log☇︎
470600+ entries in 0.293s
ascii_field: ty trinque.
Hasimir: such as in the case of the key dignork and I discussed earlier
trinque: I'm an idiot and I understand that much
ascii_field: and why would a 'bug' affect ONLY (!!!) 1) moduli 2) m^d mod n 3) exponent, which is ALWAYS 281479271743489 after the transformation, regardless of what it originally was 3) ALL FIELDS ARE CORRECTLY SIZED ☟︎
trinque: if a factored subkey has a sig from the master key wtf
jurov: what things?
Hasimir: jurov, it can't, but if the sig was already there, but other data got mangled, it might account for some things
trinque: not "this is why this is bullshit"
ascii_field: 'perhaps it fell from the moon'
jurov: what if the answer is no, keyserver can't ever produce valid sig in this case?
trinque: the vast majority of responses I've seen to this are of the "not worth looking into" variety
ascii_field: 'perhaps the bullet was always in lincoln, from birth'
ascii_field: someone who, charitable interpretation is, did not take even five minutes to think.
trinque: on the one hand, how something functions, on the other, what someone intends
Hasimir: I can assure you that post in particular is from someone who just wants to know the answer
trinque: "teach the controversy" tactic
Hasimir waits for the penny to drop ...
Hasimir: it's just a question, what's the problem with asking it?
ascii_field: (v. 0.9.something) mangled these keys?' << are they idiots or just pretending ?
ascii_field: 'Is it possible that a keyserver running the old, buggy PKS code
Hasimir: oh, did I forget to mention, I'm the treasurer of pirate party australia ☟︎☟︎
Hasimir: I need to script that, clearly
ascii_field: suggests to me - BND. ☟︎
trinque: great reason to keep digging though
trinque: and that isn't currently known
ascii_field: Hasimir: damned if i know. i - only see the bullet.
Hasimir: what is then?
trinque: the question is "what do these keys have in common?"
trinque: that's not the question to ask
Hasimir: trinque, true, but if the malicious bastards theory is the most viable answer: what is the motive?
ascii_field: and this is supposed to be an argument in favour of miracle ??!
Hasimir: there are plenty of more interesting keys to target than that list
Hasimir: Phil Zimmermann isn't on that list, neither is RMS or even a former PM of my country (and yes, it was a real key)
ascii_field: and that the burden of proof somehow lies on the reasonable, literate folks who can see, plain as daylight, that this is as likely as a bullet spontaneously materializing inside lincoln
ascii_field: and that the presence of several 'interesting' names in the list, is also merely fortuitous.
ascii_field: Hasimir: you are asking me to believe that a large number of moduli, carefully crafted such that in mutilated form, they are factorable -and- have valid sigs, is something that could somehow happen by accident.
Hasimir: no one on that list has said, "this is the answer" - they're discussing theories and you're attacking them for doing so, it seems a bit odd ☟︎
Hasimir: yes, but it doesn't prove your malicious bastards theory either
ascii_field: Hasimir: the null hypothesis is not 'miracle happened.' this is not how it works.
ascii_field: aaaaand 'we did this all, yes, believe us, we just never bothered to mention in public'
ascii_field: to even give this hypothesis the time of day, just imagine.
ascii_field: he must think we are morons.
Hasimir: specifically in relation to merging keys, not in general
ascii_field: or perhaps he does not claim this, but passes off as plausible
ascii_field: https://lists.gnupg.org/pipermail/gnupg-users/2015-May/053644.html << koch claims that memory corruption can result in 1) corrupted key that is 2) has valid (!!!) signature. this is an insult to every intelligent reader and beneath contempt.
trinque: that would be the thing to answer
Hasimir: oh, I see what you mean now ... so how are his keys more interesting than ours?
ascii_field: Hasimir: you claimed that '70-year-old hobbyist' is necessarily boring
Hasimir: just the local computer club kind
Hasimir: Charly Avital is on that list too
Hasimir: didn't spare all the boring folks ☟︎
Hasimir: but what makes them interesting? just that it happened?
ascii_field: aaaand for some reason this only happens to interesting keys, aha
Hasimir: anyway, until the specific cause is identified, it can't be called either way
Hasimir: but has since said he's not interested (the follow up by DKG has that) ☟︎
Hasimir: he was copied in on the email directly
ascii_field: LinuxCon and he told me that some folks complained that they can't encrypt to him. For other this was no problem, though.' << this part should surprise no one. the boobytrap works on -someone-. ☟︎
ascii_field: 'Incidentally, I met one of the other guys with a broken subkey at
ascii_field: shitgnomes and their 'it didn't happen. if it happened, it doesn't matter. if it matters - one of -our- people did it first, of course!' ☟︎
ascii_field: downloaded most RSA keys from a keyserver and tried to factor....'
ascii_field: and aha, they are already starting with 'That reminds if of a private discussion I had last autumn. Some guy
Hasimir: erm ... do you use gpg or something else to access openpgp functionality?
ascii_field: Hasimir: examine the evidence for yourself. tell me it is a bug.
