BLUE
speckled-doge.bsky.social

I get hashing and salting. It's just KIND OF ANNOYING to deal with secure transfer along with checking for session tokens.

2
ACarxiv-cs-cv.bsky.social

Xu Yuan, Zheng Zhang, Xunguang Wang, Lin Wu Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval https://arxiv.org/abs/2310.14637

0
CMthemilfmag.net

what happened to hashing out new ideas until something sticks

1
Tkvnbbg.bsky.social

The caller can choose whether to use simple or secure hashing without disrupting existing code structures.

0
EUeprint.bsky.social

Robust AE With Committing Security (Viet Tung Hoang, Sanketh Mendaia.cr/2024/1542

Abstract. There has been a recent interest to develop and standardize Robust Authenticated Encryption (Robust AE) schemes. NIST, for example, is considering an Accordion mode (a wideblock tweakable blockcipher), with Robust AE as a primary application. On the other hand, recent attacks and applications suggest that encryption needs to be committing. Indeed, committing security isalso a design consideration in the Accordion mode. Yet it is unclear how to build a Robust AE with committing security.

In this work, we give a modular solution for this problem. We first show how to transform any wideblock tweakable blockcipher TE to a Robust AE scheme SE that commits just the key. The overhead is cheap, just a few finite-field multiplications and blockcipher calls. If one wants to commit the entire encryption context, one can simply hash the context to derive a 256-bit subkey, and uses SE on that subkey. The use of 256-bit key on SE only means that it has to rely on AES-256 but doesn’t require TE to have 256-bit key.

Our approach frees the Accordion designs from consideration of committing security. Moreover, it gives a big saving for several key-committing applications that don’t want to pay the inherent hashing cost of full committing.
Image showing part 2 of abstract.
0
Ddragonlight.bsky.social

Could be? Also, it could be that artists are desperate for attention and would use any hashing to get it. (As seen in person when I went to portfolio reviews at a con...so many artists just wanting someone to look at their art. 😳)

1
MBmdotblind.bsky.social

WP Engine and Automattic hashing it out in court is probably... bad? for users (some users) depending on how this plays out but I think it's fair to be having discussions about for-profit companies and Open Source or "open source" software. www.theverge.com/2024/10/3/24...

The ‘WordPress’ fight is now a lawsuit
The ‘WordPress’ fight is now a lawsuit

WP Engine is suing Automattic and its CEO Matt Mullenweg.

1
DCdcoles.net

I'd been meaning to look at postcard-rpc. I know we'd talked about the schema hashing, but interested to see how it works in practice. So far it's looking pretty exciting. Since the PC is going to see a UART bridge, device ID matching would work. Question is if we can change the existing protocol.

1
TPaxialagegamer.bsky.social

No, the true and accurate history is what we get by hashing it out. Not what anyone already knows. You get to shitty conclusions when you're always jumping to them.

1