#cryptography
39 items · 39 articles
Articles
Two Roads to a Network Without Permission: Reticulum and FIPS
Reticulum and FIPS both build permissionless encrypted meshes, but they differ radically in routing, crypto primitives, and their relationship to IP.
The Key Inside the Ciphertext: A Full Introduction to PIPEs v2
PIPEs v2 turns spend conditions into key-recovery conditions, letting Bitcoin enforce proof-gated authorization through ordinary Schnorr signatures and extraordinary off-chain cryptography.
Computing on Secrets
Services no longer need to see data to compute on it. Cryptographic and hardware primitives make that contract a deployed reality.
Every Crowd Hides You Differently
From Bitcoin CoinJoin to zero-knowledge proofs, every serious approach to financial privacy bets on a different crowd to disappear into.
The Hard Part of Multi-Device Messaging
MIP-06 proposes the protocol basis for White Noise multi-device group membership, letting each device securely join as its own MLS leaf.
The Third Court: Insurance, Arbitration, and the Private Production of Justice
Insurance prices risk, arbitration resolves disputes, restitution makes victims whole, and cryptographic enforcement binds them all into one complete system.
Inside Marmot: Six Specs That Make Private Group Messaging Work
Six protocol specs define how the Marmot Protocol delivers fully encrypted group messaging on Nostr without centralized servers or metadata leaks.
The Problem They Said Could Not Be Solved
The builders of the best encrypted messengers declared decentralized group encryption impossible. The Marmot protocol proved them wrong.
Sign What You Cannot See: A Field Guide to Blind Signatures
Four decades of blind signatures show that one algebraic trick, letting someone sign what they cannot see, protects ecash and CoinJoin.
Your Nostr Key Is Your Network Address
FIPS makes your Nostr npub a routable network address, unifying identity across social and infrastructure layers in a single self-sovereign keypair.
Verify Anyone on Any Channel
A simple challenge-response app can verify Nostr identities across any anonymous channel by querying the follow graph users already built.
The Mathematics That Bridges Bitcoin: From BitVM to Argo
Cryptographic enforcement succeeds where trust fails, and nowhere does this principle matter more than in Bitcoin's quest for trustless bridges.
The Algebra of Trust
Anonymous commerce requires solving the trust problem, and the solution may be to treat trust itself as a quantifiable, tradeable commodity.
The Cheapest Defense
Privacy blinds the adversary's OODA loop at observation. When defense costs pennies and attack costs millions, surveillance becomes unprofitable.
The Praxeology of Privacy ~ Chapter 21: Building the Parallel Economy
The parallel economy grows through counter-economics. Cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers. Build. Trade. Resist.
The Praxeology of Privacy ~ Chapter 19: Operational Security
Operational security prevents adversaries from gathering compromising information. Threat modeling guides defense. Human factors are the weakest link. Perfect OPSEC is impossible.
The Praxeology of Privacy ~ Chapter 16: Zero-Knowledge Proofs
Zero-knowledge proofs enable verification without disclosure. SNARKs, STARKs, and Bulletproofs make different tradeoffs. Deployed in Zcash and rollups; broader adoption developing.
The Praxeology of Privacy ~ Chapter 14: Anonymous Communication Networks
The internet leaks metadata. VPNs help locally. Tor distributes trust through relays. Mixnets defeat global adversaries. Choose tools matching your threat model.
The Praxeology of Privacy ~ Chapter 13: Cryptographic Foundations
Cryptography provides mathematical privacy foundations: encryption, hashing, and digital signatures enable trustless verification. Implementation bugs and human error remain the weakest links.
The Praxeology of Privacy ~ Chapter 12: The Crypto Wars
The Crypto Wars pit states against privacy technology. Mathematics ignores legislation. Developers face prosecution. The fundamental conflict is permanent and intensifying.
The Praxeology of Privacy ~ Chapter 5: The Axiom of Resistance
The Axiom of Resistance assumes systems can resist control. Mathematics, empirical evidence, and similar systems support this well-grounded but non-self-evident assumption.
The Praxeology of Privacy ~ Preface
Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both to make the state irrelevant.
Trust Without Ceremonies: How Nostr Fixed the Web of Trust
PGP's web of trust failed because it demanded explicit rituals. Nostr succeeds by extracting trust from ordinary social behavior.
The Trust Shift: Secure Enclaves for Private Nostr Relays
TEE relays shift trust from operators to chip manufacturers. For most threats, that trade is worth making, with eyes open.
