asciilifeform: and who noticed that the reversal worked mechanically, but somehow ~0 spermatozoons made it to the other end.
asciilifeform: trinque, ben_vulpes : the first tipoff that one can immunologically zap own spermatozoids came not from alzheimer's patients, but from folks attempting to have vasectomy reversed
asciilifeform: if only this worked for everything else!
asciilifeform: ahahaha nice , asciilifeform doesn't need to crank the logtron, other folks will do it !111
asciilifeform: mircea_popescu's scheme answers 'E infers key, floods A with megatonne of shit' with 'A renegotiates key with all of A's peers via magical channel that E cannot saturate with shit'
asciilifeform: just like the idiot 'tamper seals' that are trivially broken every day, not only by usg but by turd world pissant secret services, merely by penetrating the ENVELOPE.
asciilifeform: and if i can describe (and i can) how the scheme can be broken WITHOUT breaking the cipher, then the cipher is decorative.
asciilifeform: in approx. the sage's own words, 'piss in one hand, argument irrelevance in the other, see which one weighs more.'
asciilifeform: and mircea_popescu's favorite rhetorical device is 'this is not relevant.' hey, it's the man's own blog, who am i to say that he has to consider my observations relevant. but this nonsense won't keep rainwater out of a tent, much less ft meade.
asciilifeform: (picture a weapon that kills the same POPULATION PERCENTAGE of the firer's army as of the enemy. it would be quite useless. any weapon requires asymmetry to work.)
asciilifeform: E can ding A and B for less cost to himself than they incur from said ding. which is the elementary particle from which ddos is made.
asciilifeform: this has not been an especially productive discussion.
asciilifeform: mircea_popescu's answer appears to be 'lala can't hear you.'
asciilifeform: as it stands, the cost to E of replaying any or all of the packets between A and B, or reordering, is 0.
asciilifeform: and came to conclusion that there is a massive hole in the scheme sketched out in subj link, that i can drive a maersk cargo liner through.
asciilifeform: enemy must NOT have the ability to determine that an arbitrary ip contains a gossip node.
asciilifeform: ('because he does not know the ip to ask' is an idiot answer. you don't even need to be at ft meade, Framedragger's scanner could easily be modified to send a challenge req to entire ipv4 space every couple of hours.)
asciilifeform: and anyone who - like mircea_popescu earlier - states that 'but all-comer will ~not~ be able to request a challenge' is stuck explaining why not.
asciilifeform: (if all-comer can get a challenge, this not only makes you ddosable tcp-style, but turns your gossip net into a ddosatron weapon for any idiot who can get spoofed packets into it)
asciilifeform: and violates the principle of nothing-to-allcomers.☟︎
asciilifeform: but challenge-response requires 2way comms.
asciilifeform: earlier in thread, mircea_popescu pointed out - correctly - that signature is not the only form of cryptoauthentication, and that there is also challenge-response, a la deedbot etc.
asciilifeform: and it is doomed to sybilatronic heat death.
asciilifeform: whereas 'attribution for no one' is the current net and whoever wants it, already has it.
asciilifeform: (attribution 'for us but not for them'.)
asciilifeform: mod6: presently it is a machine which contains a box labeled ???, which is the answer to a mathematical problem.
asciilifeform: mod6: no lord in his right mind would connect his royal key to a machine that emits signed material autonomously.
asciilifeform: that is, can infer a link between a station key and royal key.
asciilifeform: it is unfortunately also one of the weak points in mircea_popescu's original sketch, as an enemy who turns up a 'for' binding signature can make an attribution of station ownership.☟︎