Hasimir: well, current theory from werner is it's just a software bug
ascii_field: Hasimir: idk why anyone would want to pwn it, either. ask the fine folks who made the faux key for it..
Hasimir: well, keybase might be a little more useful (but would be better if it did not try to manage private keys for anyone)
Hasimir: anyway, things like the directory key and the hush key are about the same as keybase.io
assbot: Trust relationship from user trinque to user Hasimir: Level 1: 0, Level 2: 0 via 0 connections. |http://www.btcalpha.com/wot/trust/?from=trinque&to=Hasimir | http://www.btcalpha.com/wot/user/Hasimir/
Hasimir: the other reason for using that, though, is to allow hush users to encrypt to you
Hasimir: anyone not using hush can get their key signed by that by registering their key through the hushtools.com site and later retrieving the signed copy
Hasimir: the other key (kind of) like it is the Hushmail DEMO key
Hasimir: the sole purpose of that directory key is to provide minimal (stress minimal) proof that the entity controlling an email address approves the key as theirs, no more
ascii_field: ;;later tell mircea_popescu http://blog.spaf.us/post/119499216803/two-security-researchers-break-rsa-4096-bit-keys << hard to even believe. someone ought to contact the man (assuming he exists in life) and ask, if he shat this out
Hasimir: though I thought it had my key ... no matter
Hasimir: cool, thanks
trinque: Hasimir: register a key and I'll give you a 1 to self-voice in the future
ascii_field found this by looking at The List, of course ☟︎
ascii_field: 'The PGP Global Directory is not a replacement for the PGP Web of Trust, but an additional mechanism to provide a global foundation for the PGP Web of Trust that enables opportunistic secure communications.'
trinque: holy shit that's rich
ascii_field: 'Because the PGP Global Directory allows users to manage lost keys, it cannot use cryptographic mechanisms for verification. Instead, like mailing list servers and other public Internet services, the PGP Global Directory verifies a key by requiring a response to a verification email sent to each email address specified on the key.'
ascii_field: ;;later tell mircea_popescu https://keyserver.pgp.com/vkd/VKDVerificationPGPCom.html << mega-l0l
ascii_field: https://keyserver.pgp.com/vkd/GetWelcomeScreen.event << apparently this still exists.
assbot: Successfully updated the rating for fluffypony from 3 to 5 with note: Met IRL, OpenRigs, Monero, etc
assbot: Successfully updated the rating for davout from 1 to 3 with note: paymium, met IRL
ascii_field: incidentally, rust's flight caused the sacking of pretty much the whole of soviet air force brass.
assbot: You rated user fluffypony on 20-Apr-2015, with a rating of 3, and supplied these additional notes: Points out stupidity, and promotes what matters while maintaining his humanity.
assbot: You rated user davout on 27-Apr-2015, with a rating of 1, and supplied these additional notes: paymium.
ascii_field: 'In the room waited Iraqi Prime Minister Haider al-Abadi, who had stopped by for a photo op and was posing a challenge for officers discussing safe ways to get the prime minister out of the building if necessary.' << oh noez, poor muppet might lose a string or two
trinque: the thing's a chair and propeller
ascii_field: (doesn't get him out of the trespassing charge, but 'flying without license')
ascii_field: http://www.usua.org/Rules/ruleandregs.htm << if his machine was under the weight limit - no license needed ?
trinque: they're terrified of capable people
trinque: so his felony is being a goddamn badass that built his own gyrocopter?
trinque: the felonies are simply... we are defining your remote controlled toy as an aircraft
trinque: notably the felonies lack anything about super-top-govt airspace, those were the misdemeanors
trinque: http://www.cnn.com/2015/05/20/politics/gyrocopter-pilot-indicted-on-six-counts/ << two felony counts -- one count of "operating as an airman without an airman's certificate" and another count of "violating registration requirements involving aircraft,"
trinque: the whole thing is spectacle
assbot: Logged on 21-05-2015 19:03:42; trinque: https://firstlook.org/theintercept/2015/05/21/nsa-plan-find-osama-bin-laden-infiltrating-medical-supply-chain/ << subtext, NSA caught Bin Laden
ascii_field: http://log.bitcoin-assets.com/?date=21-05-2015#1142132 << they could've simply poisoned him then ☝︎
trinque: who knows, but snowden TM says call your senator and install appz