Advertisement · 728 × 90

Posts by Nick Sullivan

Crypto Review Panel

Want to help shape the cryptography that ends up in Internet standards? CFRG is looking for Crypto Review Panel members. Self-nominations welcome. Two-year renewable term.

Send nominations by April 20: cfrg-chairs@ietf.org

wiki.ietf.org/group/cfrg/C...

2 days ago 2 3 0 0
GitHub - grittygrease/ech-auth-interop Contribute to grittygrease/ech-auth-interop development by creating an account on GitHub.

Also: new draft work on authenticated ECH config distribution and rotation with Dennis Jackson and Alessandro Ghedini, plus interop work here:
www.ietf.org/archive/id/d...
github.com/grittygrease...

4 days ago 1 0 0 0

That is why signed ECH config updates are interesting. The goal is not just "more crypto." The goal is to remove the deployment constraint that created a stable fingerprint in the first place.

4 days ago 1 1 1 0

This is the deployment lesson: privacy is not just about cryptographic correctness. It is about operational indistinguishability too. Rollout paths, retry paths, and recovery paths all matter.

4 days ago 1 1 1 0

That meant protected traffic still had a cheap classification handle. In other words: ECH stopped sticking out at one layer, and started sticking out at another.

4 days ago 1 0 1 0

But real deployments still created a visible pattern. The issue was not the ECH extension. It was config update and recovery behavior, which pushed clients toward a common outer name in the clear.

4 days ago 1 1 1 0

GREASE did part of that job. It made ECH-shaped traffic common, so the syntax itself did not stand out.

4 days ago 0 0 1 0

ECH's design goal is "do not stick out." The basic idea is simple: if encrypted connections all look similar, it is harder to classify, monitor, and block them.

4 days ago 2 0 1 0
Preview
Do Not Stick Out: The Dynamics of the ECH Rollout Lessons Learned-ech-traffic-stuck-out" href="#why-ech-traffic-stuck-out" class="toc-anchor">Why ECH Traffic Stuck Out">The Paradox of Privacy Adoption: Standing Out to Disappearss="toc-anchor">Case St...

ECH exposed a hard truth about privacy technology: you can win at the protocol layer and still lose at the deployment layer.

I wrote about it here:
cdt.org/insights/do-...

4 days ago 8 5 2 1
Preview
Why Meta is retreating from encryption In 2019, Mark Zuckerberg called privacy the future of social networking. Not anymore

www.platformer.news/instagram-en...

3 weeks ago 1 0 0 0
Advertisement

I had a wonderful time at RWC again this year. What a lovely group of people.

1 month ago 4 0 0 0

The room gets philosophical. Cryptography & Society chaired by Nick Sullivan ( @nicksullivan.org ): what is crypto hiding from itself? Security vs. interoperability? CRA policy? Proofs that aren't enough? And Nadim Kobeissi on teaching crypto in post-crisis Lebanon. #realworldcrypto

1 month ago 8 3 1 0

I’m back in Taipei for Real World Crypto, then Tokyo next week for IETF by proxy. Let me know if you’re around!

1 month ago 3 0 0 0
Preview
Encrypted Client Hello: Closing the SNI Metadata Gap Referencesent-deployment-and-adoption" href="#current-deployment-and-adoption" class="toc-anchor">Current Deployment and Adoptionor">Trial by Firewall-security-systems" href="#adapting-network-securit...

Encrypted Client Hello is now RFC 9849

This RFC defines an extension to Transport Layer Security that improves privacy for web users. Huge team effort and a win for the internet at large. Now to get deployment up...

Some words I wrote about this for @cdt.org: cdt.org/insights/enc...

1 month ago 30 10 0 2
CryptoJobs - Cryptography Career Opportunities The definitive job board for cryptography professionals. Find opportunities in post-quantum cryptography, zero-knowledge proofs, HSM, TLS/PKI, and applied cryptographic research.

