home tags events about rss login

Stand back... I'm going to write some code.

(aka @timkuijsten@mastodon.social)

kuijsten bonked 28 Feb 2026 17:06 +0100
original: nilix@cafe.nilfm.cc

#honkers ; does anybody know what happened to Ted?

Also does anybody have an up-to-date clone of honk? it appears the version i'm running is newer than the version i have the source for and the wayback machine doesn't have consistent snapshots of the source :<

kuijsten honked 28 Feb 2026 07:05 +0100

@GrapheneOS any idea if a recent Pixel with your OS is vulnerable to any of the new airsnitch attacks?

kuijsten bonked 28 Feb 2026 06:48 +0100
original: vanhoefm@infosec.exchange

We found that Wi-Fi client isolation can often be bypassed. This allows an attacker who can connect to a network, either as a malicious insider or by connecting to a co-located open network, to attack others.

NDSS'26 paper: https://www.ndss-symposium.org/wp-content/uploads/2026-f1282-paper.pdf
GitHub: https://github.com/vanhoefm/airsnitch

Excellent article on the work by Dan Goodin: https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/

I'd say we bypass Wi-Fi encryption, in the sense that we can bypass client isolation. We don't break Wi-Fi authentication or encryption. Crypto is often bypassed instead of broken. And we bypass it ;)

kuijsten honked 09 Oct 2025 16:25 +0200

Pretty surprised to see that the armv6m optimized Ascon-Hash256 (winner of NISTs lightweight crypto competition) is 3x slower than the standard BLAKE2s reference implementation on a Cortex-M0+ 😲

#hashing #ascon

kuijsten honked 07 Oct 2025 21:10 +0200

Hi @kora, thanks for making rosenpass, it looks very well composed and engineered!

Question, has blake3 been considered for rosenpass and what were the reasons to settle on shake256 instead?