Live Coding: Custom Hash-Based Encryption πŸ”

Streaming my process of creating a custom hash-based encryption, despite unpaired earbuds. Feedback welcome for improvements!

Live Coding: Custom Hash-Based Encryption πŸ”
ibgibDOTcom
16 views β€’ Jul 14, 2022
Live Coding: Custom Hash-Based Encryption πŸ”

About this video

I streamed this video while my double-duty ear buds were unpaired. I'm going to leave it up as is. If you want me to ameliorate this, I'll be glad to add a soundtrack somehow. Or if you'd prefer to help address the root cause (and you even reading this indicates this is a good likelihood), let me know! Leave a comment here or on GitHub, or The Great Most High Force willing, an ibgib web1 presence. We'll see about getting some web3 on https://ibgib.space !

Encryption is hard and leave it to the experts...of course we're not going to do that today. I'm going to introduce my encrypt-gib encryption which is a custom encryption algorithm that relies on hashing only for encryption. I haven't done the math (i.e. cryptanalysis), so assume that this is super weak and super stupid. If you're new to encryption, probably best to ignore this. If you're like me, however, and you see a future moving away from PKI and more towards a balanced centralized-decentralized web architecture, this might be interesting. In my vision of "web3" (and I'm way out beyond the fringe in this world), reducing complexity is essential, especially in reducing surface area. So to remove an extremely dense, cryptic encryption library and instead use a hash-only algorithm could be useful. Of course, this does not obviate the necessity for other approaches, I'm just saying **no one** has a hash-only encryption algorithm, and maybe that's something that is detrimental.

About ibgib:

This is an ibgib video, about some aspect related to ibgib technologies. In short, ibgib is a web3 metaverse protocol that I've been developing for 20+ years. OK, it's more of my obsession. Instead of assuming a single-source of truth, I've tried to instill humility in its foundations. So even though we are using cryptographic principles, we never assume what our data shows is The Truth or Knowledge. Rather, living logic can best be represented by Beliefs and their evolution over time. Inevitably, this approach leads not only to sovereign, distributed data, but also to some degree of sovereign AIs. This is our approach to metaprogramming.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

16

Duration

01:24:14

Published

Jul 14, 2022

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.