59000+ entries in 0.356s

a111: Logged on 2017-07-19 13:21 ave1: of clean gcc 4.9.4 from FSF to
a gcc 4.9.4 that build with musl + gnat
a111: Logged on 2017-07-15 18:18 mircea_popescu: war makes the only thing peace never can, that is -- empty space. the value of empty space varies, from negative after
a war to infinite during socialism.
a111: Logged on 2017-07-19 16:35 asciilifeform: i only know him as
a steady source of disconnectolade rubbish
a111: Logged on 2017-07-19 17:43 mircea_popescu:
a that's unfortunate. woman went into mountain, watcher her 6 kids starve to deaths.
mircea_popescu:
a that's unfortunate. woman went into mountain, watcher her 6 kids starve to deaths.
☟︎ mircea_popescu: curie happened as the domestic slave of
a male ; not as an "equal partner" in
a lesbo partnership.
trinque: or tell me, is the public chiming in re: phuctor? doesn't seem like such
a thing cares, if it exists
trinque: asciilifeform: the original claim was there is no longer
a "the public"
a111: Logged on 2017-06-12 18:10 mircea_popescu: absolutely never licensing any of this. people wish to contribute, they get to participate, not to "just like bitcoin with
a little bit of censorship" bullshit.
mircea_popescu: you can't actually find
a case where anyone has any legitimate complaint against the world. hasn't, yet, happened.
mircea_popescu: that was, since i was
a wee tyke, the one fascinating, ceaselessly fascinating aspect of the world : that for all teh chagrin and professed despair and broken dreams hopes and aspirations etcetera
daffadil: Haha yes. As the paper currently presents, the system is not built for privacy, especially if it uses publicly-indexed databases. However I thought that the idea of using mutational randomness as
a physical process to generate private keys was interesting.
mircea_popescu: even in the particular that literacy is reserved for
a precious few.
a111: Logged on 2015-04-02 14:59 asciilifeform: 'Identity-based encryption is
a type of public-key encryption in which any arbitrary string (such as
a users email address) can be used as
a public key, enabling data to be protected without the need for long, randomly generated keys or certificates. Today, there are numerous standards for IBE based on Bonehs work, including IEEE P1363.3 and several IETF RFCs.' << from the press release.
ave1: of clean gcc 4.9.4 from FSF to
a gcc 4.9.4 that build with musl + gnat
☟︎ ave1: p.s I already have
a musl build for x86_64 (based on musl_cross) (works on adacore stuff and gcc-4.9.4), but is needs some more work
ave1: then you have
a gcc you can build
ave1: p.s. I want to throw it out, but I like to have
a version that cross compiles to ppc64le
ave1: I can build
a gnat using the sources from adacore and all is fine
lobbes: BingoBoingo: <lobbes> damn. looks like my plans for my old craptop being
a trb node will have to wait until I secure better iron. << Why can old craptop not eat SSD? << wtf I didn't even consider this. And yeah, this'll be
a great opportunity to clean out the physical crap that's probably choking out the airflow in the thing.
BingoBoingo wonders how reactive
a hand santizer would have to be to reliably convert most organic compounds to "safe" forms. Likely would look like
a hand solving vat of H2SO4 + H2O2
mircea_popescu: "i'm not only
a virgin, but i never laid
a hand on my slit" comes with
a smegma guarantee.
mircea_popescu:
a sentiment i can sympathize with -- no better way to ruin the day of cleanfreak chick than making her open up her years-old laptop.
BingoBoingo: <lobbes> damn. looks like my plans for my old craptop being
a trb node will have to wait until I secure better iron. << Why can old craptop not eat SSD?
BingoBoingo: <sina> whenever DPR does
a thing, Vizzini is forced to say "Inconceivable" << Except irl, mircea_popescu is not short and DPR sits in sodomy box while mircea_popescu's muscle has titties
lobbes: damn. looks like my plans for my old craptop being
a trb node will have to wait until I secure better iron.
lobbes: in other questions: Prompted by up-stack threads and after much log reading I've concluded that
a SSD is
a must for trb-ing. Would an external usb SSD be adequate, versus, say
a SATA connection?
mircea_popescu:
http://btcbase.org/log/2017-07-19#1686438 <<< yes, because you're applying the pretense of statics to
a dynamic situation. trinque 's metaphore is very much factual : we were paradopped on hot coals, by the FAULT, inexcusable, and indelible, of our parents. they should have taken care that we do not get dropped on hot coals, as children barely able to move. they did not, and derelict in their first and practically speaking on
☝︎☟︎ a111: Logged on 2017-07-19 00:47 sina: feel free to say "it's
a dumb question, go away"
hanbot: lol this poor guy's been trying to have
a chuckle the last 20 mins...NOT ALLOWED!
