<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: sweis</title><link>https://news.ycombinator.com/user?id=sweis</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 09 Apr 2026 03:21:18 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=sweis" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[Assessing Claude Mythos Preview's cybersecurity capabilities]]></title><description><![CDATA[
<p>Related: <i>Project Glasswing: Securing critical software for the AI era</i> - <a href="https://news.ycombinator.com/item?id=47679121">https://news.ycombinator.com/item?id=47679121</a><p><i>System Card: Claude Mythos Preview [pdf]</i> - <a href="https://news.ycombinator.com/item?id=47679258">https://news.ycombinator.com/item?id=47679258</a><p>Also: <i>Anthropic's Project Glasswing sounds necessary to me</i> - <a href="https://news.ycombinator.com/item?id=47681241">https://news.ycombinator.com/item?id=47681241</a></p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47679155">https://news.ycombinator.com/item?id=47679155</a></p>
<p>Points: 307</p>
<p># Comments: 52</p>
]]></description><pubDate>Tue, 07 Apr 2026 18:11:31 +0000</pubDate><link>https://red.anthropic.com/2026/mythos-preview/</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=47679155</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47679155</guid></item><item><title><![CDATA[New comment by sweis in "Stop Using Encrypted Email"]]></title><description><![CDATA[
<p>“ There was a bug in an OpenPGP library which finally gave us an excuse to tear encrypted email via PGP to shreds. Our special guest William Woodruff joined us to help explain the vuln and indulge our gnashing of teeth on why email was never meant to be encrypted and how other modern tools do the job much, much better.”</p>
]]></description><pubDate>Sat, 23 Aug 2025 02:14:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=44992401</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=44992401</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44992401</guid></item><item><title><![CDATA[Stop Using Encrypted Email]]></title><description><![CDATA[
<p>Article URL: <a href="https://securitycryptographywhatever.com/2025/08/22/stop-using-encrypted-email-with-william-woodruff/">https://securitycryptographywhatever.com/2025/08/22/stop-using-encrypted-email-with-william-woodruff/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44992400">https://news.ycombinator.com/item?id=44992400</a></p>
<p>Points: 10</p>
<p># Comments: 2</p>
]]></description><pubDate>Sat, 23 Aug 2025 02:14:11 +0000</pubDate><link>https://securitycryptographywhatever.com/2025/08/22/stop-using-encrypted-email-with-william-woodruff/</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=44992400</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44992400</guid></item><item><title><![CDATA[New comment by sweis in "How to pack ternary numbers in 8-bit bytes"]]></title><description><![CDATA[
<p>I dug into this once and the "theoretical ideal" of 3 originated in a 1950s paper about vacuum tube computers, which itself immediately backed off and said the choice of base 2 is frequently justified.<p><a href="https://sweis.medium.com/revisiting-radix-economy-8f642d9f3c6a" rel="nofollow">https://sweis.medium.com/revisiting-radix-economy-8f642d9f3c...</a><p>In this case, the context are {-1, 0, 1} weights in a LLM model, which I don't think is being used for any hardware efficiency argument. I think it's just quantizing weights into 3 states.</p>
]]></description><pubDate>Thu, 05 Dec 2024 18:25:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=42330920</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=42330920</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42330920</guid></item><item><title><![CDATA[New comment by sweis in "Operation Triangulation: What you get when attack iPhones of researchers"]]></title><description><![CDATA[
<p>The video of the talk is online now too: <a href="https://www.youtube.com/watch?v=7VWNUUldBEE" rel="nofollow">https://www.youtube.com/watch?v=7VWNUUldBEE</a></p>
]]></description><pubDate>Wed, 27 Dec 2023 21:53:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=38787238</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=38787238</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38787238</guid></item><item><title><![CDATA[New comment by sweis in "IBM demonstrates 133-qubit Heron"]]></title><description><![CDATA[
<p>The best estimate I've seen is that we need about 5-7 orders of magnitude more qubits and 1-2 orders of magnitude lower error rates:
<a href="https://sam-jaques.appspot.com/quantum_landscape_2023" rel="nofollow noreferrer">https://sam-jaques.appspot.com/quantum_landscape_2023</a></p>
]]></description><pubDate>Wed, 20 Dec 2023 22:11:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=38714315</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=38714315</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38714315</guid></item><item><title><![CDATA[New comment by sweis in "OpenSSH 9.5 released with keystroke timing obfuscation"]]></title><description><![CDATA[
<p>Rambus bought Cryptography Research about 12 years ago:
