lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

70
active users

#cryptography

8 posts8 participants1 post today
Alexander Hansen Færøy<p>This is undoubtedly the most promising Post-Quantum TLS deployment situation I have seen for <a href="https://mastodon.social/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> since we started discussing it more actively in the team. Very exciting!</p><p>I hope that OpenSSL 3.5, when released, will make it into <a href="https://mastodon.social/tags/Debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Debian</span></a> Trixie. That would make deployment of this so much more snappy and easy for the Tor network to upgrade, but that may be dreaming. The timelines here look quite difficult for that to happen, but let's hope.</p><p><a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/pqc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pqc</span></a> <a href="https://mastodon.social/tags/pqcrypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pqcrypto</span></a></p>
Nick Mathewson<p>What's the current consensus on whether I should worry about Grover's algorithm when choosing symmetric cryptography?</p><p><a href="https://abyssdomain.expert/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://abyssdomain.expert/tags/quantum" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quantum</span></a></p>
Alexander Hansen Færøy<p>Lo and behold, <a href="https://mastodon.social/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSL</span></a> 3.5 (their upcoming LTS release) will come out here at the beginning of April, and it does indeed support some of these hybrid PQC schemes. Their recent beta2 announcement can be read here: <a href="https://openssl-library.org/post/2025-03-25-openssl-3.5-beta/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">openssl-library.org/post/2025-</span><span class="invisible">03-25-openssl-3.5-beta/</span></a> and their roadmap is at <a href="https://openssl-library.org/roadmap/index.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">openssl-library.org/roadmap/in</span><span class="invisible">dex.html</span></a></p><p>Very excited by this work. Big kudos to the OpenSSL Team here! 🥳🎉 Already planning on giving this a spin with the C implementation of <a href="https://mastodon.social/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> later this week to see how it goes!</p><p><a href="https://mastodon.social/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/pqc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pqc</span></a></p>
stib<p>If I have a <a href="https://aus.social/tags/codeberg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codeberg</span></a> account set up, with a verified <a href="https://aus.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> key on my account and the corresponding public and private keys in `~/.ssh/`, is there a way that I can make it so that it doesn't ask me for my keyphrase every time I push? I'm sure VSCode could do this, but since I've switched to <a href="https://aus.social/tags/Helix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Helix</span></a>, which doesn't have git built-in I've been manually doing the git stuff.<br>My knowledge of <a href="https://aus.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> and <a href="https://aus.social/tags/git" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>git</span></a> are well and truly at the 'barely enough to get myself into trouble' level.<br><a href="https://aus.social/tags/AskFedi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AskFedi</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/FBI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FBI</span></a> raids home of prominent computer scientist who has gone incommunicado</p><p><a href="https://arstechnica.com/security/2025/03/computer-scientist-goes-silent-after-fbi-raid-and-purging-from-university-website/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">03/computer-scientist-goes-silent-after-fbi-raid-and-purging-from-university-website/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/politics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>politics</span></a> <a href="https://mastodon.thenewoil.org/tags/XiaofengWang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XiaofengWang</span></a> <a href="https://mastodon.thenewoil.org/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a></p>
ResearchBuzz: Firehose<p>Ars Technica: FBI raids home of prominent computer scientist who has gone incommunicado . “A prominent computer scientist who has spent 20 years publishing academic papers on cryptography, privacy, and cybersecurity has gone incommunicado, had his professor profile, email account, and phone number removed by his employer, Indiana University, and had his homes raided by the FBI. No one knows […]</p><p><a href="https://rbfirehose.com/2025/03/31/ars-technica-fbi-raids-home-of-prominent-computer-scientist-who-has-gone-incommunicado/" class="" rel="nofollow noopener noreferrer" target="_blank">https://rbfirehose.com/2025/03/31/ars-technica-fbi-raids-home-of-prominent-computer-scientist-who-has-gone-incommunicado/</a></p>
