33400+ entries in 0.018s

mp_en_viaje: heh. haven't logged in forever,
they might even have.
mp_en_viaje: anyway, i dunno imperial "platforms" have much utility beyond
this derivative comedy value, of making a laughingstock of
the empire and it's inept movements.
mp_en_viaje: asciilifeform, currently im most amused at
the inventing imaginary person with
the most obscure of names. somehow oddly
this chick didn't exist last year.
a111: Logged on 2016-08-01 00:44 mircea_popescu:
http://btcbase.org/log/2016-08-01#1511937 << oh, "color revolutions" dun work ?
tell you what, we'll steal your country's exports and with
the proceeds finance an alt-country we'll pretend is realy your country. ha-ha!
mp_en_viaje: nah, prolly stays for a while, is deleted again,
then "please verify acct",
then "here's an imaginary someone else by your name",
then etc.
mp_en_viaje: hey, maybe if real africans weren't really subhuman,
they could be economically useful ?
mp_en_viaje: the question as
to WHY "
They couldnt even get real Africans for
the parts. " is amusingly left unaddressed.
diana_coman: stjohn_piano_2: re programming otherwise,
there's eulora with a shit-ton of interesting stuff
to do but
there like ~anywhere, it's always about digging deeper rather
than looking wider as it were
☟︎ stjohn_piano_2: ^
trinque. hope you see
the above about OTP before doing any investigation.
diana_coman: stjohn_piano_2: you need
to ask; and it's a more general rule really
diana_coman: heh, as I was reading
the log, I was wondering if you were
trying
there
the right OTP or someone else's
stjohn_piano_2: in my notes, i had
this sequence: 1) join forum, 2) deedbot will present OTP, 3) decrypt OTP, 4) use !!v OTP.
stjohn_piano_2: by mistake, i was attempting
to decrypt
the OTP sent
to asciilifeform
☟︎ diana_coman even still has somewhere a profile in
there but can't be quite bothered atm about it
mp_en_viaje: diana_coman, i dunno,
they do some rotation whining and displaying
thing.
diana_coman: on which I can access
the linkedin site I mean; possibly some paywall or whatever, didn't bother
to really go around it
diana_coman: at least on
the public
toilet I can even access it
mp_en_viaje: precisely how one defeats
the pantsuit strategy : unconnected examples.
diana_coman: ah, ah, purged refs on it; (linked in site was derping re login bla bla so I didn't get
to see
the content)
mp_en_viaje: the mechanical similarity
to
the phuctor example should be illustrative enough. it's one
thing for
the "sceptical"
tard
to say whatever bla-bla re
the former case ; but
the
two presented
together are particularly strong, because absolutely
the only commonality is
their unpalatability
to
the femstate.
mp_en_viaje: diana_coman, well, removed any
tmsr reference on one ; invented a spare.
diana_coman: o.O
they replaced her profile on linked in??
mp_en_viaje: "Nicole's curiosity about life has put her on a path of ever-deepening self-discovery. She believes in gentleness
towards oneself, practicing gratitude, always having fun, and
that laughter is one of
the great keys
to well-being."
stjohn_piano_2: asciilifeform, mp_en_viaje:
thanks again for
the patient help.
a111: Logged on 2019-05-16 19:12 stjohn_piano_2: people reeeeally
try
though. "machine learning" (rather
than "statistical sampler with paremeter adjustment").
stjohn_piano_2: to quote myself "To attack a hidden-key address, an adversary would need
to discover weaknesses in: ECDSA, SHA256, RIPEMD-160.
These weaknesses would also have
to be compatible.
To attack a known-key address, an adversary would only need
to discover a weakness in ECDSA."
mp_en_viaje: hard
to beat
the loving slave in most personal applications.
a111: Logged on 2019-05-16 19:06 stjohn_piano_2: although, i am surprised. i had
thought "driver" was one category of subordinate where you could
trust
that
the subordinate would do
the work carefully, for his own sake.
stjohn_piano_2: section is called "Does
the hash in a Bitcoin address provide any protection?" (if you search
the page for
that string, you'll get
to it)
mp_en_viaje: you understand
there's a (very
theoretical) weaking of an address
through reuse
tho ?
stjohn_piano_2:
http://btcbase.org/log/2019-05-16#1914109 << yes. i didn't even
trust
the implementation of
the hash function
though. i started out with
the assumption "it's all
terrible" and
the conclusion was "the only
true
test is
to get a
transaction from
this address into
the blockchain".
☝︎ stjohn_piano_2: asciilifeform:
thanks. i have read it already
though (and much of
trilema).
a111: Logged on 2019-05-16 18:44 stjohn_piano_2: well, in my initial half-understanding of bitcoin, was nervous about moving bitcoin into offline address without knowing (for certain)
that i could retrieve it.
stjohn_piano_2: re:
testing: excellent. i will eventually buy one. need
to get a job first.
stjohn_piano_2: people reeeeally
try
though. "machine learning" (rather
than "statistical sampler with paremeter adjustment").
☟︎ stjohn_piano_2: yes. people
try, but final responsibility can never be outsourced.
stjohn_piano_2: although, i am surprised. i had
thought "driver" was one category of subordinate where you could
trust
that
the subordinate would do
the work carefully, for his own sake.
☟︎ stjohn_piano_2: the question in my mind is: does
this strategy lose out
to write-bitcoin-scripts-in-scripting-language
to run offline on whatever cheap hardware china makes?
stjohn_piano_2: question becomes: spend lots of
time becoming expert in old
tech, run homebrew hardware for running a wallet, but
then: how
to monetise?
the expenditure in
time alone is enormous.
stjohn_piano_2: so digging
through junkyards is actually workable for my lifetime?
stjohn_piano_2: asciilifeform: yes. i noticed. i have a 10yo macbook
that functions still, while newer ones.... well, not so good.
stjohn_piano_2: well, when (roughly) can ~all
the 70s, 80s stuff be expected
to be dead, purely from entropy.
a111: Logged on 2019-05-12 03:29 asciilifeform: mp_en_viaje: not only
that period. i have strong suspicion
that 'capacitor plague' never
trooly ended, or will
stjohn_piano_2: ah interesting. did not know
that. had assumed old stuff would break in some way over
time.
stjohn_piano_2: i contemplated a future (my middle age?) in which all of
the old stuff no longer works.
stjohn_piano_2: e.g. dig dig dig "ah,
this Y is a wrapper around a half-melted X"
stjohn_piano_2: asciilifeform: all
this is
true. is it still a bad idea if you run
the raspi offline forever?
a111: Logged on 2015-03-07 00:01 asciilifeform: mircea_popescu: and deliberately pseudo-open architecture (runs linux, sure, but with massive closed blobs required even
to boot. and vendor regularly pays media mouthpieces
to lie about it; also posts astroturfed comments)
stjohn_piano_2: well, in my initial half-understanding of bitcoin, was nervous about moving bitcoin into offline address without knowing (for certain)
that i could retrieve it.
☟︎ stjohn_piano_2: variant in
this case is: use raspberry pi
to generate offline
transaction
to confirm address validity.
a111: Logged on 2019-05-16 17:18 mp_en_viaje:
http://edgecase.net/articles/conversation_programmer_licences << what's
the weird here ? a) wrt
to a buncha people calling
themselves x piano ; b) wrt
to hand-publishing what's eminently a chatlog, as such ? why not use a logger and only publish selected snippets
that need notes and such ?