log☇︎
1600+ entries in 0.239s
sina: I thought I had because I couldn't decrypt some OTP, if you recall
deedbot: Get your OTP: http://p.bvulpes.com/pastes/tRQbW/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/pnnqa/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/zlbhy/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/1tmjn/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/TKYJp/?raw=true
mircea_popescu: no the other part. !!rate someone or whatrever so it makes you an otp
sina: how the fuck is it possible mircea_popescu can encrypt a msg against that key and I can successfully Hurr durr, but the OTP won't?
sina: what the fuck have I done wrong here. "gpg --export --armor sina.sa@gmail.com" ==> http://wotpaste.cascadianhacker.com/pastes/STTlS/?raw=true ...registered with that. got an OTP URL from above. put it into a file called 'input', run 'gpg --decrypt input' get that error above
sina: when I run gpg --decrypt input from the OTP, it says gpg: decryption failed: secret key not available
deedbot: Get your OTP: http://p.bvulpes.com/pastes/kUwQx/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/t8o7L/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/toyMw/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/tYWMC/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/iHm49/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/OV6I5/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/HxJGS/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/i86s4/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/I9CWG/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/3EGhF/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/9MHzy/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/XlEGX/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/UL2ou/?raw=true
asciilifeform: 'The advertised unit is a keychain that plugs in through the headphone jack of a mobile device, meant to interact closed-source app to provide impenetrable crypto. This crypto is said to use a one-time pad (OTP) system. The design, photos, prototype, and social networking vibe feel all too similar to the vaporware you’d expect a San Francisco based startup of 5 college students to poorly slap together and unload to unsuspecting ven
asciilifeform: mircea_popescu: frequency hopping is a solved problem in 1980s, you use blum-blum-shub (or variant) if using public key crypto; or same otp as for everything else, if otp.
mircea_popescu: trinque could deedbot get a !!seen which would return the top line of the last otp the nick in question responded correctly to ?
deedbot: Get your OTP: http://p.bvulpes.com/pastes/tYlDe/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/lp1MJ/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/FNtzE/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/QPFcg/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/Bpoix/?raw=true
mircea_popescu: eh, i don't expect worldwide usage of otp ticker exceeds 1mbps.
asciilifeform: or, elsewhere, for, say , otp gen.
deedbot: Get your OTP: http://p.bvulpes.com/pastes/Fklbq/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/wZpiD/?raw=true
a111: Logged on 2017-03-23 00:27 asciilifeform: the supposed otp roms you can buy now, are actually eproms without the quartz window.
asciilifeform: to briefly revisit upstack, http://btcbase.org/log/2017-03-23#1631333 these suffer charge leakage ( like ordinary flash rom ) ; actual otp -- theoretically good for centuries. ☝︎
asciilifeform: (oh imho a future otp rom, if anyone finds himself sitting on a throne, and wants to make one, ought to have not one but TWO fuses per bit. so that nobody can turn a 1 into a 0 later by blowing an unblown fuse. so you'd have 10 -> 1; 01 -> 0; 11 -> dead cell, ergo dead chip; 00 -> blank cell, only found on blank (new) chip.)
asciilifeform: for instance, i wanted to make FUCKGOATS in otp. no dice.
asciilifeform: the supposed otp roms you can buy now, are actually eproms without the quartz window. ☟︎
asciilifeform: every couplea months i do an 'can haz otp rom?' and answer, as always, is 'nope', not at any price, simply not made in past 30 yrs.
deedbot: Get your OTP: http://p.bvulpes.com/pastes/uAhzP/?raw=true
asciilifeform: ben_vulpes: 0 provable improvements on otp.
deedbot: Get your OTP: http://p.bvulpes.com/pastes/Po5lA/?raw=true
asciilifeform: extensions work entirely fine on otp rom
asciilifeform: (outside of otp.)
deedbot: Get your OTP: http://p.bvulpes.com/pastes/hasdQ/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/9hEUH/?raw=true
deedbot: Get your OTP: http://p.bvulpes.com/pastes/qHI75/?raw=true
mircea_popescu: if yes the system's unbound, if no then why the fuck even bother, just do otp from get-go.
trinque: mircea_popescu: just means that lobbesbot must have state which keeps track of requests sent, then matches them to incoming OTP, then sends OTP if ==
mircea_popescu: i don't think there's anything fundamentally wrong with the otp approach as opposed to the signature approach tbh.
mircea_popescu: speaking of which trinque : it's somewhat dubious you send plain otps. you should send request.string+otp.
trinque: I get unsigned text, I give you an encrypted OTP; how then are you to know that OTP corresponds on my end to an unmodified copy of your invoice?
danielpbarron: the otp is functionally the same as a signature for the purpose of keeping text unmollested, and also the same in that neither can ensure a message is ever actually received
trinque: also, the OTP dance doesn't by itself confirm that A received B's invoice as it was intended.
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/sIA9y/?raw=true
trinque: also payment can just challenge with OTP
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/ib14G/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/qbha4/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/6m157/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/8JXSw/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/AMks2/?raw=true
Reuel: well I have to copy paste he OTP, run cmd line stuff, etc, just curious how many here automated the process
Reuel: Ignore my test, also, have you guys automated the login process with the OTP etc?
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/0RG4D/?raw=true
Reuel: ah right was using the OTP for rating me
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/XVb8E/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/eKlY0/?raw=true
asciilifeform: (finishing touch on the otp subthread : the mega-virtue of steel wire vs magnetic tape, is that you can heat it to its curie point for rapid-zapping, without creating smoking, melted mess. so good emergency erase -- just put current through the spool.)
asciilifeform: (there is no conceivable reason to put otp on expensive, non-disposable random-access disks, other than not having anything better)
asciilifeform: btw magnetic tape really shines in otp-land. it costs a penny a GB, and you can trivially write two tapes identically with same head (plugged into rng naturally), AND -- bonus -- can destroy it immediately when it comes out of read head.
asciilifeform: mircea_popescu: 'quantum communication' is golden toilet nonsense, for the cost of building the link, you can perma-sync a thousand years of OTP.
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/5ywX0/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/046K6/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/LR0Jf/?raw=true
mircea_popescu: in my own mind it's about as strong re this as otp, "you can get any message you want back out", but admittedly that's mostly self infatuation
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/OJ1nf/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/2hBgV/?raw=true
netmonk: i least i was succesfull to decrypt the otp :)
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/F0wVU/?raw=true
netmonk: lets try the otp then
trinque: netmonk: send !!up to deedbot in a private message, then decrypt the response, and reply to deedbot with !!v <your OTP here>
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/SzgT8/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/5fwGs/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/IRNh8/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/E7Ffw/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/3UzQb/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/jCEr0/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/To2R5/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/uVq8C/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/SoIRT/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/UQlsg/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/B3jf1/?raw=true
gabriel_laddel: That being said, I'm trying to decrypt my OTP and "gpg: decryption failed: secret key not available".
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/5fx1y/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/cEdMP/?raw=true
deedbot: Get your OTP: http://wotpaste.cascadianhacker.com/r/YGSHQ/?raw=true
trinque: provided other people see me send this encrypted OTP to another
trinque: hm. you know what. if I stockpile encrypted OTP material which is also encrypted to my own key, I suppose it does the same.