log☇︎
274900+ entries in 0.308s
ben_vulpes: i'm thinking dig olivine out of the earth, blow co2 over it, and sell carbon credits.
ben_vulpes: fuck software, it's time for a new scam.
BingoBoingo: Hard to tell
Nordic: Also very entertained :D .. today has been a funny day.
Nordic: How do i answer that, lol. Norwegian dude, interested in the cryptoscene.
Nordic: :D Thanksies, and evenin' people.
mod6: will do, just about got all the deps dl'd.
mod6: im 'bout to build v0.1.2b here.
shinohai: ;;later tell BingoBoingo http://ix.io/1aww
shinohai: Even better reason to be preoccupied
mircea_popescu: i thought he was raising a kid
asciilifeform: shinohai: perhaps he finally found that oil well.
ben_vulpes: i'm rather tempted to simply nuke the html view.
phf: ben_vulpes: your non raw version does not escape html, so it parses #include <header> as a tag
asciilifeform: ben_vulpes: diff the raw and standard views of linked piece.
ben_vulpes: also pls to characterize mangling
ben_vulpes: asciilifeform: does the mangling show up in ?raw=true?
asciilifeform: ;;later tell ben_vulpes your wotpaste gizmo mangles c code, e.g., http://wotpaste.cascadianhacker.com/pastes/e38c3232-5ff5-4e85-be93-d6d47f14354f
fromphuctor: I see. so for this to work, two factors should be close to each other. So nothing todo with 2x-1?
asciilifeform: an rng firing blanks and leading rsa key gen to spit out the square of a prime immediately following a power of two, is simply one way to arrive at such.
asciilifeform: (and, ergo, to the square root of the mod)
asciilifeform: rather, with moduli where the two factors are quite close together
asciilifeform: nothing to do with powers of 2
fromphuctor: I know that, it works well only on non-properly-generated rsa modulus, which is easily factorizable by 2^x -1
asciilifeform: fromphuctor: in case you didn't know - fermat's method is not an effective way to attack a properly-generated rsa modulus
mircea_popescu: is the latrine worth the shitting ?
asciilifeform: is the skin worth the tanning ?
mircea_popescu: asciilifeform nothing that advanced/serious even. they leak it.
mircea_popescu: meanwhile, takes a non-idiot half an hour to fish them out.
mircea_popescu: in other lulz : https://developers.facebook.com/docs/graph-api/common-scenarios/ "Although you can't get a list of all the fans of a Facebook Page, you can find out whether a specific person has liked a Page."
asciilifeform: dun exist in the corner store.
mircea_popescu: symptomatic for the "we are the premiere science and tech world in the world", it dun exist.
asciilifeform: would be entertaining to see what ft meade's looked like.
asciilifeform: this kind of thing really begs for a cpu arch optimized for bignummery
mircea_popescu: asciilifeform which is why i say depends on the set-up. maybe something plouffe-esque could be had to fit it in tight ram
asciilifeform: and obliterate the parallelism
mircea_popescu: obviously a lot of the cpu is not really used to do bignum mults. a smaller lot of the gpu isn't.
mircea_popescu: it might be cheaper, though, in terms of digit/dollar
fromphuctor: you might end up writing your own bignum calc in GPU and still I'm not entirely sure it will be faster for this op in CPU
asciilifeform: http://wotpaste.cascadianhacker.com/pastes/bfd989db-f5e2-4d2e-b2aa-3f699bbb638a << this ought to get you started, if you want to fermat.
asciilifeform: nor would such a thing necessarily work especially well.
asciilifeform: fromphuctor: doubtful. afaik there is no bignum routine optimized for gpu
fromphuctor: one dumb question, would GPU do this operation faster? (I doubt it, but have to ask)
fromphuctor: thank you for all the info
fromphuctor: so for this brute-forcing, don't you need a little bit of fast PC?
fromphuctor: yup, that's what I meant. Thank you!
mircea_popescu: not exactly ; the faq has some good links re this.
asciilifeform: if you're speaking of the latest experiment, we used fermat's method
fromphuctor: but to do the same thing youself, you need to bruteforce 2^x -1 == your N?
fromphuctor: so when we can modulus N, how do you use bignum calc for it? don't you need to brute force 2^x -1 starting from 2^1023 ?
asciilifeform: fromphuctor: however, the factorings are reproducible - you can dump modili with 'pgpdump', and any bignum calculator - e.g., 'bc', or ordinary python repl, can multiply the factors.
trinque: aha. might have to roach-brain harder
asciilifeform: of course, there is no degree of idiocy that could be wholly ruled out where usg is involved..
asciilifeform: ;;later tell BingoBoingo http://news.softpedia.com/news/hacker-compromises-fosshub-to-distribute-mbr-hijacking-malware-506932.shtml << qntra ?
trinque: asciilifeform: maybe they want to find where messages originate without having to have the privkeys at the points of surveillance? but yeah, not clear
_FeltPen: and what's that?
shinohai: "bitco.in" and "dogecoin" tell me all I need to know.
asciilifeform: why have the loud diarrheal fart ?
asciilifeform: trinque: if fella is a stooge, no reason for him not to have ~normal~ pgp key with puppet master having copy of the private.
trinque: asciilifeform: guy gets trotted out every shooting to "islam is not about this!" so one might suspect him as having a reason to have a bad key
asciilifeform: mircea_popescu: my best hypothesis is a) khadeer generated key with, e.g., 'jihadcrypt' b) winblowz gpg with the memcpy from rng nopped out by ???
mircea_popescu: asciilifeform incidentally, "owned by whitening" is not altogether a bad theory wrt the null-entropy keys. ie, "they replaced rng with null-outputting one, never noticed because whitening". this, of course, doesn't explain why gpg would end up with null-generated keys, but whatevs.
shinohai: Besides getting trggered by a hashtag, for instance.
mircea_popescu: what do you do other than lurking ? ie, "for teh ecosystem"
_FeltPen: i hope . . . normally, i just lurk and learn. happy to keep doing that.
mircea_popescu: shinohai _FeltPen do you two have anything more substantive of a beef than what one might have implied by what he might have said on facebook ?
