Why ProtonDrive uses so many layers of encryption that looks redundant

I read their security model which explains how they laid out all these layers. https://proton.me/blog/protondrive-security
Files and folders are structured in a tree and called nodes. Each node (file/folder) have a password and asymmetric … Continue reading Why ProtonDrive uses so many layers of encryption that looks redundant

AIs as Trusted Third Parties

This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as trusted third parties:

Abstract: We often interact with untrusted parties. Prioritization of privacy can limit the effectiveness of these interactions, as achieving certain goals necessitates sharing private data. Traditionally, addressing this challenge has involved either seeking trusted intermediaries or constructing cryptographic protocols that restrict how much data is revealed, such as multi-party computations or zero-knowledge proofs. While significant advances have been made in scaling cryptographic approaches, they remain limited in terms of the size and complexity of applications they can be used for. In this paper, we argue that capable machine learning models can fulfill the role of a trusted third party, thus enabling secure computations for applications that were previously infeasible. In particular, we describe Trusted Capable Model Environments (TCMEs) as an alternative approach for scaling secure computation, where capable machine learning model(s) interact under input/output constraints, with explicit information flow control and explicit statelessness. This approach aims to achieve a balance between privacy and computational efficiency, enabling private inference where classical cryptographic solutions are currently infeasible. We describe a number of use cases that are enabled by TCME, and show that even some simple classic cryptographic problems can already be solved with TCME. Finally, we outline current limitations and discuss the path forward in implementing them…

Continue reading AIs as Trusted Third Parties

GPG: importing a friend’s signature on my public key demotes "ultimate" to "full"

This may be a newbie question. A friend ("Bob") and I have tried to sign each others’ keys according to these instructions. I want to get Bob’s signature on my public key into my own keychain. We get to step 6, where Bob has sent… Continue reading GPG: importing a friend’s signature on my public key demotes "ultimate" to "full"

What are some reliable and well-maintained Post-Quantum Cryptography (PQC) libraries with Go support? [closed]

I am looking for reputable libraries or solution providers that offer reliable, well-maintained, and well-documented implementations of post-quantum cryptographic (PQC) algorithms. Specifically, I am interested in:

Digital signature schem… Continue reading What are some reliable and well-maintained Post-Quantum Cryptography (PQC) libraries with Go support? [closed]