Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I loved these books so much I wrote part of my book's first chapter[1] in the same style. Here's an excerpt:

> In all the years I’ve spent studying and working with cryptography, I’ve never noticed a single pattern in which a cryptographic primitive ends up being used in real-world applications. Things are pretty chaotic. Before a theoretical primitive gets to be adopted, there’s a long list of people who get to handle the primitive and shape it into something consumable and sometimes safer for the public at large. How can I even explain that to you?

> Have you heard of Choose Your Own Adventure? It’s an old book series where you got to pick how you want to step through the story. The principle was simple: you read the first section of the book; at the end of the section, the book lets you decide on the path forward by giving you different options. Each option was associated with a different section number that you could skip directly to if you so chose. So, I did the same here! Start by reading the next paragraph and follow the direction it gives you.

> Where it all begins. Who are you? Are you Alice, a cryptographer? Are you David, working in the private industry and in need of a solution to your problems? Or are you Eve, working in a government branch and preoccupied by cryptography?

> You’re Alice, go to step 1.

> You’re David, go to step 2.

> You’re Eve, go to step 3.

> ...

(you can read that for free I believe)

[1]: https://livebook.manning.com/book/real-world-cryptography/ch...



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: