Matthew Green (@matthew_d_green) 's Twitter Profile
Matthew Green

@matthew_d_green

I teach cryptography at Johns Hopkins. Mastodon at [email protected] and BlueSky at matthewdgreen.bsky.social. Bluecheck not my decision ;)

ID: 106234268

linkhttp://blog.cryptographyengineering.com calendar_today18-01-2010 22:45:09

85,85K Tweet

152,152K Followers

1,1K Following

Bryan Steele 🦋 (@canadianbryan) 's Twitter Profile Photo

Support for AMD SEV encrypted memory guests in #OpenBSD vmm(4)/vmd(8) is now enabled in -current! 😎 This follows kernel SEV guest mode support added to ccp(4) in July, later split off into a new psp(4) driver. marc.info/?l=openbsd-cvs…

Patrick Breyer #JoinMastodon (@echo_pbreyer) 's Twitter Profile Photo

🇬🇧New EU #ChatControl proposal leaked +++ Governments to position themselves by 23 September, will be very tight... +++ Will messenger services be blocked in Europe? patrick-breyer.de/en/new-eu-push… Help pressure your government now to defend privacy and secure encryption:

Matthew Green (@matthew_d_green) 's Twitter Profile Photo

I see a lot of people who don’t think cryptocurrency tech will go anywhere for various technological reasons. I think betting against technology improvements is usually a bad bet.

Matthew Green (@matthew_d_green) 's Twitter Profile Photo

Vainius I. 🇱🇹🇺🇦 The “known” part has a lot of problems. But the proposal is fairly clear that they’re only doing known CSAM temporarily because they’ve admitted don’t have a clue how to run classifiers with secret models. They still clearly want to do this, and “grooming” conversations.

<a href="/taxofonas/">Vainius I. 🇱🇹🇺🇦</a> The “known” part has a lot of problems. But the proposal is fairly clear that they’re only doing known CSAM temporarily because they’ve admitted don’t have a clue how to run classifiers with secret models. They still clearly want to do this, and “grooming” conversations.
Matthew Green (@matthew_d_green) 's Twitter Profile Photo

Vainius I. 🇱🇹🇺🇦 In other words, this is just a work in progress. The goal is to make the legal and architectural changes that require scanning of private encrypted messages. Later you can easily update the law and code that does the scanning to change how it works & what content it scans for.