log☇︎
304800+ entries in 0.2s
Valfor: Saw the contact mention this irc chan
Valfor: I saw the list of broken GPG keys on the phuctor website
Valfor: oh, timed voice - interesting
punkman: danielpbarron: the redditards fail at reading, so thought the "worked example" in blogpost would be the secret signature presented to BBC et al
danielpbarron: apparently the signature on wright's thing was lifted from an old transaction
jurov: oops the ycombinator url is wrong, the excerpt is from https://twitter.com/petertoddbtc/status/727078284345917441
jurov: "FYI, @gavinandresen's commit access just got removed - Core team members are concerned that he may have been hacked."
mircea_popescu: egorsmkv in fairness most merit goes to bernstein, with his work we do in 20 minutes what used to take ~10 years on the first estimation.
egorsmkv: service very good, thanks for it
mircea_popescu: aha thanks. was already reported. asciilifeform will get to it once he's back.
mircea_popescu: the specific sort of broken keys listed there (ie, with mirrored low 32bit modulus) is obviously an' very much designed just for this purpose.
mircea_popescu: the most effectual approach is to put a broken key of yours up on sks, and wait for alice to mistake it for yours.
mircea_popescu: you have to realise however that if eve is trying to eavesdrop on alice's communications to you,
piratsimon: and my apologies for that itsybitsy misunderstanding. :D
piratsimon: sry mircea. that was a classic misunderstanding. we both did assume something. ;)
mircea_popescu: piratsimon you could ask that then, neh ? the pile of keys being worked on come from a dump of sks servers.
piratsimon: no tribut, didnt, did not had that url util now. let me read it fast.
tribut: mircea_popescu: thanks
mircea_popescu: $up tribut
mircea_popescu: that's not in there either.
mircea_popescu: piratsimon you used a different key. http://phuctor.nosuchlabs.com/gpgkey/FC96CBFBF66B4E8996A0960C8B95EC5D1CD4B1A860719C7AEA00B3E06E41CE1B << these two are weak.
mircea_popescu: generally, it takes someone to care enough.
piratsimon: im just curious how long it does really take to break it. you know, theory is one thing, doin it another. :D
piratsimon: yes i do. but i bet you are right now deeper in the topic than me. ;)
piratsimon: so voilá there it is. :D
mircea_popescu: alrighty. in the meanwhile, you understand how rsa works ?
mircea_popescu: is there some sort of reward associated or just sportstmanship challenge ?
piratsimon: challenge: http://pastebin.com/t4xqzfyx im really curious how long it does take. you may contact me via mail@simonlange.eu if you mind. ;)
mircea_popescu: anyway. domain reg'd feb 16th, first post april 26th. teh boyz poured their sweat blood an' tears as the expression goes. too bad it won't work. ☟︎
mircea_popescu: hopefully it protected the aussie something or the other just as well!
mircea_popescu: "He was Vice President of CSCSS (Centre for Strategic Cyberspace and Security Science) with a focus on collaborating government bodies in securing cyber systems. Wright has trained government and corporate departments in SCADA Security, Cyber Warfare and Cyber Defence."
mircea_popescu: "He was Vice President of CSCSS (Centre for Strategic Cyberspace and Security Science) with a focus on collaborating government bodies in securing cyber systems. Wright has trained government and corporate departments in SCADA Security, Cyber Warfare and Cyber Defence."
mircea_popescu: looks like it's done by the same "i fucking love science" ustard crew.
mircea_popescu: lmao this drcraigwright.net thingee.
mircea_popescu: asciilifeform you'll have to add verbiage explaining to the goodfolk that rsa keys specifically and uniquely are at issue ; somehow it's not obvious dsa/ecc/elgamaletc dun work.
punkman: piratsimon: post it on pastebin, maybe someone will give it a try
piratsimon: you dont have to but im just curious. ;)
piratsimon: thats quite interesting. interested in testing it? im gonna encrypt something and you try to decrypt not knowing the phrase nor possessing the private key? ;)
mircea_popescu: JusticeRage thanks for reporting.
mircea_popescu: piratsimon no ; but given what we know about these keys it's a trivial exercise.
piratsimon: mircea, have u successfull attacked a private key you dont own and did you successfull decrypt some strong encrypted file wighout possess of the private key?
