log☇︎
176600+ entries in 0.12s
asciilifeform: we ain't got any tests in FG, other than 'von neumann filter has not emitted 8 bits in past 0.5msec -- lamp is red'
asciilifeform: but rather tests a proposed test of entropy.
asciilifeform: as i understand, this doesn't test entropy
asciilifeform: ( for the intrepid: see http://btcbase.org/patches/fg-genesis#L276 , http://btcbase.org/patches/fg-genesis#L378 , http://btcbase.org/patches/fg-genesis#L475 . )
asciilifeform: ( recall the sheet of paper that came with your FG. )
asciilifeform: so we actually have it, in there, nao.
asciilifeform: eventually i derived that this is equivalent to the equation seen in the 'watchdog' circuit in fg.v
mircea_popescu: asciilifeform practically same thing, just physical.
asciilifeform: i.e. a lamp whose brightness is proportional to how close (bits emitted from vonneumann filter per sec) / ( bits entering same, per sec) is to 1
mircea_popescu: next the usg is going to get off its ass, discover the whole rapereum "ecosystem" was $7600.
asciilifeform: mircea_popescu: i actually considered something that is arguably a variant of your test, when designing FG,
asciilifeform: e.g., aes(0, 1, 2, ...., maxint) is perfectly uniform by all known tests.
mircea_popescu: asciilifeform understand this isn't a matter of testing specified bitfields, but specified ~processes~
shinohai: http://archive.is/OBRuJ <<< Another scammer (soon to turn stripper)
asciilifeform: any test whatsoever, past or future.
mircea_popescu: pass-fail tools notoriously horrendous measurement instruments.
asciilifeform: ( statistical tests only reveal broken rng , but never a working one )
asciilifeform: dijkstra's 'testing reveals presence of bugs, but not absence' applies just the same to rng.
mircea_popescu: and in the process see also that ent is not a very good measurement tool.
mircea_popescu: those curious -- straight to your ent, see.
mircea_popescu: it turns it... WORSE :D
asciilifeform: even moar outrageously, adding the 100 1s does not in fact 'turn it bad', the P of these 100 1s appearing in a uniform distrib is >0
mircea_popescu: the whole discussion is, given a stream of perfect entropy, how to construct known-degree-of-badness out of it.
asciilifeform: there is no mechanical test that, e.g., 'bitflipped digits of pi' does not also pass.
mircea_popescu: asciilifeform no that's exactly what we're doing. controlledly-bad-level entropy.
mircea_popescu: a is also twice as strong, because obviously b will flip on average half the bits it sets. but is this ACTUALLY half ? ie, how do yo umeasure unrandomness ? b is much more strongly patterned than a.
mircea_popescu: as alf points out, a is "better" in the sense v-n debiaser kills b, if this is a better. unclear.
asciilifeform: the possibly paradoxical answer, afaik, is there does not actually exist such a thing as good entropy. only bad and worse.
mircea_popescu: (ie, i dun have an answer for it myself, nor know how to get one.)
ben_vulpes: gonna hafta think about it, for sure
mircea_popescu: poor ben_vulpes has been silent since the blessing of wtf 10 minutes ago.
asciilifeform: iirc the d00d who found the koch whitening lulzgem used a proggy that worked quite like 'barium enema'
BingoBoingo: <mircea_popescu> wtf, newswriting not dictionary boating accident << Cleanup ongoing. Probably ought to write before baking brain in heat or sleep and proofread before publishing. /me resets "Days since linguistic boating accident" sign back to 0 days
mircea_popescu: asciilifeform there is that, yes. but we're doiong this for instrumentation in teh lab not for any other purpose. it's a tracer for entropy, like the shit they make you swallow to see your stomach.
asciilifeform: btw, fun project for FG owners -- connect the analogue hoses to something other than the included boards, and see what you get
asciilifeform: incidentally if there's a vonneuman filter in the pipe, setting consecutive bits does 0
mircea_popescu: as in, balance it according to a calculation, rather than according t oa feeling.
