#ECC

Dmytro (Dima) Oliinykdima@dol.social
2026-01-27

RE: dol.social/@dima/1159692319491

Shoutout to Proton support - they helped me reset my Drive volume entirely.

The difference between RSA2048 and Curve25519 (ECC) on mobile is night and day. Loading is now instant, and the "thermal throttling" is gone.

Moral of the story: Modern crypto isn't just about security, it's about accessibility and efficiency.

Now my data is encrypted by my own key, and the system actually feels "functional" for the first time.

#Proton #GPG #Cryptography #ECC #Curve25519 #Infosec #TechDeepDive #Privacy #Blog #Thoughts #ProtonMail

2026-01-22

El PC ideal de #Linus #Torvalds no busca la potència bruta, sinó la màxima estabilitat i silenci absoluta 🤫💻. Prioritats clares:✅ Memòria RAM #ECC per evitar errors.✅ Refrigeració per aire (res de líquids!).✅ Flux d'ai ...

[^BgTA^] :verified: :opensuse:...

[^BgTA^] :verified: :opensuse:raul@mastodon.in4matics.cat
2026-01-22

El PC ideal de #Linus #Torvalds no busca la potència bruta, sinó la màxima estabilitat i silenci absoluta 🤫💻.

Prioritats clares:

✅ Memòria RAM #ECC per evitar errors.
✅ Refrigeració per aire (res de líquids!).
✅ Flux d'aire natural amb la caixa @FractalDesign.
✅ Silenci total amb fonts sobredimensionades.

Menys "gaming" i més fiabilitat per seguir picant el #Kernel de #Linux. 🐧🏗️

www-profesionalreview-com.cdn.

2026-01-15

I, and apparently everyone else, got the idea this week to build Maha, its Feathers Night #EDH. I took a look at prices and preordered the #ECC precons months ago but while I do have many of the cards, I think I will need to wait for some of the froth to die down before I get started. #mtgcommander #mtg #magicthegathering

Magic: the Gathering card Maha, Its Feathers Night, {3}{B}{B}, Legendary Creature — Elemental Bird. Flying, trample,  Ward—Discard a card. Creatures your opponents control have base toughness 1. 6/5
Daily Times - Latest Pakistan News, World, Business, Sports, Lifestyledailytimes.com.pk@web.brid.gy
2026-01-08

How Quantum Computing Could Change Cybersecurity

1,043 words, 6 minutes read time.

Quantum computing is no longer a distant dream scribbled on whiteboards at research labs; it is a looming reality that promises to disrupt every corner of the digital landscape. For cybersecurity professionals, from the analysts sifting through logs at 2 a.m. to CISOs defending multimillion-dollar digital fortresses, the quantum revolution is both a threat and an opportunity. The very encryption schemes that secure our communications, financial transactions, and sensitive corporate data could be rendered obsolete by the computational power of qubits. This isn’t science fiction—it’s an urgent wake-up call. In this article, I’ll explore how quantum computing could break traditional cryptography, force the adoption of post-quantum defenses, and transform the way we model and respond to cyber threats. Understanding these shifts isn’t optional for security professionals anymore; it’s survival.

Breaking Encryption: The Quantum Threat to Current Security

The first and most immediate concern for anyone in cybersecurity is that quantum computers can render our existing cryptographic systems ineffective. Traditional encryption methods, such as RSA and ECC, rely on mathematical problems that classical computers cannot solve efficiently. RSA, for example, depends on the difficulty of factoring large prime numbers, while ECC leverages complex elliptic curve relationships. These are the foundations of secure communications, e-commerce, and cloud storage, and for decades, they have kept adversaries at bay. Enter quantum computing, armed with Shor’s algorithm—a method capable of factoring these massive numbers exponentially faster than any classical machine. In practical terms, a sufficiently powerful quantum computer could crack RSA-2048 in a matter of hours or even minutes, exposing sensitive data once thought safe. Grover’s algorithm further threatens symmetric encryption by effectively halving key lengths, making AES-128 more vulnerable than security architects might realize. In my years monitoring security incidents, I’ve seen teams underestimate risk, assuming that encryption is invulnerable as long as key lengths are long enough. Quantum computing demolishes that assumption, creating a paradigm where legacy systems and outdated protocols are no longer just inconvenient—they are liabilities waiting to be exploited.

