log☇︎
600+ entries in 0.165s
mircea_popescu: which makes me believe republican format otp should actually come as xxxx xxxx xxxx xxxx xxxx xxxx xxxx xxxx [yyyy] blocks
mircea_popescu: a very useful tool for dropping the workload from ~50 minutes to ~30 minutes / otp is s/\n/" | sha512sum | cut -c1-2 >> hurr.txt \necho "/ and then comparing the line crcs.
deedbot: Get your OTP: http://p.bvulpes.com/pastes/Zq7xJ/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/H1aji/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/WneUD/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/CJykO/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/h49tI/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/tO5di/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/ATY1x/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/oe5Gr/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/8V4oi/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/8FWHx/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/xxWhV/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/xf62K/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/CC0aj/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/ROBzr/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/1IuVr/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/mivHR/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/Bp8rZ/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/K0MbO/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/hRPCe/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/y2oFP/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/VZ1pw/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/5zVVx/?raw=true
a111: Logged on 2019-05-22 14:05 stjohn_piano_2: 3) there may be an approach to signed comments that does not involve the primary key: examples: a) sign with a subordinate key b) validate your current IP for a time period (e.g. a month / year) by decrypting an OTP, like deedbot.
stjohn_piano_2: 3) there may be an approach to signed comments that does not involve the primary key: examples: a) sign with a subordinate key b) validate your current IP for a time period (e.g. a month / year) by decrypting an OTP, like deedbot. ☟︎
a111: Logged on 2019-05-22 12:51 diana_coman: stjohn_piano_2: re ^ , an OTP challenge is a way to check one's identity; hence, deedbot will not send an OTP in response to !!register but WILL send an OTP in response to ~any other command (technically to any command that is a request of *someone* i.e. that requires an identity)
diana_coman: stjohn_piano_2: re ^ , an OTP challenge is a way to check one's identity; hence, deedbot will not send an OTP in response to !!register but WILL send an OTP in response to ~any other command (technically to any command that is a request of *someone* i.e. that requires an identity) ☟︎
a111: Logged on 2019-05-16 17:11 stjohn_piano_2: asciilifeform: gpg --list-packets shows that the key ID is C8EFFF13 in the OTP file. The key ID of my public key is 5991 52AC. Is this expected? (the fingerprint shown by deedbot in the earlier line is correct, though).
a111: Logged on 2019-05-16 20:10 stjohn_piano_2: by mistake, i was attempting to decrypt the OTP sent to asciilifeform
stjohn_piano_2: ^ trinque. hope you see the above about OTP before doing any investigation.
diana_coman: heh, as I was reading the log, I was wondering if you were trying there the right OTP or someone else's
a111: Logged on 2019-05-16 16:55 deedbot: Get your OTP: http://p.bvulpes.com/pastes/q34GD/?raw=true
stjohn_piano_2: http://btcbase.org/log/2019-05-16#1913654 << pattern-matched as "ah, here is OTP" ☝︎
stjohn_piano_2: in my notes, i had this sequence: 1) join forum, 2) deedbot will present OTP, 3) decrypt OTP, 4) use !!v OTP.
stjohn_piano_2: by mistake, i was attempting to decrypt the OTP sent to asciilifeform ☟︎
stjohn_piano_2: just back to say: solved (non-)mystery of OTP
stjohn_piano_2: strange. doing the operation again with the original OTP still produces the error.
deedbot: Get your OTP: http://p.bvulpes.com/pastes/yXnbk/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/tiMdL/?raw=true
stjohn_piano_2: mp_en_viaje: ok. round 2 i.e. new OTP?
stjohn_piano_2: $ gpg --decrypt encrypted_otp.asc
stjohn_piano_2: puzzler: why the key ID in the otp message is C8EFFF13, while my key's fingerprint is 599152AC. importing the private key into gpg produces (in gpg --list-keys) the correct key ID 599152AC. diffing the key returned by deedbot with my public key shows no difference.
stjohn_piano_2 is reading http://edgecase.net/articles/basic_gpg_commands to try to use GPG the normal way to decrypt the otp.
stjohn_piano_2: asciilifeform: gpg --list-packets shows that the key ID is C8EFFF13 in the OTP file. The key ID of my public key is 5991 52AC. Is this expected? (the fingerprint shown by deedbot in the earlier line is correct, though). ☟︎
asciilifeform: cat yer_otp.txt | gpg --decrypt ?
stjohn_piano_2: i had some prepared commands, but i'm having some trouble decrypting the otp.
deedbot: Get your OTP: http://p.bvulpes.com/pastes/q34GD/?raw=true ☟︎
deedbot: Get your OTP: http://p.bvulpes.com/pastes/iceQu/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/wibRd/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/BOGAU/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/T6Ll1/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/zvRfS/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/uezIh/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/jt13P/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/g5lJm/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/DyZr2/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/SXWIq/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/v0WGF/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/eRXB7/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/HtINi/?raw=true
mircea_popescu: and incidentally, trinque 's otp way the fuck smarter than gpg's ascii armor format, slavegirl reports. degree of magnitude faster wetware diode if one needn't handle the shift.
deedbot: Get your OTP: http://p.bvulpes.com/pastes/zuwx6/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/nXxf3/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/4kxC6/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/suucL/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/MZQrI/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/mf5aN/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/CjZ5E/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/stCsE/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/fbHVx/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/V5U6o/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/qPYYR/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/P3q5O/?raw=true
asciilifeform: i.e. you can buy all the 'otp eprom' you want, but they're ALL ordinary flash with the write pin (promisetronically) nonworking
deedbot: Get your OTP: http://p.bvulpes.com/pastes/wstgr/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/k4pYa/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/zzoQ1/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/T4EDi/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/LN8mM/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/6ojPb/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/gnw6E/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/Z0gXi/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/CNahi/?raw=true
asciilifeform: the 1 device which dun rely on unprovens is... otp ( insert oblig old thrd here !11 )
deedbot: Get your OTP: http://p.bvulpes.com/pastes/DK7NK/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/SqPGY/?raw=true
a111: Logged on 2018-08-04 22:05 asciilifeform: ben_vulpes: iirc i proposed at one time an intermediate item on the way to proper gossipd ( 'serpent'-ciphered tunneler to connect coupla ircd instances to each other, and ditto for users ( get otp cookie a la deedbot, get a key that's good for 1 tcp connect ) but so far instead followed mircea_popescu's advice re not wasting sweat on such a thing, but pushing with ffa so as to get with what to gossipd.
deedbot: Get your OTP: http://p.bvulpes.com/pastes/Rt8io/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/e1XKL/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/1ESmT/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/WYs1g/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/QG7tk/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/DQOv9/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/olVxg/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/qWVuC/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/wj8AT/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/RqhQw/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/NHoYy/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/rvDia/?raw=true