log☇︎
167900+ entries in 0.1s
asciilifeform: keep in mind that forgetting your 'alphabet' is just as good as forgetting the key
edivad: at these times porn industry should have generated enough pornstar name entropy
edivad: i could even try with pornstar names
edivad: mod6: You need at least one UTF8 locale to build a toolchain supporting locales
mircea_popescu: http://trilema.com/2012/romanian-dicelist/ << see there.
edivad: do you mean with paper and pencil, and then storing the paper in some hole very distant from NSA eyes? mircea_popescu
asciilifeform: edivad: ever read about mnemonists ? the stage magicians.
edivad: in some random words that can be converted into the 64 hex original key
edivad: since i'm not yet capable to remember my 64 characters hex private key, there is a way to convert it in a seed without decreasing the security, and maybe being able to memorize it?
mircea_popescu: yes. there's isn't, nor is there going to be a way, manner, instrument or device through which to protect the passive from the active.
edivad: that's quite sad, but there's nothing that will stop this general trend
edivad: but you know, user friendliness is going to fuck hard security perception of mainstream users
mircea_popescu: edivad the public wants entertainment not education.
edivad: that's some good warning that should be public in many places
asciilifeform: and not simply 'reducing entropy', but introducing a relationship between all of them
a111: Logged on 2017-08-10 15:39 mod6: But wouldn't be a bad idea to throw it on there in the case where someone, decides to use the linked vdiff script, which uses diff.
mircea_popescu: http://btcbase.org/log/2017-08-10#1696617 << very minimally just in case tho, you know. ☝︎
edivad: using deterministic shit, I'm reducing the entropy of my keys, correct?
edivad: so basically, tell me if I'm wrong
asciilifeform: enemy only needs to steal ONE seed to get every privkey your ever generate
asciilifeform: why would you do this to yourself
a111: Logged on 2016-02-04 01:12 asciilifeform: why the FUCK would i
asciilifeform: http://btcbase.org/log/2016-02-04#1396046 << see thread ☝︎
edivad: absolutely true
edivad: > the state-of-the-art among thinking folk is that pre-generated tx are stored on paper and fed into a hot node when necessary
edivad: ok going to check the results
edivad: wasn't able to learn because those damn seeds have a last checksum word (that maybe is a perfectly ok security feature, but it cuts out manual experiments with dice)
edivad: because you know, with a bip 44 compliant seed, you then generate your extended public key, and you can leave your dice in the drawer
edivad: and one thing that i haven't learnt yet is how to generate a bip 44 compliant seed with dice
edivad: but yes, asciilifeform, is very time consuming if you need to do repeatedly
edivad: i thought that dice was great for cheap and safe cold storage, if done it right ☟︎
edivad: so, back to the question, is the fuckgoats device meant to be, for instance, if i run a bitcoin service that constantly need to generate private keys, let's say, for example, for an hot wallet?
asciilifeform: edivad: it's pretty expensive to use dice if your time has value.
mod6: ok, that /is/ a bit less steps, so a decent place to start until you get the hang of the process.
mod6: edivad: are you doing the online or offline build?
edivad: basically, i recently learned how to generate private keys with a D16 + paper and pencil, and i thought that was a great way to have low cost true entropy
edivad: that maybe someone can answer later and i will check on the logs
edivad: is now downloading again boost, meanwhile i would like to ask some questions about the fuckgoats device
edivad: i'm gonna leave the actual dir for future forensics analysis when i'll be moar expert and now i'm going to create another one
mod6: i would blow everything away and start over following exact instructions in the howto
asciilifeform: ( it failed, and from the posted barf it is not possible to yet say why )
edivad: can i keep the .wot folder?
asciilifeform: mod6: i think his buildroot failed
edivad: this is the main
edivad: under src or the main?
edivad: going to check on ubuntu where is located
shinohai: No in the file CheckIncludeFiles under your cmake installation ☟︎
edivad: into the makefile.unix under src?
shinohai: Find the line: `CMAKE_CONFIGURABLE_FILE_CONTENT}\n\nint main(){return 0;}\n")` and put `void` in the parentheses after int main()
mod6: yeah, this looks like it might be something with your /etc/alternatives or something
edivad: lemme try
shinohai: ^ That pthread issue I solved on Debian by going to /usr/share/cmake and changing a line in CheckIncludeFiles.cmake ☟︎
jhvh1: asciilifeform: The operation succeeded.
asciilifeform: !~later tell pete_dushenski http://www.contravex.com/2017/08/10/unboxing-and-set-up-of-nosuchlabs-fuckgoats-on-macos-openbsd-linux/#comment-58669
edivad: :) please tell me that the solution is right around the corner, like adding a CC=/path/to/something into the makefile
edivad: but i really cannot figure out what i could try before running again the make command
mod6: yeah, it does not seem to understand where 'c' is located.
