39800+ entries in 0.018s

mircea_popescu: RewriteCond %{REQUEST_FILENAME} !-d << this sort of thing.
mircea_popescu: ben_vulpes wp doesn't actually care how .htaccess is implemented ; only that it works.
mircea_popescu: generally the alfajor as a commercial item is two wafers, ddl in betrween, whole dipped in hard chocolate.
mircea_popescu: hey, i didn't think i even liked girls, as a 14yo. people get strange ideas in their heads.
mircea_popescu: ben_vulpes you should see the britt chocolate covered macadamia nuts.
mircea_popescu: anyway, guy got a bitcoin, meaning he can put however many more hours into the thing you're using, so wins all around.
mircea_popescu: word. you're building quite the diplomatic reputation for yourself, you know that ?
mircea_popescu: zx2c4 and the good news is, linus permitted ada modules before.
mircea_popescu: actually, most crap is not even permitted. see all the pragmas.
mircea_popescu: depends. performance on ACTUAL constanttime items is not so good.
mircea_popescu: and could you guess WHY it wouldn't make it upstream ? because ada object-links with c object code np.
mircea_popescu: could you guess, zx2c4 , why we would favour ada for finnicy work such as crypto libs ?
mircea_popescu: that's a perl impl of a v tool by mod6 ; everyone is invited to make their own v tools.
mircea_popescu: asciilifeform did we ever establish why he wrote the thing in c ?
mircea_popescu: the idea with it is that patches must be a) clearly assigned to a responsible key and b) well read. actually, not putatively a la ers's trillion dead fish eyes.
mircea_popescu: anyway, as to the other one : v is the republican... well many things, but also works as a versioning system. here's a pretty picture to help the notion along :
http://btcbase.org/patches << you can select from the drop menu to the left, see vaqrious trees extant. you can click on any item to see the patch it represents.
mircea_popescu: and saying "multiples of k : 0, 8, 16" is NOT an enumeration of "similar things". 0 is dissimilar to everything else.
mircea_popescu: you have to get it in your head, that 0 is an invariant, and permitting it is always dangerous, because it's not "just another number".
mircea_popescu: the problem is fundamental, though. the same EXACT thinking informs this problem as informs the earlier discussion with asciilifeform over null ciphers.
mircea_popescu: this reduces your strength, like it or not, because ~attacker inferred something~. that's what strength is, "attacker doesn't infer". see the history of the concept of "ban" and hopw turning bamburismus'd.
mircea_popescu: if however he observes a stream of n messages of length = 0, he can infer nothing was said.
mircea_popescu: one thing at a time : if an attacker observes a stream of n messages of lengths != 0, there is nothing he can infer : maybe they're part of one message, or maybe they're not, or maybe they don't even say anything.
mircea_popescu: anyway, the point here isn't that padded protocols infoleak in multiples of the paddiong., the point is that 0 is a special case invariant, and yhou can never leak a multiple of 0 safely. because, again, a message of arbitrary length n can be presented as m messages of length k ; but 0 messages can never carry anything.
mircea_popescu: yes, that's how wer dop it. do you happen to be familiar with diana coman's work on the ada impl of rsa/keccak etc >?
mircea_popescu: zx2c4 is this constant time ecc implementation on display somewhere btw ? i don't think i ever saw one before.
mircea_popescu: in any case, cryptography comes in two sorts : sort a), known here as "this must be secure, it's so confusing to me", and sort b). the moment you say "i can't see what this gives attacker" you force-shove yourself in group a. it's not your business to know the attacker, that's the whole fundamental philosophy of ciphering, that you do not need to know the attacker.
mircea_popescu: this is the problem : you introduce a categorical breach with this system.
mircea_popescu: because i can turn a 31 message into two 15 messages or back ; but i can't turn 0 messages into anything else.
mircea_popescu: well, for instance, if i know six nodes in your network and know asciilifeform uses at most two, and i see those are not transmitting, i know he's asleep and send the titassassins.
mircea_popescu: why am i held to explain how a protocol breach can be elevated to arbitrary height ? the attracker FIND SOMETHING
mircea_popescu: so that eve can't distinguish silent keepalive from actual convo ?
mircea_popescu: so wouldn't it make sense for me to send 8 whether i have anything to say or not ?
mircea_popescu: and if my slut eve in the other room is listening in, she can distinguish the case where i sent 0 from the case where i sent 8 ?
mircea_popescu: zx2c4 here's a simple alternative to consider : would you agree the assemblage would be more secure if instead of sending a null payload you sent a random string ?
mircea_popescu: can you off the top of your head give me a dummy example of such ?
mircea_popescu: so it is not "empty" in the sense of "" ; it is empty in the sense of the payload being null, but the actual message is in fact a nonce and some tags anyway.
mircea_popescu: "If a packet has been received from a given peer, but we have not sent one back to the given peer in KEEPALIVE ms, we send an empty packet." <<
mircea_popescu: zx2c4 the fundamental problem with "set to empty" is that ciphers can be and many are vulnerable to this, as a particular case of "known plaintext"
mircea_popescu: asciilifeform he can't answer that, because it'd be implementation dependant.
mircea_popescu: this is principally enforced by dizzy operators not touching the framework in the first place, but only given implementations of it.
mircea_popescu: so in no case a dizzy operator could naively set up noise 7.4 so as to send his payloads in plaintext.
mircea_popescu: zx2c4 for the public record, make the "this is not the case" distinction plain.
mircea_popescu: the ready argument for doing it this way is simplicity.
mircea_popescu: asciilifeform seems to me the case to be, that they defined a matrix, and then implemented all the cells, and fuck you if you pick a dumb cell.
mircea_popescu: zx2c4 you can voice yourself (permanently) by saying !!up to deedbot ; saves us the trouble.
mircea_popescu: zx2c4 don't break up your sentences in multi lines, we read everything anyway.
mircea_popescu:
http://btcbase.org/log/2018-04-12#1796976 << you know me. he doesn't know you. this makes all the difference in the world -- i can whip my slavegirls into shape because they ~love me~. people without this benefit are stuck going at snail speed, which is why "education" in the unsexualized way it's implemented publicly does not work. it couldn't fucking work.
☝︎ mircea_popescu: speaking of which and ben_vulpes boyhood dreams, ssto and so on : i dreamt last night that someone actually managed to create that true wunderwaffen material, the composite/ceramic with higher tensile strength than steel, but negligible caloric conductivity. making some iiiincredible jet engines.
mircea_popescu: i think if you have not enough in your wallet it drops it silently ; and if the payment's not processed yet you might have nothing in your wallet yet.
mircea_popescu: so it permits indefeasible record of deeds ; something the fiat sovereigns have not yet managed.
mircea_popescu:
http://deedbot.org/ << on deedbot you can register any arbitrary item ; it keeps a record that indeed your signature did so ; and it marks the time, through inclusion in the bitcoin blockchain
mircea_popescu: the deed in deedbot comes from the republican system for registration of deeds. think of it as your county clerk, you can go to him to register your wedding or business or w/e.
mircea_popescu: this is a lot more than meets the eye ; because it actually restructures conversations into a tree. things here have a depth not encountered anywhere else.
mircea_popescu: you can click the link and see a website-based story of the log ; the bot also reads the line referenced in conversation.