ATProto Browser

ATProto Browser

Experimental browser for the Atmosphere

Post

Here's a previous take on said book from social-foundations-of-cryptography.gitlab.io/2024/06/12/p...

Apr 15, 2025, 7:14 PM

Record data

{
  "uri": "at://did:plc:eoakxdfddsy4p2m4liifdnki/app.bsky.feed.post/3lmurxjefns2y",
  "cid": "bafyreihm2tydgqfzhpe6hq3cw7rgx5rrrihmj5qbyshgyxmt273fh2isjy",
  "value": {
    "text": "Here's a previous take on said book from social-foundations-of-cryptography.gitlab.io/2024/06/12/p...",
    "$type": "app.bsky.feed.post",
    "embed": {
      "$type": "app.bsky.embed.images",
      "images": [
        {
          "alt": "Website excerpt:\n\nHere, the authors consider a whistleblower setting which then motivates the definition of ring signatures. Thus, a ring signature claims to be at least also a formalisation of the social setting in which a member of a group wishes to alert outsides to something without revealing themselves while still convincing the outsider that they have access to the information being leaked. Put differently, cryptography presumes and models social relations. As such, cryptography is also a social science. However, cryptography is unaware of itself as a social science and we cryptographers more or less speculatively make up the social settings we model in our paper’s introductions. I highly recommend Jean-François Blanchette’s “Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents” for a deeper dive into this observation.\n\nThis begs the question if cryptography gets that part of its models right? In general, we work hard to have precise definitions and definitional work is a central activity of cryptography. Yet, the correctness of this part of the definitional work is usually simply presumed: “On these questions, the literature remains silent” as Blanchette put it.",
          "image": {
            "$type": "blob",
            "ref": {
              "$link": "bafkreielltyufz4luy63ky6kaqcak4cmbq4vpqhzk2hizbzp7vojmpwlnu"
            },
            "mimeType": "image/jpeg",
            "size": 693850
          },
          "aspectRatio": {
            "width": 1480,
            "height": 1020
          }
        }
      ]
    },
    "langs": [
      "en"
    ],
    "reply": {
      "root": {
        "cid": "bafyreib5zy53kw2ittah6xouorphnjhgyhtdh22zhfktxh64klc47mwplu",
        "uri": "at://did:plc:eoakxdfddsy4p2m4liifdnki/app.bsky.feed.post/3lmurv2hrl22y"
      },
      "parent": {
        "cid": "bafyreib5zy53kw2ittah6xouorphnjhgyhtdh22zhfktxh64klc47mwplu",
        "uri": "at://did:plc:eoakxdfddsy4p2m4liifdnki/app.bsky.feed.post/3lmurv2hrl22y"
      }
    },
    "facets": [
      {
        "index": {
          "byteEnd": 101,
          "byteStart": 41
        },
        "features": [
          {
            "uri": "https://social-foundations-of-cryptography.gitlab.io/2024/06/12/postdoc-ad-cryptography/",
            "$type": "app.bsky.richtext.facet#link"
          }
        ]
      }
    ],
    "createdAt": "2025-04-15T19:14:40.050Z"
  }
}