Hafa adai! 👋
My name is Eli,
I build private and performant data systems.


--zig-lib-dirBuddy Guy brought the house down at Tiny Desk, with a feature from rising-superstar Miles Caton.
Once again, thank you Sinners.
When you overload a credential used for authentication by also using it for encryption, the ‘blast radius’ for losing that credential becomes immeasurably larger.
Password managers are an important area with surprisingly little formal analysis and this work emphasized the importance of fixing that.
To be presented at Real World Crypto 2026 and published at USENIX Security 2026.
Full paper can be found here: https://eprint.iacr.org/2026/058.
Bitwarden’s blog post on the subject is here: https://bitwarden.com/blog/security-through-transparency-eth-zurich-audits-bitwarden-cryptography/1.
Specific remediation details can be found in the report linked at the end. ↩︎
via Bas Westerbaan
A curated and crowdsourced list of ~*fancy*~ cryptography protocols, currently deployed at scale.
Some rabbit holes I’m falling down:
A super bowl chaser. The only thing more powerful than hate is love.