asciilifeform: even the various so-called 'independent' 'security blogger' types won't touch phuctor
asciilifeform: the 'neverhappened' curtain is airtight
asciilifeform: i dun get it, what does either of these 'have to lose'
asciilifeform: or simply differing approaches. 'problem' posed: 'someone shat in my garden.' hn algo: 'burn with flamethrower, shoot witnesses' reddit algo: 'empty honeywagon on top of it, have whole platoon drop trou and take a shit in turn on it for good measure'
asciilifeform: different strokes, for different folkz or sumthing
asciilifeform: going strong, however, on tarditt, with buncha shannonized pinoy comments
asciilifeform: i, for one, do not care how many degrees, and from what rotten institutions, such a swindler has.
asciilifeform: ergo, the folks offering said 'equivalence' has same credibility as, e.g., 'herbal viagra' spammers
asciilifeform: or, for that matter, for ANY cryptosystem other than vernam.
asciilifeform: the claim of equivalence is wholly spurious because no difficulty proof of whatever kind exists for either system.
asciilifeform: one of these bargains is that you cannot build a career as a university academic with 'use rsa, kthx, bye'
asciilifeform: djb is respectable and talented, but labours under certain faustian bargains as part of his employ.
asciilifeform: fabio__: the cryptographic side of the question is two-pronged. there is a set of 1) questionable actors making 2) questionable claims (e.g., of equivalence of n-bit ecc with m-bit rsa, n<m) with zero public substantiation
asciilifeform: 'Despite a great deal of mathematical work in this field, there is still no general theory of cryptography, Blaze posited. He called this “one of the dirty secrets of cryptography.”'
asciilifeform: BingoBoingo: i was speaking of the 'fromphuctor's.
asciilifeform: 'Not every wiretap request is granted. Only 313 federal wiretaps were installed in 2014, far fewer than the number requested, Landau pointed out. Each one costs the federal government about $41,000, most of which is spent on “minimization”—that is, someone to monitor the wiretap and assess its content.' << lulzy: the universal dragnet thing dun count, evidently, as 'wiretap'
asciilifeform: it can only be read to him by other folks, in the only language he understands.
asciilifeform: the reading that suggests great inca is not sovereign over earth, fire, air and water, is never the preferred reading, no
asciilifeform: 'ya wouldn't wanna end up in one BY ACCIDENT WOULDJA'
asciilifeform: 'support escrow or risk COKE MACHINE!1111'
asciilifeform: e purposefully, but it is also possible for someone to genuinely forget it, and this is left to a judge to decide. If “failure to decrypt your device” leads to indefinite jail time, Kerr asked, is that an outcome we are willing to accept?' << mega-l0l
asciilifeform: 'Given the difficulty of opening a post-iOS 8 phone or a similarly protected device, investigators are now forced to turn to other methods. Kerr pointed to a case in the Third Circuit Court of Appeals of a former police officer allegedly dealing in child pornography who would not divulge his computer passcode; he is currently being detained with no clear end date. Kerr noted that it is quite possible for someone to withhold a passcod
asciilifeform: ^ in case anyone ever had whatever doubt as to the meaning and purpose of multisigification of whatever sort.
asciilifeform: spoiler: in the massive turd, usg functionaries propose to rebrand ye olde key escrow as 'multisig' and mandate! 'k of n' !
asciilifeform: 'The Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext was convened on June 23-24, 2016, in Washington, D.C., under the auspices of the Computer Science and Telecommunications Board of the National Academies of Sciences, Engineering, and Medicine. The workshop was sponsored by the Office of the Director of National Intelligence (ODNI). ... The meeting was open to the public.'
asciilifeform: ...[bunch of other sad folk snipped]'
asciilifeform: ^ u.s. academy of sciences, whored out, fucked in openings sov academy did not even ~have~ drilled
asciilifeform: in other lulz, 'Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop.' Anne Johnson, Emily Grumbling, and Jon Eisenberg, Rapporteurs. THE NATIONAL ACADEMIES PRESS 500 Fifth Street, NW Washington, DC 20001 This activity was supported by the Office of the Director for National Intelligence, under Contract....☟︎
asciilifeform: '1. Take site offline and work on ensuring everything is secure. 2. communicate to users 3. contact chain analytic companies and authorities about the hack and trace the funds, look at ways to recover the funds. 4. Investigate exactly what happened to ensure that we're still not vulnerable. 5. Work on getting the site back up and running.'
asciilifeform: mircea_popescu: illustrations to winnie pooh.