_FeltPen: who said anything about it being useful? i just said they made something.
asciilifeform: pigeon, we did not know, but turns out is a sculptor, MAKES THINGS for city statutes
_FeltPen: normally sanity lives here, so a little confused by your nonsense today.
shinohai: I'm sorry, I was unaware 21co actually made anything useful for this ''ecosystem"
_FeltPen: what are you talking about shinohai? i don't have a 21co - i tend to root for folks that make things for this ecosystem.
asciilifeform inescapably recalls the 'chess oil' from sierra online's 'gabriel knight'
_FeltPen: i'm trying to figure out what shinohai is randomly tweeting at me and making up shit about VC relationships that don't exist. a little confused atm.
mircea_popescu: better lube than even baby panda tears.
mircea_popescu: mno, i think ima keep it all.
asciilifeform: mircea_popescu: pass the luck oil
shinohai: Oh hai, I suppose you are merely another 21co fanboy that gets butthurt every time I point put how your $400 doorstop has no case, ad naseum
mircea_popescu: _FeltPen stop linking nonsense sm and explain stuff in plain terms before that half hour runs out
_FeltPen: your failing at constructing a thought, shinohai - so disappoint. https://twitter.com/MrFelt_/status/760872268327030784
_FeltPen: shinohai - what's up the tweet?
gribble: (register <nick> <keyid>) -- Register your GPG identity, associating GPG key <keyid> with <nick>. <keyid> is a 16 digit key id, with or without the '0x' prefix. We look on servers listed in 'plugins.GPG.keyservers' config. You will be given a random passphrase to clearsign with your key, and submit to the bot with the 'verify' command. Your passphrase will expire in 10 minutes.
asciilifeform: perhaps a hole in the unbroken wall of stupid
asciilifeform: iirc we haven't tried him yet
asciilifeform wrote to krebs, re khadeer
mircea_popescu: what's that all about
deedbot: shinohai rated _FeltPen -1 << My argument is you are just another redditard that sucks VC cock.
shinohai: $rate _FeltPen -1 My argument is you are just another redditard that sucks VC cock.
mircea_popescu: asciilifeform i see you admire teh beauties yes.
a111: Logged on 2016-08-03 03:05 fabio__: There has been quite a bit of noise about ECC NIST curves (nistp256, nistp384, nistp521) being tampered with by the NSA. I thought using ECC was all good if you don't use the NIST curves and instead use community approved curves like Curve25519 and Curve1174 by like DJB and friends, or other approved ones at https://safecurves.cr.yp.to/.
mircea_popescu: ;;later tell fabio__ http://trilema.com/2016/you-are-not-a-person-and-you-dont-get-a-vote/ << there yo go, re http://btcbase.org/log/2016-08-03#1513523 : community approved. ☝︎
asciilifeform: no longer work. A protection mechanism against that was implemented in version 3.8.3. '
asciilifeform: 'The way the MatrixSSL team "fixed" the miscalculation issue is not really satisfying: They now restrict the input to the pstm_exptmod() function to a set of bit sizes (512, 1024, 1536, 2048, 3072, 4096). My test input had a different bit size, therefore I cannot reproduce the miscalculation any more, but the underlying bug is most likely still there. ... Despite the fact that the bug may be still there the CRT attack will probably
asciilifeform: ' A common way to speed up the calculation of RSA signatures is an algorithm based on the chinese remainder theorem (CRT) that splits it up into two smaller calculations. However if one of these calculations goes wrong an attacker can learn the private key. Last year Florian Weimer observed that various devices had this error and he could extract their keys. He recently mentioned...'
asciilifeform: ' I just discovered a somewhat similar issue in Nettle. They switched their RSA implementation from GMP's mpz_powm() function to mpz_powm_sec(), which is supposed to be sidechannel resistant. However mpz_powm_sec() is no drop-in replacement. Unlike mpz_pown() it doesn't accept even moduli and crashes with a floating point error. Therefore when trying to use a specifically crafted RSA key with an even modulus this will crash. '
asciilifeform: 'If one tries to calculate a modular exponentiation with the base equal to the modulus (a^b mod a, code) it would return an error. If one tries to calculate a modular exponentiation with the base zero (0^b mod a, code) it would crash with an invalid free operation, potentially leading to memory corruption.'
asciilifeform: spoiler: that 1000 can move into 1BitcoinEaterAddressDontSendf59kuE any time the 51% feels like it.
asciilifeform: http://btcbase.org/log/2016-07-27#1510525 << oblig. thread. ☝︎
asciilifeform: 3, 2, 1, countdown to 'petition to miners to break softfork and mine it'
mircea_popescu: they have opinions on things, and the collected value of those opinions is nothing.
mircea_popescu: check out the deluge of comments. suddenly "the community" is showing itself to be eXACTLy http://trilema.com/2013/soft-consensus-aka-fecal-matter/