<a href="https://www.rambus.com/rambus-completes-acquisition-of-cryptography-research/" rel="nofollow noreferrer">https://www.rambus.com/rambus-completes-acquisition-of-crypt...</a></p>
]]></description><pubDate>Wed, 04 Oct 2023 17:10:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=37768294</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=37768294</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37768294</guid></item><item><title><![CDATA[New comment by sweis in "Debunking NIST's calculation of the Kyber-512 security level"]]></title><description><![CDATA[
<p>NIST P-256 curve seed came from the X9.62 specification drafted in 1997. It was provided by an NSA employee, Jerry Solinas, as an example seed among many other seeds, including those provided by Certicom. Read this for more details: <a href="https://eprint.iacr.org/2015/1018" rel="nofollow noreferrer">https://eprint.iacr.org/2015/1018</a></p>
]]></description><pubDate>Tue, 03 Oct 2023 22:00:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=37758188</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=37758188</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37758188</guid></item><item><title><![CDATA[New comment by sweis in "Debunking NIST's calculation of the Kyber-512 security level"]]></title><description><![CDATA[
<p>"High q-bit proprietary technology" and "specialized de-latticing algorithms" are made up terms that nobody uses.</p>
]]></description><pubDate>Tue, 03 Oct 2023 21:58:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=37758169</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=37758169</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37758169</guid></item><item><title><![CDATA[New comment by sweis in "How were the NIST ECDSA curve parameters generated?"]]></title><description><![CDATA[
<p>A post talking about how Jerry Solinas provided the NIST ECDSA curve parameters and anecdotes of how they were chosen.</p>
]]></description><pubDate>Fri, 29 Sep 2023 16:56:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=37706959</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=37706959</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37706959</guid></item><item><title><![CDATA[How were the NIST ECDSA curve parameters generated?]]></title><description><![CDATA[
<p>Article URL: <a href="https://saweis.net/posts/nist-curve-seed-origins.html">https://saweis.net/posts/nist-curve-seed-origins.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=37706958">https://news.ycombinator.com/item?id=37706958</a></p>
<p>Points: 5</p>
<p># Comments: 1</p>
]]></description><pubDate>Fri, 29 Sep 2023 16:56:28 +0000</pubDate><link>https://saweis.net/posts/nist-curve-seed-origins.html</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=37706958</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37706958</guid></item><item><title><![CDATA[New comment by sweis in "UK pulls back from clash with Big Tech over private messaging"]]></title><description><![CDATA[
<p>NIST post-quantum standards resulted from a 8+ year process and public competition:
<a href="https://csrc.nist.gov/projects/post-quantum-cryptography" rel="nofollow noreferrer">https://csrc.nist.gov/projects/post-quantum-cryptography</a></p>
]]></description><pubDate>Wed, 06 Sep 2023 19:17:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=37409806</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=37409806</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37409806</guid></item><item><title><![CDATA[New comment by sweis in "2048 Bit RSA and the Year 2030"]]></title><description><![CDATA[
<p>The record quantum computers can factor is 21 -- and that is by cheating by already knowing the factors are 3 and 7. There are other results that use special form composites which don't count.<p>So a QC can factor a 5 bit number with Shor's algorithm in 2023 (with some cheating). That record has not changed for 10+ years.<p>I publicly bet 8 years ago that nobody would factor the number 35 by 2030. I hope I'm proved wrong.</p>
]]></description><pubDate>Mon, 10 Jul 2023 21:58:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=36673524</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=36673524</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36673524</guid></item><item><title><![CDATA[New comment by sweis in "Black-Hole Radiation Decoding Is Quantum Cryptography"]]></title><description><![CDATA[
<p>This is appearing at Crypto'23: <a href="https://crypto.iacr.org/2023/program.php" rel="nofollow noreferrer">https://crypto.iacr.org/2023/program.php</a><p>Video of a previous lecture is here: <a href="https://www.youtube.com/watch?v=4xNk3B-4TKs">https://www.youtube.com/watch?v=4xNk3B-4TKs</a></p>
]]></description><pubDate>Mon, 26 Jun 2023 18:39:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=36483877</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=36483877</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36483877</guid></item><item><title><![CDATA[Black-Hole Radiation Decoding Is Quantum Cryptography]]></title><description><![CDATA[