I put together a job site for cryptography roles. It's in alpha, so please send me your bugs!

jobs.cryptography.consulting

1 month ago 12 3 0 0
Preview
USENIX Security '26 Enigma Track Call for Participation USENIX Security brings together researchers, practitioners, system programmers, and others to share and explore the latest advances in the security and privacy of computer systems and networks.

USENIX Enigma has published its CFP for 2026: www.usenix.org/conference/u...

Submissions are due March 31, 2026. Looking forward to seeing many of you this year.

2 months ago 1 3 0 0

I’m happy to be joining the USENIX Security ’26 Enigma organizing committee this year, after having the chance to speak at Enigma three times. It has a long history as a home for early, practice-driven security ideas, often where work first gets aired before it’s fully polished or widely deployed.

2 months ago 1 0 1 0

Software has eaten the world. Banks, hospitals, power grids, planes. If the ground liquefies, everything built on it sinks. We're not talking about bad code anymore. We're talking about infrastructure failure at scale.

2 months ago 0 0 0 0
Post image

Liquefaction is what happens when shaking meets saturated ground. The soil loses structure and behaves like liquid. Buildings sink. In software: unverified code + relentless velocity + strained review = a codebase that can't hold weight.

2 months ago 2 0 1 0
Advertisement
Post image

And verification doesn't scale for free. 38% say reviewing AI code takes *more* effort than human code. Werner Vogels calls this verification debt. It compounds silently until something breaks.
🔗 buildwithaws.substack.com/p/werner-vog...

2 months ago 0 0 1 0
Post image

Same survey: 96% of devs don't fully trust AI output. But only 48% say they always verify before committing. That gap is where bugs live. That gap is where security dies.
🔗 www.sonarsource.com/company/pres...

2 months ago 1 0 2 0
Post image

Here's where it gets uncomfortable. Devs now say ~42% of their code is AI-generated. Projected to hit 65% by 2027. The codebase is becoming porous.
🔗 www.sonarsource.com/company/pres...

2 months ago 0 0 1 0
Post image

AI isn't coming; it's already in the pipes. Over 1.1M public repos now depend on an LLM SDK. Almost 700K of those appeared in the last 12 months alone. +178% YoY.
🔗 github.blog/news-insight...

2 months ago 0 0 1 0
Post image

Forget counting lines. Watch the flow. GitHub saw 518M pull requests merged in 2025, up 29% from the year before. That's not growth, that's a flood.
🔗 github.blog/news-insight...

2 months ago 0 0 1 0
Post image

Software Heritage archived over 22 billion unique source files by end of 2024. That's just public code they could find. The real number is unknowable, and growing faster than anyone can track.
🔗 annex.softwareheritage.org/public/annua...

2 months ago 0 0 1 0
Post image

Here's the scale we're dealing with: roughly 2.8 trillion lines of code written in the last 20 years. A huge chunk of that? Just the last two. The acceleration is the story.
🔗 medium.com/modern-stack...

2 months ago 0 0 1 0
Post image

AI coding is an earthquake for software security. Not a tremor. The kind that liquefies the ground beneath your feet. We're mid-shake and most people are still debating if it's real.
🔗 github.blog/news-insight...

2 months ago 4 1 1 0
Advertisement
Preview
RWC 2026 registration Real World Crypto Symposium

Registration for Real World Crypto 2026 is now open! rwc.iacr.org/2026/registr...

3 months ago 8 3 1 0
Preview
Mailing List Subscribe Made with Tally, the simplest way to create forms.

Also, sign up for my upcoming mailing list! Occasional, high-signal updates: tally.so/r/2EBz4D

3 months ago 0 0 0 0

News! I’ll be joining the Internet Architecture Board(IAB) starting March 2026 at IETF 125 in Shenzhen(I’ll be participating remotely).

The IAB is part of the IETF ecosystem. It looks across Internet protocol work to provide architecture-level oversight and help keep the standards process healthy.

3 months ago 5 0 1 0