600+ entries in 0.177s
mircea_popescu: asciilifeform are you nuts or what ? can't have "
rng with entirely known characteristics"
a111: Logged on 2019-01-22 06:57 BingoBoingo: <asciilifeform> BingoBoingo: how does it cache the e.g. tB of
rng i happen to generate in racked box in jp and dload via ssh ? << I will say that this does suggest .jp s a candidate for Pzarro rack 2 when that time comes
BingoBoingo: <asciilifeform> BingoBoingo: how does it cache the e.g. tB of
rng i happen to generate in racked box in jp and dload via ssh ? << I will say that this does suggest .jp s a candidate for Pzarro rack 2 when that time comes
☟︎ mircea_popescu: how the fuck would this even work, indulge me. arm processor just invents
rng opcode ?
a111: Logged on 2019-01-15 22:10 mircea_popescu: (ie, you can construct an infinity of
rng strings which'll make a given sct "falsely" converge)
mircea_popescu: (ie, you can construct an infinity of
rng strings which'll make a given sct "falsely" converge)
☟︎ mircea_popescu:
http://btcbase.org/log/2015-07-08#1193607 << this makes for a pretty lulzy re-read, in the context of the meanwhile better fleshed out notions of structure and trees and whatnot. isn't it obvious, asciilifeform , that the ~substantial difference~ is not at all the "head
rng" but simply the extension and especially quality of the conceptual trees involved ? the "head v" so to speak ?
☝︎ mircea_popescu: kinda states differently ye olde "ciphers are not worth having when encryption's available". IF you have
rng to piss out, might as well find some primes.
a111: Logged on 2017-02-14 19:19 asciilifeform: specifically, for every byte you intend to send, you instead send two: x, y. which you generate by obtaining
rng byte r, and payload byte b, and x := b xor r, y := r
mircea_popescu: the more i think about this whole serpent business, the more it becomes evident that the ~only~ way to have a cipher (not encryption, ie, asym keys, but enciphering, ie, simmetric keys) stronger than serpent is to ~mix
rng bits~. ie, the weakest cipher is the one where len(E) = len(P), and they're all equally week, and 1 serpent worth. to go stronger, you must have something that has len(E) = a len(P) + b sorta thing. the key
danielpbarron: pretty sure it was
RNG + player seeds, publish after hand/game
a111: Logged on 2018-11-01 17:44 asciilifeform: i had to algebraize the thing , and have just the right
rng bits flip in head , to get the 'ceiling tiles' ( why didn't mircea_popescu get'em in '15 ? )
bvt: just tested ffa-8 where
rng was introduced -- it works fine. would be trying to understand what is wrong with my code, then
bvt: i used gnat 2017. will test ffa
rng code and see if it works out.
mircea_popescu: asciilifeform consider also that if a, b, c, d, e, f are
rng words, then (P xor a) xor b) etc does not in fact substract anything.
a111: Logged on 2018-10-11 19:59 phf: but it also seems that before that becomes reality we either have to patch linux kernel or implement a
rng daemon or somesuch
a111: Logged on 2018-10-11 19:34 asciilifeform: phf, bvt : i thought of a possible algo for sane tmp file creation that dun need
rng or global counter. 1) pick a file name in tmp dir, if none exists, take empty string, as string S 2) produce S' = H(S) , H is hash (e.g. keccak) 3) stat(S') ; if already exists, take S'' = H(S') and repeat .
phf: but it also seems that before that becomes reality we either have to patch linux kernel or implement a
rng daemon or somesuch
☟︎ phf: asciilifeform: i believe that was the real conclusion of yesterday's conversation: you want easy access to a real
rng from any republican process at any time, and that makes a lot of idiotic problems go away
bvt: Apparently those addresses are used as 'poor man's
RNG'