Antibiotic resistant MRSA kills thousands of people a year in the US. The idea that he went to the hospital with pneumonia and then contracted antibiotic resistant MRSA from the hospital environment is very plausible.
SETI received ~$28m in donations and contributions in 2022, according to their tax filings [1]
As mentioned in the press release, contribution will be used at least in part as an endowment, providing perpetual funding for ongoing programs.
Also, it is my understanding that large philanthropic gifts, particularly from estates, often come in the form of non-cash assets such as stocks or other financial instruments. So probably not a $200m check, but a very nice nest egg to fund SETI projects for decades to come.
Most of Comcast’s internet is exchanged through transit-free peering agreements, so only about 1% of Comcast’s outbound traffic requires them to pay for IP transit. And that traffic is mainly overseas, so Comcast is effectively a Tier 1 network in the US. Which means their customers’ outbound traffic doesn’t cost them anything.
For most last-mile ISPs, peering isn’t a revenue source. Small ISPs have to pay for peering and IP transit, and large ISPs have transit-free peering agreements with most, if not all, of the internet.
However, large ISPs that enjoy regional monopolies can refuse to upgrade connections with peered networks in an attempt to force the content providers sending traffic over the peered network to instead peer directly with the ISP.
This tactic is really only feasible for ISPs who have captive customers that are unable to switch to another ISP, as the negotiation process requires the ISP to allow the service it is providing to its actual customers to degrade to such an extent that the content provider is forced to peer directly with the ISP.
US Internet (private fiber ISP in the Twin Cities) is an anomaly, not the norm. Minneapolis is incredibly lucky to have a local, private ISP that offers fiber to the home at up to 10 gigabit/s. The only other ISPs in the US that I know offer similar services are either municipal ISPs, co-ops, or Google Fiber.
Cincinnati, Ohio has Altafiber (formerly Cincinnati Bell) that offers 2gbps down 1gbps up for $80/mo. I have it and it’s amazing.
Cincinnati Bell was early to roll out DSL too. Went to college here in the late 90s and had a mind blowing 768kbps. I could watch RealVideo at 640x480!
Is it? Can you summarize it? I'm asking seriously.
This is not his style, for what it's worth, at least not for standalone long-form writing. His most influential cryptography writing is concise and lucid.
In between a bunch of conspiratorial hinting, djb argues that KYBER-512 is weaker than NIST claims.
To make that argument, he points out a fairly egregious math mistake (the whole "2^40+2^40" bit) and then shows that NIST was inconsistent in applying the rules of the contest it refereed.
He also offers an explanation for why NIST would be so inconsistent about it, namely that they were influenced to pick KYBER, even if it wasn't the best candidate.
--
My personal takeaway was that he was both being a sore loser but also that KYBER-512 is weaker than it should be, weaker than it is claimed to be and that for some reason NIST still wanted it to win.
Makes me skeptical about KYBER-512 (but not larger sizes) and reinforces my worry that NIST can be influenced to pick less-than-optimal algorithms.
But then, I'm not a cryptographer and in the lucky situation where for any application I encounter, I can just go for KYBER-768 or 1024 or NTRU and just be fine - I don't have to understand this situation perfectly.
Hope you get some value from this outside perspective.
I’ve not followed the PQC competition very closely, but I don’t think djb’s arguments significantly impact whether you should use KYBER-512. From my reading, as someone with a decent amount of crypto knowledge, all the evidence suggests that it is more than secure enough. The rest of the stuff is at the level of “submit an erratum”, not “omg cancel the whole thing”.
If anything, this reinforces my belief that KYBER is a good design. If this is the best he can come up with to try and discredit it, then it must be pretty solid.
The last part I agree with - clearly KYBER isn't trivially broken if this is the best he can come up with.
What doesn't seem clear to me, and I'd appreciate if you could tell me why you think differently, is that KYBER-512 isn't as strong as it was targeted to be. I find djb's argument on this narrow point fairly convincing: KYBER-512 isn't as secure as AES-128 (by the methods used to measure "secure" in this competition).
