"Pest" v. 0xFB.

This is a continuation of “Pest” v. 0xFC. This is the heaviest revision of the spec to date, approaching a total rewrite. Pedantic details concerning data types and their encodings were added; several algorithms have been reworked and substantially simplified; and a number of ugly gaffes — corrected. There is a pretty-printed mirror of this […]

"Pest" v. 0xFC.

This is a continuation of “Pest” v. 0xFD. There are currently two published prototype implementations of Pest: “Blatta” (by thimbronion); and “smalpest” (by jonsykkel). Thank you, prototype implementers! A quite lively Pestnet is now active, and a public log thereof, operated by billymg (WOT) may be seen here. There is a working draft of v. […]

"Pest" v. 0xFD.

This is a continuation of “Pest” v. 0xFE. There is a pretty-printed mirror of this page. There is now a prototype! (Thank you, thimbronion!) 14 Dec 2021: And there is now a second prototype! (Thank you, jonsykkel!) There is a working draft of v. 0xFC. (Note: it may change without warning!) The document (very much […]

"Pest" v. 0xFE.

This is a continuation of “Pest” v. 0xFF. Edit: A note for the innocent — this series of articles concerns an algorithm! It is not, at the time of writing, fully implemented anywhere! There is now a prototype! (Thank you, thimbronion!) Or even entirely complete. Edit: There is a working draft of v. 0xFD. (Note: […]

"Pest" v. 0xFF.

What follows is a long-promised detailed specification of a DDOS-proof, CPU-inexpensive, ciphered-authenticated peer-to-peer communication protocol. I would like to thank Thimbronion for implementing a large subset of this spec already despite not having seen it yet! The document (very much a work in progress!) is available as a vtree. You will need: A V-tron. If […]

How to Make Your Own Lamport Parachute from Common Household Materials.

The thought began, as many good things begin, in #trilema. Users of the WOT, of V, and other systems where your cryptographic identity is wholly in your own hands1 live with a certain risk of “cryptographic death” – i.e. the compromise of one’s signing key. A conscientious user of public key crypto might keep the […]

Vectored Signatures, or the Elements of a Possible V-Algebra.

Once upon a time (in August of ’15, to be exact) I wrote a very simple versionatron called ‘V’. Edit: See also Ben Vulpes’s excellent introduction to V. V is a carefully-designed poison against the scurrying little vermin who feed on the proverbial ‘fear, uncertainty, and doubt.’ For readers who are not in the little […]

Practical Blockchain Telegraphy.

Mircea Popescu writes: ‘Now making an irc channel is quite the pleasant experience : you create something out of nothing, get to name it and are now the boss of it. For a generation devoid of proper “empire building” avenues, this is about as cool as it gets. So you can do anything you wish, […]

You are Bad at Entropy.

Presenting a very old game, entitled: Man vs. Machine. Or, why Man is not a Particularly Good Source of Entropy.

Phuctor: Fun with Public-key Cryptography.

All of my readers are invited to test the security of their GPG public keys using a new and very simple online tool: “Phuctor” (part of a long-term collaborative project with Mircea Popescu.) Phuctor is based on cutting-edge Ancient Greek technology. Engine now re-written, using GMP. Roughly 100-fold speed boost! The service is now essentially […]