log☇︎
173800+ entries in 0.102s
BingoBoingo: <sina> whenever DPR does a thing, Vizzini is forced to say "Inconceivable" << Except irl, mircea_popescu is not short and DPR sits in sodomy box while mircea_popescu's muscle has titties
mircea_popescu: meanwhile in the emaciated future, http://68.media.tumblr.com/94e47881942ed1fb6fa1349abd5841a5/tumblr_og8lhuAnZB1stijv1o1_1280.jpg
mod6: never hurts, get the kinks out early
lobbes: I'll learn shit in the process, at least.
asciilifeform: but in my experience they make poor nodes.
asciilifeform: it doesn't hurt to try
lobbes: damn. looks like my plans for my old craptop being a trb node will have to wait until I secure better iron.
asciilifeform: ( clogs the bus )
lobbes: in other questions: Prompted by up-stack threads and after much log reading I've concluded that a SSD is a must for trb-ing. Would an external usb SSD be adequate, versus, say a SATA connection?
mircea_popescu: and once there... well... there'll be more stepping on more coals to get away.
a111: Logged on 2017-07-19 00:58 sina: does my line of thought really make so little sense?
mircea_popescu: http://btcbase.org/log/2017-07-19#1686438 <<< yes, because you're applying the pretense of statics to a dynamic situation. trinque 's metaphore is very much factual : we were paradopped on hot coals, by the FAULT, inexcusable, and indelible, of our parents. they should have taken care that we do not get dropped on hot coals, as children barely able to move. they did not, and derelict in their first and practically speaking on ☝︎☟︎
mircea_popescu: the theory is that there's no "best practices", and deliberately. i'm pretty sure the practice follows the theory, but we'll definitely never know.
sina: anyhooz. patience from the usual suspects on RSA discussion greatly appreciated. must be off, have wonderful days all.
a111: Logged on 2017-07-19 00:47 sina: feel free to say "it's a dumb question, go away"
hanbot: lol this poor guy's been trying to have a chuckle the last 20 mins...NOT ALLOWED!
sina: mircea_popescu: and yet it is so, the logs are the only place I can imagine such a sentence being discussed today
mircea_popescu: not that i fault penny-an-hour hack/writer for not being able to reproduce reality in his fancy.
mircea_popescu: dja see the difference in quality ?
a111: Logged on 2015-12-28 01:23 mircea_popescu: the dictum "never get involved in a land war in asia" is mostly due to the fact that the portuguese were involved in a sea war in asia, and it worked splendidly for them.
sina: I mean I can picture reading it in the logs
sina: "You only think I guessed wrong! That's what's so funny! I switched glasses while your back was turned! Ha ha, you fool! You fell victim to one of the classic blunders - The most famous of which is "never get involved in a land war in Asia" - but only slightly less well-known is this: "Never go against a Sicilian when death is on the line"! Ha ha ha ha ha ha ha! Ha ha ha ha ha ha ha! Ha ha ha... "
sina: actually this quote seems like 100% mircea_popescu
sina: that is the one, although the book from which it derived is equally enjoyable
mircea_popescu has seen the "you killed my father" a long time ago.
mircea_popescu: ah that's who that was.
sina: whenever DPR does a thing, Vizzini is forced to say "Inconceivable"
sina: oh. so in the movie Vizzini is the supersmart villain trying to kidnap this lady, and the good guy Dread Pirate Roberts keeps chasing him despite various obstacles Vizzini has created
a111: Logged on 2017-05-16 19:52 mircea_popescu: romania incidentally has a long history of just this, it's called fanarioti period. hundreds of groups over 3-4 centuries did just this, kept taking over because pissed off with insolence of ex crown. discovered worse deal to be king.
mircea_popescu: i get that part, but what does it aim to, what's the tendency ?
mircea_popescu: what's the intension ?
sina: some actor playing the character of "Vizzini" in "The Princess Bride"
mircea_popescu: somewhere between 1 and 3 most people have enough bellyache. because, really, it's never fucking worth it to 5.
sina: mircea_popescu: only as a matter of curiosity, given your worth re above statement, do you take any of these actions?
mircea_popescu: 5) take over the crown.
mircea_popescu: 2) get a proper power supply. this means -- that the power line should feed a battery, not your machine. you can measure leakage if you will, so this can be tweaked by hand to an arbitrary level.
mircea_popescu: otherwise, in order of cheapness-effectivity : 1) get an isolated box for rsa ops. this shouldn't ever connect ot the internet. stuffing into it a stick which was in a net-connected machine counts.
a111: Logged on 2017-07-19 00:40 sina: given that. what are the practicalities, today, on the ground
mircea_popescu: http://btcbase.org/log/2017-07-19#1686392 to this point : depends how much you're worth. if you're worth nothing, then you are thereby "safe" in this sense, that while protein rich i still don't eat the moths in my house. ☝︎
sina: trinque: to clarify, contentment in understanding, not of the status quo
trinque: just the contentment!
sina: asciilifeform, trinque, no misconceptions in my summary?
sina: mircea_popescu: if that is a complete list, then I am content with a useful answer.
mircea_popescu: for as long as you're running the "awl" there are no solutions for this -- just mitigations. do not permit micrphones ; do not permit antennas ; use inductor&battery arrangements ; shoot anyone seen approaching the solitary hilltop fortress and so on and so forth ad infinitum.
