asciilifeform: for one thing, you need to have the solution to a case of problem to use it as crypto. otherwise you could 'elementary proof of fermat's conjecture is the key!'
asciilifeform: jurov: try to understand what 'proven insolvable' means
asciilifeform: but 'omg!1111111 inconvenient!11111 can't reuse key!11'
asciilifeform: i find it also very interesting that all aes-like ('boxes') cryptosystems are direct descendants of rotor machines. which were known to be pseudoscientific even when first built, as vernam existed☟︎
asciilifeform: picture if every time 'mars didn't rise on schedule' ALL BRIDGES FELL.
asciilifeform: you want actual hard trapdoor problems.
asciilifeform: and everybody pretty much uses fpga clusters for actual cryptoanalysis anyway. so elaborate 'let's zap the miners' trickery is ~pointless.
asciilifeform: mircea_popescu: in order for above to hold true, N must have equal 'mass' to M
asciilifeform: (we have no crypto based on provably-hard cases of provably-hard problem. we have ~some~ crypto based on lousy cases of suspected-hard problem. we have MEGATONNES of crapto based on fuck knows what fuck knows whether problem at all.)
asciilifeform: but it'll have to be a) something you can actually do repeatably on a digital computer + b) based on some reasonably compact hardness assumption
asciilifeform: i have nfi what is interesting re the linked piece
asciilifeform: lel does jurov regularly read trashy ru tabloidz ??
asciilifeform: 'Blackburn's lawsuit accuses Oracle management of pushing her to "fit square data into round holes" to make Oracle's cloud services' results look better. She alleges that her bosses instructed her to add millions of dollars of accruals for expected business "with no concrete or foreseeable billing to support the numbers."'
asciilifeform: 'This will create a real full node in your browser: your browser will connect to the p2p network and do all of the block verification/serving.' << l0l suuuure.☟︎
asciilifeform: ages. Most, according to court records, involve online sales and transactions.'
asciilifeform: 0 in 2009. With shipping and other costs, the total was less than $75, according to court records. The printer's buyer was Gersh Zavodnik, a 54-year-old Indianapolis man known to many in the legal community as a frequent lawsuit filer who also represents himself in court. The Indiana Supreme Court said the "prolific, abusive litigant" has brought dozens of lawsuits against individuals and businesses, often asking for astronomical dam
asciilifeform: 'What the 66-year-old Massachusetts man didn't know then is that he would spend the next 6 ½ years embroiled in a complicated and confusing legal dispute in Indiana over that printer, which, according to its buyer, was broken. He would find himself liable for about $30,000 in damages. He would pay a lawyer at least $12,000 in his battle to escape the legal mess. And it all started with a piece of hardware he sold online for about $4
asciilifeform: 'Federal agents planted hidden microphones and conducted secret video surveillance at Alameda County’s Rene C. Davidson Courthouse for ten months, despite having no court warrant. The surveillance operation was part of an investigation into alleged bid rigging at foreclosed property auctions where thousands of houses and apartment buildings were sold by banks.'
asciilifeform: perhaps not unrelatedly, cryptome appears to be down.
asciilifeform: one obvious possibility is that he had second thoughts re pushing the tor chumpatron.
asciilifeform: ( nobody executes an asset just for the hell of it. )
asciilifeform: imho the only interesting mystery here is what it was, that was so loathesome, that even appelbaum refused to do it and had sentence of shitburial carried out.☟︎
asciilifeform: and, what, his shithub key just 'happened' to leak, this piece was planted therein, usgarchive.org just 'happened' to cache the page right before deleted, etc. ?
asciilifeform: s better known for my abuse of other people — sexually, emotionally, and physically.'
asciilifeform: 'Hey there! My name is Jacob Appelbaum. I'm pretty famous for stealing other people's research and putting my own name on it. I also spend a lot of my time pretending to be a badass hacker, but actually I can only barely code. I enjoy using my social capital, influence, and power in order to manipulate other people into getting what I want. From all that, it's pretty clear that I'm awesome! However, in several communities, I'm perhap☟︎