1000+ entries in 0.586s
a111: Logged on 2017-02-14 19:19 asciilifeform: specifically, for every byte you intend to send, you instead send two: x, y. which you generate by obtaining
rng byte r, and payload byte b, and x := b xor r, y := r
mircea_popescu: as per the very apt asciilifeform observation,
rng flux === tty flux. there should be one
rng per human, more or less.
mircea_popescu: actually : the quality of the
rng is the limit on the parallelization.
a111: Logged on 2016-11-17 16:02 Framedragger: in fact.. due to
https://hdm.io/tools/debian-openssl/ correctly pointing out that "This flaw is ugly because even systems that do not use the Debian software need to be audited in case any key is being used that was created on a Debian system.", someone should attempt botnet-brute-login to all 13M+ (i forget lol) ssh hosts with
rng-fucked client keys.
mircea_popescu: i dunno, i have no actual math to show, but intuitively it seems to me the above "take 64 bytes of
rng, iterate hash over the first 60 last 4-times and then use that as tape to pad message, then put padded message + 64 bytes in question in rsatron" is practically useful and theoretically strong.
mircea_popescu: but yes, imperial idiots actually do "
rng verification" of software ~running on unspecified machines~.
phf: yeah, that's what it looks like. i wonder if in your explorations of state of
rng you came across any offical GCB evaluation of casino rngs, i don't know if those would even be public or have technical detail...
a111: Logged on 2016-12-17 23:11 mircea_popescu: incidentally asciilifeform : actual usecase for FUCKGOATS in eulroa play : because the current mining software uses random to position the miner, the quality of the
rng generator decides how likely you actually step outside of the coords you are. ie, if your
rng is biased, you're more likely to go outside.
mircea_popescu: incidentally asciilifeform : actual usecase for FUCKGOATS in eulroa play : because the current mining software uses random to position the miner, the quality of the
rng generator decides how likely you actually step outside of the coords you are. ie, if your
rng is biased, you're more likely to go outside.
☟︎ a111: Logged on 2016-12-17 20:37 asciilifeform: re: analogue
rng, let's say you have a rat in a cage, want to use him for
rng. you give him a toggle to press, connect it between 'out' and 'ground', with a pull-up to 'power' (10Kohm or more).
mircea_popescu: "you mean the
rng tool can't even keep fucking time ?" "aha"
mircea_popescu: i mean... we pay $$$ to generate
rng. how did the computer generate 5mb to pad what alf declares "minuscle" ?
mircea_popescu: asciilifeform nothing transforms the
rng bits into fact. they were fact, from the beginning, owing to the absence of meaning.
a111: Logged on 2016-12-01 15:54 asciilifeform: (idiot pgp still needs 256
rng bits for aes session keys, when transmitting, and this is own can of lolworms)
shinohai: Maybe they need an
rng to generate a key first. >.>
trinque: with the
RNG asciilifeform is going to sell me
Framedragger: in fact.. due to
https://hdm.io/tools/debian-openssl/ correctly pointing out that "This flaw is ugly because even systems that do not use the Debian software need to be audited in case any key is being used that was created on a Debian system.", someone should attempt botnet-brute-login to all 13M+ (i forget lol) ssh hosts with
rng-fucked client keys.
☟︎ mircea_popescu: asciilifeform i can't, not really. as pissed off as i/anyone can be, "What I currently see as best option is to actually comment out those 2 lines of code. But I have no idea what effect this really has on the
RNG. The only effect I see is that the pool might receive less entropy. But on the other hand, I'm not even sure how much entropy some unitialised data has. What do you people think about removing those 2 lines of code?
Framedragger: mircea_popescu may be interested to read about how it happened. i think it was some developer-helper tool / linter / sth which showed an 'unused var'? and dev removed it. and broke
rng a111: Logged on 2014-05-29 17:55 asciilifeform: i really can't fathom the purpose of buying a mystery meat hardware
rng. if you're willing to eat mystery meat, why not use the vlsi turd found in current cpu?
thestringpuller: looking through my research there doesn't seem to be a conclusion to hardware
RNG thread
adlai: it should be ~unique each time you run the
rng, but if your 'entropy' source is a piece of data (public key), doesn't your
rng turn into a p-
rng?
a111: Logged on 2016-09-27 16:39 mircea_popescu: this doesn't matter so much, future cryptosystem will be made on the basis of
rng ;
rng can work with pubkey as entropy source.
mircea_popescu: J.sign("Here's the laydown : 1. rsa got fucked, this is the process to exrtract privkey from pubkey ; 2. message so-and-so on deedbot was creating by so-hashing this salt and this pubkey ; 3. this here key J was created by using cryptoisystem ? with
rng = privkey.K, which guarantees i am the one that made it ; 4. please use this here J' in future")
mircea_popescu: this doesn't matter so much, future cryptosystem will be made on the basis of
rng ;
rng can work with pubkey as entropy source.
☟︎ mircea_popescu: thinking being that if the all-xored-with-key packet is specifically known, observer has some advantage in detecting underperforming
rng ; but if it's not known then not so much.