log☇︎
260500+ entries in 0.089s
asciilifeform: i thought the single 'm' was the Ro. spelling.
asciilifeform: http://emacs-fu.blogspot.com/2009/01/drawing-pictures.html
asciilifeform: emacs, 'artist mode'
asciilifeform: Dimsler__: if you'd like to live in New York circa 1890, you will have to build it. tears have never built anything.
asciilifeform: 'in my country there's a problem, and that problem is transport...'
asciilifeform: last i checked, usury is in perfect health in russia.
asciilifeform: chinese, european, aztec, whoever.
asciilifeform: the fact is, this kind of thing doesn't sit well with any ruler
asciilifeform: (won't hear of this in the anglo media, though)
asciilifeform: who wrote about how his country needs 300 years of european colonization to become 'civilized'
asciilifeform: like that chinese idiot
asciilifeform: plugged for good cause, as far as i can see
asciilifeform: politkovskaya
asciilifeform: by his definition
asciilifeform: russia. france.
asciilifeform: on the other hand, if you can afford this maneuver in canada, you can afford it in a real country.
asciilifeform: the crunchy part is made from angles, the inner cream, distilled from saxons.
asciilifeform: (usd)
asciilifeform: if i recall you can buy canadian citizenship for $50k
asciilifeform: saxons.txt
asciilifeform: three or four on this street, some with the familiar green DOD stickers
asciilifeform: http://www.mazepath.com/uncleal/puron.htm
asciilifeform: enviro-whinerism: expensive, shoddy, deadly.
asciilifeform: http://www.wikileaks-forum.com/nsa/332/snowden-leak-gshq-attacked-anonymous-in-2012/27549
asciilifeform: british crown ddos of irc!
asciilifeform: http://www.maximintegrated.com/app-notes/index.mvp/id/5250
asciilifeform: PCB is lead-free, ICs aren't.
asciilifeform: melting point 138C.
asciilifeform: mircea_popescu: Sn / Bi alloy.
asciilifeform: (similar: http://home.comcast.net/~alloy-artifacts/Photos/tools/plomb_4070_gear_puller_38_cropped.jpg)
asciilifeform: i've always thought of my gear puller as 'the pear'
asciilifeform: better still, robert sheckley's 'the petrified world.'
asciilifeform: seems to be the real thing.
asciilifeform: http://bookre.org/reader?file=223021
asciilifeform: damn, censored.
asciilifeform: as always.
asciilifeform: it does whatever the russian kids throw in, until the censors nuke it.
asciilifeform: http://www.scribd.com/doc/86728044/Greg-Egan-Luminous
asciilifeform: obligatory warez copy:
asciilifeform: by carrying out certain computations.
asciilifeform: the premise was a little brain-fucking, yes - turned out that mathematics was a physical object, that one could fuck with
asciilifeform: damn if i recall. but there was a mathematical galactic battle in there
asciilifeform: greg egan, 'luminous', if i recall.
asciilifeform: btw the whole homomorphic business reminds me of an old sf story, where some malefactor stumbles upon a pair of large integers whose multiplication doesn't commute.
asciilifeform: it's a perpetuum mobile, but that never stopped the desperate idiots with infinitely deep pockets, has it.
asciilifeform: the inevitable boojum of conventional computing is that a boobytrap, no matter how clever, could eventually be stumbled upon by some clever soviet kid with a copy of 'ida'
asciilifeform: they would like to create (and then mandate) computing machinery that cannot be audited for security even in principle. ☟︎☟︎
asciilifeform: in principle, 'all blades have two edges,' etc. but in practice, the one and only objective of the folks funding homomorphic is a kind of satanic opposite of my purpose outlined in 'don't blame the mice'
asciilifeform: hence, if someone asks you to run homomorphically cloaked code...
asciilifeform: it is thus useful to know how to tell which end of the barrel you are being placed on.
asciilifeform: correct. ideally one should like to be on the 'correct end of the barrel' for this one.
asciilifeform: and this fact not being deducible from the code.
asciilifeform: a 'soft pgp' that appears to work fine, but when you encrypt a message to a certain pubkey, the message becomes 'eat shit and die'
asciilifeform: so, worked example:
asciilifeform: that is, code with genuinely-hidden functionality
asciilifeform: certain people would /love/ a mathematically-impenetrable boobytrap.
asciilifeform: so i'll mention it here.
