Thomas Ptacek's Avatar

Thomas Ptacek

@sockpuppet.org

Full of passionate intensity.

2,691
Followers
217
Following
1,027
Posts
16.05.2023
Joined
Posts Following

Latest posts by Thomas Ptacek @sockpuppet.org

("Current LLMs are better vulnerability researchers than I am.")

04.03.2026 17:46 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Nicholas Carlini at [un]prompted. If you know Carlini, you know this is a startling claim.

04.03.2026 17:46 ๐Ÿ‘ 24 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 1

None of you are giving me enough credit for not participating on the TLS working group mailing list. You're welcome. Everything I don't do, I don't do it for you.

28.02.2026 02:26 ๐Ÿ‘ 24 ๐Ÿ” 2 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 0

Annals of things people have actually written down for other people to read: "No one trusts NIST. But people do trust the IETF."

26.02.2026 00:56 ๐Ÿ‘ 4 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

People who hope to apply Daniel Bernstein's rules-lawyering tactics at IETF, which were honed in the DNS WGs (where he was probably in the right), would do well to remember that those tactics have consistently failed. They've merely won him standing to complain about the IETF.

25.02.2026 18:27 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

All this debate about whether MLKEM breaks formal methods results on the TLS protocol, when the answer all along was simply to deploy Additive Cryptography.

25.02.2026 01:23 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Additive Cryptography for TLS This document defines Additive Cryptography for TLS, a transition framework in which algorithms are never replaced and only accreted. Implementations MUST NOT negotiate a single key exchange algorithm...

There's only one correct way forward for handling the introduction of MLKEM into TLS, and, indeed, all future tls-wg cryptography debates, and it's this proposal:

snkth.com/add-crypto/

25.02.2026 01:22 ๐Ÿ‘ 18 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Given how i am only

a) a beneficiary of air travel (thanks for all the miles so far)
b) A non-avionics-expert reader of the EUROCAE WG-128 RTCA/DO-254 drafts
c) A spectator usually attending this type of debate with popcorn

I hope my comments are useful...

23.02.2026 00:56 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

"Auchentoshan" is inarguably the best distillery name.

22.02.2026 02:13 ๐Ÿ‘ 3 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Stop making videos you don't love sharing. Jesus.

21.02.2026 05:13 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Semantle Crab

ok so this is obviously very old news and also nobody is ever going to solve it better than this:

web.archive.org/web/20220421...

19.02.2026 18:37 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Word2Vec Explorer

Here's a trivial one-word-at-a-time implementation of the same rough idea (I'm not using their algorithm, it'll take you more guesses than it takes them, but you'll still get them in like <10 guesses).

semvec3-jpn.sprites.app

19.02.2026 00:37 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
A Solver for Semantle

Very fun: if you have the dictionary of embeddings Semantle uses, solving it is a trivial linear algebra problem: they're giving you the cosine similarity back on every guess, so you can filter out most of the vocabulary on a single guess.

victoriaritvo.com/blog/semantl...

18.02.2026 22:00 ๐Ÿ‘ 10 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Chapoly authenticates the ciphertext whose keys you establish with 25519, but authenticating the key exchange is a separate problem. In the messaging setting, this is what 3DH is about in Signal Protocol.

17.02.2026 03:35 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

It's mostly just me making dumb noises at clips from a (great) paper, so I don't think people are missing all that much.

17.02.2026 03:34 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

No, you have the same problem with 25519! You still have to authenticate the keys.

17.02.2026 03:09 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Sort of. Moxie Marlinspike once wrote a blog called "the cryptographic doom principle" that went viral so everybody knows you have to encrypt your CBC ciphertext, but no commercial entity appears ever to have realized they needed to do that with RSA ciphertexts as well.

17.02.2026 03:02 ๐Ÿ‘ 4 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

For a lot of years I was in the habit of criticizing cryptography designs that used asymmetric constructions because RSA is much more complicated and hard to get right than symmetric crypto. But the real problem is that it's against the law to authenticate an RSA key.

17.02.2026 02:39 ๐Ÿ‘ 8 ๐Ÿ” 1 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 0

It was when I got to the attack labeled "Lucky 64", after this paper managed to fit Thai and Juliano's BEAST into a short predicate building-block attack, that I realized that the authors of this paper were conducting a sick game to see how many TLS attacks they could cram into a non-TLS paper.

17.02.2026 02:27 ๐Ÿ‘ 15 ๐Ÿ” 3 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

(Akon voice) STILL COUNTS!

17.02.2026 02:24 ๐Ÿ‘ 6 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Ok so my takeaway so far is that Bitwarden managed somehow to recapitulate DROWN in a simple client/server password manager app with a single vendor.

17.02.2026 02:21 ๐Ÿ‘ 4 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

Claude, tell me, what would the worst possible feature to have be if your cryptosystem had the property of lots of k=v field and arbitrarily swappable ciphertexts?

17.02.2026 02:12 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

The problem with this paper is that every paragraph of it is screenshot-worthy.

17.02.2026 02:01 ๐Ÿ‘ 12 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 1
I Feel Love
I Feel Love YouTube video by Donna Summer - Topic

Current status: www.youtube.com/watch?v=bHfr...

17.02.2026 01:59 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

oh no
oh no
oh no

17.02.2026 01:55 ๐Ÿ‘ 5 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

I really wish I was in the room when they wrote these words:

17.02.2026 01:52 ๐Ÿ‘ 6 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

You don't see a lot of cryptographic vulnerabilities with viral spread characteristics.

17.02.2026 01:50 ๐Ÿ‘ 14 ๐Ÿ” 3 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 2
Post image

In formal academic cryptographic jargon this is what is known as "foreshadowing"

17.02.2026 01:46 ๐Ÿ‘ 8 ๐Ÿ” 2 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 0

How the fuck does someone end up encrypting with unauthenticated CBC but doing shares with RSA-OAEP?

17.02.2026 01:44 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

You have to argue with GPT5 to, no really, ignore capturing h_u as a bearer token for several turns to get it to spit this out:

17.02.2026 01:43 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0