sina: mircea_popescu: and yet it is so, the logs are the only place I can imagine such
a sentence being discussed today
a111: Logged on 2015-12-28 01:23 mircea_popescu: the dictum "never get involved in
a land war in asia" is mostly due to the fact that the portuguese were involved in
a sea war in asia, and it worked splendidly for them.
sina: "You only think I guessed wrong! That's what's so funny! I switched glasses while your back was turned! Ha ha, you fool! You fell victim to one of the classic blunders - The most famous of which is "never get involved in
a land war in Asia" - but only slightly less well-known is this: "Never go against
a Sicilian when death is on the line"! Ha ha ha ha ha ha ha! Ha ha ha ha ha ha ha! Ha ha ha... "
sina: whenever DPR does
a thing, Vizzini is forced to say "Inconceivable"
a111: Logged on 2017-05-16 19:52 mircea_popescu: romania incidentally has
a long history of just this, it's called fanarioti period. hundreds of groups over 3-4 centuries did just this, kept taking over because pissed off with insolence of ex crown. discovered worse deal to be king.
sina: also
a famous internet meme
sina: mircea_popescu: only as
a matter of curiosity, given your worth re above statement, do you take any of these actions?
mircea_popescu: 3) get
a n-p detector, armed guards, your own spying machinery, declare interdiction zones, etcetera.
mircea_popescu: 2) get
a proper power supply. this means -- that the power line should feed
a battery, not your machine. you can measure leakage if you will, so this can be tweaked by hand to an arbitrary level.
mircea_popescu: otherwise, in order of cheapness-effectivity : 1) get an isolated box for rsa ops. this shouldn't ever connect ot the internet. stuffing into it
a stick which was in
a net-connected machine counts.
sina: mircea_popescu: if that is
a complete list, then I am content with
a useful answer.
mircea_popescu: the costs of mitigation ever mount, which is why
a proper solution is even contemplated.
mircea_popescu: sina> just, hopefully
a list of adversary capability mapping to outcomes << anyone who can listen in (ie, intercept acoustic band) within
a mile or so of your machine, can derive your key that way. anyone who can measure your power draw (say, up to the pole) can derive your key that way. anyone who can route to your box, and measure delays, can idem.
sina: "today, until
a constanttime solution is in place, gpg is the tool of choice for RSA encryption. any time you use it, you can't know whether you have completely compromised your private key. and we use it anyway."
trinque: and it wasn't
a specific example
trinque: absent asciilifeform's expertise which gave ^ as output, one'd just turn that into
a totem
sina: and so it is, "do not encrypt 500 cake recipes
a second"
sina: trinque: of course! and I ask, is there no value in understanding the consequences of
a given act?
trinque: sina: never been in
a situation where you both had to act and there were no good options?
sina: again to reiterate I seek only understanding, not to make
a point or argument
trinque: if standing on hot coals, I bet you'd run even though you'd only step on more coals, at least for
a while.
sina: it's not an argument, only the next thought that pops into my head as
a consequence of the discussion. all here seem on the same page re constanttime stuff, yet all here are using the tool in spite of that, so there must be some thought process which allows someone as reasonably paranoid as asciilifeform to do so, i.e. "I am not concerned with timing attacks of class X, Y, Z from adversary
A, B,C when I
sina: trinque: given the quoted statement, what are the implications? for example, does it imply that
a passive network adversary will not be in
a position to mount
a timing attack? or does it so?
a111: Logged on 2017-07-19 00:40 asciilifeform: sina: the practicalities are - that every time you unholster your gpg key, you broadcast
a few bits of it.
sina: I ask here, because I feel here can give
a useful answer
sina: feel free to say "it's
a dumb question, go away"
☟︎ sina: trinque: my question being, given
a sina sitting in the crater, what is the list of things ~impervious to, what is the list of things not
trinque: "yes things are that bad. have
a great day!"
sina: trinque: to extend your analogy. you are on
a field, in
a crater. you are ~impervious to horizontal machine gun attack thanks to the crater, but vulnerable to mortar attack
trinque: that you are on
a field being mortared does not mean you've discounted the enemy
sina: asciilifeform: "you cannot conceal an awl inside
a sack" understood and accepted