The Gap Between PIR and Nostr: Open Problems in Private Relay Queries
Can PIR hide Nostr queries from relays? Compound filters and subscriptions don't map to existing schemes. Here are the open problems.
The Last Leak: How MIP-05 Closes the Push Notification Surveillance Hole
Push notifications let governments track your messaging habits. MIP-05 encrypts device tokens with ephemeral keys, ensuring notification servers learn absolutely nothing.
The Great Decentralization Swindle: How Every Protocol But One Betrays Its Promise
The decentralized social landscape is littered with protocols that centralize through the back door. Nostr alone eliminates trusted third parties entirely, making it the only protocol where your identity truly belongs to you.
The Cypher Wars: Choose Your Weapon Wisely
Use ChaCha20-Poly1305 everywhere without hardware AES. Use AES-256-GCM with AES-NI. Never reuse nonces. Prefer AEAD always.
Nostr-Native Distributed Storage System
The latest iteration of Garland, a privacy-preserving distributed storage system built on Nostr and Blossom, using erasure coding for durability and single-key recovery.
When Math Catches Your Typos
Bech32's BCH code detects up to 4 typos with 100% certainty, locates up to 2 error positions, but deliberately refuses to auto-correct to prevent catastrophic mistakes.
Proving You Belong Without Saying Who You Are
Zero-knowledge proofs let Nostr users prove they're trusted without revealing their identity, enabling anonymous rate-limiting and reputation-gated relay access.
Counting Grains of Sand in an Infinite Universe: Why CoinJoin Privacy Doesn't Need Perfect Math
Coinjoin entropy becomes computationally impossible to calculate exactly for large transactions, but lower-bound estimates provide rigorous cryptographic guarantees through information theory.
Garland: Exploring the Architecture
We're exploring an architecture for Garland: Cryptomator for encryption, Blossom for blob storage, Nostr for state. Your nsec becomes your Cryptomator password. We think this works - but we'd love your feedback before we commit.
Sifting Through the Archive: Private Set Membership for Blossom
Binary Fuse filters let Blossom clients privately check which files exist on a server - download a compact filter once, query locally with zero server load, and use delta lists for real-time accuracy.
Private Relay Connections: Zero-Knowledge Solutions for Nostr
Nostr relays see everything - who connects, what they fetch, how often they post. Zero-knowledge cryptography can fix all three problems: Semaphore-based authentication hides which whitelisted user is connecting, private information retrieval hides which notes you're fetching, and Privacy Pass enables rate limiting without identity linkage.
Owned by No One: Solving Nostr's Key Rotation Problem
Nostr's greatest strength - that you own your identity through cryptographic keys - becomes its greatest weakness when keys are lost or stolen. This post introduces two simple, social solutions that let users mark compromised keys and rotate to new ones through community verification, without complex cryptography or pre-planning.
The Gossip Vulnerability: Why NIP-17's "Deniable" Messages Aren't
NIP-17 promises deniable messaging with its three-layer design: an unsigned "rumor," a signed "seal," and an ephemeral "gift wrap." However, this setup has a hidden vulnerability. The signed seal allows recipients to prove that a message was sent by the claimed author, even without revealing the content. This creates a perfect scenario for gossip attacks, where the mere proof of communication can damage reputations. As we explore NIP-17, we find that the rumor, despite being unsigned, is not as deniable as it seems, making it a potential risk for exposure.
Bitcoin Address Lookup: A Question of Privacy
Bitcoin wallets face a fundamental tradeoff: how to discover your transactions without revealing your addresses. Full nodes (2009) provide perfect privacy by downloading everything but require ~700 GB storage. Electrum (2011) achieves instant sync by transmitting your addresses directly to servers, exposing your complete transaction history. Block filters (2017-2019) restore privacy through client-side filtering - you download compact filters, check them locally, and only request matching blocks, revealing just block-level interest. Utreexo (2019) compresses the UTXO set from 11 GB to 480 bytes using cryptographic accumulators while maintaining full-node privacy, but requires 20% more bandwidth. Each approach trades privacy, storage, bandwidth, and convenience differently.
Summary of: The Praxeology of Privacy ~ Economic Logic in Cypherpunk Implementation
A book explaining why Privacy = Economic necessity proven through Austrian logic. Three axioms (Action + Argumentation + Resistance) demonstrate that surveillance destroys market calculation like socialist planning, while cryptography restores conditions for voluntary coordination. Complete bridge between Austrian economics and cypherpunk technology.