@lizthedeveloper: Uhh… AI can now break encryption y’all #CapCut #infosec #cybersecurity #viral #security #fyp #LearnOnTikTok #encryption #ai #meshtastic #organizer #communications

future infinitive ☸️🆘🇺🇸
future infinitive ☸️🆘🇺🇸
Open In TikTok:
Region: US
Tuesday 11 February 2025 19:36:34 GMT
32959
3466
350
501

Music

Download

Comments

bismuth_raven
fart nouveau :
Sorry so they need at least one plaintext+encryptedtext pair, and the public key, to get this going?
2025-02-11 21:21:57
2
asconerd
asconerd :
So many things are bad about this paper it’s almost funny. If you read through the description of the pre-processing steps *before* encryption, it’s pretty disqualifying from the get go
2025-03-02 21:29:15
5
schoenstuff
Patrick 🇺🇲 :
unlawfully collected information can't be used in court. otherwise all phone companies gave the government a backdoor access to get into our phones a long time ago.
2025-03-17 21:33:29
0
noc.v
Noc.V :
Is this only for ECB mode? ECB mode is never used because it’s exploitable for other similar reasons too. If so this is kind of a non issue.
2025-02-18 02:13:01
1
thegr8dantini
TheGR8Dantini :
I’ve been told there is no encrypted communication all apps are readable
2025-02-12 00:33:43
52
degenotterdev
degenotterdev :
privacy is a myth 🙃
2025-02-11 19:45:39
95
xxxsinxxx
sin :
Has this been replicated and peer reviewed?
2025-02-11 22:05:08
10
jyeart
jyeart :
this seems like the biggest news of the year by far, depending on it's scalability
2025-02-11 20:37:33
6
wthellydoll
BNNdoll :
Things happened to me
2025-05-06 16:15:30
0
thebratpack512
Brat Pack 512🇺🇦🇵🇸🏳️‍🌈 :
I’m writing on paper from now on.
2025-02-11 21:36:37
10
sin60skates
Sin :
I'm assuming this has to be targeting ecb mode because other modes are provably cpt-indistinguishable
2025-02-11 20:15:48
5
jfp3_
j :
is this study not a year old?
2025-02-12 05:22:54
0
illtelly0uwhat
illtelly0uwhat :
wonder if using cypher keys within the text could add a layer of security. ie send a cypher key on another channel then make the text that's encrypted a cypher itself.
2025-02-12 07:13:30
0
lucasaphillips
lucasaphillips :
so, what happens if your text contents are nothing like the sample text they created and trained on?
2025-02-13 17:28:48
0
goblinbussy69
Buntler :
i’m skeptical- they used chosen encryption technique/key and trained it to detect the plaintext topic from the ciphertext, but can they do it without knowing the key?
2025-02-11 22:34:03
0
jcashell
jcashell :
So if I’m understanding this right - they can find the representation of various topics in vector space and find the topic closest to the excrypted text? This is a) brilliant and b) terrifying (1/)
2025-02-12 18:08:43
0
geigerclick
geigerclick :
What is it inverting? They've already got length and timing based attacks which can decrypt meaning; the use of movie subtitles implies stuff, eg I talk about is not on the menu.
2025-02-11 21:00:45
1
bebbi_1
Bebbi :
The secure way is after handshake do another handshake plus the traffic is split on several ports encrypted with different rotating protocolls.
2025-02-11 21:04:38
1
nyanhelsing
Nyan Helsing :
ok so one time pads
2025-02-11 19:43:56
21
soloparashavos
Korax155 :
do blockchain when?
2025-02-11 21:14:38
0
frulitzball
Frulitzboll :
Source ?
2025-02-11 23:56:11
0
swimnbud
Swimnbud :
A bit out of the pocket, but if you ever read the lensman series by Edward Elmer Smith?
2025-02-12 03:34:40
1
wheatflax
Perry :
Well, life is becoming more transparent
2025-03-08 23:52:22
1
brianmoney
Brian 🇺🇸 :
They trained a model to read patterns in encrypted text?
2025-02-12 02:38:14
8
stla_va
stla_va :
What was the cost of the approach to train against one public key. I mean $5 vs $5,000,000 makes a big difference in how so would respond.
2025-02-11 20:11:32
3
To see more videos from user @lizthedeveloper, please go to the Tikwm homepage.

Other Videos


About