Post-Quantum Cryptography: Building the Defenses of Tomorrow

As frightening as the threat is, the cybersecurity industry isn’t standing still. Post-quantum cryptography (PQC) is already taking shape, spearheaded by NIST’s multi-year standardization process. This isn’t just theoretical work; these cryptosystems are designed to withstand attacks from both classical and quantum computers. Lattice-based cryptography, for example, leverages complex mathematical structures that quantum algorithms struggle to break, while hash-based and code-based schemes offer alternative layers of protection for digital signatures and authentication. Transitioning to post-quantum algorithms is far from trivial, especially for large enterprises with sprawling IT infrastructures, legacy systems, and regulatory compliance requirements. Yet the work begins today, not tomorrow. From a practical standpoint, I’ve advised organizations to start by mapping cryptographic inventories, identifying where RSA or ECC keys are in use, and simulating migrations to PQC algorithms in controlled environments. The key takeaway is that the shift to quantum-resistant cryptography isn’t an optional upgrade—it’s a strategic imperative. Companies that delay this transition risk catastrophic exposure, particularly as nation-state actors and well-funded cybercriminal groups begin experimenting with quantum technologies in secret labs.

Quantum Computing and Threat Modeling: A Strategic Shift

Beyond encryption, quantum computing will fundamentally alter threat modeling and incident response. Current cybersecurity frameworks and MITRE ATT&CK mappings are built around adversaries constrained by classical computing limits. Quantum technology changes the playing field, allowing attackers to solve previously intractable problems, reverse-engineer cryptographic keys, and potentially breach systems thought secure for decades. From a SOC analyst’s perspective, this requires a mindset shift: monitoring, detection, and response strategies must anticipate capabilities that don’t yet exist outside of labs. For CISOs, the challenge is even greater—aligning board-level risk discussions with the abstract, probabilistic threats posed by quantum computing. I’ve observed that many security leaders struggle to communicate emerging threats without causing panic, but quantum computing isn’t hypothetical anymore. It demands proactive investment in R&D, participation in standardization efforts, and real-world testing of quantum-safe protocols. In the trenches, threat hunters will need to refine anomaly detection models, factoring in the possibility of attackers leveraging quantum-powered cryptanalysis or accelerating attacks that once required months of computation. The long-term winners in cybersecurity will be those who can integrate quantum risk into their operational and strategic planning today.

Conclusion: Preparing for the Quantum Era

Quantum computing promises to be the most disruptive force in cybersecurity since the advent of the internet itself. The risks are tangible: encryption once considered unbreakable may crumble, exposing sensitive data; organizations that ignore post-quantum cryptography will face immense vulnerabilities; and threat modeling will require a fundamental reevaluation of attacker capabilities. But this is not a reason for despair—it is a call to action. Security professionals who begin preparing now, by inventorying cryptographic assets, adopting post-quantum strategies, and updating threat models, will turn the quantum challenge into a competitive advantage. In my years in the field, I’ve learned that the edge in cybersecurity always belongs to those who anticipate the next wave rather than react to it. Quantum computing is that next wave, and the time to surf it—or be crushed—is now. For analysts, architects, and CISOs alike, embracing this reality is the only way to ensure our digital fortresses remain unbreachable in a world that quantum computing is poised to redefine.

Call to Action

If this breakdown helped you think a little clearer about the threats out there, don’t just click away. Subscribe for more no-nonsense security insights, drop a comment with your thoughts or questions, or reach out if there’s a topic you want me to tackle next. Stay sharp out there.