R. Scott Pert<p>FBI raids home of prominent computer scientist who has gone incommunicado</p><p>&gt; A prominent computer <a href="https://mastodon.cloud/tags/scientist" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scientist</span></a> who has spent 20 years publishing <a href="https://mastodon.cloud/tags/academic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>academic</span></a> papers on <a href="https://mastodon.cloud/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a>, privacy, and cybersecurity has gone incommunicado, had his professor profile, email account, and phone number removed by his employer <a href="https://mastodon.cloud/tags/Indiana" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Indiana</span></a> <a href="https://mastodon.cloud/tags/University" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>University</span></a>, and had his homes <a href="https://mastodon.cloud/tags/raided" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>raided</span></a> by the <a href="https://mastodon.cloud/tags/FBI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FBI</span></a>. No one knows why.</p><p>&gt; Xiaofeng Wang has a long list of prestigious titles. He was... <a href="https://arstechnica.com/security/2025/03/computer-scientist-goes-silent-after-fbi-raid-and-purging-from-university-website/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">03/computer-scientist-goes-silent-after-fbi-raid-and-purging-from-university-website/</span></a></p>
Schneier on Security RSS<p>AIs as Trusted Third Parties</p><p>This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as tr... <a href="https://www.schneier.com/blog/archives/2025/03/ais-as-trusted-third-parties.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/03/ais-as-trusted-third-parties.html</span></a></p><p> <a href="https://burn.capital/tags/machinelearning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>machinelearning</span></a> <a href="https://burn.capital/tags/academicpapers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>academicpapers</span></a> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://burn.capital/tags/trust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>trust</span></a> <a href="https://burn.capital/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a></p>
Veronica Olsen 🏳️‍🌈🇳🇴🌻<p>Haha, good one!</p><p><a href="https://mastodon.online/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a></p>
Minnesota Spy Club<p>Mar 24, 1944: On this date, the poem The Life That I Have was issued by Special Operations Executive cryptographer Leo Marks to agent Violette Szabo. The poem was made famous by its inclusion in the 1958 movie about Szabo, Carve Her Name with Pride. (1/2) </p><p><a href="https://mastodon.online/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a> <a href="https://mastodon.online/tags/WW2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WW2</span></a> <a href="https://mastodon.online/tags/SOE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOE</span></a> </p><p><a href="https://en.wikipedia.org/wiki/The_Life_That_I_Have" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/The_Life</span><span class="invisible">_That_I_Have</span></a></p>
hubertf<p>So you thought AES-CBC was safe from decrypting? Ask your nearest Padding Oracle for another opinion!</p><p><a href="https://mastodon.social/tags/aes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aes</span></a> <a href="https://mastodon.social/tags/cbc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cbc</span></a> <a href="https://mastodon.social/tags/poa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>poa</span></a> <a href="https://mastodon.social/tags/paddingoracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>paddingoracle</span></a> <a href="https://mastodon.social/tags/pwncollege" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pwncollege</span></a> <a href="https://mastodon.social/tags/ctf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ctf</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a></p>
Security Land<p>Quantum security is evolving. Terra Quantum latest research on QCKD demonstrates how secure communication can thrive even over lossy fiber networks. As the quantum era advances, businesses must prepare for the future of cybersecurity.</p><p><a href="https://mastodon.social/tags/securityland" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityland</span></a> <a href="https://mastodon.social/tags/emergingtech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>emergingtech</span></a> <a href="https://mastodon.social/tags/quantumsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quantumsecurity</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/quantumresistence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quantumresistence</span></a></p><p><a href="https://www.security.land/quantum-protected-key-distribution-securing-data-over-lossy-urban-fiber-networks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security.land/quantum-protecte</span><span class="invisible">d-key-distribution-securing-data-over-lossy-urban-fiber-networks/</span></a></p>
Jon PENNYCOOK<p>"US politicians and privacy campaigners are calling for the private hearing between Apple and the UK government regarding its alleged encryption-busting order to be aired in public."</p><p><a href="https://www.theregister.com/2025/03/14/apple_uk_encryption_hearing/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/03/14/app</span><span class="invisible">le_uk_encryption_hearing/</span></a></p><p>"Colloquially, the IPA is referred to as the Snooper's Charter since its aims are to legally empower intelligence agencies with greater surveillance powers."</p><p><a href="https://mstdn.social/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://mstdn.social/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://mstdn.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mstdn.social/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://mstdn.social/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> <a href="https://mstdn.social/tags/politics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>politics</span></a> <a href="https://mstdn.social/tags/uspol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>uspol</span></a> <a href="https://mstdn.social/tags/ukpol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ukpol</span></a> <a href="https://mstdn.social/tags/InvestigatoryPowersAct" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InvestigatoryPowersAct</span></a> <a href="https://mstdn.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mstdn.social/tags/Surveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Surveillance</span></a></p>
