quantum computers (CRQCs) will represent
a singular discontinuity in the history of digital security, with wide ranging impacts. This whitepaper
seeks to elucidate specific implications that the capabilities of developing quantum architectures have
on blockchain vulnerabilities and potential mitigation strategies. First, we provide new resource
estimates for breaking the 256-bit Elliptic Curve Discrete Logarithm Problem over the secp256k1
curve, the core of modern blockchain cryptography. We demonstrate that Shor’s algorithm for this
problem can execute with either ≤ 1200 logical qubits and ≤ 90 million Toffoli gates or ≤ 1450
logical qubits and ≤ 70 million Toffoli gates. In the interest of responsible disclosure, we use a zero-
knowledge proof to validate these results without disclosing attack vectors. On superconducting
architectures with 10−3 physical error rates and planar connectivity, those circuits can execute in
minutes using fewer than half a million physical qubits. We introduce a critical distinction between
“fast-clock” (such as superconducting and photonic) and “slow-clock” (such as neutral atom and ion
trap) architectures. Our analysis reveals that the first fast-clock CRQCs would enable “on-spend”
attacks on public mempool transactions of some cryptocurrencies. We survey major crypto…

Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations Ryan Babbush,1, ∗ Adam Zalcman,1, † Craig Gidney,1, ‡ Michael Broughton,1 Tanuj Khattar,1 Hartmut Neven,1 Thiago Bergamaschi,1, 2 Justin Drake,3 and Dan Boneh4 1Google Quantum AI, Santa Barbara, CA 93111, United States 2Department of Computer Science, University of California Berkeley, Berkeley, CA 94720, United States 3Ethereum Foundation, Zeughausgasse 7a, 6300 Zug, Switzerland 4Department of Computer Science, Stanford University, Stanford, CA 94305, United States (Dated: March 30, 2026) The expected emergence of cryptographically relevant quantum computers (CRQCs) will represent a singular discontinuity in the history of digital security, with wide ranging impacts. This whitepaper seeks to elucidate specific implications that the capabilities of developing quantum architectures have on blockchain vulnerabilities and potential mitigation strategies. First, we provide new resource estimates for breaking the 256-bit Elliptic Curve Discrete Logarithm Problem over the secp256k1 curve, the core of modern blockchain cryptography. We demonstrate that Shor’s algorithm for this problem can execute with either ≤ 1200 logical qubits and ≤ 90 million Toffoli gates or ≤ 1450 logical qubits and ≤ 70 million Toffoli gates. In the interest of responsible disclosure, we use a zero- knowledge proof to validate these results without disclosing attack vectors. On superconducting architectures with 10−3 physical error rates and planar connectivity, those circuits can execute in minutes using fewer than half a million physical qubits. We introduce a critical distinction between “fast-clock” (such as superconducting and photonic) and “slow-clock” (such as neutral atom and ion trap) architectures. Our analysis reveals that the first fast-clock CRQCs would enable “on-spend” attacks on public mempool transactions of some cryptocurrencies. We survey major crypto…

> We demonstrate that Shor’s algorithm...can execute with either ≤ 1200 logical qubits and ≤ 90 million Toffoli gates or ≤ 1450 logical qubits and ≤ 70 million Toffoli gates

research.google/blog/safegua...

quantumai.google/static/site-...

2 weeks ago 18 9 0 4

have you seen the new supply chain vuln? don't update tubu. it's literally on heebee. they got poodee's deps. they infiltrated dippy. roll back weeno. disable scripts in ~/.gumpyrc. it's in poob. do not install poob. do not update poob. uninstall poob right now. poob has it in for you.

2 weeks ago 2340 704 27 18
2 panel comic.

Panel 1. Balding man. "Gonk is this true?"

Panel 2. Gonk Droid. "GONK."

2 panel comic. Panel 1. Balding man. "Gonk is this true?" Panel 2. Gonk Droid. "GONK."

Every day we wake up to more of this.

2 months ago 215 71 3 1

Hadn't realised that the third party review of Twitter's chat protocol had been published and wow github.com/trailofbits/...

