Is there another post somewhere giving a general description of what you are doing?
Is there another post somewhere giving a general description of what you are doing?
Do you have a link about your messaging app? And PIR doesn’t conceal the existence of traffic, so it doesn’t seem like the right thing for messaging. It’s more for databases as the name implies. What exactly are you trying to do?
Were these algorithms reverse engineered and made public years ago anyway? I half remember something about that.
Haven’t read this yet but it looks significant. The attack relies on the presence of a fault so it’s not like every ssh key everywhere is broken. But the abstract says 100s of broken keys have been found.
“Thus we join television in leading people to kill thoughtlessly.”. --Emacs manual, in earlier days.
Ada would like a word with you ;)
Thanks, it’s late here now but I’ll try to look soon. I didn’t realize significant improvements over Goldberg etc al were really possible. I’ll try to understand that too.