log☇︎
337600+ entries in 0.203s
shinohai: http://news.softpedia.com/news/avast-safezone-browser-lets-attackers-access-your-filesystem-499990.shtml /me likes how antivurs companies that can't protect computers from viruses think their luck will be better at web browsers.
assbot: You rated user dionyziz on 06-Oct-2014, with a rating of 1, and supplied these additional notes: OpenBazaar, http://twitter.com/dionyziz.
danielpbarron: a year is long enough. picking out the ones with old dates mostly
danielpbarron: heh, my list was getting a little too long to fit in my head so to speak
shinohai: danielpbarron is thinning out the herd O.o
assbot: You rated user napedia on 17-Nov-2014, with a rating of 1, and supplied these additional notes: https://twitter.com/napoleon/status/534321538657308672.
gribble: napedia was last seen in #bitcoin-assets 51 weeks, 6 days, 16 hours, 49 minutes, and 12 seconds ago: <napedia> I don't write for SNI. My opinion is that I'd like to see SNI sort it out with economic reasoning and good articles. Pierre's arguments are most persusasive.
assbot: Successfully unrated thomas_d
assbot: You rated user thomas_d on 24-Nov-2014, with a rating of 1, and supplied these additional notes: plays on seals as thomas_dick.
danielpbarron: !rated thomas_d
danielpbarron: ;;seen thomas_d
assbot: Successfully updated the rating for thestringpuller from 1 to 1 with note: wrote the hard fork missile crisis qntra article
assbot: You rated user thestringpuller on 08-Oct-2014, with a rating of 1, and supplied these additional notes: https://twitter.com/thestringpuller.
danielpbarron: !rated thestringpuller
maqp: ben_vulpes: I think you're confusing patriotism with nationalism
assbot: You rated user rdymac on 07-Dec-2014, with a rating of 1, and supplied these additional notes: that bobbaer guy http://log.bitcoin-assets.com/?date=07-12-2014#947497.
maqp: AFAIK Snowden hasn't got a degree in math/crypto, but what he said might indicate something in the leaks the journalists chose not to publish. It's a long shot but since there was no harm in cascading...
ben_vulpes: what the fuck is this "tongue slipped"
maqp: That's pretty much the story behind CEV
maqp: Additive keystreams have very low risk after all and I didn't have to trust single external crypto library
maqp: Snowden hinted something about using cascading at Harvard Privacy Synopsium when he was talking with Schneier. Schneier disagreed but it left me wondering whether Snowden's tongue slipped. Cascading was agreed as a good practice in the Schneier's Friday squid blog so I had a go
maqp: mircea_popescu: Didn't see that. CEV was built to distribute trust over multiple cryptographic primitives and designers
fluffypony: "It's not clear why WhatsApp settled on the oddly specific number, but it'll be good news for those users for whom 100 just wasn't big enough."
assbot: WhatsApp increases group chat size limit to 256 people | News | Lifestyle | The Independent ... ( http://bit.ly/1Q3UzwG )
assbot: B,TMSR~ Block Cipher Competition on Trilema - A blog by Mircea Popescu. ... ( http://bit.ly/1UWcHH8 )
maqp: unconditionally secure authentication fits information theoretically secure algorithms (not ciphers)
punkman: maqp: what other algorithms are you thinking of that fit the title?
punkman: "because why trust on a single cryptographic primitive" << because it's nice if the whole thing fits-in-head, and even if you cascade there is still the possibility of meet-me-in-the-middle attacks or I dunno what else
ben_vulpes: the superb owl impends, and the girls need a hand hefting cakes and buckets of wangs
ben_vulpes: anyways, i now return you to your regularly scheduled programming
punkman: "why use information theoretically secure ciphers" << not really plural there, there is only otp
assbot: Logged on 07-02-2016 16:56:01; ascii_rear: ben_vulpes: good 'v' summary - but i'm still waiting for somebody to crap out a treatise re: the philosophical 'why' of it
ben_vulpes: http://log.bitcoin-assets.com/?date=07-02-2016#1399016 << where do the provided explanations fall flat? ☝︎
ben_vulpes: phf: thank you for the rewriting and clarification on why vdiff doesn't on macos.
maqp: "because why trust on a single cryptographic primitive" makes a lot more sense than "why use information theoretically secure ciphers"
maqp: Keccak512-CTR - XSalsa20 - Twofish-CTR - AES256-GCM - HMAC-SHA512 - SHA3-512-MAC
assbot: Logged on 07-02-2016 16:42:15; mircea_popescu: funny application of the entire symbols vs words debate, incidentally. was it deliberate ?
ben_vulpes: http://log.bitcoin-assets.com/?date=07-02-2016#1399000 << in the sense that most everything i read here gets filed away and pops up unexpectedly elsewhere. but no, not explicitly. ☝︎
maqp: CEV is the cascading encryption version
maqp: It's also a lot easier with NaCl than with OTP/CEV (there's a separate command for adding PSKs)
assbot: How to memorize a random 60-bit string | the morning paper ... ( http://bit.ly/1Q3Tkh8 )
punkman: http://blog.acolyer.org/2015/10/29/how-to-memorize-a-random-60-bit-string/ some neat ideas in this paper
punkman: I think pronounceable words beat baseX
maqp: NaCl also lets you pre-share 256-bit XSalsa20-Poly1305 keys. It was the only practical post-quantum solution at the moment
mircea_popescu: as the saying goes, #b-a presence counts for 30 iq points.
