GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Sophie Schmieg (sophieschmieg@infosec.exchange)

  1. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Thursday, 16-Apr-2026 23:43:39 JST Sophie Schmieg Sophie Schmieg
    in reply to
    • Soatok Dreamseeker

    @soatok I hope they accounted for ML-DSA's signature size when planning to add all these JWTs.

    In conversation about 12 days ago from infosec.exchange permalink
  2. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Tuesday, 07-Apr-2026 00:56:13 JST Sophie Schmieg Sophie Schmieg
    • Filippo Valsorda

    And the posts, they keep on coming.
    I hundred percent agree with @filippo here, the question is not whether we're certain that a quantum computer exists by 2029, it's whether we're certain that one doesn't exist. And things have progressed far enough that non-physicists, or even physicists working in different subfields, can no longer reliably tell what's going on.

    https://words.filippo.io/crqc-timeline/

    In conversation about 22 days ago from infosec.exchange permalink
  3. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Friday, 13-Mar-2026 09:57:34 JST Sophie Schmieg Sophie Schmieg
    • Filippo Valsorda

    Last time I had a 10+ hour flight, Opal nerd sniped me into figuring out how to break ML-DSA keys that had been improperly encrypted with a reused IV. (To be perfectly clear, this is not an issue with ML-DSA, but with reused IVs. Nothing is secure in that case, but some things are insecure in interesting ways)

    So of course, @filippo , being present when I disclosed that vulnerability, chose to immediately exploit it by nerd sniping me into providing additional test vectors for ML-DSA for this flight.

    In conversation about 2 months ago from infosec.exchange permalink
  4. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Friday, 20-Feb-2026 02:58:07 JST Sophie Schmieg Sophie Schmieg
    in reply to
    • Soatok Dreamseeker

    @soatok @whitequark yeah, this is the rare compiler w for constant time programming, that has saved some Kyber implementations.
    Since multiplication and shifts are so much cheaper than integer division, this is more or less the standard behavior if the compiler knows the divisor. But of course, you can't rely on it. And theoretically, the compiler is allowed to take your manual Barrett code and replace it with idiv as well, if it sees so fit.

    In conversation about 2 months ago from gnusocial.jp permalink
  5. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Friday, 20-Feb-2026 00:38:00 JST Sophie Schmieg Sophie Schmieg
    in reply to
    • Soatok Dreamseeker

    @soatok is it bad that I find the assembly completely reasonable? It's just a Barrett reduction.

    In conversation about 2 months ago from infosec.exchange permalink
  6. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Friday, 13-Feb-2026 06:45:09 JST Sophie Schmieg Sophie Schmieg

    Lol. Rofl, even.

    (Not the Onion: https://www.ibm.com/thought-leadership/institute-business-value/en-us/report/enterprise-2030)

    In conversation about 3 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/059/698/181/615/660/original/827499da278edf3a.png
    2. Domain not in remote thumbnail source whitelist: www.ibm.com
      The enterprise in 2030
      AI isn’t just enhancing the business model. By 2030, it will be the business model. Here are five predictions that can help business leaders prepare to win in an AI-first future.
  7. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Friday, 13-Feb-2026 06:14:02 JST Sophie Schmieg Sophie Schmieg
    • Q ✨

    @q I have no idea. I work in this field, and I have no idea.

    In conversation about 3 months ago from infosec.exchange permalink
  8. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Tuesday, 03-Feb-2026 01:32:08 JST Sophie Schmieg Sophie Schmieg
    in reply to
    • Charlie Stross
    • Charles Johnson
    • Weekend Editor
    • Dan Sugalski

    @wordshaper @weekend_editor @Green_Footballs @cstross starting by the fact that being resistant to a specific disease does not necessarily produce any other positive side effects, and in fact is more likely to negatively impact fitness when the disease is not a threat. See for example sickle cell anemia and malaria.

    In conversation about 3 months ago from infosec.exchange permalink
  9. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Thursday, 29-Jan-2026 04:53:41 JST Sophie Schmieg Sophie Schmieg
    in reply to
    • Jade
    • Christine Lemmer-Webber

    @cwebber @JadedBlueEyes to be fair, if you leave all the crypto as a TODO, it is technically post-quantum.

    In conversation about 3 months ago from infosec.exchange permalink
  10. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Friday, 23-Jan-2026 03:35:47 JST Sophie Schmieg Sophie Schmieg
    in reply to
    • Soatok Dreamseeker

    @soatok independent of that logic error, looking at the code it also has a fundamentally flawed design that assumes that signatures can be verified via an equality check. It also trusts the token with algorithm selection and has a timing side channel.

    In conversation about 3 months ago from infosec.exchange permalink
  11. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Thursday, 22-Jan-2026 14:46:33 JST Sophie Schmieg Sophie Schmieg

    Me: if I was an attacker and had a quantum computer right now, CA root certs would certainly be my first target.
    Colleague: come on, no Bitcoin for me?
    Me: fine, after I stole a bunch of Bitcoin and distributed them among the people in this video call, CA root certs would be my next target.