<p>Article URL: <a href="https://arxiv.org/abs/2211.05491">https://arxiv.org/abs/2211.05491</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=36483865">https://news.ycombinator.com/item?id=36483865</a></p>
<p>Points: 4</p>
<p># Comments: 1</p>
]]></description><pubDate>Mon, 26 Jun 2023 18:38:18 +0000</pubDate><link>https://arxiv.org/abs/2211.05491</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=36483865</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36483865</guid></item><item><title><![CDATA[New comment by sweis in "Meshtastic is an encrypted communications platform for the Lora RF protocol"]]></title><description><![CDATA[
<p>Is this using unauthenticated AES-CTR mode?<p><a href="https://github.com/meshtastic/Meshtastic-device/blob/04478081c6252e80bb602dcf7d233fdddb1c9651/src/nrf52/aes-256/tiny-aes.cpp#L200" rel="nofollow">https://github.com/meshtastic/Meshtastic-device/blob/0447808...</a><p><a href="https://github.com/meshtastic/Meshtastic-device/blob/04478081c6252e80bb602dcf7d233fdddb1c9651/src/nrf52/NRF52CryptoEngine.cpp#L24" rel="nofollow">https://github.com/meshtastic/Meshtastic-device/blob/0447808...</a><p><a href="https://github.com/meshtastic/Meshtastic-device/blob/285413c68cb6aeb6b102ab24084d7881b9d2ae2a/src/portduino/CrossPlatformCryptoEngine.cpp#L37" rel="nofollow">https://github.com/meshtastic/Meshtastic-device/blob/285413c...</a></p>
]]></description><pubDate>Thu, 07 Jul 2022 23:28:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=32021033</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=32021033</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32021033</guid></item><item><title><![CDATA[Landscape of Quantum Computing in 2021]]></title><description><![CDATA[
<p>Article URL: <a href="https://sam-jaques.appspot.com/quantum_landscape">https://sam-jaques.appspot.com/quantum_landscape</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=31995213">https://news.ycombinator.com/item?id=31995213</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 06 Jul 2022 00:00:09 +0000</pubDate><link>https://sam-jaques.appspot.com/quantum_landscape</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=31995213</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31995213</guid></item><item><title><![CDATA[New comment by sweis in "NIST announces first PQC algoritms to be standardized"]]></title><description><![CDATA[
<p>The record for factoring using a quantum computer is 21. Don't read that as 21 bits. 3*7. This has been the record for 12 years and that is arguably a result that is "cheating" with a priori knowledge of the factors.<p>There are some other examples of people factoring special-form composites that are particularly easy to factor on quantum computers, but those are basically stunts with no impact.<p>To threaten RSA, quantum computers need to increase the number qubits 6 orders of magnitude and improve the error correction at least 2 orders of magnitude. Check out this blog post for an illustration of where we are at: <a href="https://sam-jaques.appspot.com/quantum_landscape" rel="nofollow">https://sam-jaques.appspot.com/quantum_landscape</a></p>
]]></description><pubDate>Tue, 05 Jul 2022 23:59:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=31995210</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=31995210</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31995210</guid></item><item><title><![CDATA[New comment by sweis in "Ask HN: Best book on modern cryptography?"]]></title><description><![CDATA[
<p>Oded Goldreich's "Foundations of Cryptography" books are the rigorous, theoretical oriented books used in many grad-level crypto courses:
<a href="https://www.wisdom.weizmann.ac.il/~oded/foc-book.html" rel="nofollow">https://www.wisdom.weizmann.ac.il/~oded/foc-book.html</a><p>Neil Koblitz has "A Course in Number Theory and Cryptography", which I haven't read, but is often used: <a href="https://www.amazon.com/Course-Number-Cryptography-Graduate-Mathematics/dp/0387942939" rel="nofollow">https://www.amazon.com/Course-Number-Cryptography-Graduate-M...</a><p>Also, Boneh and Shoup is good and mentioned in other comments: <a href="https://toc.cryptobook.us/" rel="nofollow">https://toc.cryptobook.us/</a></p>
]]></description><pubDate>Fri, 27 May 2022 19:31:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=31533846</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=31533846</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31533846</guid></item><item><title><![CDATA[New comment by sweis in "How to have a billion dollar exit with zero capital gains tax"]]></title><description><![CDATA[
<p>You can't just base a business in a QOZ and call it a QOZB. It needs to generate 50% of its gross income from within the zone and 40% of its intangible property (e.g. software) must be used for business within a zone.<p>Further, there are restrictions on what kind of business it can be. It can't be, for example, a golf course or a liquor store.</p>
]]></description><pubDate>Tue, 10 May 2022 04:47:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=31323557</link><dc:creator>sweis</dc:creator><comments>https://news.ycombinator.com/item?id=31323557</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31323557</guid></item></channel></rss>