log☇︎
346 entries in 0.901s
mircea_popescu: you seriously should make a proper nick and register your pgp with deedbot.
fromphuctor___: thanks... would the phuctor checker work with non PGP keys, if i correctly converted an RSA key to the required format?
mircea_popescu: ;;later tell egorsmkv consider registering your pgp key with deedbot ; i'll rate you and you'll beable to self-voice
mircea_popescu: http://nosuchlabs.com/gpgkey/0D9057DA7AEE12C725AA9408D47F4FFC3769BEF7891A0F9C0A9F38420C5C08AB << a look, PGP Corporation Update Signing Key; PGP Corporation Update Signing Key <update-key@pgp.com>; with the 32 bit mirroring thing. we're by now in last year's territory amirte ? i recall seeing this.
mircea_popescu: i would think this is definitionally lame, "o hey check out my pgp key with the cool domain and the shitty exponent".
mircea_popescu: i don't think there's anything wrong with proper, full rsa (as opposed to the neutered version implemented by pgp)
sbp: "Searching pgp.mit.edu for key with fingerprint"
asciilifeform: 'For open source code, you read the code, line by line, verify that it is in fact safe to run. You then issue a PGP-signed certificate which pretty much says "I the X of Y have reviewed the below code and judged it safe in accordance with Z".'
assbot: Searching pgp.mit.edu for key with fingerprint: 76EB8DE4EA28A5C4746C71AA7C7F34CDCF4CDA75. This may take a few moments.
asciilifeform: mircea_popescu: imho single-bit scalar pgp is rather like car with sole control being a gas pedal.
asciilifeform: incidentally anybody who actually tries the latter with pgp, is stuck with mutilated line endings
mircea_popescu: " 1]To whomever is now going to say "it's server fault, deedbot should output GPG signed material with proper mimetype like application/pgp-signature". I can only recommend frontal lobotomy by robot that fetches its instructions with wget." << i lolled.
mircea_popescu: why the fuck did you imagine the various items and pillars to build a coherent world-envelloping system come to me so easily ? i'm not coming up with fucking wot-economy and pgp-corporations and all this de novo, i'm just applying to pre-existing items!
assbot: Successfully added a rating of -1 for pgp with note: random schmuck with bizarre pretensions.
mircea_popescu: !rate pgp -1 random schmuck with bizarre pretensions.
asciilifeform: mircea_popescu: if you can pick a cipher or combo of ciphers you can temporarily stomach, we can have an irc box up with pgp auth.
assbot: Searching pgp.mit.edu for key with fingerprint: 7CCB395483FDDC68A7E7B70E7CA40926D6E34EAD. This may take a few moments.
mircea_popescu: how about you register a pgp sig with assbot.
assbot: Searching pgp.mit.edu for key with fingerprint: 9AF0C08E3C97CF0CCDC2F6E3201E1D0C00EDF5AB. This may take a few moments.
assbot: Searching pgp.mit.edu for key with fingerprint: 9AF0C08E3C97CF0CCDC2F6E3201E1D0C00EDF5AB. This may take a few moments.
assbot: Searching pgp.mit.edu for key with fingerprint: 559FA134DE33AED70DF97D8B085ADF061C2B20CD. This may take a few moments.
maqp: I won't have to disconnect since it's running on uni server's screen. But you get more assurance on my future bitcoin account signed with my PGP key https://pgp.mit.edu/pks/lookup?op=vindex&search=0x085ADF061C2B20CD
mircea_popescu: also, it's a good idea to register your pgp key with assbot. that way you create an identity in the wot we can attach to.
assbot: Searching pgp.mit.edu for key with fingerprint: 112F353F5A3EEEBE3B0E824A36F13568F209C5B0. This may take a few moments.
assbot: Logged on 01-04-2015 21:20:02; *: ascii_field listened (in car) to an infuriatingly zimmermanish interview with jon callas (former pgp, now 'silent circle' garbage)
Linus_: it's supposed to be like PGP , but with Forward Secrecy, and some othe stuff
pete_dushenski: Linus_: if you need help with the pgp part of the equation, start here http://www.contravex.com/2014/09/23/please-to-pgp-guide-for-linux-os-x-windows/
mircea_popescu: no buZz. if you want to be able to voice register your pgp key with assbot.
mircea_popescu: SamPatt ah you the guy with a blog and a proper pgp key on it ?
assbot: Searching pgp.mit.edu for key with fingerprint: 57E72CD7F935682FB8E5254B0C5455BF89B9D200. This may take a few moments.
assbot: Searching pgp.mit.edu for key with fingerprint: 57E72CD7F935682FB8E5254B0C5455BF89B9D200. This may take a few moments.
assbot: Searching pgp.mit.edu for key with fingerprint: E9306C6E1CCE5697A88B54825E16D36EDB3240F9. This may take a few moments.
PeterL: so I was playing with the idea of http://trilema.com/2015/the-pgp-w-mode/ ☟︎
asciilifeform: 'All of it could be an elaborate hoax—perhaps orchestrated by Wright himself. The unverified leaked documents could be faked in whole or in part. And most inexplicably of all, comparisons of different archived versions of the three smoking gun posts from Wright’s blog show that he did edit all three—to insert evidence of his bitcoin history. The PGP key associated with Nakamoto’s email address and references to an upco
nubbins`: more of a passive thing these days. i've been trying to get a full set of silvers with pgp docs
ascii_field: ^ were they signed with isis pgp key ?
mircea_popescu: looky. a gossipd based on the concept that you keep firewalled clients at home and they connect to a random pile of websites, which simply respond with pgp -w text
mircea_popescu: incidentally, re the eventual republican reimplementation of pgp : other than the -a armored mode, i want it to also have a -w armored mode. in this mode, it should load a list of lines from a file, modulo the message by the line count of that file, replace every numeric unit with the respective line,
assbot: Logged on 17-11-2015 22:38:39; ascii_field: (is a specially crafter derplinux pre-impregnated with tor, faux pgp, etc)
ascii_field: (is a specially crafter derplinux pre-impregnated with tor, faux pgp, etc) ☟︎
mircea_popescu: "PGP is not as important as people think. As long as both parties use an encrypted email (and connect with a VPN, TOR, TAILS, whatever) you're fine. This is because if they get access to the webmail all information is decrypted either using automatic PGP decryption (eg: Countermail) or locally on their computer (somewhere this information is going to be stored)."
mircea_popescu: kakobrekla oh i see, THERE it's about the version. if it were a different version than 3.1 it'd have been fine, because windows is usgtronics. MEANWHILE the problems with gpg-hijacked are really problems WITH PGP.
assbot: A Few Thoughts on Cryptographic Engineering: What's the matter with PGP? ... ( http://bit.ly/1QE27o9 )
phf: couldn't find it in logs, but i'm fascinated by this "research". top comment on lobste.rs where it got posted links to http://blog.cryptographyengineering.com/2014/08/whats-matter-with-pgp.html which was pretty discussed. "there's consensus!" somebody ought to publish meta study of "gpg poor usability"
phf: http://arxiv.org/pdf/1510.08555.pdf "Why Johnny Still, Still Can’t Encrypt: Evaluating the Usability of a Modern PGP Client". wtf is the point of these "studies"? "We elected to test Mailvelope, a modern PGP tool, for our study. Mailvelope is a browser extension that integrates with users’ webmail systems." "Participants were allocated sixty minutes to com- plete the study, with about 35-40 minutes spent using Mail- velope."
mircea_popescu: basically you need a pgp key (do you have one ?) and register it with assbot
asciilifeform spoke to brother of poettering, drepper, et al, and he replied 'wouldn't it be interesting if someone built a thing where people signed code with pgp and rated one another and...'
assbot: Searching pgp.mit.edu for key with fingerprint: A2E107958CF9F320EFB05297F5972074BD8D68DF. This may take a few moments.
assbot: Searching pgp.mit.edu for key with fingerprint: A2E107958CF9F320EFB05297F5972074BD8D68DF. This may take a few moments.
assbot: Searching pgp.mit.edu for key with fingerprint: E465FB9F065F4BF966AF465407CC5D7C4A0208B8. This may take a few moments.
mircea_popescu: "In PGP and GnuPG, the public-key cipher is probably the weaker of the pair. Fortunately, however, if an attacker could decrypt a session key it would only be useful for reading the one message encrypted with that session key. The attacker would have to start over and decrypt another session key in order to read any other message."
ascii_field: now mircea_popescu, find a fast machine with hardware rng and run n = 21474837. then, shoot it into pgp.mit.edu ...
binaryatrocity: by signing a message with your PGP key, thus linking hte accounts
mircea_popescu: <ascii_field> or, if american forgery, why not crank out a pgp to sign with
ascii_field: or, if american forgery, why not crank out a pgp to sign with
mircea_popescu: <phf> asciilifeform: why did you go with a separate keys folder instead of relying on existing pubring? << more calmly explained, because pgp is marked for death. we're working deliberately towards replacing it.
asciilifeform: perhaps by winter's end i will hear from him again, with a pgp sig
assbot: Searching pgp.mit.edu for key with fingerprint: 551516687E08CB0D60CA4A56D9AEA7019BAAD3FE. This may take a few moments.
asciilifeform: no screwing with pgp separately, no untarring, etc.
assbot: Searching pgp.mit.edu for key with fingerprint: 4A0363951AFA090B6C221787E2F23DB84A63EC22. This may take a few moments.
assbot: Searching pgp.mit.edu for key with fingerprint: 4A0363951AFA090B6C221787E2F23DB84A63EC22. This may take a few moments.
assbot: Searching pgp.mit.edu for key with fingerprint: 16C81597E76E86E6C01EF037AA4B3330F162C410. This may take a few moments.
mircea_popescu: anton_osika i don't understand what you think pgp sigs have to do with phuctor ?
nubbins`: or would you like for contracts signed with your pgp key to only be resolved via that same key?
BingoBoingo: <gabriel_laddel> trinque: I have a listing of programs associated with my PGP identity, you can make references to them, and people will be able to see them (or not) based on my trust relationship with them... << It is essential for WoT to exist that I can safely point at the enemy's words and bury them in sulfur
gabriel_laddel: trinque: I have a listing of programs associated with my PGP identity, you can make references to them, and people will be able to see them (or not) based on my trust relationship with them. Your "references" can be any arbitary computation, buut probably some standards will evolve (e.g., we don't check sexprs who pass some test of being a plist of the structure (:name ... :version ...)).
gabriel_laddel: trinque: PGP identity with a list of programs to run.
asciilifeform: http://arstechnica.com/business/2015/08/im-now-an-estonian-e-resident-but-i-still-dont-know-what-to-do-with-it << a related lul from same fishwrap. mandatory non-pgp signatures in whole muppet country, aha.
assbot: Searching pgp.mit.edu for key with fingerprint: D1702BB1EE057FAA3ED134AA922837F6B1FC09A3. This may take a few moments.
asciilifeform: 'this program may be redistributed provided that 1) this notice and 2) the original copy of $program, with my pgp signature thereof - are included; and any changes you made to $program must be represented in the form of a vdiff patch signed with a pgp key registered in the Web of Trust.'
assbot: Searching pgp.mit.edu for key with fingerprint: 6310C4E0B0E97287A3CFEBAD8515F76EADCFD13C. This may take a few moments.
assbot: Improving the trustworthyness of PGP keys with Bitcoin ... ( http://bit.ly/1NHbJNh )
asciilifeform: williamdunne: if you want to pgp, you're mostly stuck with shell call-outs to classical gpg.
