274900+ entries in 0.308s

ben_vulpes: i'm
thinking dig olivine out of
the earth, blow co2 over it, and sell carbon credits.
ben_vulpes: fuck software, it's
time for a new scam.
Nordic: Also very entertained :D ..
today has been a funny day.
Nordic: How do i answer
that, lol. Norwegian dude, interested in
the cryptoscene.
Nordic: :D
Thanksies, and evenin' people.
mod6: will do, just about got all
the deps dl'd.
mod6: im 'bout
to build v0.1.2b here.
shinohai: Even better reason
to be preoccupied
ben_vulpes: i'm rather
tempted
to simply nuke
the html view.
phf: ben_vulpes: your non raw version does not escape html, so it parses #include <header> as a
tag
ben_vulpes: asciilifeform: does
the mangling show up in ?raw=true?
fromphuctor: I see. so for
this
to work,
two factors should be close
to each other. So nothing
todo with 2x-1?
fromphuctor: I know
that, it works well only on non-properly-generated rsa modulus, which is easily factorizable by 2^x -1
mircea_popescu: asciilifeform nothing
that advanced/serious even.
they leak it.
mircea_popescu: meanwhile,
takes a non-idiot half an hour
to fish
them out.
mircea_popescu: symptomatic for
the "we are
the premiere science and
tech world in
the world", it dun exist.
mircea_popescu: asciilifeform which is why i say depends on
the set-up. maybe something plouffe-esque could be had
to fit it in
tight ram
mircea_popescu: obviously a lot of
the cpu is not really used
to do bignum mults. a smaller lot of
the gpu isn't.
fromphuctor: you might end up writing your own bignum calc in GPU and still I'm not entirely sure it will be faster for
this op in CPU
fromphuctor: one dumb question, would GPU do
this operation faster? (I doubt it, but have
to ask)
fromphuctor: so for
this brute-forcing, don't you need a little bit of fast PC?
fromphuctor: but
to do
the same
thing youself, you need
to bruteforce 2^x -1 == your N?
fromphuctor: so when we can modulus N, how do you use bignum calc for it? don't you need
to brute force 2^x -1 starting from 2^1023 ?
trinque: aha. might have
to roach-brain harder
trinque: asciilifeform: maybe
they want
to find where messages originate without having
to have
the privkeys at
the points of surveillance? but yeah, not clear
shinohai: "bitco.in" and "dogecoin"
tell me all I need
to know.
trinque: asciilifeform: guy gets
trotted out every shooting
to "islam is not about
this!" so one might suspect him as having a reason
to have a bad key
mircea_popescu: asciilifeform incidentally, "owned by whitening" is not altogether a bad
theory wrt
the null-entropy keys. ie, "they replaced rng with null-outputting one, never noticed because whitening".
this, of course, doesn't explain why gpg would end up with null-generated keys, but whatevs.
shinohai: Besides getting
trggered by a hashtag, for instance.
mircea_popescu: what do you do other
than lurking ? ie, "for
teh ecosystem"
_FeltPen: i hope . . . normally, i just lurk and learn. happy
to keep doing
that.
mircea_popescu: shinohai _FeltPen do you
two have anything more substantive of a beef
than what one might have implied by what he might have said on facebook ?
_FeltPen: who said anything about it being useful? i just said
they made something.
_FeltPen: normally sanity lives here, so a little confused by your nonsense
today.
shinohai: I'm sorry, I was unaware 21co actually made anything useful for
this ''ecosystem"
_FeltPen: what are you
talking about shinohai? i don't have a 21co - i
tend
to root for folks
that make
things for
this ecosystem.
_FeltPen: i'm
trying
to figure out what shinohai is randomly
tweeting at me and making up shit about VC relationships
that don't exist. a little confused atm.
shinohai: Oh hai, I suppose you are merely another 21co fanboy
that gets butthurt every
time I point put how your $400 doorstop has no case, ad naseum
mircea_popescu: _FeltPen stop linking nonsense sm and explain stuff in plain
terms before
that half hour runs out
_FeltPen: shinohai - what's up
the
tweet?
gribble: (register <nick> <keyid>) -- Register your GPG identity, associating GPG key <keyid> with <nick>. <keyid> is a 16 digit key id, with or without
the '0x' prefix. We look on servers listed in 'plugins.GPG.keyservers' config. You will be given a random passphrase
to clearsign with your key, and submit
to
the bot with
the 'verify' command. Your passphrase will expire in 10 minutes.
deedbot: shinohai rated _FeltPen -1 << My argument is you are just another redditard
that sucks VC cock.
shinohai: $rate _FeltPen -1 My argument is you are just another redditard
that sucks VC cock.
a111: Logged on 2016-08-03 03:05 fabio__:
There has been quite a bit of noise about ECC NIST curves (nistp256, nistp384, nistp521) being
tampered with by
the NSA. I
thought using ECC was all good if you don't use
the NIST curves and instead use community approved curves like Curve25519 and Curve1174 by like DJB and friends, or other approved ones at
https://safecurves.cr.yp.to/. mircea_popescu: they have opinions on
things, and
the collected value of
those opinions is nothing.