log☇︎
304600+ entries in 0.189s
mircea_popescu: iiuc jurov already has a more or less complete package of github keys, working to turn them into proper format.
fromphuctor__: you could collect many millions keys from SSH server using the ssh-keyscan utility included in OpenSSH
asciilifeform: steffen: any ministry recommending a ms-winblowz package ipso facto answers to washington.
mircea_popescu: yeah ; a lot of eulora players also. seems to be the most accessible for "people in general"
steffen: which incidentally is also a software package vetted by the BSI (german ministry for informational security or something like that)
steffen: a lot of germans that I know use gpg4win
steffen: at least so far I can see that my key is not malformed. I'll certainly check that result page periodically in the future.
mircea_popescu: steffen the golden standard re such verifications in tmsr is V.
mircea_popescu: steffen we've been trying to get people with exposed keys to post the software they used.
steffen: I lack the skill to verify my software package
mircea_popescu: many rsa implementations, especially for the closed source walled gardens, are miserable indeed.
mircea_popescu: steffen you gotta make sure your pgp is actual protocol-strength rsa not merely promise-strength rsa tho.
steffen: now my next question would be which software was used to generate the flawed keys and if those were software packages with malicious intent
asciilifeform: so that was where the ferret cannon was aimed.
asciilifeform: mircea_popescu: pgp really took off in de, it seems
steffen: being a german myself, yes, and that's where I thought pgp added a nice sense of privacy to interested parties no matter the government
asciilifeform: and so quietly, too.
asciilifeform: the germans have been taking it nice and hard in the arse for half century +.
mircea_popescu: but no, it's entirely out of the question any sort of natural event is at work here. usg.nsa been diddling not merely angela merkel's phone,
asciilifeform: (neutron background pretty much everywhere on planet3 is same, with the exception of fukkupppies)
asciilifeform: would be ++lulzy if we had the neutronograph
mircea_popescu: it'd be fun if we could diagnose, eg, fukushima by quality of keys from place and time.
anotheryou: thanks for all the work :)
asciilifeform: they appear to have the genuine key's fingerprint in certain pgp clients.
asciilifeform: and quite likely were crafted by a third party.
asciilifeform: anotheryou: most of the german keys are of the 'mirrored' type
anotheryou: So my uninformed conclusion would be that something went especially wrong in germany or the pirates cryptoparties got a lot of people using pgp in the first place.
mircea_popescu: (the keys are not processed one at a time. this used to be the case, but not anymore. now, all done simultaneously)
mircea_popescu: nah, no selection. it's the whole sks dump
anotheryou: So many german pirate-party members on the list. How where the tested keys selected? I assume you had to start somewhere...
mircea_popescu: he has a point, too. can just be here for the feeds.
asciilifeform: at this point i can see it.
mircea_popescu: i kinda gave up autovoicing the default nick folken.
anotheryou: trying to make sense and reading a bit before asciing stupid questions :)
anotheryou: sorry, just ment to lurk :) don't mind me. Maybe most don't need the up.
mircea_popescu: quite the accomplishment yeah.
jurov: it's amazing that fingerprint is not even suitable for that use.
asciilifeform: so that i could hash a key and determine if we have it already
asciilifeform: jurov: i needed a way to uniquely identify ~keys~ rather than ~moduli~
asciilifeform: and correspond to legit fp
jurov: ok, ty
asciilifeform: plox do not attempt to use for anything other than indexing on phuctor.
asciilifeform: jurov: it is a hash of the moduli
mircea_popescu: ie how he derives it from the keys ? nfi. i always assumed it's arbitrary index from db
mircea_popescu: jurov the reason for teh hexporn is that there have been diddled keys!
jurov: wtf you're on? i never tried to approach phuctor with sort fingerprint
mircea_popescu: anyway, yet another thing bitcoin corrupts irretrievably. "wtf this secret job has no public log ? a fie upon you!"
mircea_popescu: jurov he has to because obv keys can be diddled.
asciilifeform: (where i refuse to take holy orders, and they stop calling)
asciilifeform: phf: pretty much all of my conversations ended the same way
phf: need a top-secret job where can discuss things in a public log, tmsr style
jurov: so even the 40char one is short?
jurov: oh this is correct: http://phuctor.nosuchlabs.com/gpgfp/BBB0A99950037551F533850A677ABD62D0AEE7D7
asciilifeform: phf: not only this, but i strongly suspect that winblowz pgp eats them all...
