log☇︎
75600+ entries in 0.682s
BingoBoingo: mircea_popescu: Truly.
BingoBoingo: <mircea_popescu> you confuse two unrelated things. thieves do not steal the brickwork but leave it behind for similar reasons. << And this is the warning flag Ferguson is a special failure. Theives steal the bricks.
BingoBoingo: <mircea_popescu> if one scales shit linarily, a 20mb block would be verified by this machine in 560 seconds, or just a shade under 10 minutes << Welcome to my world
decimation: https://en.wikipedia.org/wiki/Fall_of_Saigon#/media/File:Saigon-hubert-van-es.jpg
BingoBoingo: !up gabriel_laddel
assbot: Logged on 03-06-2015 03:25:03; mircea_popescu: "If your system's date and time are too far off (typically by months or years,) then it may prevent Portage from properly downloading source tarballs. "
BingoBoingo: !up gabriel_laddel
BingoBoingo: mircea_popescu: Doing dumbell rows to get the strength to get to chinups/pullups. In the interim cutting weight to make that stuff easier.
mod6: gabriel_laddel: ok thanks for the heads up
trinque: gabriel_laddel: PSA that deedbot likes to eat manifests
mircea_popescu: gabriel_laddel if you're going to be doing code preservation you prolly want to hash and deed like i did on the eulora binaries for nvidia drivers.
mod6: gabriel_laddel: werd. it /seems/ right. but like I said, maybe another look will tell the tale. i'll be checking it out more tomorrow.
gabriel_laddel: mircea_popescu: yeah, portage needs to die - 70k loc, python.
mircea_popescu: http://gabriel-laddel.github.io/Funtoo_Linux_Installation.htm aha.
assbot: Logged on 03-06-2015 00:40:32; alphonse23_: I've actually been meaning to start using a key locker or something
gabriel_laddel: mircea_popescu: still don't have funding, but coming along
mircea_popescu: gabriel_laddel how's the os business.
BingoBoingo: !up gabriel_laddel
asciilifeform: mircea_popescu: nah, the old netscape crud (from which we get 'mozilla' et al) is probably worse
asciilifeform: mircea_popescu: it is an ancient horror, yes
asciilifeform: mircea_popescu: note that typical derprogrammer likes to sit down on a soft cushion of 'it doesn't work because i surely made a small mistake', rather than the hard concrete of 'it is broken because i am illiterate' --- or the sharp pine stake of 'because i am a moron'
assbot: Logged on 02-06-2015 23:27:20; alphonse23_: does 4096 refer to the max size of one of the primes. or the primes multiplied togetheR?
asciilifeform: or to mircea_popescu's www
asciilifeform: l0l now we learn that mircea_popescu programs in turboc
mircea_popescu: alphonse23_ you read http://trilema.com/2015/on-how-the-factored-4096-rsa-keys-story-was-handled-and-what-it-means-to-you/ an http://trilema.com/2015/more-factored-rsa-keys-and-assorted-other-considerations/ i expect ?
asciilifeform: http://docs.adacore.com/sparkdocs-docs/Examiner_Ravenscar.htm
asciilifeform: mircea_popescu: the basic concept that must be understood is that c/cpp are entirely impossible to 'reason' about mechanically
assbot: Logged on 02-06-2015 22:27:24; ascii_field: at this point it probably makes sense to churn the entire sks db for tuples of keys having same userid and date, and diff all said tuples.
asciilifeform: mircea_popescu: the lulzy part is that it was -already- handled this way. only thing that will change (once anyone gets around to it) is a few lines in a spreadshit
asciilifeform: mircea_popescu: that was the item, yes
BingoBoingo: mircea_popescu: Confusing it with OpenSSL again
asciilifeform: mircea_popescu: that'd be openssl
assbot: Logged on 02-06-2015 21:52:56; ascii_field: http://log.bitcoin-assets.com/?date=02-06-2015#1151841 << embrace, extend, extinguish (TM) (R)
asciilifeform: mircea_popescu: see log for diff, incl. screenshot of visualdiff
mod6: <+mircea_popescu> mod6 was working on getting one together but im sure he can use help << yeah, certainly on testing. i bought a pos box to use to build a physical gentoo box guide. i messed up something now grub is unhappy. I havne't been able to take a decent look at it since sunday morning.
ben_vulpes: super_important_passwords.gpg
ben_vulpes: derpy_web_passwords.gpg
asciilifeform: alphonse23_: you already own a device for storing passwords. it is attached to your shoulders.
asciilifeform: alphonse23_: what is a 'key locker' ?