edivad: since gcc is present i think that is some kind of env problem
edivad: so, this is the last error mod6
edivad: you know, a satisfacting terminal try & die till everything works
edivad: i feel that i'm very near of a succesful compiling of bitcoind, especially after the update of the guide
edivad: i promise that this will be the last emergency troubleshooting about TRB
mod6: alright, I have published those changes to : http://thebitcoin.foundation/trb-howto.html
mod6: Ok, I think it's better now.
mod6: Updated the formatting too.
mod6: But wouldn't be a bad idea to throw it on there in the case where someone, decides to use the linked vdiff script, which uses diff. ☟︎
mod6: my V doesn't use diff anyway, only patch, gpg, sha512sum, and wget -- and otherwise just standard shell tools such as echo, mkdir, rm, cat, etc.
mod6: I think it was patch, but yeah, maybe I'm mis-remembering that.
shinohai: Yeah I forgot you had a guy with some sort of linux that didn't have diff
mod6: maybe i aught to add 'diff' on that list. it is inexplicable to me that it wouldn't be there, but then again, lol.
mod6: Thanks for taking a look shinohai
mod6: Hi, I've updated the howto, it's not "finalized" yet. Please take a look and let me know if this doesn't read quite right, or if I've left something out: ☟︎
PeterL: oh, and I was trying to make the functions more general, avoid putting in magic numbers as much as possible
asciilifeform: lzw is neither here nor there, you can't rely on payload being compressible
PeterL: ah, originally I had it written to allow user to change key sizes, that is a holdover just in case
a111: Logged on 2016-08-18 12:32 mircea_popescu: asciilifeform since we're on this btw, the way i want tmsr-rsa key generation to work is as follows : a contains a number of entropy bytes specified by user in tmsr-rsa.conf read whenever tmsr-rsa.conf specifies (such as urandom); b contains a base-tmsr string specified by user. c = base-tmsr(a).b ; p = nextprime(cut(sha512(c),257)) ; process is repeated for q = nextprime (cut(sha512(c'),258));
mircea_popescu: all keys same size. ideally as per http://btcbase.org/log/2016-08-18#1524210 discussion at that ☝︎
mircea_popescu: PeterL + padlen = min(keya.l, keyb.l) - 1 # make sure that the strings will not overflow the key mods << i don't get it, why do you have variable length keys ?
mircea_popescu: (and in any case, this is also a major improvement over gpg, which realloy only uses 2^16, and worked ok in the field for many years)
mircea_popescu: a cheap improvement would be to write down also the LZW compression ratio.
mircea_popescu: are you trying to say that since there's only 2^32 possible values for the crc, it then follows that 1 in 4bn will match ?
mircea_popescu: asciilifeform in my model the crc was also random.
asciilifeform: *randomturd that passes
asciilifeform: aaactually chance of computing randomturd-cum-crc is no lower than 1/bitness-of-crc
mircea_popescu: if you're asking "what is the probability of a 4000 bit string being randomly generated so it matches an arbitrary crc32", the answer is you know, 1 in infinity.
mircea_popescu: crc checks that the string is the same now as it was when crc was originalyl computed
PeterL: not trying to catch changes, trying to catch random string accidentally passing the check
mircea_popescu: this is what crc does : for blasts up to its size, 100%. for larger blasts, proportionate.
mircea_popescu: PeterL if your string is 250 chars, there is 0 probability that an up to 32 bit setcion being altered in any way will not be caught up
asciilifeform: mircea_popescu: you get the idea. no reason to standardize the diddle.
PeterL: also, my question re crc32 yesterday, I meant to say: given a (random) string of 250 chars, what is the proability that (random four byte string) will pass the crc32 test? which I think is just 1/256^4
mircea_popescu: once implemented, "theft" dropped like 90%. which is more than any usgstani effort has, or ever will do.
mircea_popescu was a major, and in fact for a year or so the only proponent of encrypted wallets for btc.
mircea_popescu: asciilifeform gpg does teh same thing.
mircea_popescu: i expect at least one's own history should be kept encrypted to a key of his.
asciilifeform: privkeys are plaintext ( you can cipher them via some other cmdline util, or even another piped p, but no nonsense re 'bitcoin-style' enter-aes-pw etc )
PeterL: at the moment there is no securing of data. that would be something to add before battlefield use.
mircea_popescu: PeterL is there any security contemplated for the data, such as i dunno, encrypt the lists of peers / keys / history etc ? or simply a case of "fuck you secure your machine" ?
mircea_popescu: if the machine is on and i'm long dead, am i online cuz it pings ?
PeterL: the idea would be to ping everybody, and have an option for wther or not you respond to pings