2 months ago 116 35 2 5

Our digital systems reward belonging over accuracy, with people gaining status by aligning with their group, not by checking facts. Once beliefs become tied to identity, more media literacy won’t shift behaviour, the social rewards run against work against it.

4 months ago 261 46 2 1
Preview
Protein Powders and Shakes Contain High Levels of Lead - Consumer Reports CR tests of 23 popular protein powders and shakes found that most contain high levels of lead.

my latest investigation for @consumerreports.org is based on months of reporting and 60+ lab tests of leading protein supplements

we found that most protein powders and shakes have more lead in one serving than our experts say is safe to have in a day (🧵)

www.consumerreports.org/lead/protein...

6 months ago 6123 3249 285 1482
Preview
Protecting You From Social Engineering Campaigns: An Update From Workday

Workday discloses "third-party CRM" breach... most likely their Salesforce account

blog.workday.com/en-us/protec...

8 months ago 7 4 2 0
Advertisement

Exciting! MLS e2ee messaging with fingerprints in Bluesky bios (to prevent silent bindings) and pre-keys in PDS.

Kinda wish the key was published in the DID document though, especially if one day plc.directory will become a tlog. (Basically free KT!)

www.germnetwork.com/blog/integra...

8 months ago 55 21 6 1
Preview
Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years “All of the knowledge to generate the exploit already exists on the internet. AI could even build it for you,” the researcher told 404 Media.

New from 404 Media: we spoke to the researcher who found hackers can remotely trigger brakes on American trains. Says was ignored for years, DHS confirmed. "All of the knowledge to generate the exploit already exists on the internet, AI could even build it for you." www.404media.co/hackers-can-...

9 months ago 172 47 6 14

Just to clear up some misinfo, a BGP hijack was not the cause of Cloudflare DNS going down today.

At 21:51 UTC, Cloudflare (AS13335) withdrew both 1.1.1.0/24 and 1.0.0.0/24 for an unknown reason.

I suspect AS4755 was always announcing 1.1.1.0/24, when CF went away, it leaked a bit (%2).

9 months ago 24 10 4 4
Preview
Activision pulls Call of Duty game after PC players are hacked Call of Duty: Remote Code Execution

Activision has pulled a Call of Duty game after multiple reports of PC players having their computers hacked. An old insecure version of the game was reportedly uploaded to the Microsoft Store 😬 www.theverge.com/news/702255/...

9 months ago 75 10 2 6
Preview
161. The Court's Disastrous Ruling in the Third-Country Removal Case The majority did not just greenlight an especially odious immigration policy without any explanation; it did so in a case in which the government defied the district court—twice—with no consequence.

Today’s unsigned, unexplained #SCOTUS ruling clearing the way for removals of migrants to third countries without any additional process is a disaster—not just on the merits, but because of the government misbehavior that it not only refuses to punish, but effectively rewards.

Me, via “One First”:

9 months ago 9223 3436 559 314
[TLS] Photosynthesis, an update to Merkle Tree Certificates Photosynthesis combines the Static CT API with the ideas in Merkle Tree Certificates.

Here's something I am very excited about: Photosynthesis! 🌱☀️

A proposal to have CAs run transparency logs and make X.509 certificates out of Merkle Tree inclusion proofs.

This is similar to how CT would have worked in an ideal world, and it solves the problem of PQC sizes in logs and handshakes.

9 months ago 40 12 1 0

this is actually how my cursed Online brain read the post

2 years ago 1172 253 25 2
Preview
Coinbase breach tied to bribed TaskUs support agents in India A recently disclosed data breach at Coinbase has been linked to India-based customer support representatives from outsourcing firm TaskUs, who threat actors bribed to steal data from the crypto exchange.

A recently disclosed data breach at Coinbase has been linked to India-based customer support representatives from outsourcing firm TaskUs, who threat actors bribed to steal data from the crypto exchange.

10 months ago 2 3 0 0
Preview
Democratizing Detection Engineering at Block: Taking Flight with Goose and Panther MCP A comprehensive overview of how Block leverages Goose and Panther MCP to democratize and accelerate security detection engineering.