BingoBoingo: alphonse23_: Well you do now. The question is what are you going to do about it?
danielpbarron: !up alphonse23_
asciilifeform: alphonse23_: if someone else has a copy of your private key, whether because you let them generate it for you, or gave it up for storage for 'convenience', he can do anything which you can do. this ought to be obvious
williamdunne: alphonse23_: Its compromised if you a) generate your keys with them, or b) store your keys with them.
asciilifeform: alphonse23_: the very idea is braindamaged
trinque: alphonse23_: all they have to do is ship you some javascript once that reads that and transmits it elsewhere
asciilifeform: alphonse23_: if you let them generate it, they have it
danielpbarron: alphonse23_, the sites that keybase lets you link to your identity aren't really worth linking to your identity
asciilifeform: alphonse23_: except to keybase?
trinque: alphonse23_: if someone other than you knows your private key, it is by definition not private
asciilifeform: alphonse23_: for people whom you will never meet, 'you' are the key. and nothing else.
asciilifeform: alphonse23_: they all mirror one another.
asciilifeform: alphonse23_: there is a large and well-established network of public key servers. e.g., https://pgp.mit.edu and other sks
BingoBoingo: <alphonse23_> maybe though the issue is, where would one store a public key. on whose server << Ideally if you want people to find your public key you spray it all over, but especially spray it in venues associated with your identity.
trinque: alphonse23_: ever heard "if it's free, you're the product" ?
asciilifeform: alphonse23_: it is 'user friendly' in the same way that a mousetrap is mouse-friendly
asciilifeform: alphonse23_: if you let them generate keys for you, they have your private key. this ought to be elementarily obvious
asciilifeform: alphonse23_: it isn't one specific server, but a network of mirrors
asciilifeform: alphonse23_: instead we found that someone is uploading carefully modified versions of other people's keys to sks key server net
asciilifeform: alphonse23_: the idea is to find evidence of sabotaged implementations of rsa key generator.
asciilifeform: alphonse23_: basic idea, which is very old, is that euclid's greatest-common-divisor algorithm is very fast, for arbitrarily large numbers. so if two or more rsa keys were to share a factor, it will pop up.
asciilifeform: alphonse23_: 'phuctor' deals only with traditional rsa keys.
asciilifeform: alphonse23_: http://doc.sagemath.org/html/en/thematic_tutorials/numtheory_rsa.html << worked examples
asciilifeform: alphonse23_: http://mathworld.wolfram.com/RSAEncryption.html for example.
asciilifeform: alphonse23_: rsa is not especially complicated. you can understand the basic idea after an hour's study
trinque: alphonse23_: noob's not an insult
asciilifeform: alphonse23_: 'checking them all', given current of foreseeable technology, would take several thousand years.
williamdunne: http://en.wikipedia.org/wiki/Password_strength
williamdunne: alphonse23_: This might help you understand what the 4096 means
asciilifeform: alphonse23_: no. the size of the modulus, typically a product of two primes
asciilifeform: alphonse23_: author of 'phuctor' speaking. you had questions ? ☟︎
asciilifeform: alphonse23_: you still there?
asciilifeform: !up alphonse23_
BingoBoingo: alphonse23_: Once again http://nosuchlabs.com/stats uses euclid's greatest common divisor
BingoBoingo: alphonse23_: Well, if you want to be a dick you could use botnet slaves as IRC bouncer, but easier to leave an old machine on at home to bounce IRC. Black and white Macs are ideal
trinque: alphonse23_: yup, or run a second box at home
trinque: alphonse23_: yessir
BingoBoingo: alphonse23_: http://nosuchlabs.com/stats
trinque: ben_vulpes: make app icon! raise 15m! year later, raze your business!
trinque: alphonse23_: this is generally a "bouncer" you run elsewhere from your local computer
trinque: alphonse23_: dude, all clients log
trinque: alphonse23_: all clients do logs
trinque: alphonse23_: that irccloud thing seems like a turd
shinohai: !up alphonse23_
trinque: alphonse23_: note that this does not mean RSA in the abstract is broken
danielpbarron: !up E8888____
trinque: !up alphonse23_
gabriel_laddel: !up ascii_field
assbot: Trust relationship from user gabriel_laddel to user artifexd: Level 1: 0, Level 2: 0 via 0 connections. |http://www.btcalpha.com/wot/trust/?from=gabriel_laddel&to=artifexd | http://www.btcalpha.com/wot/user/artifexd/
jurov: ascii_field: neither url works
ascii_field: ;;later tell mircea_popescu https://pgp.mit.edu/pks/lookup?search=jbollstrom%40gmail.com&op=index << tell-tale duplicate submission. but not the usual 32-bit walk thing
ascii_field: ;;later tell mircea_popescu http://nosuchlabs.com/gpgkey/9EEA1A9FB9290DC70739E70AB8E97F3FC0DB67BAE16B955D5BF0AD92FF9D8B3E << NOT in magic set
asciilifeform: !up ascii_field
trinque: ascii_field: progress! this will cost far less. god bless the free market.
jurov: mircea_popescu you've got depositz :)
mircea_popescu: ascii_field easy to fathom tho. one of those rotten cases where the exemption is louder than the thing it covers.
trinque: mircea_popescu: lol
asciilifeform: !up ascii_field
jurov: https://www.schneier.com/blog/archives/2008/05/random_number_b.html
ascii_field: mircea_popescu: found it earlier, neat
mircea_popescu: ascii_field http://bookaspdf.com/the-sphinx-franklin-roosevelt-the-isolationists-and-the-road- to-world-war-ii.html