Settings

Theme

The Generational Transition to Programmable Cryptography

0xparc.org

48 points by newsreaderguy a year ago · 9 comments

Reader

thadt a year ago

> Example applications of the Universal Protocol:

> ...your smartphone can generate a cryptographically secure response to any query about your financial history or health, while keeping your underlying data private and in your own control.

My kids love playing '20 questions'. It's rather remarkable how fast you can go from knowing nothing, to very specific information. With a few answers to 'any query' about your financial history or health, your underlying data will be neither private, nor in your control.

  • Vecr a year ago

    Yes, this is not statistically well thought out. See Death Note: L, Anonymity & Eluding Entropy (yes it's about a cartoon, but read it for the math).

    https://gwern.net/death-note-anonymity

    Also see the 2020 census statistical calculations and the tradeoffs they made.

    There's "not that many" (compared to the number of ChaCha20 keys, for example) humans in the world, it does not take that many fractional-bit information leaks to get a good read on a person.

ur-whale a year ago

This article is pretty far out, but definitely worth a read.

Cryptography is one of these subjects that initially seems interesting in terms of how it works but rather boring in terms of what it does.

But then the more you learn about it, the more you discover how deep the rabbit hole of applications actually is.

This article does a pretty good job of exposing you to how deep the topic of cryptography applications potentially is.

winternewt a year ago

I hear about advanced crypto schemes like this every couple of years but I have yet to see a concrete, practical implementation of it. Is there any software library that will let me perform arbitrary arithmetic on encrypted data without knowing the key, for example?

eximius a year ago

While there is a certain exciting aspect to this in the same vein as any cyberpunk dystopia might have, it also sounds exceedingly wasteful.

The security properties are interesting but largely overshadowed by economic forces. Things become centralized because they're cheaper and easier for users.

If this system existed, it would have to have _such a good user experience_ to overcome its many inefficiencies.

i2km a year ago

The adoption of advanced cryptography has struggled for decades. It’s a long-running cause of frustration to cryptographers, i.e. “why do we keep on developing more and more advanced schemes yet the real world doesn’t use them?”

This sentiment runs through this piece as an undercurrent.

Part of the frustration comes from the fact, which is emphasised throughout the piece, that all these things are possible in real life. The utopia of autonomous MPC and ZK agents running obfuscated programs to prove identity attributes, vote, etc is all possible, if only we rewrite the entire internet.

The stumbling block, as ever, is human nature. This utopia would decay in just the same way that the bitcoin utopia did, moving from a perfect libertarian idea for an incorruptible currency to a cesspit of fraud, manipulation and speculation.

In Moxie Marlinspike’s article on web 3, he makes the case that the decentralisation promises of web 3 will inevitably decay and be reshaped as a new form of centralisation, leaving us in a potentially worse place than before. Pretty much the same arguments apply here.

Nonetheless, it’s an interesting read. But it would be fascinating to see this approached from a human perspective, I.e. “what are the compelling adoption vectors?” and “how can we avoid re-centralisation?”

  • i2km a year ago

    Also curious that any mention of confidential computing is avoided throughout the piece

perching_aix a year ago

site is dead without js

  • ruuda a year ago

    Which is odd, given that it contains zero interactive elements even with js enabled.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection