540900+ entries in 0.309s

mircea_popescu: "Their most absurd suggestion
turned out
to be surprisingly close
to
the
truth:
that it must have been some website we visited."
phillipsjk: I do play in
the Bitcoin forum...Though it was like 2-3years before I actually bought any.
phillipsjk: I was asking support questions. I normally avoid
that forum.
mircea_popescu: i always assumed
those
things are just pure astroturf grown out of a misguided attempt
to "be online' of various corps.
mircea_popescu: phillipsjk you know you might be
the first guy of your kind i ever met. so, you're on some isp's forum because... it's your isp ? and i suppose on
the mazda forum if/when driving a mazda and so on ?
mircea_popescu: kakobrekla can
there be a page with a list of l2 fingerprints ?
jurov: ideal? just having api
that i can pull keys of l2 members directly from and is never down?
jurov: step 5 would be
to check if sender is in l2
jurov: i described
these 4 steps above
jurov: 1. i don't have slaves
to write
the parser for me
mircea_popescu: jurov i still don't see why you'd process
the dump as a myslq
mircea_popescu: asciilifeform
their possession is a blessing for whoever's not doing it : costs more
than it produces.
jurov: mircea_popescu: verifying is another problem. i can do
that by hand
mircea_popescu: asciilifeform no, not so.
the better comparison is you saying " winblows user walking
to pgp is somewhat like a virgin playing pensively with a fat cucumber. she isstill a virgin."
mircea_popescu: jurov one problem is... if
this were on a webpage what exact use would it be ?
mircea_popescu: asciilifeform well at least he's perambulating in
the generally right direction...
phillipsjk: DSA is assumed
to be weak because 768bit RSA primes have been publicly factored.
mircea_popescu: was dsa
the one we were not using because we suspect it comes with a nsa hole from
the get go or am i confusing my sas ?
phillipsjk: The point of a new key is
that I am *assuming*
the NSA may be ably
to crack 1024bit dsa, but I am not sure. I doubt anybody else can do it.
mircea_popescu: pete_dushenski: c'est mieu ? << mieux.
the x, like
the h, and
the e, and everything else in French including
the French
themselves, is silent.
phillipsjk: ben_vulpes, if you miss issuing a new key, you may still want
to sign with an expired key
to prove you know
the secret.
mircea_popescu: asciilifeform: maslow's
thing had 'cooperation'? wat? << it keeps getting revised, it's a bona fide "golf club patter"
that
thing. always in step with
the emotional needs of a new generation.
mircea_popescu: but i've not yet got
through
the logs far enough
to figure wtf
the contention is so gimme a minute
jurov: but in
the future i potentially want
the
turdatron
to display wot nicks anyway
mircea_popescu: jurov jst saying, you don't have
to do any actual query on
the db. just grep it.
jurov: 3) and 4)
take care about ambiguous matches
phillipsjk: I have been questioning
the feature where you can change key expiry, but not do operations with expired keys. (Since i learned about it)
jurov: 4) rechecking
the dam sig
mircea_popescu: jurov but
this flaw of
the gpg protocol can't really be fixed at
the assbot elvel.
jurov: mircea_popescu: one cannot get full fingerprint out of gpg-signed stuff one get by email.
t was already discussed
mircea_popescu: asciilifeform: ^ from
the run-moar-winblows department << how
the hell does one check for backdoors. submerge in water an' blow ?
pete_dushenski: if
the qntra boys don't pick it up within an hour or so, i'll scoop it
jurov: so id ecided
to just pull whole db anyway
pete_dushenski: mircea_popescu:
this is
true but
there's some other writing i'm attending
to
mircea_popescu: jurov i
thought you could get json of anything anyway ?
jurov: kakobrekla anything
that can be parsed, not ran. csv, json,...etc
mircea_popescu: felipelalli: let me ask you guys another
thing <<< when using a broker, you necessarily undertake
that risk.
the way
to not undertake
the risk is
to have your own account.
assbot: Central Bank of Italy Declares Virtual Currency Exchanges Are Not Subject
to AML Requirements – Bitcoin Magazine ... (
http://bit.ly/1zgk6II )
pete_dushenski: italian fiu: "The FIU states
that businesses dealing in virtual currencies, including holding
them and exchanging
them for fiat currencies, are not required
to comply with any AML/KYC regulations."
kakobrekla: i can give you a different format, seems like you are
the first
the use
the
thing.
jurov: kakobrekla, but please confirm you're aware
that by choosing mysqldump format, it can't be parsed but must be piped into mysql which is practically
the same as piping into /bin/sh
mircea_popescu: submission is cooperation, just, functional.
the sort of cooperation you have in mind is simply not found in nature is all.
☟︎ jurov: kakobrekla
that wouldn't help
teward: phillipsjk: well
that's not uncommon - and if anyone
tried
to DDoS me,
they'd hit my VPS not me, and
that's DDoS-filtered
phillipsjk: I slightly related news, apparently I can put whatever files I want on my web-host. Was working under
the assumption I had at least 100MB of space. Apparently it is 25GB. (I essentially chose my own price-point since anything more
than 25MB may as well be infinite for my e-mail and web-site.)
phillipsjk: teward, I found my first DDOS kind of exciting.
The cloak works so far. Apparently people will DDOS live-streaming gamers for lulz as well.
kakobrekla: idk, i could make it announce new shasums in chan and you parse logs
then
jurov: kakobrekla: so i'm
to connect
to irc from my wot sync script, srsly?
phillipsjk: I my write-up on
the Shaw forums, I included a caution about
that.
phillipsjk: asciilifeform, I was running it from a LiveCD. But yes,
those captures may be potentially harmful.
teward: phillipsjk: just
TARPIT everything
phillipsjk: The UDP flood sample was after I let
the previous attack drop
to dial-up rates,
then briefly reconnected.
teward: AFAIK
they're all patched, but I haven't watched wireshark upstream like a hawk
teward: asciilifeform: depends on
the rev you're on
phillipsjk: I finally have DDOS samples up. Apparently
the attack mode switched at some point. I was not able
to determine exactly when because my machine lacks
the RAM
to load
the entire packet capture in wirkeshark.
pete_dushenski: i'll admit, it was a bit odd having all my
thoughts in
the footnotes... i'm just not sure
that
this is cleaner
to read.
phillipsjk: asciilifeform, 4 of
the 5 categories use
the
term "domination"
nubbins`: cracked open a firmware update image, might be something
to
this
ben_vulpes: pete_dushenski: if you're just going
to annotage logs at least have
the commentary arrayed neatly around
the source material like
the rest of
the
talmudic publications
felipelalli: !rate jurov 1 "coinbr.com owner, great job, I
trust him."
felipelalli: jurov: just now I noticed "they" are actually "you". :)
Thanks.
felipelalli: actually
they (CoinBr.com) hold
the shares for me in CoinBr MPEx account, isn't it? Just
to know if I am missing something.
jurov: felipelalli: also, what happen if MPEx just go bankruptcy (or disappear)? Same
thing.
mike_c: felipelalli: ^
that is your protection against coinbr disappearing.