2021-08-11 18:40:40 +00:00
<?xml version="1.0" encoding="utf-8"?>
<feed xmlns= "http://www.w3.org/2005/Atom" >
<title > pseudorandom</title>
<link href= "https://pseudorandom.resistant.tech" />
<link rel= "self" href= "https://pseudorandom.resistant.tech/feed.xml" />
<updated > 2021-08-10T14:30:00Z</updated>
<author >
<name > Sarah Jamie Lewis</name>
</author>
<id > urn:uuid:699b0ba2-2fbf-4f9d-b5ac-4a7e044be3c6</id>
2021-08-16 18:06:50 +00:00
<entry >
<id > 3258032e-ec03-4847-9c54-30464284bb52</id>
<title > Revisiting First Impressions: Apple, Parameters and Fuzzy Threshold PSI</title>
<link href= "https://pseudorandom.resistant.tech/ftpsi-parameters.html" />
<updated > 2021-08-16T11:05:00Z</updated>
<summary > Last week, Apple published more additional information regarding the parameterization of their new Fuzzy Threshold
PSI system in the form of a Security Threat Model...</summary>
</entry>
<entry >
<id > urn:uuid:a7b71725-1cb6-4d8f-8e19-e92580d5b316</id>
<title > A Closer Look At Fuzzy Threshold PSI</title>
<link href= "https://pseudorandom.resistant.tech/a_closer_look_at_fuzzy_threshold_psi.html" />
<updated > 2021-08-12T14:30:00Z</updated>
<summary > Apple recently released a detailed cryptographic paper describing a new private
set intersection protocol which they named Fuzzy Threshold PSI with Associated Data, or ftPSI-AS for short....</summary>
</entry>
2021-08-11 18:40:40 +00:00
<entry >
<id > urn:uuid:fc37f259-004e-406b-addb-85cda6107e7b</id>
<title > Obfuscated Apples</title>
<link href= "https://pseudorandom.resistant.tech/obfuscated_apples.html" />
<updated > 2021-08-10T14:30:00Z</updated>
<summary > Generating noise in a way which is indistinguishable from real signal is a ridiculously hard problem. Obfuscation does not hide signal, it only adds noise....</summary>
</entry>
</feed>