asciilifeform: we have schmuck-P; if one were to divide Π(∀n) by (schmuck-P ^ 2), result is J*K where J is $schmuck-Q and K is $otherschmuck-Q. thereby K*schmuck-P == otherschmuckmodulus.
asciilifeform: for the record, since folks were asking, much simpler than i thought,
asciilifeform promises to investigate this oddity, and see if there are others like it, as soon as finishes current plate
asciilifeform: but that shouldn't throw off my apparatus.
asciilifeform: the only peculiar thing i can see in this key is the use of odd orcish hieroglyphs in the id string
asciilifeform: no this is a good find, i will add it to the queue of three or four other mysterymeats
asciilifeform: jurov: most peculiar. it is a valid rsa key.
asciilifeform: williamdunne: 'first ecstacy, then laundry.' (al schwartz)
asciilifeform: mxtm: some 2 schmucks (of which i've identified 1, but the other will follow in a week or so) had common factor in their rsa private keys.
asciilifeform: kudos to mircea_popescu for supplying the cpu cycles for this apparatus pro bono
asciilifeform: the most lulzy part (what the common factor was) is not even posted publicly yet.
asciilifeform: jurov: there is a second, but it will take a while to unearth it.
asciilifeform: but my point above was, what are we to do with the answer? it could be coming from just about anyone!
asciilifeform: phuctor does not send automatic emails. to anyone. so, let's see what happens when mircea_popescu writes to mr schmuck
asciilifeform: if keys are identities are people - which, for purposes of wot and dealings among folks who will never meet in the flesh, they most certainly are - that one: has died.
asciilifeform: and we must not neglect the third party - the fine folks who boobytrapped mr schmuck's copy of pgp.
asciilifeform: to rephrase, he no longer (if ever did) have sole control of his private key
asciilifeform: which is to say, i could sign, with his key, 'please rape me in public with a donkey' and it will be as legit as anything he will ever say himself
asciilifeform: mircea_popescu likes to speak of having 'killed' that greek derp, but in a very real sense the schmuck whose key we just broke, is dead
asciilifeform: we haven't really discussed it, but there are interesting implications in breaking a fella's pgp key.
asciilifeform: and the poor bugger appears to be in the strong set, no less.
asciilifeform: phun phuct: i never actually tested the code which displays phuctored moduli. (couldn't be bothered to craft a dud key, it's a pain) - but it worked. because was written correctly. perhaps a novel concept to some folks
asciilifeform: (he isn't anyone we know. but we did promise to spare)
asciilifeform: in fact, i'm rather unclear on what will happen if key's owner wakes up and asks 'pretty please don't rape me on camera'
asciilifeform: kakobrekla: i woke you up because the info necessary to resolve this bet is not public (as of yet.) hence tricky.
asciilifeform: (for anyone perplexed - we promised not to announce dud keys publicly, at least not if key's owner answers the warning - see http://nosuchlabs.com/theory )
asciilifeform: where you try to minimize noise, get predictable mechanism, etc
asciilifeform: decimation: rng literally breaks most of the rules of 'civilian' electronic design
asciilifeform: what one might call 'spread spectrum' clocking.
asciilifeform: decimation: the correct way to sample is at (within feasible limits) random intervals.
asciilifeform: indiancandy1: paid mircea_popescu a visit yet ?
asciilifeform: decimation: at any rate, the -correct- way to sample these for experimental purposes is with either parallel port or a generic i/o gadget (e.g., 'ftdi')
asciilifeform: decimation: this was what i told ben_vulpes at c3
asciilifeform: now, if you have a -very- well-behaved os, you could sample it as rs232 anyway. but then you discover (see old mircea_popescu article where we stepped on this caltrop!) that you end up losing bytes that match 'control' section of ascii table
asciilifeform: i.e. a pin that changes level when it wants.