mircea_popescu: which allows you to correctly balance your tester irl.
mircea_popescu: in a sense. it has multiple utilities, it allows you to try and guess (numerically) whether for instance better entropy or more passes are useful for rabin miller
asciilifeform: so this's a 'meta' test of a given dh-style test ?
mircea_popescu: then we feed it into entropy-dependent processes (say the rabin miller test, as discussed yest) and see what comes out.
mircea_popescu: M' is now a "known low entropy bitfield". we know it to have degraded by 100/1Mb or w/e the case may be
asciilifeform: aite, and what to do with M and M' ?
mircea_popescu: it degrades the entropy of M' so obtained.
asciilifeform: what's that do ?
mircea_popescu: set them to 1.
asciilifeform: and then we take Pth to P+100th bits and.. what then
mircea_popescu: what's the rub ?
asciilifeform unable to parse an implementable algo out of the above
mircea_popescu: for the other 1048476 bits
asciilifeform: ( for what does this operation use the original values that came out of the rng ? )
asciilifeform: what means 'flip a number of consecutive bits to 1' ?
asciilifeform: mircea_popescu: i'd like to see an expanded algo for ^
a111: Logged on 2017-07-10 19:50 mircea_popescu: which incidentally brings us to a very workable and very useful tmsr definition of entropy quality : take a FG string. flip a number of consecutive bits to 1. the result is your entropy quality, such as 100/1mb if you flipped 100 bits.
mircea_popescu: ben_vulpes here's a high pay grade question for you : of the two models of "controlled de-entropy" i spawned in a week, specifically a) count of randomly placed flipped bits, as in the discussion with you re that and b) string of randomly initiated, n bit long SET bits, as discussed in http://btcbase.org/log/2017-07-10#1681268 which does the bitcoin foundation regard as a better candidate for standardization as "the republic' ☝︎
ben_vulpes: byte arrays to integers for the m+1, m+2, coercions for byte arrays to integers, bit arrays for flipping random bits,
asciilifeform: ...but confesses to tape-painting bot
ben_vulpes: mircea_popescu: slowlybut surely, expanding the horizon of things i understand, taking the time to make sure i understand each part.
asciilifeform: meanwhile in the land of toy crypto, https://eprint.iacr.org/2017/655 >> '...Inmarsat satellite phones... the 64-bit encryption-key... recovered in around 0.02s on average'
mircea_popescu: "As recently as earlier today, the Fake News empire turned idiot son Donald Junior's gullibility with respect to a phishing scheme1 into their latest headline of the day which they will use to sell loyal consumers of their fiction product on the "certain end" of the 8 year Trumpreich in spite of all the actual evidence running to the contrary of their narrative supported instead by a complete lack of evidence."
mircea_popescu: http://btcbase.org/log/2017-07-11#1681522 << how's teh fhf perfing coming along ? ☝︎
deedbot: http://qntra.net/2017/07/fake-news-washington-post-changes-tune-on-russian-collusion/ << Qntra - Fake News Washington Post Changes Tune On Russian Collusion
BingoBoingo: Try telling that to CNN
shinohai: fake news is where the $ is at these dayz
BingoBoingo: In other news: Fake news attacking idiot son (Donald Jr.) for trying to impress father because shut out of campaign as an idiot
asciilifeform has not tried $subj
asciilifeform: http://gcc-melt.org << of potential trbological interest.
