900+ entries in 0.191s
mircea_popescu: now, intuitively, would you imagine this worked at all if the
string was so short it never fully wrapped ?
mircea_popescu: basically they had this early elliptic curve crypto, implemented as an arbitrary cone on which they wrapped a
string. because the
string is fixed length see, whereas the section of cone is not.
☟︎ PeterL: It checks to see if it is using the right key by comparing the decrypted text agains a pre-known challeng-
string (cs)
a111: Logged on 2017-08-09 14:12 PeterL: using the wrong key will result in a random byte
string, so with a cs of 1 byte, you have 1/256 chance of looking like it was the right key
mircea_popescu: and upstream, to make clear what "semantic security" means : rsa is deterministic, if i wish to see if your "encrypted"
string really was message m, all i have to do is encrypt m myself. if the results match i have cryptographic confirmation.
mircea_popescu: basically it takes a random
string, jumbles it with the original message, and spits out two halves. the hope with it is that it provides all-or-nothing security, in the sense that to recover any bit of the message you need to correctly process the entire pair of jumbled strings.
mircea_popescu: 0 length isn't usually what one thinks of when seeing "too small". same istrue if 1 byte
string ?
PeterL: using the wrong key will result in a random byte
string, so with a cs of 1 byte, you have 1/256 chance of looking like it was the right key
☟︎ mircea_popescu: this is bizarre. try the actual line from the .sh that fails ? (prolly the first one to
string match "patch") ?
trinque: so the encrypted item is both the hex
string and what you told the bot to do.
mircea_popescu: if they're not there, any historical trace of a ps -eo cmd,args | grep "mysql" (or the same command run on a similar system) will provide a -datadir=
string.
trinque: ah probably
string of command, since folks need to see what it is they've gotten an OTP for. at any rate, still not branch-causing.
mircea_popescu: sort-of like the "independent, career-oriented business woman" with a
string of "serial entrepeneurship" consisting of hair salons her bf at the time bought for her.
mod6: <+asciilifeform> mod6: you may have noticed that asciilifeform did not use the containers, or elaborate
string ops << yeah, we discussed. just wanted to familiarize myself with 'em.
mod6: the really interesting part will be doing any sort of
string manip etc.
BingoBoingo: Simply but a
string in that isn't formatted unlike an email address, at least on qntra
phf: also can probably
string them as far as adams morgan zoo from your bunker, have a secondary effect as definitely getting labeled as terrorist when caught (lizard territory)
a111: Logged on 2015-04-02 14:59 asciilifeform: 'Identity-based encryption is a type of public-key encryption in which any arbitrary
string (such as a users email address) can be used as a public key, enabling data to be protected without the need for long, randomly generated keys or certificates. Today, there are numerous standards for IBE based on Bonehs work, including IEEE P1363.3 and several IETF RFCs.' << from the press release.
phf: so the utf-8 parser takes anything in the 0-127 range as is, so we definitely wouldn't have any "magic
string" cases in the happy path (the unhappy path being that you can apparently specify file type and encoding when posting to an rfc2388 form, and the server can happily decide to transcode it in whatever way it pleases)
mircea_popescu: i thought maybe it is the case that it takes a 2 or 3 byte item which starts with valid ascii and tries to interpret it as some sort of unicode bs and in the process ends up applying a transform to the text somehow. but unless we have the actual magic
string, we're not finding this.
erlehmann: problem is timespan. systemd already could not handle an empty
string and executed tasks for users named “0day” as root because names starting with numbers are hard, mmmkay?! it might take a long time before it collapses.
mircea_popescu: but that said, a large baloon with a
string of gliders underneath that detach bottom first like some sort of strange technofruit losing its seeds like some sort of anemochorious epiphyte.
a111: Logged on 2017-07-05 15:50 phf: oh flag, lets you pass this stuff as a command line argument.. i guess this approach works too. i'm not sure why i can't just do message =
string(dat) but i'm too lazy to figure it out
a111: Logged on 2017-07-10 19:50 mircea_popescu: which incidentally brings us to a very workable and very useful tmsr definition of entropy quality : take a FG
string. flip a number of consecutive bits to 1. the result is your entropy quality, such as 100/1mb if you flipped 100 bits.
mircea_popescu: ben_vulpes here's a high pay grade question for you : of the two models of "controlled de-entropy" i spawned in a week, specifically a) count of randomly placed flipped bits, as in the discussion with you re that and b)
string of randomly initiated, n bit long SET bits, as discussed in
http://btcbase.org/log/2017-07-10#1681268 which does the bitcoin foundation regard as a better candidate for standardization as "the republic'
☝︎ mircea_popescu: which incidentally brings us to a very workable and very useful tmsr definition of entropy quality : take a FG
string. flip a number of consecutive bits to 1. the result is your entropy quality, such as 100/1mb if you flipped 100 bits.