Given that I already generally use AES-256, why shouldn't I treat this the same way as AES-128?
That is, "it's probably fine-ish, but if you have the power, just go one bigger".
It’s possible that in the specific sense that NIST defined, KYBER-512 isn’t as strong as AES-128. However, that doesn’t mean that it’s less secure in general. E.g. DJB himself wrote a good article[1] on how even though 128-bit AES and 256-bit elliptic curve crypto are thought of as same “security level”, actually there are attacks against AES that just don’t apply to ECC when you consider multi-target security models (i.e., when you consider a population of users not just one). I wouldn’t be surprised if similar things applied to lattice-based crypto, but I don’t know enough about it. And even if we take the reduced security level given by DJB, it still seems big enough to be out of reach to any realistic attack.
But by all means feel free to go one bigger and pick KYBER-768, and I believe lots of people do recommend this. Obviously, there is a performance penalty (as there is when moving from AES 128 to 256), and for PQ schemes there is also more importantly also a big increase in the size of bytes on the wire when public keys have to be exchanged (e.g. in TLS) - in this case a jump from 800 bytes to 1,184 bytes (a 48% increase). (Compare this to ECC public keys which are typically around 32-65 bytes, depending on encoding).
First off, thanks for the reply. It has since been pointed out to me elsewhere that there are now responses showing his central claim of a maths error to be false, which means all of this is now moot - KYBER is as secure as claimed.
It has also been pointed out to me that djb has been quietly ignoring another metric in which KYBER beats NTRU: implementation complexity.
Even accepting all other arguments about the tradeoffs between NTRU and KYBER (and I do take your point about size of keys being more important than CPU cycles), even then, KYBER is judged to have lower implementation complexity.
Having read about all the crypto libraries who produced broken output because they made a mistake in the implementation, that's something I immediately understand as a big benefit.
Again, thanks for the conversation and helping me understand!
There's a valid point to be made about selecting key exchange parameters to match bulk encryption parameters, but before you gear up to make a stink about it, bear in mind that it's generally the case in modern cryptosystems (that aren't specifically designed to do that matching) that key exchange security levels are lower than those of block ciphers. The step functions for key exchange security levels are pretty abrupt, and you pay a pretty high price to select the next one up, so aiming for "roughly the vicinity" of 128 bits is pretty normal.
The gist as I understand it is: NIST tilted the playing field repeatedly so that their favorite would win, and their favorite is not the best new candidate and not even better than existing systems.
Re: style, this seems longer and more rambling than usual, but other stuff on his blog has been long, and his style with lots of background, asides, references, self-quotes seems pretty distinctive, isn't it?
But I'm sure you paid more attention to this than me.
Not exactly sure if explicitly declared output of the Kagi Universal Summarizer is allowed (will delete again if not, but I did not see a guideline for it), but I think this could be a start sparking further curiosity. (I don't know how accurate the output is, as I am not a domain expert in PQC or cryptography in general, for that matter)
Kagi Universal Summarizer output for "Summary":
This web page discusses the selection of the Kyber and NTRU cryptosystems as the quantum-resistant digital signature algorithms by the National Institute of Standards and Technology (NIST). It analyzes NIST's claims about the security levels of Kyber-512 compared to AES-128. While NIST argued Kyber-512's security level is boosted enough by memory access costs to meet the AES-128 threshold, the text raises uncertainties around accurately modeling such costs and argues NTRU may have advantages in flexibility and performance. Overall, the page questions whether NIST fully justified selecting Kyber-512 over NTRU given the uncertainties in quantifying the security of lattice-based cryptosystems against future attacks.
Kagi Universal Summarizer output for "Key moments":
- There is debate around whether Kyber-512 provides adequate security compared to the AES-128 benchmark. NIST claims it meets this level factoring in memory access costs, but others argue the analysis is uncertain.
- NIST's analysis added 40 bits of estimated security to Kyber-512's post-quantum security level due to memory costs, bringing it above the AES-128 threshold. Critics question this calculation.