    In conversation about 3 months ago from infosec.exchange permalink
  12. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Saturday, 17-Jan-2026 00:49:18 JST Sophie Schmieg Sophie Schmieg
    in reply to
    • Soatok Dreamseeker

    @soatok ah yes, I too prefer X448 to guard against – checks notes – quantum attacks.

    In conversation about 3 months ago from infosec.exchange permalink
  13. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Tuesday, 13-Jan-2026 07:25:56 JST Sophie Schmieg Sophie Schmieg
    in reply to
    • Paul_IPv6
    • Paul Cantrell

    @paul_ipv6 @inthehands honestly, I've been wondering that for a while. If there is a masked, unidentified person abducting people in broad daylight, isn't it supposedly the police's job to stop them? I mean could be anyone, without a badge we can't know for sure, after all.

    (And I know, expecting the police to actually do their job instead of committing crimes themselves is a tall order, but still)

    In conversation about 4 months ago from infosec.exchange permalink
  14. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Saturday, 10-Jan-2026 17:55:36 JST Sophie Schmieg Sophie Schmieg
    • Insecurity Princess 🌈💖🔥

    Me: oh, we could buy an oscilloscope!
    @saraislet : why would we need an oscilloscope?!?
    Me: uhm, because it's an oscilloscope?!?

    In conversation about 4 months ago from infosec.exchange permalink
  15. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Thursday, 08-Jan-2026 12:43:33 JST Sophie Schmieg Sophie Schmieg
    in reply to
    • Soatok Dreamseeker

    @soatok correction: it was for PDF files: https://shattered.io/

    In conversation about 4 months ago from gnusocial.jp permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: shattered.io
      SHAttered
  16. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Thursday, 08-Jan-2026 07:56:38 JST Sophie Schmieg Sophie Schmieg
    in reply to

    @soatok we've already done SHA1 fingerprint collisions, but I guess that was for ASN.1 certs and not PGP keys.

    In conversation about 4 months ago from infosec.exchange permalink
  17. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Thursday, 08-Jan-2026 06:46:33 JST Sophie Schmieg Sophie Schmieg
    in reply to
    • Soatok Dreamseeker

    @soatok 64 bit collision? I forgot how to count that low.

    Like seriously, that's "find a multi collision" territory.

    In conversation about 4 months ago from infosec.exchange permalink
  18. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Friday, 02-Jan-2026 06:14:48 JST Sophie Schmieg Sophie Schmieg
    in reply to
    • Soatok Dreamseeker
    • Clemens

    @neverpanic @soatok tbf, the PQC specs came out about a year ago, and FIPS takes about a year. We'll see a lot more FIPS validated implementations across the board in 2026.

    When it comes to crypto agility, have you tried Tink (https://developers.google.com/tink)? It is IMHO the far superior way to solve this issue (full disclosure, it is developed by my team, so I'm extremely biased)

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.gstatic.com
      Tink  |  Google for Developers
      Discover resources for this multi-language, cross-platform, open-source cryptographic library.
  19. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Friday, 02-Jan-2026 06:14:46 JST Sophie Schmieg Sophie Schmieg
    in reply to
    • Soatok Dreamseeker
    • Clemens
    • Simo ✔️

    @simo5 @neverpanic @soatok this is one of my pet peeve rants: we have signature formats. (Several of them, even). Cryptographic standards define functions that map a collection of byte strings to some other byte strings. Files can store byte strings. What we are somewhat lacking is fully specified public key formats, but even that we have some (Tink defines it's own and can read/write many of the existing formats). The signature should just be the byte string given as the output of the signing algorithm. It's the public key that needs the information for verifying the signature.

    So if I give you a public key (including a definition of the full algorithm used, all the hash functions and security parameters etc), then you can verify a signature.

    If you want crypto agility, then the thing you need is support for key sets, i.e. multiple, equally trusted keys. That allows you to add, promote, and delete keys in a distributed environment. You have two options for the signature format in this case (and Tink supports both): either you keep the unmodified signature, try all public keys and call the signature verified if it verified under one of the public keys (great for comparability), or you put a short and meaningless identifier in front of the signature, which allows you to directly jump to the right public key. Better performance, but not compatible with libraries that don't support key sets in the same way.

    In both cases, this composite algorithm retains EUF-CMA/SUF-CMA as long as all keys in the key set are trusted and have EUF-CMA/SUF-CMA.

    Interestingly, pretty much all other types of signature formats, such as JWT (and as far as I know PGP) violate EUF-CMA and definitely violate SUF-CMA, so I argue (fairly strongly, given all the attacks due to these violations), that the Tink way of supporting key sets and signatures is the correct approach.

    In conversation about 4 months ago from infosec.exchange permalink
  20. Embed this notice
    Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Friday, 28-Nov-2025 03:01:59 JST Sophie Schmieg Sophie Schmieg

    Unicode normalization.

    In conversation about 5 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/618/252/786/299/596/original/61c3b0006efa2b71.png
  • Before

User actions

    Sophie Schmieg

    Sophie Schmieg

    Leading cryptography (ISE Crypto) at Google.Opinions my own.Content usually badly explained mathematics

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          41310
          Member since
          27 Nov 2022
          Notices
          87
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.