toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

251
active users

#cryptography

7 posts7 participants0 posts today
Peter N. M. Hansteen<p>Recent new features in OpenSSH <a href="https://www.undeadly.org/cgi?action=article;sid=20250802084523" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20250802084523</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/openssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openssh</span></a> <a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/newfeatures" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newfeatures</span></a> <a href="https://mastodon.social/tags/development" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>development</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/freesoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freesoftware</span></a> <a href="https://mastodon.social/tags/libresoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libresoftware</span></a> <a href="https://mastodon.social/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a></p>
Aaron Toponce ⚛️:debian:<p>After typing up my <a href="https://fosstodon.org/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a> TRNG* with von Neumann's randomness extractor, I revisited my curiosity to see if I can improve its efficiency. von Neumann throws out a lot of bits, likely including quality entropy.</p><p>My intuition was to pool the discarded bits and iterate over those again, perhaps with XOR. Turns out my intuition wasn't far off.</p><p><a href="https://gist.github.com/atoponce/0a659da0ab53b093629c4facb32e9547" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gist.github.com/atoponce/0a659</span><span class="invisible">da0ab53b093629c4facb32e9547</span></a></p><p>* Software CAN produce information theoretic entropy. Stating otherwise is a bad meme that needs to die.</p><p><a href="https://fosstodon.org/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://fosstodon.org/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a></p>
Tommaso Gagliardoni<p>The war on crypto never ends. The war on privacy, civil rights, security and freedom of speech never ends.</p><p>This time we are dangerously close to lose. The "Child Sexual Abuse" (CSA) EU regulation proposal, more aptly nicknamed "ChatControl", will be voted <em>AGAIN</em> this October, and many countries who opposed it last year are now undecided. The proposal at its roots aims at allowing authorities to break end-to-end encryption for the usual reason: "because of the children". As a father of two, I am disgusted by this recurring, cheap rhetoric.</p><p>What you can do: <a href="https://www.patrick-breyer.de/en/posts/chat-control/#WhatYouCanDo" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">patrick-breyer.de/en/posts/cha</span><span class="invisible">t-control/#WhatYouCanDo</span></a></p><p><a href="https://infosec.exchange/tags/eu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eu</span></a> <a href="https://infosec.exchange/tags/CSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSA</span></a> <a href="https://infosec.exchange/tags/CSAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSAM</span></a> <a href="https://infosec.exchange/tags/ChatControl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChatControl</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://infosec.exchange/tags/authoritarianism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authoritarianism</span></a> <a href="https://infosec.exchange/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://infosec.exchange/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://infosec.exchange/tags/civilrights" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>civilrights</span></a></p>
varx/tech<p>If anyone is up for doing a <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> review of Breakmancer's protocol (<a href="https://infosec.exchange/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a>, networking, handshake logic) I'd be *very* appreciative!</p><p>These are the most recent protocol docs: <a href="https://docs.rs/breakmancer/0.9.0/breakmancer/protocol/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.rs/breakmancer/0.9.0/brea</span><span class="invisible">kmancer/protocol/index.html</span></a></p><p>It's nothing super complicated, just an exchange of X-Wing keys and a KDF, with out-of-band key verification—but *anything* can be gotten wrong. :-)</p><p><a href="https://infosec.exchange/tags/CodeReview" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CodeReview</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/RustLang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RustLang</span></a></p>
Doktor Overcomma :vepi:<p><span class="h-card" translate="no"><a href="https://kolektiva.social/@reverendstanley" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>reverendstanley</span></a></span> While work had been progressing "behind the fence" at Fort Meade, the 1984 album "Points on a Curve" on which this first appeared is one of the earliest publications on elliptic-curve cryptography<br><a href="https://dobbs.town/tags/ECC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECC</span></a> <a href="https://dobbs.town/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a></p>
