Ideas and Execution
I’ve been known to blog about ideas that I don’t have the time or energy to build myself–from using asynchronous ratcheting trees to support multicast networking in WireGuard (and other Noise-based...
View ArticleThe Better Daemons Of Our Profession
I’ve spent the better part of 2023 and 2024 trying to imagine the specific changes we technology nerds could make to improve things somewhat. Meme remix of Matt Bors’s comic and Stan Kelly’s Sickos...
View ArticleRoasted Christmas Spam from Muhu.ai
I wrote what I thought would be the final blog post of 2024 last week, and was looking forward to starting 2025 strong with a blog I’d been drafting since July 2023. But then, a little after Midnight...
View ArticleCollatzeral Damage: Bitwise and Proof Foolish
Let’s talk about the Collatz Conjecture, which is like mathematicians’ original version of this programmer joke: Except the number of mathematician hours wasted is much larger, possibly too large for...
View ArticleDon’t Use Session (Signal Fork)
Last year, I outlined the specific requirements that an app needs to have in order for me to consider it a Signal competitor. Afterwards, I had several people ask me what I think of a Signal fork...
View ArticleSession Round 2
Last week, I wrote a blog post succinctly titled, Don’t Use Session. Two interesting things have happened since I published that blog: A few people expressed uncertainty about what I wrote about using...
View ArticleToo Many People Don’t Value the Time of Security Researchers
It’s really not my place to ever command respect from anyone; and that’s not just because I’m a furry–which has always been towards the bottom of the geek hierarchy. I am well aware how little weight...
View ArticleHell Is Overconfident Developers Writing Encryption Code
Overconfident developers that choose to write their own cryptography code have plagued the information security industry since before it was even an industry. This in and of itself isn’t inherently a...
View ArticleReviewing the Cryptography Used by Signal
Last year, I urged furries to stop using Telegram because it doesn’t actually provide them with any of the privacy guarantees they think it gives them. Instead of improving Telegram’s cryptography to...
View ArticleShaming Isn’t Shielding: The Moral Panics That Cry Wolf
Content Warning: This blog post talks about adult themes and sexuality. If you’re under 18, sit this one out. If you’ve been around the furry fandom for a while, you will notice that discourse tends...
View ArticleOn The Insecurity of Telecom Stacks in the Wake of Salt Typhoon
Towards the end of last year, we learned that a group (allegedly affiliated with the Chinese government, referred to as “Salt Typhoon”) breached T-Mobile and other telecommunications companies and...
View ArticlePost-Quantum Cryptography Is About The Keys You Don’t Play
(With severe apologies to Miles Davis.) Post-Quantum Cryptography is coming. But in their haste to make headway on algorithm adoption, standards organizations (NIST, IETF) are making a dumb mistake...
View ArticleThe Practical Limitations of End-to-End Encryption
Internet discussions about end-to-end encryption are plagued by misunderstandings, misinformation, and some people totally missing the point. Of course, people being wrong on the Internet isn’t...
View ArticleThe Authenticity Drought
The types of people that proudly call themselves “influencers,” and describe what they create merely as “content,” are so profoundly allergic to authenticity that it bewilders the mind. Don’t believe...
View ArticleRetrospective: Five Years Blogging About Cryptography as a Gay Furry Online
The history of this blog might very well be a cautionary tail (sic) about scope creep. AJ The Original Vision For Dhole Moments Originally, I just wanted a place to write about things too long for...
View ArticleTech Companies Apparently Do Not Understand Why We Dislike AI
It’s becoming increasingly apparent that one of the reasons why tech companies are so enthusiastic about shoving AI into every product and service is that they fundamentally do not understand why...
View ArticleWhat Does It Even Mean To Be “Great” Anyway?
I normally don’t like writing “Current Events” pieces (and greatly prefer focusing on what SEO grifters like to call “evergreen content”), but I feel this warrants it. Content warning: Violence,...
View ArticleFurries Need To Learn That Sunlight Is The Best Disinfectant
Next month, AMC+ is premiering a new series about furries that tracked down sexual abusers hiding within the furry fandom. You can watch the trailer for this below. And I do recommend watching the...
View ArticleChecklists Are The Thief Of Joy
I have never seen security and privacy comparison tables (henceforth referred to simply as “checklists” for brevity) used for any other purpose but deception. After pondering this observation, I’m...
View ArticleJurisdiction Is Nearly Irrelevant to the Security of Encrypted Messaging Apps
Every time I lightly touch on this point, I always get someone who insists on arguing with me about it, so I thought it would be worth making a dedicated, singular-focused blog post about this topic...
View Article