4100+ entries in 0.244s

Framedragger also wonders about pure
rsa performance. guess we'll see :)
trinque: or otherwise it calls for homebrew
RSA+padding
mircea_popescu: now, the one hold-up here is that we've not yet settled on an universal-fingerprinting-function and we don't like how the koch-
rsa fingerprinting works
ben_vulpes: i too would like more detail in re 'shall provide a platform for those interested in analysing
RSA keys'
mircea_popescu: not terrible, has all the needed parts except "which shall provide a platform for those interested in analysing
RSA keys and the surrounding metadata collected and provided by Phuctor" could benefit from (such as : by x, and y, and z) as it's currently not even vaguely clear what i could do on that platform.
mircea_popescu: why not something actually appropriate ? TMSR envoy, something
RSA, whatevs
mircea_popescu: but i'm thinking maybe it went from "crack
rsa" to "phuctor" level of dubiousness.
trinque: yes and I can factor
rsa in my head
mircea_popescu: i jus' did, and best i can see it is sufficient, and how we'll do stuff like
rsa encryption/decryption over uci once gossipd is here.
mircea_popescu: it is. in order for you to get the whole set you must a) break
rsa keys as numerous as the whole set and b) magically intercept all communications, even those happening outside of any set that includes you.
mircea_popescu: this is a stronger guarantee than what
rsa offers, incidentally.
mircea_popescu: there was (perhaps more usbstantially interesting) an effort to get the historical databases with silk road junk as maintained by some pothead sifted, both for
rsa keys and whatever else
Framedragger: couldn't find anything after (very) cursory glance at logs, so, random question #667: has anyone considered crawling tor hidden services for their
rsa (1024 bit iirc!) keys, and dumping them into phuctor? apologies if there was already a discussion with regards to this.
mircea_popescu: i guess i should add this to my
rsa key length article.