4600+ entries in 0.385s

mircea_popescu: there is exactly ONE
rsa format, for all time, past as well as future, and it goes like this : N, e, comment.
mircea_popescu: not by centering on the non-
rsa formats and adding tms on the side.
mircea_popescu: illustrate them by storing
rsa in the
rsa format and adding the illustration on the side
mircea_popescu: there ARE NOT two classes of object.
rsa is the class of object.
Framedragger: asciilifeform: ah wait lol: i'd be parsing ssh
rsa keys, not pgp keys - different format - though also base64 etc. i'll check!
Framedragger: asciilifeform: mircea_popescu: i'd like to interrupt this joyful occasion of copulation of you two by noting that ssh-
rsa keys of all of ipv4 are now ready for phuctoring and further analysis; they are in the format of e,N,ipaddress. there's 10.6M of them, out of 20.8M something-listening-on-port-22 hosts. rejoice!
trinque: the problem is poorly formed; I would eventually sign off on a function that did
RSA pete_dushenski: ie. '
rsa pill really exists, just you wait until they drop bomb'
mircea_popescu: at the USER end. if you want to otp the stuff you put through cs/
rsa, by all means.
mircea_popescu: see, but any construction of identity in terms other than pseudonimity (such as, "issuing" of "id" as opposed to generating
rsa key) is merely a ploy by the socialist state, designed specifically to introduce a red herring in the conversation.
Framedragger:
http://btcbase.org/log/2016-05-22#1470431 << hmh actually not sure now. it doesn't seem that the email addy in the ssh host's pubkey is sent to client. yet you're right in that the email addy is included (in e.g. /etc/ssh/ssh_host_rsa_key.pub). will check (ssh-keyscan explicitly doesn't give/relay it though)
☝︎ mircea_popescu: lmao omfg. dude published the 2012 census with a pgp (v2.0!) 1kb
rsa key ; and he claims to be inspired by... XKCD!!! to do a fucking hilbert curve. omfg the unit-square covering discussions were all in vain, xkcd is the source.
Framedragger: mircea_popescu: (got 2768 ssh-
rsa keys on a test run on a populated /16... this will be fun.)
Framedragger: but kk, it's clear it's not relevant to current effort as current effort is about factorization of
rsa keys
Framedragger: mircea_popescu: of course. :) btw can i assume that ecdsa keys are not of interest? only
rsa?
Framedragger: the convertor converts keys into some kind of tmsr
rsa format, then?
mircea_popescu: that may be ; but the problem here is that politically, we do not wish to recognize
rsa is owned by pgp.
mircea_popescu: well since phuctor has a bunch of
rsa work already done ; converting github
rsa keys to a usable format and checking them by the same process isn't that tall a step.
Framedragger: i mean let's say one wouldn't depend on gnupg or anything like that. fine. use
RSA. but with the (admirable) level of scrutiny employed herein, i'd be wary of even suggesting a single implementation of
RSA which would not be shitty. i mean, there is libressl...
mircea_popescu: in that drawing, "modern security features added to render useless in the wrong hands" prolly means 1kb
rsa with exponent 35, amirite
mircea_popescu: 2. get the
rsa conversion to the official tmsr universal
rsa format discussed in logs.
davout: asciilifeform & mircea_popescu just realized that the DKIM
RSA keys could easily be harvested from teh interwebz and fed to the phuctor