#PublicKeyCryptography

2025-02-23

New Kitten release

• Fixes redirection from sign-in page when person is already authenticated.

kitten.small-web.org

To learn more about how Kitten automatically implements authentication for your Small Web sites and apps using public-key cryptography (so even your own server doesn’t know your secret)¹, please see the Authentication tutorial:

kitten.small-web.org/tutorials

Enjoy!

:kitten:💕

¹ The security (and privacy) of Domain/Kitten are based on a 32-byte cryptographically random secret string that only the person who owns/controls a domain knows.

This is basically a Base256-encoded ed25519 secret key where the Base256 alphabet is a set of curated emoji surrogate pairs without any special modifiers chosen mainly from the animals, plants, and food groups with some exceptions (to avoid common phobias or triggers, etc.) that we call KittenMoji.

When setting up a Small Web app via Domain, this key is generated in the person’s browser, on their own computer, and is never communicated to either the Domain instance or the Kitten app being installed. Instead the ed25519 public key is sent to both and signed token authentication is used when the server needs to verify the owner’s identity (e.g., before allowing access to the administration area).

The expected/encouraged behaviour is for the person to store this secret in their password manager of choice.

More: kitten.small-web.org/reference

#Kitten #SmallWeb #SmallTech #authentication #publicKeyCryptography #web #dev #NodeJS #JavaScript #HTML #CSS

2024-11-14

Elliptic curves on FunctionalScript. Including Secp256k1, which is used in Bitcoin.

Just in case if we have to use decentralized identity much more often in the near future.
github.com/functionalscript/fu #elliptic_curve #elliptic_curve_cryptography #PublicKeyCryptography

2024-08-13

In den 1970er-Jahren ist Martin Hellman der erste Mathematiker, der zu Kryptografie forscht. Damit zieht er den Groll der NSA auf sich, denn der US-Auslandsgeheimdienst sieht seine eigenen Bestrebungen gefährdet.

#Kryptografie #Mathematik #PublicKeyCryptography #SpektrumDerWissenschaft #GeschichtenAusDerMathematik

detektor.fm/wissen/geschichten

2024-01-16

#TIL about #cjdns

"An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing."

directory.fsf.org/wiki/Cjdns

#P2P #IPv6 #encryption #PublicKeyCryptography

Rachael Ava 💁🏻‍♀️RachaelAva1024@tech.lgbt
2024-01-01

I've generated my official GPG key for real-world usage! I wanted to wait until 2024 to generate the key so that the key says it was generated on the 1st of 2024. A bit picky, I know, but it'll make my OCD brain happy, lol. I'll be testing it out before I upload my public key for everyone. :blobfoxfloof:

#GnuPG #GPG #PGP #Security #Privacy #Cryptography #PublicKeyCryptography

スパックマン クリスchris_spackman@twit.social
2023-12-20

Great example of how helpful #ChatGPT is: it just walked me through the math behind #PublicKeyCryptography. I kind of, sort of understand the math better now.

It also came up with #emacs #lisp code to show each step of the math involved, for whichever two primes are input. It seems to work fine, without any tweaking or fixing.

Don't worry - I know enough #CyberSecurity to know not to try to roll my own *anything*. This is just for showing #K12 #InfoTech students how public key crypto works.

why do websites rely on email they should also support making a account with
image boards kinda do this with trip codes, en.wikipedia.org/wiki/Tripcode
there are already tools for managing keys like for android. authentication can be done via challenge and response. anonymity can be handled with locally managed sub keys. or new unrelated keys. account recovery can be done by web of trust or make a back up account and mutually sigh your main one.

2023-07-18

Passwörter im Internet sind oft nervig, schwer zu merken und dazu auch noch unsicher. Die Tech-Giganten Google, Apple und Microsoft wollen sie künftig durch sogenannte „Passkeys“ ersetzen. Sind die klassischen Passwörter also bald Vergangenheit?

#Biometrie #Datenschutz #FIDO #Passkeys #Passwörter #PublicKeyCryptography #ZurückZumThema

detektor.fm/digital/zurueck-zu

Yaroslav Khnyginsurabax@mastodon.ie
2023-07-07

I wonder if it's possible to implement public-key signing for posts within ActivityPub, it could be a good verification solution for those who really need it. Maybe it's already in the spec?

#Mastodon #ActivityPub #Fediverse #Cryptography #PublicKeyCryptography #AsymmetricCryptography #GnuPG #PGP #Verification #AccountVerification #DigitalIdentity #CyberSecurity #InfoSec

Rachael Ava 💁🏻‍♀️RachaelAva1024@tech.lgbt
2023-04-06

Here's an idea: A digital camera that uses public key cryptography to encrypt photos and videos on a micro SD card.

The idea is that your camera uses the public key to encrypt the photos and videos as you take them. Then, when you want to review your album, you can enter your private key passphrase to see the contents.

The keys could be stored on a TPM in the camera for secure tamper-resistant access to ensure the key isn't swapped with a different key only accessible by a malicious actor. The keys could also be copied to the micro SD card for when you go to import the media to your computer.

Some open source software could be used to automate the process of prompting for the private key passphrase and decrypting process as it's being transferred to your computer.

But the goal here is to ensure that whatever photos and videos you take on it is encrypted and safe from someone who might steal your camera and/or the micro SD card.

#Photography #Encryption #PublicKeyCryptography #Security #Privacy #FOSS

Rachael Ava 💁🏻‍♀️RachaelAva1024@tech.lgbt
2022-06-14

Here's an idea for #surveillance camera systems for businesses: Use public key cryptography to ensure that the security footage is secure and private against malicious actors. Use the public key to encrypt the footage and store the clips on disk as an encrypted file. Then, when you need to pull up the footage, you use the private key (ideally stored on a flash drive most of the time with secure backups) to decrypt the clips and go through the footage.

#PublicKeyCryptography #RSA #Encryption

Rachael Ava 💁🏻‍♀️RachaelAva1024@tech.lgbt
2022-05-02

If anyone is struggling to understand how public key cryptography works, this video should help you out explaining #RSA. I know this video talks about quantum computers, but this guy's explanation of RSA on traditional computers like we have now really helped me understand it better.

#Security #Encryption #Cryptography #PublicKeyCryptography #QuantumComputers

youtube.com/watch?v=6H_9l9N3IX

தோட்டக்காரன்(gardener)solariiknight@social.systemreboot.net
2017-10-18
2048 bit keys generated by Infineon's RSA Library version v1.02.013, is vulnerable to factorisation.
This library was used to generate keys using smartcards instead of PCs. However, the method used generates keys that are vulnerable to factorisation.
https://social.systemreboot.net/url/67545
#infosec #RSA #publickeycryptography

Encryption is truly an arms race! Its not matter of if, but when it will be broken.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst