log☇︎
1500+ entries in 0.422s
asciilifeform: pgp is a hard litmus
assbot: Logged on 20-08-2015 23:05:51; ahmed_bodi: Occasional trader. remember trading with a few people here. lost my PGP? key so i cant auth with assbot myself anymore
assbot: Logged on 22-08-2015 19:30:03; mircea_popescu: the merit of a pgp signature is that it delivers them from having to do this.
mircea_popescu: the merit of a pgp signature is that it delivers them from having to do this. ☟︎
asciilifeform: i can't wait till they start doing circus like this for, e.g., a pgp signature
asciilifeform: http://log.bitcoin-assets.com/?date=22-08-2015#1248244 << ahahaha this is ~very~ easy. does the thing contain any material signed with the original leak's pgp key? no? then straight to /dev/null !! ☝︎
punkman: "Motherboard was given a contact email address for The Impact Team by an intermediary. After reaching out, the hackers replied with a message signed with the same PGP key posted with the Ashley Madison dumps. " << of course they couldn't provide the signed replies
phf: for the curious ftp://ftp.pgpi.org/pub/pgp/2.x/doc/pgformat.txt, http://www.spinnaker.com/crypt/pgp/pgp26ui/pgp26uis.zip (src/crypto.c:1289)
assbot: PGP Source Code ... ... ( http://bit.ly/1PEStiy )
phf: one can buy "PGP Source Code and Internals." from amazon for $289
asciilifeform: while we're at it, copying in from my handwritten 'pgp is retarded' notebook,
mircea_popescu: to subvert thew pgp i npractice.
mircea_popescu: anyway, there's no question left that a usable extant pgp implementaton exists. this should be redone.
mircea_popescu: deep restructuring of the pgp implementation is required anyway.
asciilifeform: where a pgp signature is so retardedly structured that it cannot be verified at all without the original matter
punkman: "oh yeah let's be compatible to PGP 4, because that matters"
ascii_field: pgp sig doesn't carry the whole hash.
trinque: what I mean by header is perhaps no more than: -----BEGIN PGP SIGNED MESSAGE-----
ascii_field: ... does he pgp?
mircea_popescu: inasmuch as the guy links it as "pgp signature"...
asciilifeform: http://log.bitcoin-assets.com/?date=20-08-2015#1246308 << aha. for instance, one fella i know loaded the new (today's) 'ashley madison' crud. and one of the archive balls fails pgp sig. ☝︎
ahmed_bodi: Occasional trader. remember trading with a few people here. lost my PGP? key so i cant auth with assbot myself anymore ☟︎
ascii_field: mega-related. no pgp, no wot. no wot, eaten alive by influence agents and provocateurs.
ascii_field: and start pgp.
mircea_popescu: the correct solution is to reimplement pgp and make it behave re clearsign.
asciilifeform: can we agree to use something like human names in pgp keys perhaps ?
jurov: but it's hopelessly complicated and no afaik one even tried do send PGP/MIME message to mailing list
jurov: http://log.bitcoin-assets.com/?date=20-08-2015#1245281 << there's PGP/MIME (RFC2015, RFC3156) that allows to add such headers easily ☝︎
assbot: No valid OpenPGP data found on pgp.mit.edu.
assbot: Searching pgp.mit.edu for key with fingerprint: 4A0363951AFA090B6C221787E2F23DB84A63EC22. This may take a few moments.
asciilifeform: whereas the alternative is only even contemplated because pgp is retarded.
asciilifeform: somebody cook up a key with that fp as seen in idiot winblows pgp, and sign, for the lulz
asciilifeform: https://pgp.mit.edu/pks/lookup?search=andrew%40andreworr.ca&op=index
mircea_popescu: but it is apparent, from the apoplectic reactions, and glaring when you look at the shards together, that the same jerking around is both behind the openbsd story and the pgp story.
mircea_popescu: asciilifeform well obviouisly nobody ever used pgp for any serious purpose.
asciilifeform: the pgp signature thing is fucktarded, can't believe for how long we've put up with it
jurov: asciilifeform: yo want to stream pgp signed stuff_
asciilifeform: not without a much better reason than 'pgp breathes through its mouth'
mircea_popescu: we sadly have been overtaken by events in this point. i'd have much preferred to start work on this after the decanter work for "new pgp" was done.
asciilifeform: this is a place we end up in because pgp is retarded
mircea_popescu: current computer science favours the speed of light over other speeds "much more important to "us"". it is a serious fucking problem for usg/nsa/alphabetsoup that there still exist people who even vaguely understand what this shit even is, because even one in a million that can make actual decisions based on actual facts when that asshole asciilifeform publishes things about pgp keys or that asshole mircea_popescu thre
mats: Maintains the strong set, displays some statistics as to it in the manner of Penning's thing [http://pgp.cs.uu.nl] <<
assbot: Logged on 21-04-2015 11:41:31; mircea_popescu: and then $ gpg --keyserver sks-keyservers.net --send-key <KEYID> and $ gpg --keyserver pgp.mit.edu --send-key <KEYID> where keyid you just copy from the line above.
assbot: Searching pgp.mit.edu for key with fingerprint: DEF6F884324D1E384DC09C97F2CBD75211F125B2. This may take a few moments.
wywialm: considering it, but sane in-browser pgp is not straightforward
wywialm: ben_vulpes, the application is currently a standalone python app, not a web browser app. We are working on a convenient in-browser app that would work with PGP
pete_dushenski: Guest96371: btw where's your pgp key this fine evening ? y'know you can auth and self-voice with assbot eh
mircea_popescu: "guy with a pgp key and a bmezine archive" = cypherpunk
wywialm: (see https://quedex.net/doc/pgp_messages)
wywialm: from the security perspective, it is based on the MPEx PGP standard
asciilifeform: mircea_popescu: in somewhat related nyooz, i've been experimenting with what for now i call 'v' - a very dumb 'versioner' that i've been writing, which eats solely 0) pgp keys 1) patches 2) signatures for same, many-to-many mapping of (2) to (1) ☟︎
assbot: Logged on 06-08-2015 21:28:06; ascii_field: checking can be done on a keyless pgp
mircea_popescu: http://log.bitcoin-assets.com/?date=06-08-2015#1228030 << to expound on this for the log readership : it is not trivial but definitely feasible to cause any running implementation of asymmetric cryptography to leak key bits if it is possible to direct encrypted matter at it in an automatic fashion and have live access to the results somehow. this theoretical fact is practically verified for pgp, and there's no grounds ☝︎☟︎
ascii_field: checking can be done on a keyless pgp ☟︎
mike_c: html and pgp don't mix
danielpbarron: http://log.bitcoin-assets.com/?date=04-08-2015#1224509 << I was trying to figure out what this urbit dukedom thing was, in in so doing found this -> http://pgp.mit.edu/pks/lookup?op=vindex&search=0xB36AE9849D961AC9 << I met this guy at porcfest / he was the only one there who also had his GPG fingerprint on a business card; we signed eachothers keys :D ☝︎
asciilifeform: 'All this was in part spawned by a long going if little voiced thread in #b-a on the topic of "how can PGP folk be this fucking retarded. Sort-of like the colonial European's expectation that someone firing a weapon necessarily speaks French, or Spanish, or English, or some sort of civilised language also. Because otherwise... where did they get the human weapon! Goblins don't craft weapons.' << YES!
mircea_popescu: do not expect a girl with a collar is actually a slave - she probably thought it looks good for her facebook ; do not expect someone with a pgp key is a lord - they probably were just trying to impress someone.
mircea_popescu: this includes the pgp mailing list.
asciilifeform: except that i linked to mircea_popescu's pgp key in a post
a3voices: cool well now I have a pgp key for the first time
BingoBoingo: ben_vulpes: pgp.mit.edu was a gold mine for academic keys they may not have made the transition to sks. I retrieved manually though by schoool.
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=12884901891 (PGP Corporation Update Signing Key; PGP Corporation Update Signing Key ; ) <http://nosuchlabs.com/gpgkey/0D9057DA7AEE12C725AA9408D47F4FFC3769BEF7891A0F9C0A9F38420C5C08AB#F79436B629322C70C523BAA5BE0D3D4DDA011578F84122B8CA3ABD15C52A9567>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=12884901891 (PGP Corporation Update Signing Key; PGP Corporation Update Signing Key ; ) <http://nosuchlabs.com/gpgkey/0D9057DA7AEE12C725AA9408D47F4FFC3769BEF7891A0F9C0A9F38420C5C08AB#F79436B629322C70C523BAA5BE0D3D4DDA011578F84122B8CA3ABD15C52A9567>
nubbins`: i coulda SWORN i just typed in my pgp passphrase completely and utterly wrong
asciilifeform: and check the pgp sig
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=12884901891 (PGP Corporation Update Signing Key; PGP Corporation Update Signing Key ; ) <http://nosuchlabs.com/gpgkey/0D9057DA7AEE12C725AA9408D47F4FFC3769BEF7891A0F9C0A9F38420C5C08AB#F79436B629322C70C523BAA5BE0D3D4DDA011578F84122B8CA3ABD15C52A9567>
pete_dushenski: BingoBoingo you get my pgp-gram/qntra submission ?
ascii_field: the original was, iirc, used to sign winblowz pgp updates
assbot: Logged on 22-07-2015 03:04:19; assbot: Logged on 22-07-2015 02:22:29; lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=12884901891 (PGP Corporation Update Signing Key; PGP Corporation Update Signing Key ; ) <http://nosuchlabs.com/gpgkey/0D9057DA7AEE12C725AA9408D47F4FFC3769BEF7891A0F9C0A9F38420C5C08AB#F79436B629322C70C523BAA5BE0D3D4DDA011578F84122B8CA3ABD15C52A9567>
assbot: Logged on 22-07-2015 03:04:19; assbot: Logged on 22-07-2015 02:22:29; lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=12884901891 (PGP Corporation Update Signing Key; PGP Corporation Update Signing Key ; ) <http://nosuchlabs.com/gpgkey/0D9057DA7AEE12C725AA9408D47F4FFC3769BEF7891A0F9C0A9F38420C5C08AB#F79436B629322C70C523BAA5BE0D3D4DDA011578F84122B8CA3ABD15C52A9567>
assbot: Logged on 22-07-2015 02:22:29; lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=12884901891 (PGP Corporation Update Signing Key; PGP Corporation Update Signing Key ; ) <http://nosuchlabs.com/gpgkey/0D9057DA7AEE12C725AA9408D47F4FFC3769BEF7891A0F9C0A9F38420C5C08AB#F79436B629322C70C523BAA5BE0D3D4DDA011578F84122B8CA3ABD15C52A9567>
asciilifeform: and ^ yes, 'PGP Corporation Update Signing Key' was in the 'magic list'
assbot: Logged on 22-07-2015 02:22:29; lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=12884901891 (PGP Corporation Update Signing Key; PGP Corporation Update Signing Key ; ) <http://nosuchlabs.com/gpgkey/0D9057DA7AEE12C725AA9408D47F4FFC3769BEF7891A0F9C0A9F38420C5C08AB#F79436B629322C70C523BAA5BE0D3D4DDA011578F84122B8CA3ABD15C52A9567> ☟︎☟︎
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=12884901891 (PGP Corporation Update Signing Key; PGP Corporation Update Signing Key ; ) <http://nosuchlabs.com/gpgkey/0D9057DA7AEE12C725AA9408D47F4FFC3769BEF7891A0F9C0A9F38420C5C08AB#F79436B629322C70C523BAA5BE0D3D4DDA011578F84122B8CA3ABD15C52A9567> ☟︎☟︎
popmechanic: Apparently they just offer email addresses? Not sure, first time I’ve used the service. I totally understand and am prepared to agree with a predjudice against a service like this, because they’re going to end up sitting on private keys. But it’s optional, and actually a pretty handy way to manage a few aspects of PGP management.
assbot: Searching pgp.mit.edu for key with fingerprint: 48802F831BAFC232A26C974A0DA5926BC6E7BDCF. This may take a few moments.
ascii_field: (they don't appear to believe in pgp, so i cannot say if authentic)
fluffypony: look, fromphuctor, here's mine: http://pgp.mit.edu/pks/lookup?op=vindex&search=0x7455C5E3C0CDCEB9
nubbins`: phuctor is smashing numbers together, right now, churning through huge data sets of pgp keys
phillipsjk: I really should auth with the bot with pgp though.
cazalla: meh i just saw pgp in the headline, read it and thought perhaps might appeal to others here
assbot: Despite Hacking Team’s poor opsec, CEO came from early days of PGP | Ars Technica ... ( http://bit.ly/1Gd8mFR )
cazalla: http://arstechnica.com/security/2015/07/despite-hacking-teams-poor-opsec-ceo-came-from-early-days-of-pgp/
assbot: Logged on 10-07-2015 20:21:42; ascii_field: my point is that if i, or mats, write to, e.g., saudi, offering ht work, will be laughed out of the room; and, since these twits don't believe in pgp, we'd get a visit from gasenwagen the next day
ascii_field: my point is that if i, or mats, write to, e.g., saudi, offering ht work, will be laughed out of the room; and, since these twits don't believe in pgp, we'd get a visit from gasenwagen the next day ☟︎
asciilifeform: let's see if he remembers how to pgp
ascii_field: let's suppose they traded pgp keys and can communicate securely. however, they cannot prevent the enemy from delaying messages
mats: le pgp key server almost done cooking
asciilifeform: signed with pgp, verified by user, dropped in .bitcoin
ascii_field: the only reason to do this, other than pgp-hardened out of band syncs, is to make your bitcoind walk the same logic path as other fella's
asciilifeform: now whoever dares, can ask a node to crap out blocks n ... n+k, pgp-sign, bring them to node having blocks j ... n-1, and 'feed' them to it.
asciilifeform: which is why i said 'we need mechanism...' rather than 'hey mircea_popescu, hash those db turds and send me back via pgp wontcha'
asciilifeform is coming to think that we will be needing a mechanism for out-of-band (hashes, pgp) comparison of blockchains
asciilifeform: mircea_popescu: think of it, traditional cpu ~is~ cloaka, where you pgp with the same barrel shifter and adder that you play tetris and read lolcatz with
assbot: PGP Key Generator - iGolder ... ( http://bit.ly/1SRtH0C )
asciilifeform: https://www.igolder.com/pgp/generate-key << server side!
assbot: Logged on 27-06-2015 01:09:10; mats: https://www.igolder.com/pgp/generate-key hue
assbot: PGP Key Generator - iGolder ... ( http://bit.ly/1QV0ZhQ )
mats: https://www.igolder.com/pgp/generate-key hue ☟︎