mircea_popescu: sina> just, hopefully a list of adversary capability mapping to outcomes << anyone who can listen in (ie, intercept acoustic band) within a mile or so of your machine, can derive your key that way. anyone who can measure your power draw (say, up to the pole) can derive your key that way. anyone who can route to your box, and measure delays, can idem.
sina: "today, until a constanttime solution is in place, gpg is the tool of choice for RSA encryption. any time you use it, you can't know whether you have completely compromised your private key. and we use it anyway."
sina: alright. please let me attempt to summarise the discussion thus far, and correct any misconceptions
asciilifeform: i had nfi that this is a difficult concept.
trinque: sorta like these guys that come through asking what to do with their raspberry pi wallet or w/e, life savings in dogecoin
asciilifeform: sina: you DON'T KNOW that it's 500
trinque: absent asciilifeform's expertise which gave ^ as output, one'd just turn that into a totem
sina: trinque: does the general commit his troops to an action and see if he fails? or try and understand the enemy movement and tactics, to say "ok, crossing the bridge with enemy awaiting on farside, bad idea" without needing to act on it
trinque: how would you measure whether they are or not, other than acting in the world and seeing if you fail?
sina: whereas I am asking, what is the gradient of consequence, given differing scenarios and adversaries
sina: but that is not congruent with actions taken, otherwise all here would treat their keys as compromised?
sina: it seems the answer so far given is only "the consequence is always the worst, given this particular act"
sina: trinque: of course! and I ask, is there no value in understanding the consequences of a given act?
trinque: sina: never been in a situation where you both had to act and there were no good options?
asciilifeform: == 'what is the point of obeying traffic signals, i have a good chance of death in traffic anyway'
sina: again to reiterate I seek only understanding, not to make a point or argument
sina: does my line of thought really make so little sense? ☟︎
sina: otherwise asciilifeform would surely say "what is the point of encrypting, I am broadcasting my key to all, every time"
trinque: and meanwhile only sensible strategy would be to move quickly / step as few times as possible til off
trinque: if standing on hot coals, I bet you'd run even though you'd only step on more coals, at least for a while.
sina: want to send my encrypted cake recipe to trinque"
sina: it's not an argument, only the next thought that pops into my head as a consequence of the discussion. all here seem on the same page re constanttime stuff, yet all here are using the tool in spite of that, so there must be some thought process which allows someone as reasonably paranoid as asciilifeform to do so, i.e. "I am not concerned with timing attacks of class X, Y, Z from adversary A, B,C when I
trinque: sina: be brave and actually state what made you say that.
asciilifeform: sina: i'll ask just this one more time : what is your argument ?
sina: and yet, here we all are, encrypting, decrypting, signing ascii with some RSA stuff all the time, in spite of that
asciilifeform: but refusing to actually plug the leak at the source, dooms you to it
asciilifeform: to whoever sits on your pole transformer.
trinque: to the antenna in your CPU! lets go full tinfoil.
asciilifeform: to the other electronics, of various provenance, in your house. in your neighbour's house. to martians. etc
asciilifeform: to your neighbour, watching the room lights; to passer-by with antenna; to your isp; varies
sina: anyone who can ping my box? anyone in the world?
asciilifeform: there isn't a 'to whom', that's what word 'broadcast' ~means~
sina: or to ask alternatively, broadcast to whom?
sina: can I safely state, if I want to email trinque RSA encrypted cake recipe, that asciilifeform can never read it?
sina: trinque: given the quoted statement, what are the implications? for example, does it imply that a passive network adversary will not be in a position to mount a timing attack? or does it so?
a111: Logged on 2017-07-19 00:40 asciilifeform: sina: the practicalities are - that every time you unholster your gpg key, you broadcast a few bits of it.
sina: feel free to say "it's a dumb question, go away" ☟︎
asciilifeform: sina: what argument are you trying to make ?
sina: none of us do, and yet, tmsr uses "18th century hygeine" anyway. I am assuming because of considered evaluation of possible threats and their outcome
trinque: sina: you do not and likely will not know the manifold ways modern computing has been perforated for imperial tyranny
sina: trinque: my question being, given a sina sitting in the crater, what is the list of things ~impervious to, what is the list of things not
trinque: "yes things are that bad. have a great day!"
trinque: there's this reaction to the NSA mindrape that ought to be pointed at directly. and more broadly the socialist mindrape.
sina: trinque: to extend your analogy. you are on a field, in a crater. you are ~impervious to horizontal machine gun attack thanks to the crater, but vulnerable to mortar attack
asciilifeform: the other practicality is that certain hypothetical uses of rsa -- such as specifically gossipd -- magnify this leak to the point where you are broadcasting the key at a few kHz
asciilifeform: whether anybody happens to be listening is separate consideration.
asciilifeform: sina: the practicalities are - that every time you unholster your gpg key, you broadcast a few bits of it. ☟︎
trinque: might think of moving, while you're still alive
sina: given that. what are the practicalities, today, on the ground ☟︎
trinque: just that you're there, so might get hit.
trinque: that you are on a field being mortared does not mean you've discounted the enemy
asciilifeform: sina: our 18th ancestors' perspectives on hygiene are not advice to the modern thinking man.
sina: e.g. asciilifeform uses gpg, even though he knows some adversary might read his key via timing attack, because the list of adversary which can do so, he has discounted
sina: for the purpose of proper understanding
sina: just, hopefully a list of adversary capability mapping to outcomes
sina: which is fine, and I guess my point, because you must understand there is some adversary which can read your keys and some which cannot and you as of current, accept the risk