assbot: Logged on 20-08-2015 23:05:51; ahmed_bodi: Occasional trader. remember trading with a few people here. lost my PGP? key so i cant auth with assbot myself anymore
asciilifeform: http://log.bitcoin-assets.com/?date=22-08-2015#1248244 << ahahaha this is ~very~ easy. does the thing contain any material signed with the original leak's pgp key? no? then straight to /dev/null !! ☝︎
punkman: "Motherboard was given a contact email address for The Impact Team by an intermediary. After reaching out, the hackers replied with a message signed with the same PGP key posted with the Ashley Madison dumps. " << of course they couldn't provide the signed replies
ahmed_bodi: Occasional trader. remember trading with a few people here. lost my PGP? key so i cant auth with assbot myself anymore ☟︎
assbot: Searching pgp.mit.edu for key with fingerprint: 4A0363951AFA090B6C221787E2F23DB84A63EC22. This may take a few moments.
asciilifeform: somebody cook up a key with that fp as seen in idiot winblows pgp, and sign, for the lulz
asciilifeform: the pgp signature thing is fucktarded, can't believe for how long we've put up with it
assbot: Searching pgp.mit.edu for key with fingerprint: DEF6F884324D1E384DC09C97F2CBD75211F125B2. This may take a few moments.
wywialm: ben_vulpes, the application is currently a standalone python app, not a web browser app. We are working on a convenient in-browser app that would work with PGP
pete_dushenski: Guest96371: btw where's your pgp key this fine evening ? y'know you can auth and self-voice with assbot eh
mircea_popescu: "guy with a pgp key and a bmezine archive" = cypherpunk
asciilifeform: mircea_popescu: in somewhat related nyooz, i've been experimenting with what for now i call 'v' - a very dumb 'versioner' that i've been writing, which eats solely 0) pgp keys 1) patches 2) signatures for same, many-to-many mapping of (2) to (1) ☟︎
mircea_popescu: do not expect a girl with a collar is actually a slave - she probably thought it looks good for her facebook ; do not expect someone with a pgp key is a lord - they probably were just trying to impress someone.
popmechanic: Apparently they just offer email addresses? Not sure, first time I’ve used the service. I totally understand and am prepared to agree with a predjudice against a service like this, because they’re going to end up sitting on private keys. But it’s optional, and actually a pretty handy way to manage a few aspects of PGP management.
assbot: Searching pgp.mit.edu for key with fingerprint: 48802F831BAFC232A26C974A0DA5926BC6E7BDCF. This may take a few moments.
phillipsjk: I really should auth with the bot with pgp though.
asciilifeform: signed with pgp, verified by user, dropped in .bitcoin
asciilifeform: mircea_popescu: think of it, traditional cpu ~is~ cloaka, where you pgp with the same barrel shifter and adder that you play tetris and read lolcatz with
assbot: Searching pgp.mit.edu for key with fingerprint: E3A490547D5E8A590A5608B0C31CB3DFF91576C7. This may take a few moments.
asciilifeform: what's with the folks who 'need' the automated email-pgp things? are they still using 2-button mice ?
BingoBoingo: http://motherboard.vice.com/read/great-someone-managed-to-sign-facebooks-pgp-key-with-an-ascii-goatse
assbot: Searching pgp.mit.edu for key with fingerprint: A364FCEAC68953860519C8A5A66E2D65273F03BD. This may take a few moments.
assbot: Searching pgp.mit.edu for key with fingerprint: A364FCEAC68953860519C8A5A66E2D65273F03BD. This may take a few moments.
WolfGoethe: never messed with pgp
assbot: Searching pgp.mit.edu for key with fingerprint: A886215D072240C8D8632DA8564F4D7DAEEA5571. This may take a few moments.
mircea_popescu: and you can replace captcha with pgp challenge
copypaste: i could make a PGP key with just any data.