167400+ entries in 0.1s

mircea_popescu: diana_coman, hanbot,
trinque, bingoboingo, mod6, danielpbarron, mike_c, asciilifeform, davout, ben_vulpes, phf, lobbes, mike_c, jurov, peterl, pete_dushenski ^
mircea_popescu: this is actually going
to be
teh magic number of
the republic. so at
this juncture i would like
to ask everyone
to compute "the largest primorial (ie, product of all successive primes)
that fits in 515 bits", sign it and put it into deedbot.
☟︎☟︎☟︎ mircea_popescu: a yes. a mb or so's worth is good
to have. afaik all rsa impls have some small primes. heck, peterl's gossiptron had a list.
mircea_popescu: asciilifeform i don't mean
the disk size of
the 8ball, i mean
the size of
the largest prime in it
mircea_popescu: asciilifeform i believe
the spawner is
the same mother-of-idiocy, always pregnant, always knees spread,
that spawned everythiong
they do, from "voting"
to "gpg"
a111: Logged on 2017-08-14 16:16 asciilifeform: (
then, elementarily, you gcd against '8ball', primorial of $largeint )
mircea_popescu: it's funny how all
the
things are
the same
thing and everything wraps into ideological identity. empire needs... a lot of really dumb ones, as a COLLECTIVE. we... make every one stand on its own INDIVIDUALLY.
☟︎ mircea_popescu: it is also a very
typical difference, symbolic enough
to go on our fucking flag. "the empire makes a
test and
then goes
through parts until it finds one
that goes
through ;
the republic makes a part and
tests it until it is certain
to be correct."
a111: Logged on 2017-08-14 16:14 asciilifeform: (
tldr : superiority of
the FUCKGOATS-enabled approach, of get-new-N-bits-from-rng-then-primalitytest-until-done, vs
the kochian get-N-bits-then-increment-until-passes-millerrabin )
mircea_popescu: and otherwise, in
their own fucking idiota i mean "idioma", it goes like so : "con fuerza y corage dicimos adios".
this.
this is 100% argentina, brave, brave, brave sir robert
turned about and galantly he chickened out... brave brave brave recursos humanos...
mircea_popescu:
http://btcbase.org/log/2017-08-14#1697556 <<
the funny
thing is
that
there's not enough of
them by now. same exact
thing happened
to
the german communists in
the 30s. "folks
this is
the end", ie, "we used
to
think we're right because we're many, and now we're not many, and
that's all we had."
☝︎ mircea_popescu: it's your racist victim
that stood in
the way of black code matters and progress and spice and everything nice.
a111: Logged on 2017-08-14 16:45 shinohai:
http://archive.is/Uffst <<< lulzy ... "After a software update was sent
to your lock, it failed
to reconnect
to our web service making a remote fix impossible"
shinohai: Theonly 2 fixes proffered require AT LEAST one week
to implement
shinohai:
http://archive.is/Uffst <<< lulzy ... "After a software update was sent
to your lock, it failed
to reconnect
to our web service making a remote fix impossible"
☟︎ trinque: cute backyard
tiki
torches. I wonder if
they got
the citronella ones, useful for keeping skeeters away from your /pol/ flash mob.
trinque: mircea_popescu: makes sense. can't stop
the bits from leaking; can however simply let
the owner of an account know every
time something happens, so he can yell at me before I do
the next batch of withdrawals if he didn't do it.
mircea_popescu: but outside of
this, "has
T told X about Y's otp" is very much a "you wouldn't download a car"
type of problem.
mircea_popescu: accidental re-use of otps would however become obvious
to L
the moment he sees
two hash(C)s equal. he can complain even before
the user responds
to
the otppad.
mircea_popescu: the ~only approach is
to come up with secret parts, but
this is contrary
to design goals in context.
mircea_popescu: trinque
there's no way
to prove owner of secret S did not share secret S with someone else.
that's why "key sharing" dun work for rsa/bitcoin/etc.
a111: Logged on 2017-08-06 05:36 mircea_popescu:
trinque re last para, what's wrong with you know,
http://btcbase.org/log/2017-08-03#1693444 ? basically replace "The user decrypts
the ciphertext and returns
the cleartext OTP
to D, which relays it
to
T, meanwhile revealing it
to L.