Most engineers aren’t taught how to write secure code or catch threats after deploy.

Detection engineering used to be limited to experts. Now anyone can do it with prompts, Goose, and the Panther MCP server. 💪

block.github.io/goose/blog/2...

10 months ago 10 5 0 0
Advertisement
Preview
Vanta bug exposed customers' data to other customers | TechCrunch The compliance company said the customer data exposure was caused by a product change.

New, by me: Compliance startup Vanta said it's fixing a bug that exposed some customer data to other Vanta customers.

One Vanta customer told us that they were notified that some of their data was pulled out of their Vanta instance "into other customers’ instances."

10 months ago 13 5 1 1

Our latest investigation…

10 months ago 156 56 7 0
Post image Post image Post image Post image

I'm often asked if I'll redo the 2019 quantum factoring estimate. Denser storage by yokes, smaller magic factories by cultivation, slimmer approx arithmetic by Chevignard et al… surely the cost is lower now?

Yes, it's lower now.

security.googleblog.com/2025/05/trac...

arxiv.org/abs/2505.15917

10 months ago 73 14 2 4
Preview
Probe Found Security Lapses Led to US Contractor’s Data Breach Failures in cybersecurity practices at a software company that helps federal agencies manage investigations and FOIA requests allowed two convicted hackers to delete databases, according to internal d...

SCOOP: In Feb, federal agencies "lost" many #FOIA requests but you probably had no idea. It turns out that the FOIAs disappeared due to an "insider threat attack" by 2 employees at a software company who were previously convicted of hacking into the State Dept

🧵

🎁 www.bloomberg.com/news/article...

10 months ago 514 320 24 29
DHI

DHI

New: Docker Hardened Images 🔐

✅ Non-root by default
✅ SLSA Level 3 compliant
✅ SBOMs, VEX, provenance — all signed
✅ Built-in to Docker Hub

👉 http://spklr.io/63323CAqR

#Docker #DevSecOps #SoftwareSupplyChain #Containers #CloudNative #DockerHardenedImages

11 months ago 5 3 0 1

DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage's archive server micahflee.com/ddosecrets-p...

11 months ago 136 78 6 12
Branch Privilege Injection: Exploiting Branch Predictor Race Conditions – Computer Security Group

Time to update microcode on your Intel processors (gen >9)
new speculative prediction bug lets you capture /etc/shadow with 99% reliability. They didn't make anything like it work on AMD or ARM, yet...

comsec.ethz.ch/research/mic...

www.intel.com/content/www/...

github.com/intel/Intel-...

11 months ago 2 3 0 0
Preview
Despite misleading marketing, Israeli company TeleMessage, used by Trump officials, can access plaintext chat logs Despite their misleading marketing, TeleMessage, the company that makes a modified version of Signal used by senior Trump officials, can access plaintext chat logs from its customers. In this post I ...

Despite misleading marketing, Israeli company TeleMessage, used by Trump officials, can access plaintext chat logs. My findings are based on TM SGNL's source code, and they are corroborated by hacked data micahflee.com/despite-misl...

11 months ago 773 315 23 87
Preview
Windows RDP lets you log in using revoked passwords. Microsoft is OK with that. Researchers say the behavior amounts to a persistent backdoor.
11 months ago 40 10 5 2
Preview
The Signal Clone the Trump Admin Uses Was Hacked TeleMessage, a company that makes a modified version of Signal that archives messages for government agencies, was hacked.

TeleMessage, the Israeli company that makes the modified Signal app used by Trump officials, was hacked. “I would say the whole process took about 15-20 minutes,” the hacker said micahflee.com/the-signal-c...

11 months ago 1825 865 36 86
Advertisement
Post image

PhD Timeline xkcd.com/3081

11 months ago 60074 20551 591 831
Post image

🧵 THREAD: A federal whistleblower just dropped one of the most disturbing cybersecurity disclosures I’ve ever read.

He's saying DOGE came in, data went out, and Russians started attempting logins with new valid DOGE passwords

Media's coverage wasn't detailed enough so I dug into his testimony:

1 year ago 13991 7344 329 1006