ltning<p>Why on earth was the <a class="hashtag" href="https://pleroma.anduin.net/tag/activitypub" rel="nofollow noopener" target="_blank">#ActivityPub</a> protocol even <em>let out the door</em> without a well-specified and mandatory graceful, non-destructive key rotation scheme?</p><p>Yes I know the privacy issues. Those are not valid reasons to not have such a mechanism; it's a valid reason to not enable or use one.</p><p>What we're stuck with now is a ton of instances with absurdly long, legacy-algorithm keys (RSA-4096) with no way to replace them with shorter/better keys without effectively losing everything ever posted on the instance.</p><p>The protocol is <em>only 7 years old</em>! EC crypto was well-established at the time, and should have been the default.</p><p>And what happens once everyone <em>has to</em> replace the keys, because RSA is broken by quantum computers (I know, probably 100 years to go)? The <a class="hashtag" href="https://pleroma.anduin.net/tag/fediverse" rel="nofollow noopener" target="_blank">#Fediverse</a> will be a wasteland, with no instances trusting anything from any other instance, so all <a class="hashtag" href="https://pleroma.anduin.net/tag/federation" rel="nofollow noopener" target="_blank">#Federation</a> breaks down.</p><p>Sorry if I got some details wrong about what the protocol says. If I get flamed to death for being wrong, then I'll consider that a Good Thing(TM). I've been trying to find a way to rotate/replace keys for a while and all my searching turns up is either 1) confirmation that most people don't know or care about cryptography, or 2) <a href="https://socialhub.activitypub.rocks/t/key-rotation-notification/562" rel="nofollow noopener" target="_blank">https://socialhub.activitypub.rocks/t/key-rotation-notification/562</a> - which really isn't helpful.</p><p>If it <em>is</em> possible to gracefully rotate the key(s) of an instance/user, there really has to exist some documentation that explains clearly how to implement this in a server and how to exercise it as a server operator.</p><p><a class="hashtag" href="https://pleroma.anduin.net/tag/cryptography" rel="nofollow noopener" target="_blank">#Cryptography</a> <a class="hashtag" href="https://pleroma.anduin.net/tag/rant" rel="nofollow noopener" target="_blank">#Rant</a> <a class="hashtag" href="https://pleroma.anduin.net/tag/mastodon" rel="nofollow noopener" target="_blank">#Mastodon</a></p>
House Panther :verified_paw:<p>A little <a href="https://goblackcat.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://goblackcat.social/tags/humor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>humor</span></a> this morning for all of us. 😹</p>
Aaron Toponce ⚛️:debian:<p>I'm reading the paper by Bruce Schneier and Niels Ferguson on the Fortuna CSPRNG from 2003.</p><p>You can read it here: <a href="https://www.schneier.com/wp-content/uploads/2015/12/fortuna.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/wp-content/upload</span><span class="invisible">s/2015/12/fortuna.pdf</span></a></p><p>Note the highlighted section. This describes precisely fast key erasure that Daniel J. Bernstein describes in his 2017 blog post: <a href="https://blog.cr.yp.to/20170723-random.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.cr.yp.to/20170723-random.</span><span class="invisible">html</span></a></p><p><a href="https://fosstodon.org/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://fosstodon.org/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Cryptomator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptomator</span></a>: Our Roadmap to Post-Quantum <a href="https://mastodon.thenewoil.org/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a></p><p><a href="https://cryptomator.org/blog/2025/07/24/post-quantum-roadmap/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cryptomator.org/blog/2025/07/2</span><span class="invisible">4/post-quantum-roadmap/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/PQC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PQC</span></a></p>
TechnoTenshi :verified_trans: :Fire_Lesbian:<p>A new proof shows quantum cryptography can be built on problems even harder than NP, offering security beyond classical encryption. Researchers introduced "one-way puzzles" to replace traditional cryptographic foundations.</p><p><a href="https://www.quantamagazine.org/quantum-scientists-have-built-a-new-math-of-cryptography-20250725/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">quantamagazine.org/quantum-sci</span><span class="invisible">entists-have-built-a-new-math-of-cryptography-20250725/</span></a></p><p><a href="https://infosec.exchange/tags/QuantumComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuantumComputing</span></a> <a href="https://infosec.exchange/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/PostQuantum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PostQuantum</span></a></p>
Victoria Stuart 🇨🇦 🏳️‍⚧️<p>These are clever people: Quantum Scientists Building New Math of Cryptography<br><a href="https://www.quantamagazine.org/quantum-scientists-have-built-a-new-math-of-cryptography-20250725/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">quantamagazine.org/quantum-sci</span><span class="invisible">entists-have-built-a-new-math-of-cryptography-20250725/</span></a><br>One-way function<br><a href="https://en.wikipedia.org/wiki/One-way_function" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/One-way_</span><span class="invisible">function</span></a><br>Quantum cryptography<br><a href="https://en.wikipedia.org/wiki/Quantum_cryptography" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Quantum_</span><span class="invisible">cryptography</span></a><br>Permanent (mathematics)<br><a href="https://en.wikipedia.org/wiki/Permanent_(mathematics)" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Permanen</span><span class="invisible">t_(mathematics)</span></a><br>♯P-completeness of 01-permanent<br><a href="https://en.wikipedia.org/wiki/%E2%99%AFP-completeness_of_01-permanent" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/%E2%99%A</span><span class="invisible">FP-completeness_of_01-permanent</span></a></p><p><a href="https://mastodon.social/tags/mathematics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mathematics</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/OneWayFunctions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OneWayFunctions</span></a> <a href="https://mastodon.social/tags/LinearAlgebra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinearAlgebra</span></a> <a href="https://mastodon.social/tags/matrices" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>matrices</span></a> <a href="https://mastodon.social/tags/QuantumCryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuantumCryptography</span></a> <a href="https://mastodon.social/tags/NPhard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NPhard</span></a></p>
