Jim Miller (@themijcipher) 's Twitter Profile
Jim Miller

@themijcipher

Engineering Director for Cryptography at Trail of Bits

ID: 1513866716337647620

calendar_today12-04-2022 13:09:05

88 Tweet

360 Followers

156 Following

Jim Miller (@themijcipher) 's Twitter Profile Photo

ICYMI some cool work coming out of Trail of Bits over the last few weeks: 1. Technical breakdown of Apple’s AI announcement: buff.ly/3zan610 2. New ML model exploit, sleepy pickle: buff.ly/4cj8o6t 3. New testing handbook on Burp Suite: buff.ly/3VHz5vO

Jim Miller (@themijcipher) 's Twitter Profile Photo

There’s tons of reasons why post-quantum cryptography is important that don’t just boil down to scary quantum computers in the future. If you or your org care about PQC, checkout my teammates discussion on this from yesterday:

Trail of Bits (@trailofbits) 's Twitter Profile Photo

We are now a proud member of the @MPCAlliance, where we will work with other industry leaders to help push forward the secure adoption of privacy technology enabled by MPC. buff.ly/3xQkHZc

We are now a proud member of the @MPCAlliance, where we will work with other industry leaders to help push forward the secure adoption of privacy technology enabled by MPC. 
buff.ly/3xQkHZc
Jim Miller (@themijcipher) 's Twitter Profile Photo

It’s been cool to see MPC transition out of a theoretical area of crypto into a now increasingly practical technology. The MPCA is a great leader in promoting adoption of this technology, and we’re excited to share our insights from all of our MPC audits and research with them

Jim Miller (@themijcipher) 's Twitter Profile Photo

Suha has been doing some great vuln research in the intersection of ML and traditional software security. She’s going to share some of the coolest ML security exploits I’ve seen that aren’t just variations of prompt injection attacks. Check out her livestream tmrw!

Trail of Bits (@trailofbits) 's Twitter Profile Photo

We break down the cryptography services offered within Google Cloud Platform —Cloud KMS, Secret Manager, and Confidential Computing—helping you decide which tools are right for your project. buff.ly/3WQB69S

We break down the cryptography services offered within Google Cloud Platform —Cloud KMS, Secret Manager, and Confidential Computing—helping you decide which tools are right for your project.  buff.ly/3WQB69S
Jim Miller (@themijcipher) 's Twitter Profile Photo

A few months back we published an overview of the cryptography services within AWS. Today you can check out our next post in this series which covers the cryptography within the Google Cloud Platform. If you’re using cryptography in the cloud, check out these posts

Trail of Bits (@trailofbits) 's Twitter Profile Photo

Will these algorithms start to become widely supported? Yes! Our crypto team anticipated this and implemented the stateless hash-based digital signature scheme (SLH-DSA or SPHINCS) in Rust, now part of RustCrypto. buff.ly/3SN6Lq1

Trail of Bits (@trailofbits) 's Twitter Profile Photo

Two days ago, National Institute of Standards and Technology finalized three post-quantum cryptography standards. Today, we are announcing an open-source Rust implementation of one of these standards, SLH-DSA, now available in RustCrypto! blog.trailofbits.com/2024/08/15/we-…

Jim Miller (@themijcipher) 's Twitter Profile Photo

Interested in using any of the post quantum algorithms standardized this week? Check out our Rust implementation of SLH-DSA!

Dan Guido (@dguido) 's Twitter Profile Photo

.Trail of Bits had one of the best weeks ever! From groundbreaking ML research to advancing post-quantum crypto, here's a summary of last week:đź§µ

Jim Miller (@themijcipher) 's Twitter Profile Photo

The first ever Queer in Cryptography conference will be held in Rochester, NY on March 6th and 7th 2025! Register now and come celebrate the many great cryptography contributions from the LGBTQ+ community- allies welcome! cryptography.lgbt

Trail of Bits (@trailofbits) 's Twitter Profile Photo

The $1.5B Bybit hack marks a new era in cryptocurrency security. Attackers have moved beyond technical exploits to sophisticated operational attacks. Read our initial analysis of this historic breach and its industry-wide implications: blog.trailofbits.com/2025/02/21/the…

Jim Miller (@themijcipher) 's Twitter Profile Photo

My colleagues wrote a great explainer on the historic hack from today and what it means for the industry. Must read 👇