Advertisement · 728 × 90

Posts by Pieter Wuille

Preview
Traueranzeigen von Claus Peter Schnorr | mittelhessen-gedenkt.de Besuchen Sie die Gedenkseite von Claus Peter Schnorr. Lesen Sie die Traueranzeige und gedenken Sie des Verstorbenen mit einer Kerze oder Kondolenz.

I just learned that Claus Schnorr passed away last June, aged 81 — a significant loss for the cryptographic community: mittelhessen-gedenkt.de/traueranzeig...

8 months ago 18 3 0 1
I Saved a PNG Image To A Bird
I Saved a PNG Image To A Bird YouTube video by Benn Jordan

Holy shit. This guy saved a PNG to a bird.

(he drew a bird into a spectrogram, played that sound to a starling, and the starling reproduced it back to him with enough accuracy he got his bird drawing back in their call's spectrogram) www.youtube.com/watch?v=hCQC...

8 months ago 4376 1364 106 327

ln(😅) = 💧ln(😄)

9 months ago 536 137 4 7

They have a superb metal detector inside already.

9 months ago 3 0 1 0
Abstract. As of November 2021, Bitcoin supports “Taproot” spending policies whose on-chain format is a single elliptic curve point. A transaction spending the funds associated with a Taproot policy can be authorized by interpreting the curve point either (a) as a public key of the Schnorr signature scheme and providing a suitable signature, or (b) as a commitment to alternative spending conditions and satisfying those. Since a sufficiently powerful quantum adversary would be able to forge Schnorr signatures, an upgrade to Bitcoin may, at some point in the future, disable the ability to spend existing funds via Schnorr signatures in order to prevent the havoc created by leaving a large fraction of the currency supply prone to theft. However, to avoid irrevocably losing all funds not migrated in time to (yet to be added) post-quantum signature schemes, it will be desirable for an upgrade disabling Schnorr signatures to retain the ability to spend funds by interpreting the curve point in a Taproot policy as a commitment to alternative spending conditions. This paper justifies such an upgrade strategy by demonstrating the post-quantum security of Taproot as a commitment scheme. Specifically, it provides concrete upper bounds on the probability that a quantum adversary making some number of queries to a quantum random oracle can break the binding or hiding property. Since the bounds follow from powerful existing results, which enable reasoning as if dealing with a classical adversary, the proofs are accessible without a background in quantum computing.

Abstract. As of November 2021, Bitcoin supports “Taproot” spending policies whose on-chain format is a single elliptic curve point. A transaction spending the funds associated with a Taproot policy can be authorized by interpreting the curve point either (a) as a public key of the Schnorr signature scheme and providing a suitable signature, or (b) as a commitment to alternative spending conditions and satisfying those. Since a sufficiently powerful quantum adversary would be able to forge Schnorr signatures, an upgrade to Bitcoin may, at some point in the future, disable the ability to spend existing funds via Schnorr signatures in order to prevent the havoc created by leaving a large fraction of the currency supply prone to theft. However, to avoid irrevocably losing all funds not migrated in time to (yet to be added) post-quantum signature schemes, it will be desirable for an upgrade disabling Schnorr signatures to retain the ability to spend funds by interpreting the curve point in a Taproot policy as a commitment to alternative spending conditions. This paper justifies such an upgrade strategy by demonstrating the post-quantum security of Taproot as a commitment scheme. Specifically, it provides concrete upper bounds on the probability that a quantum adversary making some number of queries to a quantum random oracle can break the binding or hiding property. Since the bounds follow from powerful existing results, which enable reasoning as if dealing with a classical adversary, the proofs are accessible without a background in quantum computing.

Image showing part 2 of abstract.

Image showing part 2 of abstract.

The Post-Quantum Security of Bitcoin’s Taproot as a Commitment Scheme (Tim Ruffing) ia.cr/2025/1307

9 months ago 1 2 0 1
Preview
Wormhole - Simple, private file sharing Wormhole lets you share files with end-to-end encryption and a link that automatically expires.

Now that WeTransfer is training its "A.I." on your files, I recommend using wormhole - which is end-to-end encrypted wormhole.app

9 months ago 39 12 4 0

Looking back at the dates on which I received 2FA emails: june 6, 8, 8, 9, 10, 12, 15, 16, 18, 20, 21, 26, 29. Then I stayed logged out until july 12. No reset since, maybe it's fixed... fingers crossed.

9 months ago 2 0 0 0
Preview
Replication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dog This paper presents implementations that match and, where possible, exceed current quantum factorisation records using a VIC-20 8-bit home computer from 1981, an abacus, and a dog. We hope that this ...

One of my students sent me the latest quantum factorization record, and I have to admit: I’m shook. eprint.iacr.org/2025/1237

9 months ago 66 20 8 6
Advertisement

Once a month? That sounds amazing.

The app logs me out randomly every 1-3 days or so. I usually don't bother logging back in for a week each time...

9 months ago 4 1 2 0
Preview
Linux Containers - LXD - Has been moved to Canonical The umbrella project behind Incus, LXC, LXCFS, Distrobuilder and more.

I think this is the reason: linuxcontainers.org/lxd/

11 months ago 2 0 1 0

"If you want to prompt ChatGPT 40 times, you can just stop your shower 1 second early."

"If I choose not to take a flight to Europe, I save 3,500,000 ChatGPT searches. this is like stopping more than 7 people from searching ChatGPT for their entire lives."

11 months ago 84 23 2 1
Preview
Bitcoin Mining Centralization in 2025 This post explores Bitcoin Mining Centralization in 2025 by looking at the hashrate share of the current five biggest mining pools. It presents a Mining Centralization Index and updates it with the as...

In the current Bitcoin mining landscape with proxy pools like AntPool & friends, 6 mining pools produce and mine more than 95% of the block templates.

Bitcoin mining is highly centralized today.

b10c.me/blog/015-bit...

1 year ago 3 1 1 0
Post image

BREAKING.

From a reliable source. MITRE support for the CVE program is due to expire tomorrow. The attached letter was sent out to CVE Board Members.

1 year ago 678 414 36 200

Base85 IPv6 addresses? Why have I never heard of this, and which browsers support it?

1 year ago 0 0 1 0

Dare I ask what prompted this observation?

1 year ago 2 0 1 0

Don't move around a lot? How do you deal with the 230 km/s speed of the keys around the center of the galaxy?

1 year ago 1 0 1 0

Wait, so how do you know what buttons to press?

1 year ago 1 0 1 0

Your keyboard doesn't have a built-in autopilot?

1 year ago 1 0 1 0
Advertisement

There is a zero knowledge joke here somewhere.

1 year ago 1 0 0 0