T replies
to D with either "OK" or "FAIL", and a
transaction is complete." with "T sends hash(C)
to L, encrypted(C)
to D.
The user decrypts
the ciphertext and returns
the cleartext OTP
to D, which
trinque: how
the fuck did a B get in
there, lol
a111: Logged on 2017-08-06 05:36 mircea_popescu:
trinque re last para, what's wrong with you know,
http://btcbase.org/log/2017-08-03#1693444 ? basically replace "The user decrypts
the ciphertext and returns
the cleartext OTP
to D, which relays it
to
T, meanwhile revealing it
to L.
T replies
to D with either "OK" or "FAIL", and a
transaction is complete." with "T sends hash(C)
to L, encrypted(C)
to D.
The user decrypts
the ciphertext and returns
the cleartext OTP
to D, which
BingoBoingo: They set
themselves up
the segwit bomb. Now it's 2x
that Sillybert wants
to shill.
BingoBoingo: <mircea_popescu> BingoBoingo don't you just love how
the
tards went straight on from "bitcoin cash"
to "segwit" without skipping a beat ? << Well,
they soft forked segwit.
Their new hill is
TWO mb blocks
mircea_popescu: "oh, bitcoin doubled once mp defeated our dumb shit ?
THIS ONLY GOES
TO PROVE OUR DUMB SHIT IS INDEFEATABLE!!11"
mircea_popescu: BingoBoingo don't you just love how
the
tards went straight on from "bitcoin cash"
to "segwit" without skipping a beat ?
mike_c: I've got reading
to do.
mike_c: so.. first a compiler for
this subset?
mike_c: what's
the intended purpose for
the bitcoin pieces? you going
to port
the client
to ada?
a111: Logged on 2017-07-16 20:11 asciilifeform: for anyone not
tuned in : ^ computes factorial of 65536.
a111: Logged on 2017-07-15 23:16 asciilifeform: !~later
tell mod6
http://nosuchlabs.com/pub/fact.tar.gz << complete kit for above. sha512==26198604bff50d3411e343a30b97f4babe3a6b291fca267435cecd6a5438a08862b550198a49dd5549dda00c841d95afc1443f597587710b83c7fa65effa9c73
mike_c: oh, it's called "p"?
that will make log-scouring so easy!
mike_c: yeah, mp mentioned
that. I'm going
to scour some logs for more info on it.
a111: Logged on 2017-08-13 20:58 mike_c: yeah, well, from what I remember
that's what killed cardano, no?
that gpg
turned out
to be a pile of crap?
mike_c: ok, I'll
take a crack at it.
mod6: feel free
to ask any questions.
mod6: <+mike_c> mod6 - you mentioned I might need some hand holding. anything I need
to know
that's not in
http://thebitcoin.foundation/trb-howto.html ? <<
that /should/ be all you need
to know. less steps in
the on-line version, but use which ever you need.
jhvh1: lobbes:
The operation succeeded.
mike_c: yeah, I want
to dig up some logs on
the rsa stuff.
mod6: there was a bug
that was discovered like a year ago
mike_c: yeah, well, from what I remember
that's what killed cardano, no?
that gpg
turned out
to be a pile of crap?
☟︎ mike_c: I'm looking forward
to being able
to generate a key
that I can actually
trust.
mod6: all my
test results and stuff are posted
mod6: mike_c: i had quite a bit of fun
testing
those FGs; worked pretty great for me.
mircea_popescu: now if only i knew what
the fuck i want with it
to any meaningful degree...
mircea_popescu: mod6 you prolly have a point
there, i should write since it keeps coming up when
trying
to get intelligent people up
to speed.
mike_c: stan's
theory for a mesh networked internet at least, I don't remember him proposing it for computing
mod6: It's an ongoing project.
The
tickets are above, kinda outlines
the idea ^
mircea_popescu: and now
the idea is... since
this could ALSO be used as a padder (in
the rsa sense), a reverser is needed (takes r and s and spits out m)
mod6: is
there a
trilema post on UCI?
mike_c: ok, yeah, I read
that one.