Sorry so they need at least one plaintext+encryptedtext pair, and the public key, to get this going?
2025-02-11 21:21:57
2
asconerd :
So many things are bad about this paper it’s almost funny. If you read through the description of the pre-processing steps *before* encryption, it’s pretty disqualifying from the get go
2025-03-02 21:29:15
5
Patrick 🇺🇲 :
unlawfully collected information can't be used in court. otherwise all phone companies gave the government a backdoor access to get into our phones a long time ago.
2025-03-17 21:33:29
0
Noc.V :
Is this only for ECB mode? ECB mode is never used because it’s exploitable for other similar reasons too. If so this is kind of a non issue.
2025-02-18 02:13:01
1
TheGR8Dantini :
I’ve been told there is no encrypted communication all apps are readable
2025-02-12 00:33:43
52
degenotterdev :
privacy is a myth 🙃
2025-02-11 19:45:39
95
sin :
Has this been replicated and peer reviewed?
2025-02-11 22:05:08
10
jyeart :
this seems like the biggest news of the year by far, depending on it's scalability
2025-02-11 20:37:33
6
BNNdoll :
Things happened to me
2025-05-06 16:15:30
0
Brat Pack 512🇺🇦🇵🇸🏳️🌈 :
I’m writing on paper from now on.
2025-02-11 21:36:37
10
Sin :
I'm assuming this has to be targeting ecb mode because other modes are provably cpt-indistinguishable
2025-02-11 20:15:48
5
j :
is this study not a year old?
2025-02-12 05:22:54
0
illtelly0uwhat :
wonder if using cypher keys within the text could add a layer of security. ie send a cypher key on another channel then make the text that's encrypted a cypher itself.
2025-02-12 07:13:30
0
lucasaphillips :
so, what happens if your text contents are nothing like the sample text they created and trained on?
2025-02-13 17:28:48
0
Buntler :
i’m skeptical- they used chosen encryption technique/key and trained it to detect the plaintext topic from the ciphertext, but can they do it without knowing the key?
2025-02-11 22:34:03
0
jcashell :
So if I’m understanding this right - they can find the representation of various topics in vector space and find the topic closest to the excrypted text? This is a) brilliant and b) terrifying (1/)
2025-02-12 18:08:43
0
geigerclick :
What is it inverting? They've already got length and timing based attacks which can decrypt meaning; the use of movie subtitles implies stuff, eg I talk about is not on the menu.
2025-02-11 21:00:45
1
Bebbi :
The secure way is after handshake do another handshake plus the traffic is split on several ports encrypted with different rotating protocolls.
2025-02-11 21:04:38
1
Nyan Helsing :
ok so one time pads
2025-02-11 19:43:56
21
Korax155 :
do blockchain when?
2025-02-11 21:14:38
0
Frulitzboll :
Source ?
2025-02-11 23:56:11
0
Swimnbud :
A bit out of the pocket, but if you ever read the lensman series by Edward Elmer Smith?
2025-02-12 03:34:40
1
Perry :
Well, life is becoming more transparent
2025-03-08 23:52:22
1
Brian 🇺🇸 :
They trained a model to read patterns in encrypted text?
2025-02-12 02:38:14
8
stla_va :
What was the cost of the approach to train against one public key. I mean $5 vs $5,000,000 makes a big difference in how so would respond.
2025-02-11 20:11:32
3
To see more videos from user @lizthedeveloper, please go to the Tikwm
homepage.