this post was submitted on 08 Jul 2023
11 points (100.0% liked)

cyph3rPunk

778 readers
1 users here now

The people in this community hope for a world where an individual's informational footprints—everything from an opinion on abortion to the medical record of an actual abortion—can be traced only if the individual involved chooses to reveal them; a world where coherent messages shoot around the globe by network and microwave, but intruders and feds trying to pluck them out of the vapor find only gibberish; a world where the tools of prying are transformed into the instruments of privacy. There is only one way this vision will materialize, and that is by widespread use of cryptography. Is this technologically possible? Definitely. The obstacles are political—some of the most powerful forces in government are devoted to the control of these tools. In short, there is a war going on between those who would liberate crypto and those who would suppress it. The seemingly innocuous bunch strewn around this community represents the vanguard of the pro-crypto forces. Though the battleground seems remote, the stakes are not: The outcome of this struggle may determine the amount of freedom our society will grant us in the 21st century. To the Cypherpunks, freedom is an issue worth some risk.


Relevant Links:


"Security is mostly a superstition. It does not exist in nature, nor do the children of man as a whole experience it. Avoiding danger is no safer in the long run than outright exposure. Life is either a daring adventure, or nothing." Helen Keller

founded 2 years ago
MODERATORS
 

Lion is a formally verified, 5-stage pipeline RISC-V core. Lion targets the VELDT FPGA development board and is written in Haskell using Clash.

This repository contains four parts:

  1. The Lion library: a pipelined RISC-V core.
  2. lion-formal: formally verify the core using riscv-formal.
  3. lion-soc: a System-on-Chip demonstrating usage of the Lion core on the VELDT.
  4. lion-metric: Observe Yosys synthesis metrics on the Lion Core.

In my view, with RISC-V, it is finally within the realm of possibility for every single layer of a machine's architecture to be open source and formally verified. The development on this seems to have gone mostly dormant (and many of the toughest parts of the process remain).

I am posting this here because this sounds like a great foundation for a cypherpunk machine. My vision is for an end-to-end formally verified machine and OS. 99.9999999999% free of back doors, exploits. That's sort of impossible but this machine might have less of them. It would obviously require extreme hardening in comparison to a typical Linux machine.

This might be the foundation for something like "trusted hardware".

applications for such a machine:

  • Lemmy/ActivityPub instance (this one would be the perfect candidate)
  • secure communications
  • pen testing
  • voting machines
  • stake pool/node/mining
  • lite node for real-time on-site transaction verification

I don't nearly have the skills to approach this. But what I do have is time.

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here