Benjamin Beurdouche
@beurdoucheSecurity Researcher and Cryptography TL @Mozilla / Tweets are my own. IH-SNC7
Similar User
@martinralbrecht
@veorq
@hyperelliptic
@cjpatton_
@CryptoExperts
@luca_defeo
@Daeinar
@cryptojedi
@dstebila
@durumcrustulum
@realhashbreaker
@CryptoOrrDun
@Vinod_MIT
@bwesterb
@cr_yp_to
Folks @XEng, I think @elonmusk probably has more than 175 subscriptions, right? Ps: you still haven’t reached out to speak about modern end-to-end encryption for your 1:1 and group DMs…
This month's Advancing #WebRTC from #Mozilla dives into the new standard video processing APIs MediaStreamTrackProcessor and VideoTrackGenerator. We cover differences across browsers, and how to polyfill the gap in all browsers, including #Firefox! blog.mozilla.org/webrtc/unbundl…
Hey folks @XEng @XSecurity ! Any chance someone from one of your teams could reach out by DM, please ?
6100 atoms! Feels like quantum computers with thousands of qubits are just around the corner arxiv.org/abs/2403.12021
The program for RWC 2024 is live! rwc.iacr.org/2024/program.p…
I am super excited to see Apple engaging in this work—it is outstanding. However, I have been secretly hoping that both Apple and Google would adopt MLS (Messaging Layer Security) as part of their plan to both support RCS (Rich Communication Services). While the evolution of the…
So Apple has gone and updated the iMessage protocol to incorporate both forward security (very good!) and post-quantum cryptography. security.apple.com/blog/imessage-…
This was an amazing process to see. RFC 9420 is a huge achievement. @raphaelrobert @beurdouche @JonMillican @Emad_Omara @katrielalex @rlbarnes and other contributors like @JoelAlwen @BrenTwentyTen and others really pulled together to make something great.
MLS is now finished! 5 years of intense exchange with industry and academia, what a great group effort. Congratulations and thanks to all those who contributed! We wrote an overview about it here: blog.phnx.im/rfc-9420-mls/
MLS is a new secure group messaging protocol, soon coming up in a standard. datatracker.ietf.org/doc/draft-ietf… It aims to have strong confidentiality properties, with fancy names like "forward-secrecy" or "post-compromise security"! How do we prove them?
#ePrint TreeSync: Authenticated Group Management for Messaging Layer Security: T Wallez, J Protzenko, B Beurdouche, K Bhargavan ia.cr/2022/1732
My student @Kachoc_ and I are thrilled to announce Aeneas, a new verification toolchain for Rust programs. It's on arxiv arxiv.org/abs/2206.07185 and conditionally accepted at ICFP 2022... 🧵
The F* book is beginning to look more like a book! Lots more to go, but funny how seeing it in a different format really makes it more a book in my head. fstar-lang.org/tutorial/proof… restructuredText is pretty nice for targeting both html and latex. #fstarlang
Yet another evidence that cryptography needs to pass the test of time. 📜 eprint.iacr.org/2022/111.pdf
The Security Standardisation Research Conference (SSR) will take place on June 6 in Genoa and is co-located with IEEE EuroS&P @IEEEEUROSP The submission deadline (firm) will be March 4 and all details can be found at ssr2022.com.
CHERI provides fine-grained spatial memory safety at a hardware level. msrc-blog.microsoft.com/2022/01/20/an_… #cybersecurity #ConfidentialComputing
We can do a lot for DNS security by protecting the link between the endpoint and the recursive resolver, a point @tqbf has been making for years. Whether it's DoH, DoT, or DoQ doesn't really matter that much. educatedguesswork.org/posts/dns-secu…
RiSE just announced a new position to work on proof-oriented programming, in F* and related technologies. Come work with us! careers.microsoft.com/us/en/job/1220…
There is a huge amount of code in NSS between those highest-level layers and lowest-level layers. That middle layer will never be proven correct and it’s survived lots of static analysis and fuzzing. It is totally uninteresting. But that’s where the bugs are likely to be found.
United States Trends
- 1. Thanksgiving 2,58 Mn posts
- 2. Cowboys 41,2 B posts
- 3. Dolphins 23,1 B posts
- 4. Giants 63,7 B posts
- 5. Datsun 4.336 posts
- 6. Wicks 1.929 posts
- 7. Bears 184 B posts
- 8. Eberflus 84,9 B posts
- 9. Caleb 76,8 B posts
- 10. Tom Brady 6.810 posts
- 11. Drew Lock 13,3 B posts
- 12. CeeDee Lamb 4.529 posts
- 13. Storm Duck N/A
- 14. #GoPackGo 4.595 posts
- 15. Malik Washington N/A
- 16. Lainey Wilson 1.884 posts
- 17. #NYGvsDAL 10,1 B posts
- 18. #MIAvsGB 4.034 posts
- 19. Cooper Rush 4.695 posts
- 20. Jason Garrett N/A
Who to follow
-
Martin R. Albrecht
@martinralbrecht -
JP Aumasson
@veorq -
Tanja Lange
@hyperelliptic -
Christopher Patton
@cjpatton_ -
CryptoExperts
@CryptoExperts -
Luca De Feo @[email protected]
@luca_defeo -
Philipp Jovanovic 🇪🇺
@Daeinar -
Peter Schwabe
@cryptojedi -
Douglas Stebila
@dstebila -
Deirdre Connolly¹
@durumcrustulum -
Marc Stevens
@realhashbreaker -
Orr Dunkelman
@CryptoOrrDun -
Vinod Vaikuntanathan
@Vinod_MIT -
Bas Westerbaan
@bwesterb -
Andreas Hülsing
@cr_yp_to
Something went wrong.
Something went wrong.