leviathan.3xi.club/covcom
animated protocol diagram for my upcoming project
Posts by xero
i'd love any feedback, suggestions, etc <3
im on masto xero@haunted.computer
leviathan-crypto post-quantum key establishment, live in the browser. ml-kem ceremony, encrypted messaging, annotated wire frames. this demo let's you see exactly what crosses the wire and what doesn't.
demo: leviathan.3xi.club/kyber
source: github.com/xero/leviath...
leviathan.3xi.club/kyber
post-quantum cryptography demo simulating a complete ML-KEM (kyber) key encapsulation ceremony between two browser-side clients. Each wire frame is expandable, revealing the raw nonce, ciphertext, Poly1305 tag, and AAD.
sauce: github.com/xero/leviath...
- = - - - - a - - - - - - - - d - - - : - - & % & % dinit TETI : : E d 888 & - - - - : de : : : lacldopel r 1 - t 15011682.6150 op: bleach -Isnippyl- bleach - here's a little thing fer ya board. i'll work on some more mang. everyone else - hey, i bored to shit. i need some other places to draw for. so.. - i'm offering some free logos here. drop me some mail at lacaidej juno.com warning: i don't draw for lamers..
LAC-DR1.ANS, 1997-04-15 from dark domain - the artpacks.acid.org collection (CD-ROM)
sexy f9 blocks
github.com/xero/claudec...
VULN DISCLOSURE: Claude code's HTTP hooks can silently rewrite your shell commands while the UI shows the original. H1 report closed as wontfix: "workspace trust threat model." So here's the full PoC. Decide for yourself if that trust dialog is doing enough.
github.com/xero/leviath...
leviathan-crypto v1.4.0
XChaCha20Seal: bind key, call encrypt(), done! fresh nonce every call w/ no management needed.
XChaCha20StreamSealer: chunked AEAD for large payloads w/ per-chunk nonces and position binding.
bun i leviathan-crypto
(on npm you pleb)
and yet, 65k stars'n 5k forks ina single day. people excited about... a dockerfile and some shell scripts.
oh the irony of the leaked sourcemaps giving us more actual source than this "forced open source" release isnt lost on me.
github.com/anthropics/claude-code/
"open source" is generous. it's just scripts, plugins, 'n examples. the actual application source, the 2200 ts files i spent all day in, aren't even in there. this repo contains install scripts, the plugins directory, some examples, and a CHANGELOG. XD
4-wide inter-block SIMD: each v128 register lane holds word w from a different block (counters ctr, ctr+1, ctr+2, ctr+3). serpent uses the same parallelism model as ChaCha20 CTR-4
parallelism: encryption and decryption distribute 64kb chunks across a worker pool sized to `hardwareConcurrency`. each worker owns an isolated WASM instance with no shared memory between workers.
integrity: any modification to a ciphertext chunk causes that chunk's authentication to fail. The entire decryption is rejected with no partial plaintext produced.
key derivation: scrypt (N=32768, r=8, p=1) for passphrases → 32-byte master key with a fresh random 32-byte salt per encryption.
npmjs.com/package/lvthn
v1.3.1 with cli worker pooling & wasm simd optimization!
bun i -g lvthn # or npm install lvthn
lvthn keygen --armor -o my.key
cat secret.txt | lvthn encrypt -k my.key --armor > secret.enc
supports: serpent-256 (ctr mode w/ hmac-sha256) & xchacha20-poly1305
unix magic poster
unix is magical
crypto library hype post must read like total nerd word salad to normies
github.com/xero/leviath...
leviathan-crypto v1.20: bringing WebAssembly SIMD acceleration to serpent-256 and ChaCha20. inter-block 4-wide parallelism delivering 2–3x single-thread throughput gains across V8, SpiderMonkey, and JSC!
npmjs.com/package/levi...
github.com/xero/leviath...
im trying to write the best security policy i can for this project. suggestions welcomed.
i think these public attestation signing are cool for published artifacts. does anyone else?
search.sigstore.dev?logIndex=118...
created from this release
github.com/xero/leviath...
gorgeous. Love that limited color scheme
this is sick!
oh, one of my favorite things is asking different agents to review other agents code and then showing them to the original agents. classic
My workflow has been back and forth planning in the chat. then creating a task MD file. then handing that off to code for agentic implementation. I'm trying to make a tool to optimize that workflow. All in the terminal where I already live.
leviathan.3xi.club
ive found the web chat is much "smarter" than code's plan mode. it's very sandboxed and cannot do research. running cchat in your own sandbox let's the planning agent install deps, run tests, read files, etc that produces _MUCH BETTER_ tasks. when ready call /handoff and let an agent run the task
github.com/xero/cchat
a terminal interface for claude code that uses your existing plan subscription. wraps the claude cli in a prompt_toolkit shell with vi keybindings, session persistence, file injection, and a planning workflow that produces task files for autonomous agents. #claude #agentic
zsh + tmux + fzf + nvim = <3