mod6 reads the rms thread
asciilifeform: ( http://btcbase.org/log/2015-01-10#971993 << thread. possibly elsewhere also. ) ☝︎
asciilifeform: see the classic, https://lwn.net/Articles/629259/ , and the rms thread, re why this is not available for c/cpp gcc
mod6: ah, that's sweet asciilifeform
mod6: ok neat, i just ran it against my V stuff, seems to dump out all of the symbols or whatnot
asciilifeform: and /me considered pasting the example, but turns out it potentially fires in every single line, lol
asciilifeform: so for instance i throw in pragma Restrictions (No_Exception_Propagation); and see "Constraint_Error may result in unhandled exception" and then wonder where,
deedbot: http://phuctor.nosuchlabs.com/gpgkey/6B3CA2F9FC994FCEF29102187AA563F096485E5B262AADFA403E301E941AC291 << Recent Phuctorings. - Phuctored: 1407...5429 divides RSA Moduli belonging to '210.86.180.160 (ssh-rsa key from 210.86.180.160 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (210-86-180-160.static.asianet.co.th. TH 10)
deedbot: http://phuctor.nosuchlabs.com/gpgkey/6B3CA2F9FC994FCEF29102187AA563F096485E5B262AADFA403E301E941AC291 << Recent Phuctorings. - Phuctored: 1570...7077 divides RSA Moduli belonging to '210.86.180.160 (ssh-rsa key from 210.86.180.160 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (210-86-180-160.static.asianet.co.th. TH 10)
deedbot: http://www.contravex.com/2017/07/10/the-wallet-inspectors-promise-v-ico/ << » Contravex: A blog by Pete Dushenski - The Wallet Inspector’s Promise v.”ICO”
deedbot: http://qntra.net/2017/07/credibility-of-us-universities-falling-as-desire-for-great-again-takes-lead-in-culture-war/ << Qntra - Credibility Of US Universities Falling As Desire For "Great Again" Takes Lead In "Culture War"
mod6: now that i've got that part in my head, now can tackle the rest tomorrow.
mod6: but now, it's starting to make sense.
mod6: this was throwing me off earlier today ^
mod6: i haven't gone all the way through the W_Mul yet, but just unrolling it as said.
mod6: and gleaned a few things I didn't notice earlier.
mod6: workin through this on the board. so!
mod6: lol, im probably just dim, but i think it's the only way im gonna understand things thing through and through
mod6: (im going through by hand here...)
mod6: ok, my bad, i see those are the output words for W_Mul, XY_LW and XY_HI.
asciilifeform: ( they get set afresh each time it muls )
asciilifeform: mod6: they dun need initializing, they are the low and high words of word*word mul
mod6: are 'Lo : Word; \n Hi : Word;' initialized to zero on the first pass through Col(...) by default?
mod6: asciilifeform: you mind throwing me your W_Add_D, i don't seem to have one.
deedbot: http://phuctor.nosuchlabs.com/gpgkey/2FAC60661995A00418D5429654E10DD273A94CF808ACA4449782DB8DB28ECE27 << Recent Phuctorings. - Phuctored: 1447...7557 divides RSA Moduli belonging to '83.13.39.162 (ssh-rsa key from 83.13.39.162 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (fbn162.internetdsl.tpnet.pl. PL)
deedbot: http://phuctor.nosuchlabs.com/gpgkey/2FAC60661995A00418D5429654E10DD273A94CF808ACA4449782DB8DB28ECE27 << Recent Phuctorings. - Phuctored: 1668...2909 divides RSA Moduli belonging to '83.13.39.162 (ssh-rsa key from 83.13.39.162 (13-14 June 2016 extraction) for Phuctor import. Ask asciilifeform or framedragger on Freenode, or email fd at mkj dot lt) <ssh...lt>; ' (fbn162.internetdsl.tpnet.pl. PL)
asciilifeform: note that our L does not depend on the results of the arithmetic at any point
mod6: ah, and there was a time when L was not part of the plan
a111: Logged on 2017-05-21 16:47 asciilifeform: because ALL ops take same time, so karatsuma, toom-cook, etc. cannot work because they fundamentally rely on breaking large x*y into a number of smaller a1*b1, a2*b2, ...
mod6: yeah, just wanted to remember/remind myself of why we didn't use that, and looked at karatsuba instead, but then saw this again: http://btcbase.org/log/2017-05-21#1659981 ☝︎
asciilifeform: ( only begins to +ev a considerable way above 8192b )
asciilifeform: mod6: toom-cook ?
mod6: !#s toom