About:

I do research work in applied cryptography more specifically and in computer security more generally. Currently, my main research and software project is Verifpal, and my occupation is running a small applied cryptography consultancy called Symbolic Software. I live in Paris, France.

Website:

Specializations:

Incoming Links:

Outgoing Links:

Matthew Green
Subscribe to RSS:
The author describes the challenges of obtaining a driver's license in France, including the high cost, strict standards, and scarcity of examination slots. They argue that the system needs reform to better support working-class i...
The blog post discusses the emergence of fictional characters in the security, information security, and cryptography/cryptocurrency circles, and how they are leading subcultures. It highlights the chronic delusion of these charac...
Meredith Whittaker, President of Signal, is detained at Le Bourget airport and faces charges related to Signal's encrypted platform. She negotiates with authorities and proposes Signal's exit from the EU to avoid legal issues, whi...
Nadim Kobeissi critiques a TechCrunch article on Google's call-scanning AI, arguing that the concerns raised by privacy experts are unfounded. He refutes the arguments made by the experts, emphasizing that Google's feature is base...
The author discusses the state of calendar software on desktops, highlighting the lack of good calendar software for Linux and Windows. He argues that the only viable solution is to create a new open-source calendar project levera...
The blog post is about Nadim Kobeissi's work desk in 2023, which includes a minimalist desk, a powerful PC laptop, a high-quality display, audiophile-grade speakers, a wireless mic, and a comfortable chair. He also discusses other...
The author shares their experience of using an Apple Studio Display on a Windows computer, discussing the display's features, connectivity, and driver installation. They provide detailed instructions for connecting the display to ...
The blog post discusses the process of writing an Othello AI in Rust for iOS and Mac Catalyst. It covers the necessary tools, creating a Rust project, generating Rust library bindings for Swift, building the Rust library for iOS a...
The blog post discusses the sustainability of open source projects and the idea of turning them into LLCs to contract with big companies. The author critiques the idea, arguing that it's not a novel concept and that it comes with ...
The blog post details the author's journey of creating an Othello software implementation, from learning AI algorithms to developing a high-quality iPhone game. The post discusses the challenges faced, the process of rewriting the...
The blog post discusses the feasibility of secure traceability in end-to-end encrypted messaging, particularly in response to WhatsApp's claims. The author, an applied cryptographer, argues that secure traceability is possible and...
The blog post discusses the author's excitement about the Apple Silicon M1 chip and the performance of the M1 MacBook Pro. It covers the technical specifications of the M1 chip, the differences between the M1 MacBook Pro and the M...
The author discusses the experiences he had working on Verifpal, including a situation with Zoom where they used Verifpal without giving credit, and the author's decision to publicly document instances of abusive treatment in the ...
The blog post discusses the flaws in France's StopCOVID application, highlighting the issues with its privacy-preserving design and the centralized database architecture. The author argues that the application is unfit for nationa...
The iPhone SE is a significant event in the smartphone industry, marking a shift towards more affordable and practical design. The author compares this shift to the evolution of consumer car design and predicts a new era in pocket...
The post covers the ongoing controversy between the DP-3T community and PEPP-PT regarding contact tracing protocols for COVID-19. It discusses the concerns about PEPP-PT's opacity, centralized approach, and lack of transparency. T...
The post contains spoilers and discusses the Half-Life: Alyx game, focusing on the character G-Man and his role in the Half-Life series. It provides a chronological summary of G-Man's influence on the plot, explores the character'...
The blog post discusses the Selfie attack on TLS 1.3, which allows a client to authenticate itself using a pre-shared key, leading to a reflection attack. The author argues that the attack has limited practical implications and do...
The author shares his experience of repairing a ThinkPad P1 with a corrupt Thunderbolt firmware chip. He explains the problem, the motivation, and the process of repairing the laptop. The repair involved finding the EEPROM chip, h...
The blog post discusses the use of encryption software by terrorists and the implications for the rights and security of global communities. The author argues that encryption software is essential for secure communication and that...