Topic: Tinkering With Cryptography
Speaker: Brian DeLacey
Location: Online: https://meet.jit.si/blu.org
Live stream: https://youtube.com/live/1H7Rbpq1LR8?feature=share
Making cryptography more accessible and useful with Google's Tink
Brian covers the basics of a relatively new library from Google, with
demonstration code running on multiple platforms. We'll also delve into
some of the more advanced topics related to this code and take a
special, deep dive into Key Management Systems.
As part of the discussion, Brian explores the challenges of brittle
bytes and how to achieve secure, authenticated access to critical data
over time. Demos cover code running on tiny little machines and
bigger&emdash;but still bargain&emdash;builds.
Demonstration code will be in Golang and Python, but the Tink
Cryptographic Library also works well with C++, Java, mobile platforms
We'll also walk through and demonstrate code and the use of cryptography
in "nostr", which stands for "Notes and Other Stuff Transmitted by Relays".
According to its chief architect, nostr is "The simplest open protocol
that is able to create a censorship-resistant global "social" network
once and for all. It doesn't rely on any trusted central server, hence
it is resilient; it is based on cryptographic keys and signatures, so it
is tamperproof; it does not rely on P2P techniques, therefore it works."
Google's Tink Cryptographic Library: https://developers.google.com/tink
awesome-A curated (GitHub): https://github.com/aljazceru/awesome-nostr
nostr: a truly censorship-resistant alternative to Twitter (GitHub):
Apple News 2022-12-07: Apple advances user security with powerful new
For further information and directions please consult the BLU Web site:
Jerry Feldman <firstname.lastname@example.org <mailto:email@example.com>>
Boston Linux and Unix http://www.blu.org
PGP key id: 6F6BB6E7
PGP Key fingerprint: 0EDC 2FF5 53A6 8EED 84D1 3050 5715 B88D 6F6
Announce mailing list