☟︎ mircea_popescu: in the same vein, the early 1900s investigations into the meaning and structure of number resulted in a correctly complicated notion, from riemann functions to cantor's sets and so on. this is at great variance with non-fields like "artificial intelligence" or say alf's favourite, postmodern qm (say
string theory or w/e) -- which evidently are incorrectly complicated even if it's not always evident where exactly.
mircea_popescu: phf serialization can at best be a packaging. the issue is, can i say "here's a function that takes a parameter and outputs "your mom's a python" and the data payload is function(is that you daddy)" in order to convey the
string "your mom's a python" ?
phf: there's ISLISP standard, which was supposed to create a subset of multiple different lisps (like common lisp and scheme, but also eulisp, since designed by europeans). i don't think anyone (particularly sexp library authors for other languages) ever tried to conform to it. typical solution is to have a JSON-like subset of sexps, so that you can express (FOO "abc" 2), i.e. symbol,
string, number and list and nothing else
a111: Logged on 2017-07-06 15:08 mircea_popescu: "here's what happened, and here's our story of a
string of causes which we call purposes"
mircea_popescu: "here's what happened, and here's our story of a
string of causes which we call purposes"
☟︎ mircea_popescu: speaking of which, very fundamentally libertard this "framing" approach, quintessentially what "progress" is all about. here's what happened, now let me hallucinate a
string of pseudocauses and outcomes which you can believe in!
phf: oh flag, lets you pass this stuff as a command line argument.. i guess this approach works too. i'm not sure why i can't just do message =
string(dat) but i'm too lazy to figure it out
☟︎ phf: message := flag.
String("message",
string(dat), "message")
a111: Logged on 2016-12-24 01:10 asciilifeform: say i want to encipher (dun matter with what) a
string, 'To: mircea_popescu Subj: thermonuke launch codes ...'
a111: Logged on 2017-07-03 05:50 mircea_popescu: ok, so for every
string of FG bits called M, do hashing of M, M+1, M+2, M with first bit flipped, M with first two bits flipped, inverse of M. that's 6 items.
mircea_popescu: ok, so for every
string of FG bits called M, do hashing of M, M+1, M+2, M with first bit flipped, M with first two bits flipped, inverse of M. that's 6 items.
☟︎ sina:
http://trilema.com/2016/gossipd-design-document/ III. Gossipd will receive inbound connectionsvii from identified clientsviii and on the basis of that identification produce an encrypted challenge
string, which constitutes its response. If the other party responds with the proper challenge
string, the connection is established ; otherwise it is dropped.
Framedragger: i believe this relates to asciilifeform's "traditional challenge-response creates DoS vector". so with a lighthouse auth
string, one more important point is that a particular auth
string cannot be reused.
Framedragger: yes i think so, and note that there is a time window there re. how recent challenge
string has to be, to avoid replay. i.e., those strings expire. and yes that's how you send a msg to B iirc
Framedragger: so there's no way to DoS peer B with "hi plox to send me an auth
string, i'm totally legit non sybil node"
sina: "To craft a valid packet, a sender must collect a single auth
string from the receiving node's lighthouse (via whatever means, can be a shortwave tuner), craft auth with it as described by Mircea Popescu earlier, encipher to receiver's RSA pubkey, and send." ?
sina: session may be the wrong term. I just mean, in the spec
http://trilema.com/2016/gossipd-design-document/ "III. Gossipd will receive inbound connectionsvii from identified clientsviii and on the basis of that identification produce an encrypted challenge
string, which constitutes its response. If the other party responds with the proper challenge
string, the connection is established ; otherwise it is
BingoBoingo: In not news, Buttstamp now introduce Litecoin trading to two cans and a
string too
BingoBoingo: Or as an alternative there's a number of new manufacter 2-cycle scooters which do not require registration due to various "moped" exemptions. Needs to be under 50cc displacement which means riding machine with 1/4 of a lawnmower engine or twice a
string trimmer engine.
mircea_popescu: daffadil oh i misunderstood what you were asking. i gave deedbot an order, and to verify my identity it encrypted something to my key. that
string in !!v
ben_vulpes: "it's homoiconic! everything's a
string!"
