nick's avatar
nick
nick@frostsnap.com
npub1j8d6...26k2
peer-to-peer cash security
nick's avatar
nick 1 year ago
incompetent or based image
nick's avatar
nick 1 year ago
things to buy: - bitaxe - paco rabanne invictus - pirate flag - super pc - paul allen business cards - season epic pass - spacesuit
nick's avatar
nick 1 year ago
we got your IP, it's so over for you
nick's avatar
nick 1 year ago
Today the Australian government is announcing that teenagers under 16 will be banned from social media. This implies people over the age of 16 will need to link their government identification to every social media account. The announcement coincides with the preparation of a federal Misinformation Bill - compelling platforms to crack down on what our "eSafety" commissioner deems disinformation. For Australians, Nostr is an idea whose time has come.
nick's avatar
nick 1 year ago
DEDICATED SIGNING DEVICES FOR ALL image
nick's avatar
nick 1 year ago
how much are the mega relays paying for hosting & bandwidth?
nick's avatar
nick 1 year ago
What's the deal with Claude subscription? Is it still easy to hit the usage limit? ppq.ai gets expensive with large code calls. Thinking of trying Cursor IDE to see what it thinks about the repos.
nick's avatar
nick 1 year ago
Today we disclose Dark Skippy - a powerful new method for a malicious signing device to leak secret keys. With a modified signing function, a device can efficiently and covertly exfiltrate a master secret seed by embedding it within transaction signatures If an attacker manages to corrupt a signing device, Dark Skippy can deliberately use weak & low entropy secret nonces to embed chunks of the seed words into transaction signatures. It takes just two input signatures to leak a 12 word seedphrase onto the Bitcoin blockchain. The attacker can watch on-chain until they spot an affected transaction, unblind and invert the low entropy nonces using an algorithm like Pollard's Kangaroo algorithm to learn the master secret seed. Then the attacker can wait and steal the funds whenever they decide best. Despite this attack vector not being new, we believe that Dark Skippy is now the best-in-class attack for malicious signing devices. - The attack is impractical to detect - Requires no additional communication channels - Effective on stateless devices - Exfils master secret Beyond ensuring your device firmware is genuine and honest (opensource), mitigations include anti-exfil signing protocols and we present some new ideas for additions to PSBT specifications to disrupt this attack. We encourage mitigation discussion and implementation exploration. This attack highlights the importance of verifying and securing your device's firmware, and the danger of sharing stateless signing devices with other people. We will be publicly releasing our code later this year. Authors: @Zero-Knowledge Goof (follow him so he gets onto nostr), Robin Linus, and myself. If you have any concerns or questions we recommend checking out the FAQ page on our website:
nick's avatar
nick 1 year ago
Why shouldn't I eat a complimentary biscuit? image