Bob the Traveler<p>Agnes Meyer Driscoll, born OTD in 1889, was one of the leading US cryptanalysts during both World War I and World War II; see where she worked in <a href="https://mastodon.world/tags/NewYorkCity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NewYorkCity</span></a> <a href="https://cromwell-intl.com/travel/usa/new-york-black-chamber/?s=mb" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cromwell-intl.com/travel/usa/n</span><span class="invisible">ew-york-black-chamber/?s=mb</span></a> <a href="https://mastodon.world/tags/travel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>travel</span></a> <a href="https://mastodon.world/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a></p>
CosicBe<p>Curious about the latest in <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> and <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> research? The new COSIC newsletter gives you a two-month snapshot of our key achievements and updates. Read it here: <a href="https://www.esat.kuleuven.be/cosic/sites/newsletter/2025/07/24/cosic-newsletter-june-july/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">esat.kuleuven.be/cosic/sites/n</span><span class="invisible">ewsletter/2025/07/24/cosic-newsletter-june-july/</span></a></p>
Aaron Toponce ⚛️:debian:<p>I finally finished by browser-based randomness nonsense. Let me know what you think.</p><p><a href="https://atoponce.github.io" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">atoponce.github.io</span><span class="invisible"></span></a></p><p><a href="https://fosstodon.org/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://fosstodon.org/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://fosstodon.org/tags/passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwords</span></a></p>
UK<p><a href="https://www.europesays.com/uk/284955/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/uk/284955/</span><span class="invisible"></span></a> Understanding Quantum-Resistant Cryptography Roadmaps | Chapters <a href="https://pubeurope.com/tags/Computing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Computing</span></a> <a href="https://pubeurope.com/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://pubeurope.com/tags/quantumresistant" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quantumresistant</span></a> <a href="https://pubeurope.com/tags/Roadmaps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Roadmaps</span></a> <a href="https://pubeurope.com/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://pubeurope.com/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a> <a href="https://pubeurope.com/tags/understanding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>understanding</span></a> <a href="https://pubeurope.com/tags/UnitedKingdom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnitedKingdom</span></a></p>
🧿🪬🍄🌈🎮💻🚲🥓🎃💀🏴🛻🇺🇸<p>I think that the <a href="https://mastodon.social/tags/openweb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openweb</span></a> and <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> are orthogonal. If <a href="https://mastodon.social/tags/InformationWantsToBeFree" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InformationWantsToBeFree</span></a> then why are you using <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a>? </p><p>They are both good things, but you can't be doing them both at the same time.</p><p><a href="https://mastodon.social/tags/cypherpunk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cypherpunk</span></a> <a href="https://mastodon.social/tags/indieweb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>indieweb</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
Tony “Abolish ICE” Arcieri🌹🦀<p>Replication of Quantum Factorisation Records with an 8-bit Home Computer, an Abacus, and a Dog: a snarky take on how unimpressive these records actually are</p><p><a href="https://eprint.iacr.org/2025/1237.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">eprint.iacr.org/2025/1237.pdf</span><span class="invisible"></span></a></p><p><a href="https://mas.to/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a></p>
Ben Evans<p>Factoring primes using an abacus and a dog - <a href="https://eprint.iacr.org/2025/1237.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">eprint.iacr.org/2025/1237.pdf</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/quantum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>quantum</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a></p>
Bob the Traveler<p>Joseph Rochefort, who died OTD in 1976, was a major figure in the US Navy's cryptographic and intelligence operations from 1925 to 1946, particularly in the Battle of Midway <a href="https://cromwell-intl.com/travel/japan/wwii-cryptanalysis/?s=mb" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cromwell-intl.com/travel/japan</span><span class="invisible">/wwii-cryptanalysis/?s=mb</span></a> <a href="https://mastodon.world/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.world/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.world/tags/history" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>history</span></a></p>
Bob the Traveler<p>Joseph Rochefort, who died OTD in 1976, was a major figure in the US Navy's cryptographic and intelligence operations from 1925 to 1946, particularly in the Battle of Midway <a href="https://cromwell-intl.com/cybersecurity/crypto/?s=mb" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cromwell-intl.com/cybersecurit</span><span class="invisible">y/crypto/?s=mb</span></a> <a href="https://mastodon.world/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.world/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.world/tags/history" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>history</span></a></p>