D. Bryan King

Sources

NIST: Post-Quantum Cryptography Standardization
NISTIR 8105: Report on Post-Quantum Cryptography
CISA Cybersecurity Advisories
Mandiant Annual Threat Report
MITRE ATT&CK Framework
Schneier on Security Blog
KrebsOnSecurity
Verizon Data Breach Investigations Report
Shor, Peter W. (1994) Algorithms for Quantum Computation: Discrete Logarithms and Factoring
Grover, Lov K. (1996) A Fast Quantum Mechanical Algorithm for Database Search
Black Hat Conference Materials
DEF CON Conference Archives

Disclaimer:

The views and opinions expressed in this post are solely those of the author. The information provided is based on personal research, experience, and understanding of the subject matter at the time of writing. Readers should consult relevant experts or authorities for specific guidance related to their unique situations.

#advancedPersistentThreat #AES #boardLevelCybersecurity #CISO #cloudSecurity #codeBasedCryptography #cryptanalysis #cryptographyMigration #cyberAwareness #cyberDefense #cyberDefenseStrategy #cyberInnovation #cyberPreparedness #cyberResilience #cyberRisk #cyberStrategy #cyberattack #cybersecurity #cybersecurityChallenges #cybersecurityFrameworks #cybersecurityTrends #dataProtection #digitalFortresses #digitalSecurity #ECC #emergingThreats #encryption #encryptionKeys #futureProofSecurity #GroverSAlgorithm #hashingAlgorithms #incidentResponse #ITSecurityLeadership #latticeBasedCryptography #legacySystems #MITREATTCK #nationStateThreat #networkSecurity #NISTPQC #postQuantumCryptography #quantumComputing #quantumComputingImpact #quantumEraSecurity #quantumReadiness #quantumRevolution #quantumThreat #quantumResistantCryptography #quantumSafeAlgorithms #quantumSafeProtocols #RSA #secureCommunications #securityBestPractices #securityPlanning #ShorSAlgorithm #SOCAnalyst #threatHunting #threatIntelligence #ThreatModeling #zeroTrust

Futuristic quantum computer inside a high-tech security operations center with digital encryption codes and holographic displays, illustrating the impact of quantum computing on cybersecurity.
Simon Zerafa (Status: :no_AI_logo: :catthink: 😊)simonzerafa@infosec.exchange
2025-12-27

DNA Error Correction at the molecular level 🙂

youtu.be/Xe-83tBcxhs

#DNA #Repair #ECC

Steffen Mutterghul@nerdculture.de
2025-12-24

People keep using “AI demand” to justify insane gaming #GPU prices.
That’s misleading at best.

For actual #AI workloads you don’t need ray tracing, frame generation, RGB shrouds or triple-slot coolers.
You need purpose-built compute cards: #ECC RAM, lots of it, high bandwidth, and stable 24/7 operation.

Example:
An RTX Pro–class card with 24 GB ECC GDDR7 for ~1,350 € makes sense for AI.

Now compare that to a “gaming” RTX 5090:
2,900–5,100 € for 32 GB non-ECC GDDR6, plus silicon dedicated to features AI will never use.

For the price of one 5090, I can build a small server with multiple compute GPUs and run serious models locally.

Calling this “AI pricing” is nonsense.
It’s market segmentation and margin maximization.

Stop pretending #gamers are paying for AI. We’re paying for marketing.

2025-12-10

#LinusTechTips et #LinusTorvalds : Quand deux Linus construisent un PC !
linuxtricks.fr/news/10-logicie

RAM ECC un point non négociable pour Torvalds

Linus Torvalds a insisté longuement sur l'importance de la mémoire #ECC (Error-Correcting Code). Pour lui, c'est une question de confiance dans sa machine. Il raconte avoir passé des jours à chercher des bugs dans le noyau Linux, pour finalement réaliser que le problème venait de sa RAM défectueuse après deux ans d'utilisation !
Sa conviction est forte : il indique qu'une grande partie des plantages attribués à Windows ou aux jeux pourraient en réalité provenir de défaillances matérielles non détectées.

#RAM

Pilou 🐧⚔️CaraGk@framapiaf.org
2025-12-04

100% évoquent l'#ECC.
Bons retours
Évaluations formalisées.

Absence = FAT + légitimité, peur des conflits avec les radiologues

Limites : Structuration progressive du questionnaire, collecte difficile et recueil + long que prévu

Émergence POCUS (1990-2000 en urgence/réa).
#CNGE2025

Pilou 🐧⚔️CaraGk@framapiaf.org
2025-12-04

État des lieux de la formation à l'#échographie chez les #IMG dans les #DMG de France.