- NTRU provides greater flexibility than Kyber in supporting a wider range of security levels. At some levels it also has better performance and security than Kyber options.
- The security of lattice-based cryptosystems like Kyber and NTRU is not fully understood, and there is a risk of better attacks being discovered in the future.
- Standardizing a system like Kyber-512 that may have limited security margin could be reckless given lattice cryptanalysis uncertainties.
- Critics argue NIST has not clearly explained its security evaluations and claims about Kyber-512's margin above AES-128.
- Memory access costs are important to lattice security but are not fully quantified in their impact on Kyber versus classical attacks on AES.
- Removing Kyber-512 could make NTRU the strongest candidate given its flexibility at multiple security levels.
- One paper argued multi-ciphertext attacks on Kyber may be as difficult as single-ciphertext attacks.
- There are calls for NIST to be transparent about its analysis and decision making regarding Kyber-512.
I don’t think this contributes to the conversation. There is clearly social context to this situation and copy pasting a machine-generated summary is no more helpful than reading the article at face value.
my thinking was that someone with domain expertise could identify if the summary and key takeaways make sense and furthermore if the accusations have merit.
anyways, it seems i cannot delete the comment, so would be great if a moderator or something could do it, thanks.
MDMA was first synthesized in 1912 by Merck. Merck and US Army did several animal trials in the 1950s, but by the end of the decade MDMA was shelved and thought to have no therapeutic benefit. It wasn’t until Sasha Shulgin rediscovered it in 1976 that its therapeutic benefits were discovered, at which point therapists and psychiatrists began quietly using it for psychedelic assisted psychotherapy. In July 1984 the DEA proposed making MDMA a Schedule I controlled substances, which led to outcry from practitioners who requested the DEA hold hearings to provide testimony on MDMA’s therapeutic benefits. While these hearings were ongoing, the DEA used its emergency scheduling authority in May of 1985 to place MDMA in Schedule I.
Animal efficacy and human safety trials of MDMA began in the late 1980s, and the first FDA-approved, placebo controlled, double blind phase I study was published in 1996.
PBS is a private company that receives very little funding from the public, and is mostly funded by local stations which in turn are funded through donations.
BBC is funded through an annual Television license fee, and supplemented through international distribution.
While US Public Television (largely PBS affiliates) and BBC have similar goals, fill a similar role. They're very different. Though maybe what you meant was that this is as close to BBC as the US has...
If someone is already in the middle of no where, 2.4 GHz congestion isn’t a problem for them.
I’m always for more unlicensed spectrum.
But I strongly disagree with your distaste for the FCC’s reverse auctions of spectrum. Wireless Spectrum is a limited public resource and an auction is a much better way to allocate it than to have those same companies instead hire lobbyists to try to convince the FCC to allocate that spectrum to them.
> But I strongly disagree with your distaste for the FCC’s reverse auctions of spectrum. Wireless Spectrum is a limited public resource and an auction is a much better way to allocate it than to have those same companies instead hire lobbyists to try to convince the FCC to allocate that spectrum to them.
There has to be a better way than to allocate spectrum to any one company and give them the rights to buy and sell this spectrum for ninety nine years.
If the government needs money, raise taxes!
I am not saying big telco should get wireless spectrum allocation for free.
I am saying nobody should get wireless spectrum allocation at all.
At least not in the way we currently do things.
If we really need money so much, why not put billboards left, right, and center all over our interstate highways?
Why not let companies sponsor the Washington Monument, the White House, and the US Capitol?
Lets have an auction and let the highest bidder paint these buildings with whatever they see fit.
Why not give all our federal land to Monsanto for a ninety nine years lease?
/s
Sorry for yelling.
I feel very strongly about this.
I don't have a solution to how we can allocate spectrum better than an auction.
The best I can think of is reduce the number and amount of licensed spectrum.
I want there to be something left in the wireless spectrum when in maybe a few decades hopefully future humans will have a little bit more brains than us come up with a better way to allocate spectrum.
Just to be clear, I am not arguing for repealing Highway Beautification.