Follow

Computer Scientists Achieve ‘Crown Jewel’ of Cryptography.

A cryptographic tool called indistinguishability obfuscation has seemed too good to be true.

"A cryptographic protocol is only as secure as its assumptions, and previous attempts at iO were built on ultimately shaky foundations. The new protocol, depends on security assumptions that have been widely used and studied in the past."

By Kiel Mutschelknaus

quantamagazine.org/computer-sc

Paper

eprint.iacr.org/2020/1003.pdf

Sign in to participate in the conversation

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.