Articles

Computing on Secrets

Computing on Secrets

Services no longer need to see data to compute on it. Cryptographic and hardware primitives make that contract a deployed reality.

The Hard Part of Multi-Device Messaging

The Hard Part of Multi-Device Messaging

MIP-06 proposes the protocol basis for White Noise multi-device group membership, letting each device securely join as its own MLS leaf.

Inside Marmot: Six Specs That Make Private Group Messaging Work

Inside Marmot: Six Specs That Make Private Group Messaging Work

Six protocol specs define how the Marmot Protocol delivers fully encrypted group messaging on Nostr without centralized servers or metadata leaks.

The Problem They Said Could Not Be Solved

The Problem They Said Could Not Be Solved

The builders of the best encrypted messengers declared decentralized group encryption impossible. The Marmot protocol proved them wrong.

The Merchant's Return: When Systems Fail, Producers Prosper

The Merchant's Return: When Systems Fail, Producers Prosper

Being cast out of the system reveals its deepest secret: you were never its beneficiary, only its fuel. Freedom begins with this recognition.

The Cheapest Defense

The Cheapest Defense

Privacy blinds the adversary's OODA loop at observation. When defense costs pennies and attack costs millions, surveillance becomes unprofitable.

The Praxeology of Privacy ~ Chapter 14: Anonymous Communication Networks

The Praxeology of Privacy ~ Chapter 14: Anonymous Communication Networks

The internet leaks metadata. VPNs help locally. Tor distributes trust through relays. Mixnets defeat global adversaries. Choose tools matching your threat model.

The Praxeology of Privacy ~ Chapter 13: Cryptographic Foundations

The Praxeology of Privacy ~ Chapter 13: Cryptographic Foundations

Cryptography provides mathematical privacy foundations: encryption, hashing, and digital signatures enable trustless verification. Implementation bugs and human error remain the weakest links.

The Praxeology of Privacy ~ Chapter 12: The Crypto Wars

The Praxeology of Privacy ~ Chapter 12: The Crypto Wars

The Crypto Wars pit states against privacy technology. Mathematics ignores legislation. Developers face prosecution. The fundamental conflict is permanent and intensifying.

The Last Leak: How MIP-05 Closes the Push Notification Surveillance Hole

The Last Leak: How MIP-05 Closes the Push Notification Surveillance Hole

Push notifications let governments track your messaging habits. MIP-05 encrypts device tokens with ephemeral keys, ensuring notification servers learn absolutely nothing.

Know Your Enemy, Name Your Defenses

Know Your Enemy, Name Your Defenses

Good security engineering means naming your enemies. Marmot's threat model specifies exactly which adversaries it defeats and how it defeats them.

The Cypher Wars: Choose Your Weapon Wisely

The Cypher Wars: Choose Your Weapon Wisely

Use ChaCha20-Poly1305 everywhere without hardware AES. Use AES-256-GCM with AES-NI. Never reuse nonces. Prefer AEAD always.

Nostr-Native Distributed Storage System

Nostr-Native Distributed Storage System

The latest iteration of Garland, a privacy-preserving distributed storage system built on Nostr and Blossom, using erasure coding for durability and single-key recovery.

Garland: Exploring the Architecture

Garland: Exploring the Architecture

We're exploring an architecture for Garland: Cryptomator for encryption, Blossom for blob storage, Nostr for state. Your nsec becomes your Cryptomator password. We think this works - but we'd love your feedback before we commit.

Garland: Your Keys, Your Files, No Trusted Third Party

Garland: Your Keys, Your Files, No Trusted Third Party

Garland turns Blossom blob storage into a virtual drive on your device. Your Nostr key is your password. No accounts, no cloud lock-in.