2022, #HAS plutôt défavorable à #ECC
2023, #Wonca Europe, plus optimiste, même si risque de sous/sur-diagnostic
2025 : ECC dans le référentiel métier
2024 : 16,8% des MG en France

Enquête descriptive nationales. Questionnaire à 2 branches. T1 2025.
34 DMG.

Formation 15/34. 5 en projet. Obligatoire ou optionnel. 1/5 des IMG a formation.
Hétérogénéité 1-6 demi-journées. Pratique entre étudiants.
#CNGE2025

2025-12-02

Le PC de rêve de Linus Torvalds : fiabilité, ECC et pourquoi les gens sont plus stressants que les bugs

Quand le père de Linux construit son nouveau PC, il ne rigole pas avec le matériel. J'ai décrypté la rencontre entre Linus Torvalds et Linus Tech Tips pour révéler ses choix non négociables : oublier le RGB et exiger de la mémoire ECC. Découvrez pourquoi, selon Torvalds, les bugs sont faciles à réparer, mais les gens (et votre RAM non-ECC) ne le sont pas.

blablalinux.be/2025/12/02/pc-l

Sponux 🌈🐧sponux@det.social
2025-12-02

@visratna

Das wäre schlimm, wenn es um Verherrlichung ginge. Linus Torvalds benutzt -was so berichtet wird- seine Computer sehr lange. In der Sendung begründet er seine Anforderungen. Er möchte einen zuverlässigen und leise laufenden PC, mit guten Bauteilen, der lange hält.
Neben der Linux-Eignung der HW kommt es ihm auf ein durchgängiges #ECC (Error Correcting Code) an. Beim Kernel-Kompilieren kann er so Hardware-verursachte Fehler erkennen - war mir total neu.

#Linux #Fedora #LinusTorvalds

2025-11-15

Neuerung in meinem PGP-Keygen 🥳

Ab sofort unterstützt mein clientseitiger PGP-Keygen neben RSA-4096/8192 und Curve25519 auch brainpoolP384r1.

Warum brainpoolP384r1?

Die Brainpool-Kurven wurden im Rahmen der ECC-Brainpool-Arbeitsgruppe unter dem Dach des @bsi entwickelt und sind in RFC 5639 standardisiert. Sie dienen in Europa, besonders in Behörden und sicherheitskritischen Anwendungen, als transparente, deterministisch generierte Alternative zu den NIST-Kurven, um Abhängigkeiten zu reduzieren und Vertrauen durch nachvollziehbare Parameter zu stärken.

Wie ihr seht, implementiere ich kontinuierlich nützliche Features in meinen PGP-Keygen und möchte diese transparent mit euch teilen.

➡️ PGP-Keygen: secunis.de/pgp-keygen.html

:boost_ok:

#OpenPGP #ECC #Datenschutz #ITSecurity #Datenschutz #BSI #Privatsphäre

Haseeb Rajahaseebraja
2025-11-14
Haseeb Rajahaseebraja
2025-11-14

1/ Pairing-friendly elliptic curve enable short digital signatures that are efficiently aggregatable, identity-based cryptography, single-round multi-party key exchange, and efficient polynomial commitment schemes such as KZG commitments.

TugaTech 🖥️tugatech@masto.pt
2025-11-11
Verfassungklage@troet.cafeVerfassungklage@troet.cafe
2025-11-04

#Kassenärzte warnen:

#Zehntausende #Praxen müssen wohl bald zurück zum #Papierrezept

Der langsame Umstieg auf #ECC- #Verschlüsselung zwingt viele Praxen womöglich zurück zu #Papier. #Kassenärzte warnen die #Bundesnetzagentur vor gravierenden Folgen.

Wenige Wochen vor der Umstellung des #Verschlüsselungsverfahrens #RSA auf Elliptic Curve Cryptography ( #ECC ) im #Gesundheitswesen schlägt die #Kassenärztliche_Bundesvereinigung ( #KBV ) ...

heise.de/news/E-Rezept-bald-au

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst