raadhhaseeb Profile Banner
Haseeb Raja Profile
Haseeb Raja

@raadhhaseeb

Followers
66
Following
1K
Media
56
Statuses
829

Learning Blockchain/ZK/Cryptography. Open to Work. Default and Offensive Privacy. INFJ-T. Søren’s intensity, Camus’ solution, Spinoza's World.

Joined August 2013
Don't wanna be here? Send us removal request.
@raadhhaseeb
Haseeb Raja
2 days
Attached link contains the list of vulnerabilities in the Go cryptography packages. All credits to Filippo Valsorda ( https://t.co/tDPLt6YZSo) for compiling and sharing this sheet. https://t.co/LSv8ritEnp #golang
Tweet card summary image
docs.google.com
0
0
0
@raadhhaseeb
Haseeb Raja
5 days
2/ Baba Farid reminds us of the tragic paradox of sustenance and survival.
0
0
0
@raadhhaseeb
Haseeb Raja
5 days
1/ توں کی جانیں یار فریدا روٹی بندہ کھا جاندی اے Little do you know, O (friend) Farid, The (pursuit of) bread eats (devours) the man. #poetry
1
0
1
@raadhhaseeb
Haseeb Raja
5 days
0
0
0
@raadhhaseeb
Haseeb Raja
7 days
Morning 🌅
1
0
0
@PhilosophyDose_
Daily Dose of Philosophy
7 days
Sometimes clarity comes after chaos.
21
62
290
@raadhhaseeb
Haseeb Raja
7 days
A PQ, transparent, folding scheme (think IVC) that enables the APT to remain resourceful, mimics latching (the Venom), and remains evasive while maintaining obfuscation and forensic silence.
0
0
0
@LocasaleLab
Jason Locasale
8 days
Academic science doesn’t need more money. It needs fewer administrators and fewer weak scientists clogging the system. The people who actually innovate mostly need one thing: for everyone else to step aside.
49
50
555
@raadhhaseeb
Haseeb Raja
7 days
Yes, ZKPs are computationally brutal, for now. *winks in PQ-ZK
0
0
0
@raadhhaseeb
Haseeb Raja
7 days
Offensive pipeline for the signed zk-APT: 1. Reach the target. 2. Enclave and stealth. 3. Recon. 4. Verify the proof of conditions. 5. Execute. Goals: Forensic immunity, obfuscation, stealth, autonomy. #zk #cryptography
2
0
0
@raadhhaseeb
Haseeb Raja
7 days
A zk-aware, multistage terminal agent (optionally TEE-isolated) that runs an offensive cmd pipeline, unwrapping each stage only when a ZK proof of the right environment and privileges verifies, enabling cross-device CTF missions without exposing the when, the why, or the how.
@raadhhaseeb
Haseeb Raja
7 days
Picture offensive privacy as Venom waiting for its prey in ZK. It clings onto the attacker without alarm or suspicion, until the predator becomes the prey. Now imagine it as a default.
1
0
0
@raadhhaseeb
Haseeb Raja
7 days
Picture offensive privacy as Venom waiting for its prey in ZK. It clings onto the attacker without alarm or suspicion, until the predator becomes the prey. Now imagine it as a default.
0
0
0
@vxunderground
vx-underground
8 days
I also want to note here that I've met people WAY smarter than me. I've met truly brilliant people yet I've passed them in the malware field. Intelligence is one thing, but if you're intelligent and you don't apply yourself and actually do something, then nothing will happen.
9
10
303
@Jeyffre
Jeffrey Scholz | Devconnect 🇦🇷
11 days
You’ll have a much easier time understanding ZK-STARKs if you already know how the Number Theoretic Transform works (Fast Fourier Transform for Polynomial evaluation in finite fields). The core subroutine in ZK-STARKs, FRI, is a close variant of the NTT. Now you can learn NTT
@RareSkills_io
RareSkills
11 days
Imagine understanding an algorithm so well that you can carry it out - by hand - off the top of your head - and without memorizing any unnatural tricks The ZK Book has expanded again, this time to teach the Fast Fourier Transform -- specifically the Number Theoretic Transform
2
15
126
@justinskycak
Justin Skycak
7 days
Even if you can't take as big mental leaps as someone else, you can often still compete on superior skillmaxxing. Obviously cognitive advantages give a huge leg up, but few people come anywhere close to maximizing the volume & efficiency of their upskilling.
2
11
88
@raadhhaseeb
Haseeb Raja
7 days
Life hack to take control of your attention: Get up, walk away, come back in few minutes. Process: mental block --walk away--> stimulus changes --rest breaks loop--> mind enters diffuse mode --return--> pomodoro kicks in #lifehacks #ADHD
0
0
0
@raadhhaseeb
Haseeb Raja
7 days
Cryptography is a tool for existential sovereignty against overwhelming, rabid forces and tech should be accessible, verifiable, and incorruptible. #cryptography
0
0
0
@raadhhaseeb
Haseeb Raja
8 days
Ain't worth it if it's not fair.
0
0
0
@raadhhaseeb
Haseeb Raja
8 days
"I will fix the bug tomorrow." said no developer ever. #programming #meme
0
0
0