304800+ entries in 0.2s

Valfor: Saw
the contact mention
this irc chan
Valfor: I saw
the list of broken GPG keys on
the phuctor website
Valfor: oh,
timed voice - interesting
punkman: danielpbarron:
the redditards fail at reading, so
thought
the "worked example" in blogpost would be
the secret signature presented
to BBC et al
danielpbarron: apparently
the signature on wright's
thing was lifted from an old
transaction
jurov: "FYI, @gavinandresen's commit access just got removed - Core
team members are concerned
that he may have been hacked."
mircea_popescu: egorsmkv in fairness most merit goes
to bernstein, with his work we do in 20 minutes what used
to
take ~10 years on
the first estimation.
egorsmkv: service very good,
thanks for it
mircea_popescu: aha
thanks. was already reported. asciilifeform will get
to it once he's back.
mircea_popescu: the specific sort of broken keys listed
there (ie, with mirrored low 32bit modulus) is obviously an' very much designed just for
this purpose.
mircea_popescu: the most effectual approach is
to put a broken key of yours up on sks, and wait for alice
to mistake it for yours.
mircea_popescu: you have
to realise however
that if eve is
trying
to eavesdrop on alice's communications
to you,
piratsimon: and my apologies for
that itsybitsy misunderstanding. :D
piratsimon: sry mircea.
that was a classic misunderstanding. we both did assume something. ;)
mircea_popescu: piratsimon you could ask
that
then, neh ?
the pile of keys being worked on come from a dump of sks servers.
piratsimon: no
tribut, didnt, did not had
that url util now. let me read it fast.
tribut: mircea_popescu:
thanks
piratsimon: im just curious how long it does really
take
to break it. you know,
theory is one
thing, doin it another. :D
piratsimon: yes i do. but i bet you are right now deeper in
the
topic
than me. ;)
mircea_popescu: alrighty. in
the meanwhile, you understand how rsa works ?
mircea_popescu: is
there some sort of reward associated or just sportstmanship challenge ?
mircea_popescu: anyway. domain reg'd feb 16th, first post april 26th.
teh boyz poured
their sweat blood an'
tears as
the expression goes.
too bad it won't work.
☟︎ mircea_popescu: hopefully it protected
the aussie something or
the other just as well!
mircea_popescu: "He was Vice President of CSCSS (Centre for Strategic Cyberspace and Security Science) with a focus on collaborating government bodies in securing cyber systems. Wright has
trained government and corporate departments in SCADA Security, Cyber Warfare and Cyber Defence."
mircea_popescu: "He was Vice President of CSCSS (Centre for Strategic Cyberspace and Security Science) with a focus on collaborating government bodies in securing cyber systems. Wright has
trained government and corporate departments in SCADA Security, Cyber Warfare and Cyber Defence."
mircea_popescu: looks like it's done by
the same "i fucking love science" ustard crew.
mircea_popescu: asciilifeform you'll have
to add verbiage explaining
to
the goodfolk
that rsa keys specifically and uniquely are at issue ; somehow it's not obvious dsa/ecc/elgamaletc dun work.
punkman: piratsimon: post it on pastebin, maybe someone will give it a
try
piratsimon: you dont have
to but im just curious. ;)
piratsimon: thats quite interesting. interested in
testing it? im gonna encrypt something and you
try
to decrypt not knowing
the phrase nor possessing
the private key? ;)
mircea_popescu: piratsimon no ; but given what we know about
these keys it's a
trivial exercise.
piratsimon: mircea, have u successfull attacked a private key you dont own and did you successfull decrypt some strong encrypted file wighout possess of
the private key?
JusticeRage: That's a security issue and you should probably disable
that :)
JusticeRage: I just came
to mention
that
the Phuctor Flask app is running in debug mode
mircea_popescu: JusticeRage i didn't understand your question. people call me mp at
times.
piratsimon: well at least i have
to investigate
the version. it was gpg for windows.
mircea_popescu: can
there be a numeric value for
this "loooooooooong
time ago." ?
mircea_popescu: maybe we actually manage
to figure out who did what
to whom here, it's suspicious as all hell.
piratsimon: that was really loooooooooong
time ago.
mircea_popescu: piratsimon would you be so kind as
to post
the software you used
to make
that key ?
pabs3: are you planning on revoking
the keys you have factored?
JusticeRage: Thanks for giving me voice. Did you get my MP about
the debug mode?
roxfan: could
the site be modified
to accept raw numbers?
mircea_popescu: leaving aside
this whole "at a meeting with hitler's propaganda minister, we saw it, swear!" angle.
mircea_popescu: punkman> At
the meeting with
the BBC, Mr Wright digitally signed messages using cryptographic keys created during << i dun recall
the derpy "sign with key"
thing was ever regarded by
tmsr.
roxfan: i was hoping
there's an easier way...
☟︎ roxfan: any idea how
to make one?
roxfan: i want
to submit a key
to phuctor but i have only raw N and E, not GPG format
adlai: either 60 "random" words have nothing
to do with my life, or my basal ganglia are still swimming in lsd.
adlai reminds everybody
that
the real reason he /does/n't keep secrets is because
there were none,
to begin with.
adlai: danielpbarron:
thx
punkman: "Mr Wright does not want
to make public
the proof for block 1, arguing
that block 9 contains
the only bitcoin address
that is clearly linked
to Mr Nakamoto (because he sent money
to Hal Finney). Repeating
the procedure for other blocks, he says, would not add more certainty. He also says he can’t send any bitcoin because
they are now owned by a
trust. "
punkman: Be assured, just as you have worked, I have not been idle during
these many years. Since
those early days, after distancing myself from
the public persona
that was Satoshi, I have poured every measure of myself into research. I have been silent, but I have not been absent. I have been engaged with an exceptional group and look forward
to sharing our remarkable work when
they are ready.
punkman: At
the meeting with
the BBC, Mr Wright digitally signed messages using cryptographic keys created during
the early days of Bitcoin's development.
The keys are inextricably linked
to blocks of bitcoins known
to have been created or "mined" by Satoshi Nakamoto.
gabriel_laddel: Eventually
these were compiled into
the book Zero
to One.
gabriel_laddel: ^ "Notes Essays-Peter
Thiel’s CS183: Startup-Stanford, Spring 2012"
gabriel_laddel: And if so, are you familiar with
the optimization
techniques "optimal braindamage" or "optimal brain surgery"?
mircea_popescu: GyrosGeier> is
there some effort
to notify people? << not really, feel free
to notify whoever.
gabriel_laddel: They merged with paypal eventually
though, so yes, close.
GyrosGeier: I've found one from
the same org as myself, with a key
they use, which is signed by me, so
that is clearly
theirs
GyrosGeier: is
there some effort
to notify people?
GyrosGeier: indeed, but
these shouldn't have signatures from me
mircea_popescu: yeah, fingerprints more important
than names per se.
though
there's some orgs
that got clearly raped.
fromphuctor: Apologies. I'm not
that good at cryptography.
mircea_popescu: i guess we'll have
to write a
tool for
this eventually, willy-nilly.
GyrosGeier: that makes filtering
the packet stream easier
fromphuctor: My SSH keys came when I used
the ssh-keygen command. How do I export
them?
mircea_popescu: GyrosGeier you'll have
to
try again later, once
this is caught up with.