February 21, 2026
Crypto genius or character assassination?
DJB's Cryptographic Odyssey: From Code Hero to Standards Gadfly
Internet security legend gets a glowing profile… and the nerds absolutely riot
TLDR: A glowing article about legendary security researcher Daniel J. Bernstein sparked a full-on nerd civil war: fans say he’s a difficult but principled watchdog who’s usually right, critics say the piece is biased, shallow, and borders on character worship. It matters because his designs protect most internet traffic today.
Daniel J. Bernstein, the math genius whose code quietly protects most of the internet, just got a long, admiring write‑up — and the comment section immediately turned into a courtroom drama. One camp insists he’s the rare cranky genius who’s actually been right for decades, especially about government agencies trying to keep security weaker than it could be. Another camp says: sure, he’s brilliant, but this article is basically a fan letter pretending to be journalism.
One commenter flat-out calls it “the worst sort of journalism,” accusing the author of cherry-picking facts and glossing over all the real drama, like fights over new encryption standards and post‑quantum tech (the stuff meant to survive future quantum computers). Another blasts it as an “anonymous hit piece” and compares DJB to free‑software icon Richard Stallman: annoying, intense, sometimes rude — but driven by principles, not politics.
Then there’s the gossip: people sharing old war stories of DJB calling them “company shills” in public meetings, while others roll their eyes at his legendary mailing-list rants. One top commenter even says the whole thing “reads very LLM‑y,” basically accusing the article of sounding like it was written by a robot. The real plot twist? For many in the thread, DJB’s personality flaws are just spicy seasoning on the main dish: a guy whose math they trust more than most institutions.
Key Points
- •Daniel J. Bernstein introduced Curve25519 (2006), ChaCha, Poly1305, and the NaCl library, and later co‑introduced Ed25519 (2011).
- •OpenSSH adopted Curve25519 ECDH and Ed25519 in 2014 and incorporated ChaCha20‑Poly1305; Google and Cloudflare promoted ChaCha20‑Poly1305 for HTTPS.
- •RFC 7905 (2016) standardized ChaCha20‑Poly1305 for TLS 1.2; TLS 1.3 (2018) recommended X25519 for key exchange and Ed25519 for identity.
- •Major browsers (Chrome, Firefox) implemented X25519; apps like Signal and WireGuard adopted Ed25519, driving wide deployment.
- •Cloudflare reported that in 2024 almost all TLS traffic used X25519; the article notes X25519 now secures most Internet connections.