maqp: indeed. I'll look into that <:
mircea_popescu: maqp better than 72 i'd say
maqp: Base36 would reduce public key length to 56 chars
maqp: But since you don't have to read the public key in Base58 format, it could use two different encodings
ben_vulpes: mircea_popescu: if you don't show up in the forum, marshall hoplits on demand, are you still a senator?
maqp: having to say "upper case B, lower case c".. is almost as bad as the one used in Telegram
maqp: But since users are verifying the public key over Signal call
mircea_popescu: ben_vulpes generally i'm thinking, to make it in people gotta put you in ; but once you're in, yoiu're in, and baring disaster you stay in.
maqp: I wonder if there's a library for that
maqp: mircea_popescu: indeed. I just figured the few extra chars were't that important, and that typing upper/lower case might make it slower. I'll have to look into that
ben_vulpes: mircea_popescu: dude he has like three
assbot: Successfully added a rating of 1 for maqp with note: I showed him the log, and he joined! I'm on a roll.
ben_vulpes: yes but /inclusion in the lordship/ for that?
ben_vulpes: i don't intend this as an attack on mthreat, trying only to tease out the logic.
mircea_popescu: my thinking, vague as i admit it may be, is that if the guy's service is running, the guy is ok.
ben_vulpes: 'running ok' is the criteria?
mircea_popescu: ben_vulpes well, the search is running ok. this is a thing.
ben_vulpes: i also don't quite know what mthreat's doing in there beyond running search and being a known usg antagonist.
punkman: maqp, is that a carter-wegman MAC in your otp version?
ben_vulpes: also does lordship survive termination of corporeal instantiation?
maqp: That could work of course, base58 might be better as there's less similar looking chars
mircea_popescu: maqp but you could type base64 ?
maqp: unfortunaltely that's the only way to prevent nation state from remotely injecting malware to transmitter device after setup
mircea_popescu: ben_vulpes no objection ; and in light of the traverser no objection.
deedbot-: [BitBet Bets Bets] 10.00000000 BTC on 'No' - Bitcoin to top $600 before Jul 2016 - http://bitbet.us/bet/1232/bitcoin-to-top-600-before-jul-2016/#b22
mircea_popescu: maqp you actually type hex digits ?
ben_vulpes: i propose excising artifexd from the lordship, and i further propose adding phf to it
maqp: Since it's ECDHE, the security is actually 3072-bit RSA equivalent
maqp: The current version has 72 hex char key you have to manually type to transmitter device; it's similar to manually typing Ricochet/Tox ID
maqp: I tried it earlier, but the classic Diffie-Hellman had much less security and a lot longer public key
gribble: diametric was last seen in #bitcoin-assets 1 week, 1 day, 21 hours, 42 minutes, and 31 seconds ago: <diametric> not sure that makes it a trivial non-crime at that point.
maqp: So anyway, as far as the TFC goes, NaCl is the first one to provide practical public key crypto
mircea_popescu: i wonder how gabriel spoonful's doing these days.
gribble: artifexd was last seen in #bitcoin-assets 41 weeks, 3 days, 22 hours, 19 minutes, and 18 seconds ago: <artifexd> I'm comfortable calling it a review. Not just of what it is but what it was and how it got to where it is.
maqp: As far as it goes with cast iron list, it remains to be seen who's now closer to "terrorists"
ben_vulpes: nigga you think i keep shit in my head that computers remember for me?
ben_vulpes: o wait this'd be the canonical list
mircea_popescu: and what, you dunno who the peers are ? for shame!
mircea_popescu: pretty sure it was applied then.
mircea_popescu: iirc that update got applied or not ?
ben_vulpes: right, and given the extremely long lead time for review around here i want to kick the conversation off now
ben_vulpes: you proposed changes, but i'm not seeing those changes cemented anywhere.
mircea_popescu: well no, not really april yet. there should prolly be some discussion for a new one huh.
assbot: A new Lordship List ? on Trilema - A blog by Mircea Popescu. ... ( http://bit.ly/1LYer1O )
ben_vulpes: http://trilema.com/2015/a-new-lordship-list/ << mircea_popescu did you ever finalize this?
mircea_popescu: hey, an interest in actual crypto / security ? DEFINITELY terrorism.
ben_vulpes: maqp: where does the handle come from?
mircea_popescu: no i think he was a terrorist before.
ben_vulpes: you're now a terrorist
mircea_popescu: maqp now you can self-voice ; just say !up to assbot in a pm and it'll give you a string to decrypt. pass it with !v and you're voiced.
assbot: Searching pgp.mit.edu for key with fingerprint: 559FA134DE33AED70DF97D8B085ADF061C2B20CD. This may take a few moments.
ben_vulpes: don't actually do that please.
maqp: interesting. There doesn't seem to be a setting for that when uploading key to MIT key server
ben_vulpes: that's the full-length fp
maqp: mircea_popescu: What's the prefix in front of pub key fingerprint?