Secret Diplomatic Message Deciphered After 350 Years
Posted3 months agoActive3 months ago
nationalarchives.gov.ukResearchstory
calmpositive
Debate
40/100
CryptographyHistoryCodebreaking
Key topics
Cryptography
History
Codebreaking
A 350-year-old secret diplomatic message was deciphered using codebreaking software and manual work, sparking discussions on historical cryptography and its relevance to modern encryption methods.
Snapshot generated from the HN discussion
Discussion Activity
Active discussionFirst comment
4h
Peak period
12
66-72h
Avg / period
4.1
Comment distribution41 data points
Loading chart...
Based on 41 loaded comments
Key moments
- 01Story posted
Oct 16, 2025 at 11:56 AM EDT
3 months ago
Step 01 - 02First comment
Oct 16, 2025 at 4:24 PM EDT
4h after posting
Step 02 - 03Peak activity
12 comments in 66-72h
Hottest window of the conversation
Step 03 - 04Latest activity
Oct 20, 2025 at 6:41 AM EDT
3 months ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 45606986Type: storyLast synced: 11/20/2025, 1:42:01 PM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
The proprietor of Maryland landed the title Baron Baltimore through friendship with the spymaster to Queen Elizabeth, "whom Calvert had met during an extended trip to the European mainland between 1601 and 1603".
"He also held the title of Earl of Salisbury in 1605 and Lord High Treasurer in 1608, making him the most powerful man at the royal court."
The Calvert family lost the Maryland estate after the armed insurrection of 1689, however the Crown returned the estate to the Calvert family in 1715 "after Charles Calvert, 5th Baron Baltimore, declared in public that he was a Protestant."
The final "23rd Governor of Restored Proprietary Government" Sir Robert Eden, 1st Baronet, was the great great grandfather of Prime Minister Anthony Eden.
https://en.wikipedia.org/wiki/George_Calvert,_1st_Baron_Balt...
https://en.wikipedia.org/wiki/Province_of_Maryland
https://en.wikipedia.org/wiki/Secret_Treaty_of_Dover
These also existed for corporate entities. A concern might have their own codebook such that the telegraph office would not be privy to their internal business.
They would also use codebooks as a type of compression, since the telegraph company charged less for sending English words as opposed to enciphered characters, and obviously, there are many uncommon words that could substitute for longer common phrases.
https://en.wikipedia.org/wiki/Codebook
https://en.wikipedia.org/wiki/Commercial_code_(communication...
https://eprint.iacr.org/2025/1237.pdf
I loved this quote as well
It is one of those domains where success would land you in a gilded prison.
Consider the likelihood of managing that without alerting the authorities to what is going on.
So we who grew up with 500MB computers could properly communicate how big the drives "felt" at the time, compared to what we have today.
But almost all that data is going to turn out to be useless if or when they gain quantum ability to decrypt it, and even the stuff that could be useful now gets less useful with every month it stays encrypted. Stuff that is very useful intelligence now could be absolutely useless in five years…
By observing DNS lookups in centralized taps like room 641a at AT&T.
That being said, it's not 100% used everywhere yet (Wikipedia mentions 92.6% of websites), and various means of tricking devices into downgrading to an older protocol would result in traffic that might be decrypted later.
Both the FFDH and ECDH key agreement algorithms are vulnerable to quantum crypt-analysis; someone capturing traffic today could later break that agreement and then decrypt the data. An attacker would have to capture the entire session up to the "point of interest" though.
This is why FFDH/ECDH are being augmented with Post-Quantum secure KEMs.
I'm still convinced that the simulation hypothesis is just religion for the atheist or agnostic, because if it turns out that it's correct and one day you 'wake up' only to find that it was all a simulation, well how do you know that isn't now also just another simulation? It's a non-theory. But I find this some quite compelling circumstantial evidence in favor of this non-theory. Because an arbitrary number of individuals may be able to experience "this" era throughout our species' future, yet only one group will be the one that gets to actually live it, and that group will ostensibly be orders of magnitude smaller than the sum total of all that will later 'experience' it. Statistically you're rather more likely to belong to the simulation group than the real, if these assumptions are correct.
Even trying to do something like saving 'just' the average yearly traffic tor handles would account for 2-3% of all the current storage available.
We're talking about the same government that quickly abandoned their quest of 'archiving every tweet in the Library of Congress'
That explains how the team of 3 codebreakers got it, but what about the other codebreaker, Matthew Brown, who figured it out by himself? The article doesn't say anything about his approach. Seems impressive if he can match the effort of three cryptographers using their own custom software. I want to read more about him!