Pieter Wuille's Avatar

Pieter Wuille

@pwuille.bsky.social

122 Followers  |  48 Following  |  10 Posts  |  Joined: 23.01.2025  |  1.4342

Latest posts by pwuille.bsky.social on Bluesky


Preview
Traueranzeigen von Claus Peter Schnorr | mittelhessen-gedenkt.de Besuchen Sie die Gedenkseite von Claus Peter Schnorr. Lesen Sie die Traueranzeige und gedenken Sie des Verstorbenen mit einer Kerze oder Kondolenz.

I just learned that Claus Schnorr passed away last June, aged 81 β€” a significant loss for the cryptographic community: mittelhessen-gedenkt.de/traueranzeig...

31.07.2025 08:30 β€” πŸ‘ 18    πŸ” 3    πŸ’¬ 0    πŸ“Œ 1
I Saved a PNG Image To A Bird
YouTube video by Benn Jordan I Saved a PNG Image To A Bird

Holy shit. This guy saved a PNG to a bird.

(he drew a bird into a spectrogram, played that sound to a starling, and the starling reproduced it back to him with enough accuracy he got his bird drawing back in their call's spectrogram) www.youtube.com/watch?v=hCQC...

28.07.2025 15:25 β€” πŸ‘ 4385    πŸ” 1367    πŸ’¬ 106    πŸ“Œ 328

ln(πŸ˜…) = πŸ’§ln(πŸ˜„)

21.07.2025 11:09 β€” πŸ‘ 537    πŸ” 137    πŸ’¬ 4    πŸ“Œ 7

They have a superb metal detector inside already.

21.07.2025 03:32 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Abstract. As of November 2021, Bitcoin supports β€œTaproot” spending policies whose on-chain format is a single elliptic curve point. A transaction spending the funds associated with a Taproot policy can be authorized by interpreting the curve point either (a) as a public key of the Schnorr signature scheme and providing a suitable signature, or (b) as a commitment to alternative spending conditions and satisfying those. Since a sufficiently powerful quantum adversary would be able to forge Schnorr signatures, an upgrade to Bitcoin may, at some point in the future, disable the ability to spend existing funds via Schnorr signatures in order to prevent the havoc created by leaving a large fraction of the currency supply prone to theft. However, to avoid irrevocably losing all funds not migrated in time to (yet to be added) post-quantum signature schemes, it will be desirable for an upgrade disabling Schnorr signatures to retain the ability to spend funds by interpreting the curve point in a Taproot policy as a commitment to alternative spending conditions. This paper justifies such an upgrade strategy by demonstrating the post-quantum security of Taproot as a commitment scheme. Specifically, it provides concrete upper bounds on the probability that a quantum adversary making some number of queries to a quantum random oracle can break the binding or hiding property. Since the bounds follow from powerful existing results, which enable reasoning as if dealing with a classical adversary, the proofs are accessible without a background in quantum computing.

Abstract. As of November 2021, Bitcoin supports β€œTaproot” spending policies whose on-chain format is a single elliptic curve point. A transaction spending the funds associated with a Taproot policy can be authorized by interpreting the curve point either (a) as a public key of the Schnorr signature scheme and providing a suitable signature, or (b) as a commitment to alternative spending conditions and satisfying those. Since a sufficiently powerful quantum adversary would be able to forge Schnorr signatures, an upgrade to Bitcoin may, at some point in the future, disable the ability to spend existing funds via Schnorr signatures in order to prevent the havoc created by leaving a large fraction of the currency supply prone to theft. However, to avoid irrevocably losing all funds not migrated in time to (yet to be added) post-quantum signature schemes, it will be desirable for an upgrade disabling Schnorr signatures to retain the ability to spend funds by interpreting the curve point in a Taproot policy as a commitment to alternative spending conditions. This paper justifies such an upgrade strategy by demonstrating the post-quantum security of Taproot as a commitment scheme. Specifically, it provides concrete upper bounds on the probability that a quantum adversary making some number of queries to a quantum random oracle can break the binding or hiding property. Since the bounds follow from powerful existing results, which enable reasoning as if dealing with a classical adversary, the proofs are accessible without a background in quantum computing.

Image showing part 2 of abstract.

Image showing part 2 of abstract.

The Post-Quantum Security of Bitcoin’s Taproot as a Commitment Scheme (Tim Ruffing) ia.cr/2025/1307

19.07.2025 06:43 β€” πŸ‘ 1    πŸ” 2    πŸ’¬ 0    πŸ“Œ 1
Preview
Wormhole - Simple, private file sharing Wormhole lets you share files with end-to-end encryption and a link that automatically expires.

Now that WeTransfer is training its "A.I." on your files, I recommend using wormhole - which is end-to-end encrypted wormhole.app

15.07.2025 11:56 β€” πŸ‘ 39    πŸ” 12    πŸ’¬ 4    πŸ“Œ 0

Looking back at the dates on which I received 2FA emails: june 6, 8, 8, 9, 10, 12, 15, 16, 18, 20, 21, 26, 29. Then I stayed logged out until july 12. No reset since, maybe it's fixed... fingers crossed.

14.07.2025 18:17 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Replication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dog This paper presents implementations that match and, where possible, exceed current quantum factorisation records using a VIC-20 8-bit home computer from 1981, an abacus, and a dog. We hope that this ...

One of my students sent me the latest quantum factorization record, and I have to admit: I’m shook. eprint.iacr.org/2025/1237

13.07.2025 14:53 β€” πŸ‘ 66    πŸ” 21    πŸ’¬ 8    πŸ“Œ 7

Once a month? That sounds amazing.

The app logs me out randomly every 1-3 days or so. I usually don't bother logging back in for a week each time...

13.07.2025 00:11 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 2    πŸ“Œ 0
Preview
Linux Containers - LXD - Has been moved to Canonical The umbrella project behind Incus, LXC, LXCFS, Distrobuilder and more.

I think this is the reason: linuxcontainers.org/lxd/

04.05.2025 14:04 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

"If you want to prompt ChatGPT 40 times, you can just stop your shower 1 second early."

"If I choose not to take a flight to Europe, I save 3,500,000 ChatGPT searches. this is like stopping more than 7 people from searching ChatGPT for their entire lives."

29.04.2025 15:31 β€” πŸ‘ 84    πŸ” 23    πŸ’¬ 2    πŸ“Œ 1
Preview
Bitcoin Mining Centralization in 2025 This post explores Bitcoin Mining Centralization in 2025 by looking at the hashrate share of the current five biggest mining pools. It presents a Mining Centralization Index and updates it with the as...

In the current Bitcoin mining landscape with proxy pools like AntPool & friends, 6 mining pools produce and mine more than 95% of the block templates.

Bitcoin mining is highly centralized today.

b10c.me/blog/015-bit...

15.04.2025 14:48 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Post image

BREAKING.

From a reliable source. MITRE support for the CVE program is due to expire tomorrow. The attached letter was sent out to CVE Board Members.

15.04.2025 17:23 β€” πŸ‘ 681    πŸ” 416    πŸ’¬ 37    πŸ“Œ 202

Base85 IPv6 addresses? Why have I never heard of this, and which browsers support it?

11.04.2025 02:06 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Dare I ask what prompted this observation?

21.03.2025 18:49 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Don't move around a lot? How do you deal with the 230 km/s speed of the keys around the center of the galaxy?

16.02.2025 13:50 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Wait, so how do you know what buttons to press?

15.02.2025 15:43 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Your keyboard doesn't have a built-in autopilot?

15.02.2025 15:35 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

There is a zero knowledge joke here somewhere.

11.02.2025 01:31 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@pwuille is following 20 prominent accounts