log☇︎
121000+ entries in 0.03s
asciilifeform: otherwise Kverify(H(S')) will fail.
asciilifeform: mno, he would need an S' such that H(S') == H(S)
asciilifeform: using the formulation above, describe what hitler should do
asciilifeform: so, for convenience, i'll reprint: 1) at time T, i publish Ksign(H(S)), where S is a lengthy random string; at time T1, when i wish to invoke the continuity i publish H(S+J) ; at time T2: J; at time T3, S.
asciilifeform: replace with 'publish' & reread.
asciilifeform: i oughta not have used word 'deedbot'
asciilifeform: elaborate?
asciilifeform: 'the best machine is no machine' -- altschuller
asciilifeform: no need for deedbot, etc.
asciilifeform: btw if mircea_popescu ONLY wants to give J' to his best friends, he can do that already via the otp he has with them.
asciilifeform: likewise 'my inner circle knows what the true J' is' is not solving same problem as 'everyone who knew Kpublic can reliably learn true J' ' which in the case of serious 'for the ages' signatures, e.g., vtronics, you actually ~do~ want
asciilifeform: current thread is re parachute specifically against catastrophe that would burn down rsa, c-s, similar.
asciilifeform: gossipd, in all proposed variants, relies on numbertheoretical crypto
asciilifeform: ugh
asciilifeform: outside of buttsex room.
asciilifeform: aha, because single-message is not a thing in our universe.
asciilifeform: it is not open to mitm.
asciilifeform: my algo from earlier requires only time-order.
asciilifeform: *realize
asciilifeform: this cannot actually be guaranteed physically, realized.
asciilifeform: which is ~why~ i had the multiple steps.
asciilifeform: you are open to mitm in the act of deedbotting.
asciilifeform: J.sign can sign anything anyone likes once J is known.
asciilifeform: i get it, mircea_popescu reeeeeally loves the repudiability thing, but you gotta be careful not to make a cannon that shoots in ALL directions simultaneously. someone has to get privileged knowledge of the true J' or you are cryptodead.
asciilifeform: outside of buttsex room, there is no such thing as a 'one message' that cannot be mitm'd.
asciilifeform: mircea_popescu: what means 'one message' ?
asciilifeform: recall, if rsa died, mircea_popescu cannot simply pgp the J' to his current circle of friends.
asciilifeform: and if you posit the otp (or some other way, perhaps through buttsex, for him to give the True J' to the intended recipients) it turns into my algo.
asciilifeform: but otherwise quite useless.
asciilifeform: this'd be handy if mircea_popescu had otp set up in advance with the people he intends to give the actual J' to
asciilifeform: at which point every beggar in every street can make own J'.
asciilifeform: which in the given algo, it is.
asciilifeform: and they are all equally poppycock if the private key of J is publicly known
asciilifeform: anyone can make their own J'
asciilifeform: by WHICH J
asciilifeform: if J is made wholesale from privkey.K
asciilifeform: how does mircea_popescu retain sole knowledge of the private key of J ?
asciilifeform: but!
asciilifeform: fair'nuff, rsa died
asciilifeform: ?
asciilifeform: public and private /
asciilifeform: so you published both halves of the k keypair, correct ?
asciilifeform: i have the deedbotted hash(salt+pubkey.K) to work with
asciilifeform: ok, can haz algo? i found a string J, which is a public key for an asymmetric cryptosystem, that purports to belong to mircea_popescu, and published after the rsacalypse. what do i do with it.
asciilifeform: but to permit ~any~ Jsystem and ~any~ J in advance.
asciilifeform: and we want the algo specifically not to depend on how Jsystem works.
asciilifeform: it is just a string of bits, for the purposes of this gedankenexperiment.
asciilifeform: recall, we don't know anything about the cryptosystem J is a pubkey for.
asciilifeform: no, just pseudo
asciilifeform: i can use to determine, for some input J, whether it belongs to the fella who has priv.K.
asciilifeform: gimme an algo
asciilifeform: ?
asciilifeform: mircea_popescu: but how do i verify that J belongs to mircea_popescu
asciilifeform: mircea_popescu: i get that part
asciilifeform: say he published his J. now what do i do.
