5100+ entries in 0.703s

assbot: You rated user asciilifeform on 30-Nov-2013, with a rating of 5, and supplied these additional notes: 4 First man to factor a 4096
RSA key in the history of computing..
mats: "I believe that we are in a post-hacker world ... We should strive to be professionals, making the Internet a safer place rather than exposing vulnerabilities that can be leveraged by criminals and terrorists. This is why I'm going to encourage you to attend professional security conferences like Black Hat,
RSA, SANS and others"
nubbins`: trying to find clues as to broken implementations, flaws in
rsa, etc
decimation: you just said,
rsa can solve that problem
trinque: does p2p networking over
RSA keys
decimation: I find the magic box unneeded when I can get
rsa signed time from a variety of places via ntp
jurov: and if we have
rsa-signed time, usg will pwn or jam that too
jurov: yes, of the first million ssh
rsa keys several had factors like 3,5,7,11
ascii_modem: mircea_popescu: if could switch ecdsa curves, could as well have
rsa!
decimation: ascii_field: one wonders why bezos didn't order the creation of his own
rsa code
assbot: Logged on 27-06-2015 18:08:28; lobbesbot: New post:
http://nosuchlabs.com/rss Phuctored
RSA Modulus, GCD=12884901891 (Christoph Giesel ; ) || Phuctored
RSA Modulus, GCD=12884901891 (Christoph Giesel ; )
felipelalli: mircea_popescu: Signature made Sex 26 Jun 2015 18:32:29 BRT using
RSA key ID ED5CDE14
davout: if we find an efficient algorithm for factoring large numbers we can also kiss
RSA 8192 good bye
shinohai: Thanks guy. So until such a time that
RSA 4096 is broken, we're still quite safe.
mircea_popescu: what, that blowfish or whatever dies before 4096
rsa ?
mircea_popescu: nbews in past 6 months : s.mpoe almost went to shit but recovered, i lost the berkshire bet, s.mg launched eulora, s.nsa's phuctor delivered 60 or so broken
rsa moduli
ascii_field: other thing is, only 'positive' items are even theoretically possible to authenticate. that is, if you find a leak purporting to be from the directorate-of-cracking-
rsa, stating that 'sixteen quintillion bezzlars and still no result,' this could be disinfo. whereas 'here's how to factor $maxint on a pocket calculator' is testable.
assbot: On how the factored 4096
RSA keys story was handled, and what it means to you. on Trilema - A blog by Mircea Popescu. ... (
http://bit.ly/1Qz8yuy )
assbot: Logged on 08-06-2015 12:48:13; jurov: asciilifeform: mircea_popescu: so far have 733k phathub
rsa keys, of these 19 have factors 3,5,17 or 23
jurov: asciilifeform: mircea_popescu: so far have 733k phathub
rsa keys, of these 19 have factors 3,5,17 or 23
☟︎ jurov: it won't stop running soon. i have in pipeline some 1e6
rsa keys from github i'd like to kindly bestow upon phuctor
trinque: happens to use
RSA keys and handle fancy topologies
lobbes: I'm finding it quite useful for understanding
rsa fundamentals