ben_vulpes: aye, can confirm matching hashes on your default
string sina: because the format
string used drops the leading 0
sina: so when I was building it, I was trying to match the "MP kicks ass!" output, which starts with a 1 in the example (and IIRC when I did it in python)... the original
string I had was printing a leading 0
sina: if I pick a
string I'll include the bitfield for lazy ben_vulpes
sina: but when you have a
string of all 1s
trinque: mod6: nls is a
string lookup thinger for translation; icu is yep, unicode thinger for iirc hieroglyph support
BingoBoingo: No instead as soon as you invoke "suspension" in a
string google/Bing/CuckCuckGo all return fatso pandering
mircea_popescu: "oh look dad, he produced the
string "responsibility". he can't be a useless pothead. o look, thgere goes, "the future"!!!1 let's give him more money".
mircea_popescu: the funny part being they actually believe their inane shit. "oh, if i type $
string then it'll be parsed by all-comers as such! oh and i don't have to parse any strings myself!"
erlehmann: > Our code didn't prefix the Hex
string with 0x and when we upgraded Geth from 1.5.3 to 1.5.9 on the 24th of May, the SHA3 function call failed and our sweeper process then called the contract with an invalid data payload resulting in the ETH becoming trapped.
mod6: so then i took a step back. decided to do something like what the initial steps of my V do; list the contents of a directory, throw the filenames into a list using Doubly_Linked_Lists(Unbounded_String) and then attempt to pass them to another function that does further parsing.
mircea_popescu: check him out, i give him the
string to grep, he doesn't, then wants me to control his viewport.
a111: Logged on 2017-04-05 14:25 mircea_popescu: this is usually included by the shorthand
string "bibliography"
ben_vulpes: no the kinda guy who played in bands in his early twenties and then got hoovered into $deathcorp because he can
string passable sentences together and shit out the odd mockup.
Framedragger: it spits back an int if it can parse the ascii
string into one
mircea_popescu: i have nfi what this is. so what does it do, changes the
string 9 to the numeral 9 ?
mircea_popescu: i had to talk of javascript. who the fuck thinks like this, i wish to know, "oh, i'll htmlencode a
string and then replace some of the escaped items".
mircea_popescu: no, Framedragger , it wouldn't be neat. it would be normal. code-as-ascii-
string diff fundamentally can't work.
mircea_popescu: why the fuck can't i add the
string 68 with the numeral 7 to get the real 74.99999999 as god intended ? it's ALL STRINGS YES ?
mircea_popescu: it is INCREDIBLY lulzy to catch fire at "
string = number" but to tolerate "my program is a strring hurr"
BingoBoingo today had to console poor fellow who burdened himself with a 4-cycle
string trimmer "It seems to not be that powerful" "Of course it's not, there's half as many power strokes"
trinque: and make noises like you're out of weed whacker
string mircea_popescu: there are two ways in which polling agents results in the same
string. the first is, if the item considered is banal, you show a cup to three people and get "it is a cup" back. the second is, when they have agreed among themselves to, basically, lie to you. "we call this rape", and the subtle difference already says it. "it's sex, the kind we call rape, much like if it were a cup the kind we call grail"
mircea_popescu: trinque there's a vulnerability in how deedbot handles registrations in that even with nick enforcing on, one has enough time before chanserv kicks him off (2-3 seconds ?) to shoot a reg
string at deedbot and get the name registered to his key.
mircea_popescu: but yes, i agree there's a huge difference between "spit out
string hunter2 half tyhe time" and entropy eh
a111: Logged on 2016-08-18 12:32 mircea_popescu: asciilifeform since we're on this btw, the way i want tmsr-rsa key generation to work is as follows : a contains a number of entropy bytes specified by user in tmsr-rsa.conf read whenever tmsr-rsa.conf specifies (such as urandom); b contains a base-tmsr
string specified by user. c = base-tmsr(a).b ; p = nextprime(cut(sha512(c),257)) ; process is repeated for q = nextprime (cut(sha512(c'),258));
ben_vulpes: something along the lines of
string literals next to template macros
mircea_popescu: anyway. this is what i currently use to epxlain random
string production, like "motherboard.vice.com/en_us/article/the-large-bitcoin-collider-is-generating-trillions-of-keys-and-breaking-into-wallets" or like
http://btcbase.org/log/2017-04-14#1643409 or everything in between
☝︎ mircea_popescu: given the list of all the things that have been said already (this is really a tree, but in his perspective it's flattened into a list by nulling out all the values associated with the
string nodes), his choice is :
☟︎