Twitter’s Bluesky initiative created a little challenge where the goal was to verifiably link different digital identities together. This is my attempt at this.
My Quick Attempt at Bluesky's Satellite Challenge
- 2 分
Taproot Signatures and BIP-32
- 5 分
How do Bitcoin’s new Taproot signatures interact with the good old key derivation methods from BIP-32? It turns out that the answer isn’t all that straightforward.
Signatures From Identification Schemes
- 13 分
It turns out that all you need to make a signature scheme is a way to prove your identity.
- 15 分
Recently, I made a toy E2E encrypted messanger, called Nuntius. I had fun tinkering on it, and thought that some of the cryptography involved would be fun to explain.
End-to-End Encryption in Web Apps
- 11 分
End-to-end encryption is a very appealing guarantee of privacy, and more applications want to provide this guarantee. Web applications are popular, and they want to implement this functionality in the browser. What kind of guarantees does a user still have with a web app, served to them dynamically?
- 17 分
Recently, I’ve been working on a little encryption tool called Nimotsu. My goal with this project was to implement all of the cryptographic primitives involved. I had a lot of fun doing so, and thought it would make for an interesting blog post.
Constant-Time Big Numbers: An Introduction
- 23 分
Over the past couple months, I’ve been working on a library for constant-time Big Numbers in Go. I think it’s about time that I presented a bit of this work.