4000+ entries in 0.432s
covertress wishes she had more time to join in such discussions.
^ fascinating.
pete_dushenski: ;;later tell danielpbarron see
^^^ if you're looking for blog post fodder
jurov:
^ analyse distribution of primes and moduli
phf: trinque: so your bot has a bunch of string matches for things that come back from nickserv, but they are all stripped of special characters. like "nick has been ghosted." what i get back is "
^Anick
^A has been ghosted." is that some setting i'm missing? or something else?
jurov: ben_vulpes shinohai
^ mod6: danielpbarron, let me know if you have spare cycles too
^ phf: oh, and he's giving up domain to anyone willing to "set up a new web based service" "all previous permalink.gmane.org (etc.) links continue to work as before, but they’ll look new and spiffy in your new and spiffy web interface" bunch of anons in the comments going "yeah, i'm kind of sort of interested plx send money to this btc address
^W
^W
^W
^W
^Wdomain"
fromphuctor: I know that, it works well only on non-properly-generated rsa modulus, which is easily factorizable by 2
^x -1
fromphuctor: but to do the same thing youself, you need to bruteforce 2
^x -1 == your N?
fromphuctor: so when we can modulus N, how do you use bignum calc for it? don't you need to brute force 2
^x -1 starting from 2
^1023 ?
a111: Logged on 2016-08-02 16:40 asciilifeform:
^ more or less complete picture of typical d.c. train
^ gribble: Error: "2
^1023" is not a valid command.
mod6: you already did all that!?
^5
shinohai:
^ I actually did this to ensure I was getting correct sigs each time.