asciilifeform: though i am still unclear on how mircea_popescu's verification works
asciilifeform: aha!
asciilifeform: anyway this is ~= earlier algo, just with one fewer step
asciilifeform: ah in this case with the usual meaning of deedbot, 'sign with wot key'
asciilifeform: or hm, if it's an unpublished key, he does not. but how did you link it with your actual key
asciilifeform: mircea_popescu: here's the lethal boojum: enemy knows privkey.K at t2 and if he can get to his keyboard before you get to yours, you're dead
asciilifeform: if you divulged the seed, you divulged the privkey
asciilifeform: i did say 'key J for a possibly yet-undiscovered cryptosystem'
asciilifeform: mircea_popescu: this works if your K is known in advance
asciilifeform: where you demonstrate that you knew Kpriv and a secret S at time T, and at some time T+i you show that 'he who knew S at time T now wishes to use key J for everyday life.'
asciilifeform: (incl. multiple hash algos)
asciilifeform: at any rate, it is not difficult to generalize this scheme into a wide variety of 'parachutes'
asciilifeform: perhaps this is obvious from my description, but i have learned that it sometimes helps to restate the obvious.
asciilifeform: which is why for such a scheme to work, it would have to be agreed-upon in advance by the participants.
asciilifeform: but these are to be rejected by the verifier if the latter can locate an earlier Ksign(H(S)).
asciilifeform: if K is broken publicly, or privately by the enemy, any time ~after~ T, the breaker (or anyone who learns the privkey) can try to endeedbot his own Ksign(H(S)) for his own S
asciilifeform: note, J can even be another pgp/rsa key, if you are insuring against merely a 'key costs $100M and takes 5years to break' scenario, rather than catastrophic rsacalypse
asciilifeform: mircea_popescu et al : see if you can find a simpler variant.
asciilifeform: scheme relies strictly on the strength of H (and integrity of the blockchain...)
asciilifeform: at time T3, i reveal, and deedbot, S.
asciilifeform: at time T2, i deedbot J
asciilifeform: deedbot H(S+J)
asciilifeform: at time T1, when i wish to invoke the continuity, i :
asciilifeform: at time T, i deedbot Ksign(H(S)), where S is a lengthy random string.
asciilifeform: H is a hashing function.
asciilifeform: anyway here is a simple, 'low-tech' lamport-style scheme. let K be my current pgp key; J be a future, continuity-of-life key in some yet-undiscovered system ;
asciilifeform: but i mention lamport specifically because it does not rely on number-theoretical conjecture (on the other hand, hashing relies on ????????? for hardness...)
asciilifeform: multiple systems in general.
asciilifeform: would also have a secondary 'fleet in being' effect
asciilifeform: (with which to sign a new conventional pubkey if such a thing were to come.)
asciilifeform: while we're on the subject, there may be merit in deedbotting a lamport-style one-shot public key for the event of an 'asteroid' (serious number-theoretic breakthrough, or the like)
asciilifeform: subjectively.
asciilifeform: subjectivity is a bitch like that. e.g. to 5yo being 'grounded' for month is rather like the idea of year in jail for a 50yo
asciilifeform: 14yo still has the nude classmates to take new photos of.
asciilifeform: 'better' in the sense that it is better to have one's hdd and backups burn down when you're 14 y.o. than when you're 60.
asciilifeform: keyholder has moar years of life left to invest in building up reputation of a replacement key ?
asciilifeform: (and all else equal, it is better for a key to 'die' earlier in life than later.)
asciilifeform: the focus oughta be on avoiding being in said position to begin with.
asciilifeform: there is not, and imho cannot be, a pleasant endgame for dude who gets his wot key publicly popped.
asciilifeform: they are, by any reasonable logic, 'dead' already. just need burial.
asciilifeform: what's to be done with'em ?
asciilifeform: well this is perhaps the wrong question.
asciilifeform: what'll mircea_popescu do with folks who get phuctored ?
asciilifeform: but at least then it'll be in 2 places, vs 1, and neither'll be sks.
asciilifeform: it isn't decentralized by any means, though, boring old medieval central box.