asciilifeform: but nobody seems willing to say it publicly
asciilifeform: i venture to say that the actual goal of general-purpose (or whatever approximation is possible) homomorphic crypto is quite different. ☟︎☟︎☟︎
asciilifeform: if it 'keeps key safe' via the whole proggy becoming the key, you haven't accomplished much
asciilifeform: but for the subject of the article, one is left to wonder what problem is actually being solved
asciilifeform: the building blocks of homomorphic crypto (say, the 'millionaires protocol') are certainly interesting, not only in the mathematical but practical sense.
asciilifeform: anyone who wants 'software cardano' can grab 'gpg' today.
asciilifeform: correct.
asciilifeform: lift it, accomplish the same purpose.
asciilifeform: then the code is the key.
asciilifeform: i live right outside of a big uni, whose comp sci dept. pisses out a never-ending supply of this crud.
asciilifeform: the whole field appears to be funded by the desperate 'media' conglomerates, who dream in their opium haze of unbreakable copy protection.
asciilifeform: so you're stuck with some special-case exotica, that idiots will inevitably embed in conventional code.
asciilifeform: there is already a hard impossibility proof of turing-complete computation in a homomorphic turd. ☟︎
asciilifeform: so fine. i extract the turd and feed it whatever i like
asciilifeform: and on top of that, is only willing to sign giblets beginning with 1.
asciilifeform: so let's say you have a homomorphic turd that signs arbitrary giblets with your key (which, for the sake of argument, assume cannot be extracted, as claimed)
asciilifeform: naturally, we have the boojum: '...the attacker would be able to *use* the secrets only in the way that the software allows...'
asciilifeform: - end quote
asciilifeform: 6) All of this is based on mathematical computational assumptions, which may be proven false by future algorithmic advances.
asciilifeform: 5) Obfuscation is really a terrible name, but unfortunately it is the mathematical term that has become widely used in the academic (non-hacker) community.
asciilifeform: 4) In no direct way does secure obfuscation have anything to with DRM, software copy protection, etc.
asciilifeform: secrets only in the way that the software allows, but not recover these secrets in any way beyond that.
asciilifeform: 3) The right way to think of what secure obfuscation allows is to create, *under many technical conditions*, software that has secrets built into it. These secrets are used by the software to compute output, and yet the secrets remain hidden even if an attacker obtains the entire machine-level code of the software, which of course the attacker could run and analyze. Thus the attacker would be able to *use* the
asciilifeform: 2) Secure obfuscation is a mathematical term of art. It is unfortunate that the word "obfuscation" has an ordinary meaning that is very different than what we mean. An analogy might be the word "countable" which for mathematicians usually refers to infinite sets, while lay readers would likely not think this way.
asciilifeform: 1) The title is misleading: secure obfuscation does not necessarily create "unhackable" software, whatever that means.
asciilifeform: I am a co-author of the research quoted in the article. I realize it is likely pointless to write this comment in an Internet forum, but let me attempt to clarify the situation, in the hope that some thoughtful participants will find it useful. Please note: I will not be monitoring this forum in the future. If you are a researcher, please feel free to contact me.
asciilifeform: Amit Sahai • a day ago
asciilifeform: (horrified author)
asciilifeform: see 1st comment, by author
asciilifeform: the original turd: http://www.wired.com/wiredscience/2014/02/cryptography-breakthrough/all/
asciilifeform: homomorphic crypto seems to have the ancient appeal of other proven impossibilities, like perpetuum mobile.
asciilifeform: if by 'out of the woodwork' one means 'ECDSA crypto-break using Advanced Magic'...
asciilifeform: http://thewhet.net/2012/shall-be-delivered/
asciilifeform: m-pr is a titan:
asciilifeform: i did think that mpoe-pr lurks hidden somewhere here.
asciilifeform: but if the crown decides to crank up the printing press until cakes cost the same...
asciilifeform: (when applicable - 'moore's law' and sequelae, etc)
asciilifeform: nubbins`: or, more subtly, failing to decrease in price.
asciilifeform: http://www.rcollins.org/ddj/May98/F00FBug.html
asciilifeform: but who is the F00F of bitcoin.
asciilifeform: they run?
asciilifeform: just that 'the beautiful ones are not yet born.'
asciilifeform: i'm entirely unconvinced that the smart people are automatically on one team.