Juicebox Protocol (@juicebox_xyz) 's Twitter Profile
Juicebox Protocol

@juicebox_xyz

Open-source encryption key recovery — finally, no trade-offs between security and UX. You're welcome :)

ID: 1637982934035726336

linkhttps://www.juicebox.xyz/ calendar_today21-03-2023 01:02:34

10 Tweet

124 Followers

5 Following

Moxie Marlinspike (@moxie) 's Twitter Profile Photo

I've been helping with Juicebox, an open-source encryption key recovery system that provides high security coupled with a user-friendly design, to make encryption further accessible to larger numbers of people. Details on how it works: juicebox.xyz/blog/key-to-si…

Moxie Marlinspike (@moxie) 's Twitter Profile Photo

UX-friendly key recovery has been a challenge wherever cryptography appears. This makes sense, because cryptography turns other problems into key management problems. Ever reinstall an app like Signal and lose all your messages? That's a key management/recovery problem...

Michelle Lee (@mosh.bsky.social) (@mishmosh) 's Twitter Profile Photo

It's not secure if people don't use it. Gotta love a long and nerdy journey (and whitepaper) to wrap advanced security in a user-friendly design, from Signal's creator Moxie Marlinspike & team. Brava Juicebox Protocol Daniela Perlein! 👏🏽🔒❤️

Daniela Perlein (@danielaperlein) 's Twitter Profile Photo

Launching Juicebox Protocol today alongside Moxie Marlinspike Simon Fell & others: the Juicebox protocol for secrets management improves over best practices by iMessage, WhatsApp, Signal – here we detail how it enables distributed cryptography for key recovery. juicebox.xyz/blog/key-to-si…

Molly Mackinlay | momack (@momack28) 's Twitter Profile Photo

Really great write up on the workings behind Juicebox Protocol! Similar to distributed storage - it’s a great example of increasing security & robustness by distributing fractional trust across _many_ services, instead of one behemoth! 💪

Really great write up on the workings behind <a href="/juicebox_xyz/">Juicebox Protocol</a>! Similar to distributed storage - it’s a great example of increasing security &amp; robustness by distributing fractional trust across _many_ services, instead of one behemoth! 💪
Simon Fell (@superfell) 's Twitter Profile Photo

Fun fact: The HSM realm is implemented in Rust, including the code that runs on the PCIe HSM cards. github.com/juicebox-syste…

Diego Ongaro (@ongardie) 's Twitter Profile Photo

Juicebox improves the UX for end-to-end encrypted apps. I helped build lots of it, and it launched publicly today. It lets a user retrieve their strong encryption key by entering a short PIN, so logging into a new device is easy. juicebox.xyz/blog/key-to-si…

Diego Ongaro (@ongardie) 's Twitter Profile Photo

There's a lot happening under the hood to make this secure. The protocol distributes trust across independent backends, some running on tamper-resistant hardware (HSMs). See the blog post for details, whitepapers and Rust code.

Juicebox Protocol (@juicebox_xyz) 's Twitter Profile Photo

How to blend Juicebox Protocol' s SDK with your app: by following the steps outlined here, you should have a fully functional local environment ready to experiment with and build secure applications using our protocol's magical key recovery features juicebox.xyz/blog/unlock-ma…

Juicebox Protocol (@juicebox_xyz) 's Twitter Profile Photo

We believe key recovery has to be more than cryptographic theater. It has to reflect the real world, where systems get hacked, people make mistakes, and trust boundaries aren’t just vibes. Here's how to implement Juicebox properly: juicebox.xyz/blog/dont-put-…