Compsci Weekly<p>Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process</p><p><a href="https://nvlpubs.nist.gov/nistpubs/ir/2025/NIST.IR.8545.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nvlpubs.nist.gov/nistpubs/ir/2</span><span class="invisible">025/NIST.IR.8545.pdf</span></a></p><p>Discussions: <a href="https://discu.eu/q/https://nvlpubs.nist.gov/nistpubs/ir/2025/NIST.IR.8545.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discu.eu/q/https://nvlpubs.nis</span><span class="invisible">t.gov/nistpubs/ir/2025/NIST.IR.8545.pdf</span></a></p><p><a href="https://mastodon.social/tags/compsci" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compsci</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a></p>
Calishat<p><a href="https://researchbuzz.masto.host/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://researchbuzz.masto.host/tags/art" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>art</span></a> <a href="https://researchbuzz.masto.host/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://researchbuzz.masto.host/tags/DunningKruger" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DunningKruger</span></a> </p><p>'Near the CIA headquarters in Langley, Virginia, there is a sculpture known as Kryptos. It has been there since 1990 and contains four secret codes—three of which have been solved. The final one has gone 35 years without being decrypted. And, according to a report from Wired, the sculptor responsible wants everyone to know that you are not solving the damn thing with a chatbot.'</p><p><a href="https://gizmodo.com/chatbots-have-convinced-idiots-that-they-cracked-the-code-on-a-mysterious-sculpture-in-the-cias-backyard-2000573216" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gizmodo.com/chatbots-have-conv</span><span class="invisible">inced-idiots-that-they-cracked-the-code-on-a-mysterious-sculpture-in-the-cias-backyard-2000573216</span></a></p>
Dyne.org foundation<p>But cryptography is hard. Until recently, institutions and individuals who need to run <a href="https://toot.community/tags/cryptographic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptographic</span></a> operations had to rely on specialists to review the code that their applications is running. Cryptography can protect our privacy and authenticate sources of important information. For <a href="https://toot.community/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> to work for the people, the people need to understand it.</p>
Schneier on Security RSS<p>The Combined Cipher Machine</p><p>Interesting article—with photos!—of the US/UK “Combined Cipher Machine” from WWII.... <a href="https://www.schneier.com/blog/archives/2025/03/the-combined-cipher-machine.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/03/the-combined-cipher-machine.html</span></a></p><p> <a href="https://burn.capital/tags/historyofcryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>historyofcryptography</span></a> <a href="https://burn.capital/tags/Uncategorized" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Uncategorized</span></a> <a href="https://burn.capital/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://burn.capital/tags/military" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>military</span></a></p>
Martin Rundkvist<p>Sweden nominally has a conscript army, though only a small percentage of each year's births ever get any <a href="https://archaeo.social/tags/military" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>military</span></a> training. I went through military evaluation at age 18. They offered to make me a cryptography officer. I was a pacifist, so I just turned conscientious objector. Also I had no idea about cryptography being used outside the military context. My career would have looked very, very different if I had studied to head a digital <a href="https://archaeo.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> team in 1991.</p>
Python Weekly 🐍<p>High School Assignment: RSA Encryption in Python</p><p><a href="https://youtu.be/D_PfV_IcUdA?si=lFORlsRiCHnVUo1H" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtu.be/D_PfV_IcUdA?si=lFORls</span><span class="invisible">RiCHnVUo1H</span></a></p><p>Discussions: <a href="https://discu.eu/q/https://youtu.be/D_PfV_IcUdA?si=lFORlsRiCHnVUo1H" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discu.eu/q/https://youtu.be/D_</span><span class="invisible">PfV_IcUdA?si=lFORlsRiCHnVUo1H</span></a></p><p><a href="https://mastodon.social/tags/compsci" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compsci</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://mastodon.social/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a></p>
Csepp 🌢<p>Interesting <a href="https://merveilles.town/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> thing I stumbled upon: the <a href="https://merveilles.town/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a> for <a href="https://merveilles.town/tags/PrivacyPass" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacyPass</span></a>.<br><a href="https://www.rfc-editor.org/rfc/rfc9576.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">rfc-editor.org/rfc/rfc9576.htm</span><span class="invisible">l</span></a><br>"Privacy Pass is an architecture for authorization based on <a href="https://merveilles.town/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a>-preserving authentication mechanisms. In other words, relying parties authenticate Clients in a privacy-preserving way, i.e., without learning any unique, per-Client information through the authentication protocol, and then make authorization decisions on the basis of that authentication succeeding or failing. Possible authorization decisions might be to provide Clients with read access to a particular resource or write access to a particular resource."</p>