144500+ entries in 0.086s

mircea_popescu: THAT someone isn't admitting
to idiocy, preferring isntead
to derp about how "Ceo is supposed
to know all".
mircea_popescu: indeed. but here's
the hidden
truth :
the idiots
TALKING
TO HIM about it are no different from
the people asking beautician re politics.
mircea_popescu: cto's job is
to understand why robots have limits, if
the company is doing robots.
mircea_popescu: this
totally orc bullshit where everyone is an expert in everyone's field already...
mircea_popescu: but for
the nitpick : it's not
the job of
the ceo
to know why robots have limits.
jhvh1: BingoBoingo:
The operation succeeded.
diana_coman: at a first pass
this duplex
thing based on keccak seems
to be a similar attempt really, hence my question if anyone looked at it more closely (I'm still
trying
to fully grasp it, not
there yet)
a111: Logged on 2017-10-06 23:13 mircea_popescu: basically
the scheme is, you rsa a random bitfield,
then you expand
that into as much otp as you want by doing recursively Fi = hash(bitfield + Fi-1).
there's a limit on i, obviously, which can be set
to 1.
diana_coman: yees, but conceivably
there might be one in
the future; if no knob
then no point as it were, entirely
diana_coman: heh,
true
that; I
think first
trouble
there is
that "never-reuse" choice means "no-knob" for client who pays however for
the
traffic;
the whole point was precisely
to let player choose
their own level of compromise between cost and security (otps are generated on
the server for good reason)
diana_coman: I meant
the choice of specific, concrete way
to expand
the original bitfield i.e. "reuse
the otp"
diana_coman: asciilifeform,
the second part is not so well defined/fixed yet
diana_coman: however so far I focused on
the reference paper on keccak itself (The Keccak reference version 3.0)
diana_coman: well, I have several papers on keccak and one of
them is
this "Duplexing
the sponge: single-pass authenticated encryption and other applications"
diana_coman: I can't seem
to find in
the logs any discussion re duplex construction/duplexing
the sponge i.e. keccak's authors own proposal of using keccak for authenticated encryption; did anyone look into
this?
☟︎ phf: well, i'm
thinking in
terms of a
TMSR MACHINE. scheme.adb linked against ffa linked against
that com1 hack you posted some
time ago :p
phf: right, so
that scheme.adb would benefit from a way
to cons onto an arbitrary sized array, and
then later someone can bolt a gc on
top of
that. can even implement it as an explicit function call rather
than a
threshold
thing
phf: like in php model? allocate as much as you want and
then "free" on
termination?
a111: Logged on 2017-11-12 23:12 asciilifeform: i'm not fully convinced
that a scripting lang ~needs~ a gc
phf: asciilifeform: i'm using "memory management" meaning of cons, not like lisp 101
take on it.
they don't have cons meaning
that
there's no managed heap,
there's no gc on
that heap, and you can't allocate
things into
the heap and let it be managed by heap machinery. so
they have "cons", but
their ~actual~ cons is ada's "new ..."
a111: Logged on 2017-07-13 15:42 asciilifeform: phf: contrary
to appearances, asciilifeform is not fixated on ada lang per se, but rather on
the style of
thinking it leads
the operator into.
phf: somewhat relatedly one handy
thing i saw on CADR is named cons regions, i.e. explicit memory regions where you can cons and every allocation function having a *-in-region equivalent, like (cons-in-region x y region). i'm not sure if
that's
there, but you presumably can do some kind (with-cons-region (region ...) body)
thing. naturally
those regions can be saved (preserved referential integrity) or cleared, etc.
phf: right, i suspect
that scheme.adb doesn't
touch on it, because, again, no cons
phf: i'm not sure how you're planning on doing
that, unless you mean ada level pointers. you'd have
to have objects with values
that are offsets into your virtual heap
phf: there be dragons. i mean, if you're rewriting a parser in lisp,
then you might as well have proper readtables, rather
then hardcoded sexp hack
a111: Logged on 2017-11-13 18:13 asciilifeform: use Ada.Strings.Unbounded; << mno ben_vulpes
this is ~specifically~ a Do Not Want
phf:
http://btcbase.org/log/2017-11-13#1737247 << it looks like a properly structured scheme evaluator, but it's ~explicitly~ lacking a native cons, which might be a very good exercise for whoever™ adding a static allocation space, adding mark-and-sweep,
then all
those
To_Unbounded_String look like
they can be simply search/replaced
☝︎☟︎ ben_vulpes: asciilifeform: absolutely, have a benchmarking in place, will be implementing
those
two changes and recording improvements
a111: Logged on 2017-08-15 22:51 asciilifeform: but instead flipping a single bit
that gets xored with
the result every
time you read from
the would-have-been-flipped reg.
a111: Logged on 2017-11-13 17:47 ben_vulpes: and in ancients, dusted off mpfhf benchmarker, finished
the bit-banging of inputs, fired off a run late last week
that is *still hashing*
a111: Logged on 2017-11-13 16:51 lobbes: Good news on archive front; archive.is d00d has agreed
to add my ips
to his cloudflare whitelist
trinque: "bitch,
this hash function is hard in *both* directions!"
ben_vulpes: and in ancients, dusted off mpfhf benchmarker, finished
the bit-banging of inputs, fired off a run late last week
that is *still hashing*
☟︎☟︎ ben_vulpes made some headway
through lisp in small pieces, mind appropriately blown
lobbes: Very accommodating d00d indeed. I invited him here, as well, but you know how
that goes
☟︎ lobbes: trinque, yeah. Hopefully will be able
to bypass
the cloudflare js/cookie challenge wall
trinque: nice lobbes.
this means you'll not be ratelimited? or what was
the problem?
lobbes: Good news on archive front; archive.is d00d has agreed
to add my ips
to his cloudflare whitelist
☟︎☟︎ BingoBoingo: If making pies, you have
to make
the best, and best means round.
trinque: surely
the
tickerbot has been switched
to bitcoin crash? what do I make of
this?
mod6: sorry if
this is obvious, wasn't
to me.
mod6: so in your algo above, you're saying
that you can work
that magic with just
the ~lowest~ discarded digit
mod6: yeah, /me re-read and Mr. P. said
they discard
the higest 2 digits
mod6: when you say 'lost bottom bits' worth of entropy -- you save
the discarded bits and use
them later', are you
talking about
the highest order 2 digits, and
the lowest 1, saving
their original lower-order half and using
that?
a111: Logged on 2017-11-07 16:36 asciilifeform: let's model
the ideal prime-shitter. it would be an item
that
takes integer N , of whatever bitness, and produce
the Nth prime ( or eggog if
the Nth prime is bigger
than
the register bitness permitted. )
mod6: even /if/ doing some prime selection based on 'discarded bits' would net you anything what-so-ever, is it shown, presently
that
they even do
this?
mod6: im not sure about
that
a111: Logged on 2017-11-13 05:11 asciilifeform: so it is quite in keeping with
this, for it
to , say, pioneer 'robot works in vacuum, and moves without hindrance of air resistance, ReallyFast!' etc