Introducing Adiantum: Encryption for the Next Billion Users

Adiantum allows us to use the ChaCha stream cipher in a length-preserving mode, by adapting ideas from AES-based proposals for length-preserving encryption such as HCTR and HCH.
Read more →

AlphaStar: Mastering the Real-Time Strategy Game StarCraft II

Games have been used for decades as an important way to test and evaluate the performance of artificial intelligence systems.
Read more →

Killing Eve

After a series of events, the lives of a security operative and an assassin become inextricably linked.
Read more →

HTTP/3: From root to tip

HTTP is the application protocol that powers the Web.
Read more →

On Body and Soul

When slaughterhouse workers Endre and Mária discover they share the same dreams - where they meet in a forest as deer and fall in love - they decide to make their dreams come true but it’s difficult in real life.
Read more →

Google Public DNS now supports DNS-over-TLS

We implemented the DNS-over-TLS specification along with the RFC 7766 recommendations to minimize the overhead of using TLS.
Read more →

First release of dav1d, the AV1 decoder

dav1d is good enough that it has an official release, dav1d now covers all the spec and features of AV1 (including 12bits), dav1d is very fast on modern desktop and it is getting faster on mobile chips.
Read more →

HTTP/3

The protocol that’s been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.
Read more →

Learning Complex Goals with Iterated Amplification

We’re proposing an AI safety technique called iterated amplification that lets us specify complicated behaviors and goals that are beyond human scale, by demonstrating how to decompose a task into simpler sub-tasks, rather than by providing labeled data or a reward function.
Read more →

Training AI agents to solve unfamiliar tasks

Composable planning is a new way of building artificial intelligence (AI) agents that are better at solving unfamiliar tasks.
Read more →