asciilifeform: '... courtroom recording showed that the last verse of the multiplicand was, as witnesses had claimed, sung in unison by the beautiful young fork.'☟︎
asciilifeform: '... the judge then ruled that the death of a keyholder at the hands of his fork is to be considered 'assisted suicide.' when he finished belting out the last verse of Modified-Karatsuba Anthem, his secretary drew her Nagant... '
asciilifeform: 'there were five contending forks; two boys clutching old-fashioned xerox copies and ...'
asciilifeform: 'mandatory gladiatorial combat following bifurcation was introduced in .... due to ...'
asciilifeform: * musical interlude * - 2047: mr. barack hussein IV was six foot tall at the time of his coronation, but lost his key - inscribed on a napkin - and unfortunately / bifurcated / two years later. he is now five foot eight, half-chinese, with a red beard.'
asciilifeform: where if someone has your key, / they are now legally you /
asciilifeform: it's also the fact that the alternative is a mercilessly-cryptographic concept of identity
asciilifeform: it isn't just the fact that money lenders like that, though i refuse to borrow a million, some other fellow can swipe my driver's license and do it for me
asciilifeform: quite a few people don't seem to understand the implications
asciilifeform: 'identity theft' is only possible because they wish it to be.
asciilifeform: there is no little to no incentive in the u.s. for card issuers (and money lenders in general) to secure anything.
asciilifeform: they STILL do not wish to use security << re: Target ?
asciilifeform: i guess i'm just terrible at measuring which miscreants are dumb enough to be harmless
asciilifeform: mircea_popescu: i read some old posts this morning. you are using 'crystal space' - written by the sadly famous taaki ? this does not bother you ?
asciilifeform: 'Its not clear how you would build a secure way to initialise the Trezor, as youd need to use an untrusted computer to present trusted keys into the device. A virus (MITM) could intercept and rewrite the keys as they were being loaded into the device. Unless you had key fingerprints written down on paper, itd be impossible to notice a mismatch. Pre-agreed root certs installed at the factory solve this
asciilifeform: 'Usability studies have shown nobody outside of the tiny security community understands the web of trust or how to use it.'
asciilifeform: 'SSL is one of very few crypto systems thats in daily usage by hundreds of millions of people. Remarkably, it seems that governments have not compromised the infrastructure.'