JusticeRage: At least it was the case a few hours ago
JusticeRage: That's a security issue and you should probably disable that :)
JusticeRage: I just came to mention that the Phuctor Flask app is running in debug mode
mircea_popescu: JusticeRage i didn't understand your question. people call me mp at times.
piratsimon: well at least i have to investigate the version. it was gpg for windows.
mircea_popescu: can there be a numeric value for this "loooooooooong time ago." ?
piratsimon: guess i have to investigate that.
mircea_popescu: maybe we actually manage to figure out who did what to whom here, it's suspicious as all hell.
piratsimon: that was really loooooooooong time ago.
mircea_popescu: piratsimon would you be so kind as to post the software you used to make that key ?
pabs3: are you planning on revoking the keys you have factored?
piratsimon: tyvm for the v
JusticeRage: Thanks for giving me voice. Did you get my MP about the debug mode?
mircea_popescu: sure. write the modification and submit it.
roxfan: could the site be modified to accept raw numbers?
mircea_popescu: roxfan not that i know so far.
mircea_popescu: leaving aside this whole "at a meeting with hitler's propaganda minister, we saw it, swear!" angle.
mircea_popescu: punkman> At the meeting with the BBC, Mr Wright digitally signed messages using cryptographic keys created during << i dun recall the derpy "sign with key" thing was ever regarded by tmsr.
mircea_popescu: $up tribut
roxfan: i was hoping there's an easier way... ☟︎
mircea_popescu: once you write the thing, post it somewhere also.
roxfan: any idea how to make one?
roxfan: i want to submit a key to phuctor but i have only raw N and E, not GPG format
adlai: either 60 "random" words have nothing to do with my life, or my basal ganglia are still swimming in lsd.
adlai reminds everybody that the real reason he /does/n't keep secrets is because there were none, to begin with.
adlai: danielpbarron: thx
punkman: "Mr Wright does not want to make public the proof for block 1, arguing that block 9 contains the only bitcoin address that is clearly linked to Mr Nakamoto (because he sent money to Hal Finney). Repeating the procedure for other blocks, he says, would not add more certainty. He also says he can’t send any bitcoin because they are now owned by a trust. "
punkman: Be assured, just as you have worked, I have not been idle during these many years. Since those early days, after distancing myself from the public persona that was Satoshi, I have poured every measure of myself into research. I have been silent, but I have not been absent. I have been engaged with an exceptional group and look forward to sharing our remarkable work when they are ready.
punkman: At the meeting with the BBC, Mr Wright digitally signed messages using cryptographic keys created during the early days of Bitcoin's development. The keys are inextricably linked to blocks of bitcoins known to have been created or "mined" by Satoshi Nakamoto.
gabriel_laddel: I enjoyed them ~2-3 years ago
gabriel_laddel: Eventually these were compiled into the book Zero to One.
gabriel_laddel: ^ "Notes Essays-Peter Thiel’s CS183: Startup-Stanford, Spring 2012"
gabriel_laddel: And if so, are you familiar with the optimization techniques "optimal braindamage" or "optimal brain surgery"?
mircea_popescu: GyrosGeier> is there some effort to notify people? << not really, feel free to notify whoever.
gabriel_laddel: They merged with paypal eventually though, so yes, close.
gabriel_laddel: Oh, and X.com was elon musk, not thiel. http://btcbase.org/log/2016-04-29#1459342 ☝︎
GyrosGeier: I've found one from the same org as myself, with a key they use, which is signed by me, so that is clearly theirs
GyrosGeier: is there some effort to notify people?
asciilifeform: GyrosGeier: those will have signatures but gpg will correctly reject them as invalid.
GyrosGeier: indeed, but these shouldn't have signatures from me
asciilifeform: and uploaded to sks net.
asciilifeform: they took legit keys and turned the moduli into repeating lengths of the bottom 32bit of the old mod.
asciilifeform: GyrosGeier: some of the keys (marked 'mirrored' under 'notes') were part of an organized flimflam campaign by an unknown (likely nsa) party exploiting the fact that old versions of pgp used the bottom 32 bits of a modulus as the fingerprint.
mircea_popescu: yeah, fingerprints more important than names per se. though there's some orgs that got clearly raped.
asciilifeform: GyrosGeier: the caveat is that anyone can create a key with whatever name string in it.
asciilifeform: mircea_popescu: i massaged the hell out of it
GyrosGeier: lots of famous names in there
asciilifeform: ;;later tell phf logz are down ?
GyrosGeier: seems to have worked
mircea_popescu: fromphuctor either you go read up on http://btcbase.org/log/2016-04-27#1458766 and do the conversion / publish the tool, or else wait for someone to do it. ☝︎
fromphuctor: Apologies. I'm not that good at cryptography.
mircea_popescu: i guess we'll have to write a tool for this eventually, willy-nilly.
asciilifeform: fromphuctor: it is nontrivial to convert ssh key to pgp key format.
GyrosGeier: that makes filtering the packet stream easier
GyrosGeier: do you actually need an UID in there?
mircea_popescu: or wipe the uids if you know how / can.
fromphuctor: My SSH keys came when I used the ssh-keygen command. How do I export them?
mircea_popescu: GyrosGeier you'll have to try again later, once this is caught up with.
GyrosGeier: ah, so I need to strip out those UIDs