jurov: asciilifeform: i tried to check my own keys but http://phuctor.nosuchlabs.com/gpgkey/BBB0A99950037551F533850A677ABD62D0AEE7D7 gives me a broomstick
phf: so i did a simple exercise, since there were some claims that "none of the keys import", of grabbing phuctored data. the 223 moduli represent 156 keys, importing which results in 133 "no valid user IDs" and 23 successful imports listed here http://paste.lisp.org/display/315214
steffen: interesting stuff, added my public key to check it out ;)
mircea_popescu: always nice to see kernel.org in there.
deedbot: [Recent Phuctorings.] Phuctored: 83780493 divides RSA Moduli belonging to 'James Bottomley <jejb@kernel.org>; James Bottomley <JBottomley@Odin.com>; James Bottomley <JBottomley@Parallels.com>; James Bottomley <James.Bottomley@HansenPartnership.com>; ' - http://phuctor.nosuchlabs.com/gpgkey/23B2173C2FF1A9C43007D526720EA2B9EC1CB4AC21503429ACFBA1DA022517B3
BingoBoingo: In other news the US Navy is now allowing neck tattoos
mircea_popescu: good for them then.
mircea_popescu: are they influencing and community-whatever-ing ?
mircea_popescu: i'll rate you and you'll beable to self voice in the future
cyco1: it'll take some time to find the key in my backups
asciilifeform: and this key appears to be one of them.
asciilifeform: it may be a spurious version, someone has been making them for years.
cyco: ok i'll do that
asciilifeform: cyco: and before getting alarmed, download the key and compare to yours
Apocalyptic: the important thing is k/2 prime enables to distinguish between the 2, a k/4 prime doesn't, as it would occur in both cases
asciilifeform: mircea_popescu: prime number theorm
mircea_popescu: hey, whadda ya want from me, when trying to rescue statements that are trivially broken i use heuristics!
Apocalyptic: yeah but why the 4 specifically ? for all you know you can have a k/3 prime as well
mircea_popescu: i don't recall right off how you calc the probability, but it is indeed tiny.
mircea_popescu: Apocalyptic p and q randomly generated can still produce a prime factor somewhere in there, perhaps as large as 1/4 of the length of the key.
mircea_popescu: as with all failing empires in history a) the better commentary happens among people who do not have the empire's language as native language ; b) the hassle of obtaining official seal of whatever exceeds the benefits.
Apocalyptic: mircea_popescu: why k/4 ? my argument was if the whole modulus is random, then we can expect a k/2-bit prime factor, if modulus is random p times random q, then we can't unless p or q is actually prime (assuming p and q same size), which is quite unlikely if truly random
mircea_popescu: one is that they pay fails to compensate the risks (trivially verified : find insurer who will indemnify you for any and all responsabilities in exchange of fraction of extra salary)
mircea_popescu: asciilifeform ftr, there are VERY MANY people refusing to top secret for very many good reasons.
mircea_popescu: Apocalyptic i just interpreted your argument to mean k/4
asciilifeform: mircea_popescu: lel, yet another firm wasted hours of my time only to barf when told that i refuse to 'top secret'
asciilifeform: the 32-bit mirrored ones are a fairly transparent ploy
Apocalyptic: so far I also see the two categories
asciilifeform: and it stands to reason that they were born in separate places for distinct reasons.
Apocalyptic: including the 32-bit mirrored ones ?
asciilifeform: there appear to be at least two types of phucked moduli
Apocalyptic: There might be, the resulting thing is a degree of magnitude less usable though
asciilifeform: Apocalyptic: there are reasons why someone might generate wholly unusable modulus and post to sks.
Apocalyptic: so yeah no k/2-bit prime to be expected in modulus
Apocalyptic: asciilifeform: re earlier thread I was considering either random p and q then multiplied, or whole modulus is random. Obviously the latter could not occur since the software couldn't compute phi(N), hence doing anything usefull with it.
asciilifeform: mircea_popescu: i dun think there is 'thought' involved in the usual sense
mircea_popescu: "i know how to make widgets. i also think the loch ness monster found the cvadrature of the ellipsis."
mircea_popescu: "pgp was broken ayear ago i recall defcon talk"... it's kinda shocking in the despairing sense of the term, exactly what sort of monster a specialised society creates.
asciilifeform: (this'd be a dupe thread)
mircea_popescu: lol reddit one behind the curve ?
mircea_popescu: $up tophunctor____
asciilifeform: sorta like throwing a rabbit out of airlock to see if atmosphere on new planet is breathable
asciilifeform: (of them, that is)
asciilifeform: though funnily enough i mentioned phuctor when i was hired there, as a 'litmus test'
asciilifeform: the journawhores dun seem to notice that one.
asciilifeform: sorta why i did it this way to begin with.