log☇︎
778300+ entries in 0.436s
cads: we know she knows how to cum
benkay: just about a third of the rentalstarter ipo.
benkay: btw that mpex trade, like 74 btc?
cads: The first volunteer is stoya the porn star
cads: it takes dedication to do that
cads: Unseen under the table the photographer's lovely assistant is working away with the apparently supernaturally effect hitachi vibrator.
mircea_popescu: but! that said orgasm distraction is certanly a fun game.
mircea_popescu: i'd guess about 35% of adult females can actually orgasm in the situation described.
cads: mircea_popescu: the idea is that an unpaid woman sits at a table and opens up a famous literary work she chose, begins to read a key passage, starts having and orgasm, continues trying to read, climaxes, and then closes the book and says "I'm ____ and this has been moby dick"
cads: no, absolutely the same stoya
benkay: maybe the same stoya?
cads: I'm questioning the feminist merit if only because I still enjoyed the work with a very male gaze :D
cads: "Hysterical Literature is a video art series by NYC-based photographer and filmmaker Clayton Cubitt. It explores feminism, mind/body dualism, distraction portraiture, and the contrast between culture and sexuality. (It's also just really fun to watch.) "
cads: mircea_popescu: you must watch this: http://hystericalliterature.com/stoya/
mircea_popescu: benkay stoya, the whore ?!
asciilifeform: what kind of exercise would this be if the answer involved only this.
benkay: everything's part of the point i suppose
benkay: maybe the point
benkay: wtf not the point
benkay: of course the woman's response is "i hate the essay!"
benkay: thanks for that cads. babe and i just watched stoya's. a+
cads: asciilifeform: you say that we want the 'opposite' of rsa (public decrypt, private encrypt), but... this is just the same as giving the public the private key and keeping the public one secret.
cads: I know bitcoin's scheme allows us to derive a public key from the private one, and that this is actually not typical.
cads: The only detail I am not sure is about the private -> public derivability of the keys.
cads: and G is decryption with the corresponding private key (which is included on the chip). It's a bit of an inversion of control of the intention of public key systems but it works for our purpose.
cads: anyways - asciilifeform I understand that. Ie, say we have two functions F and G such that G(F(x)) = x and F(x) is in some sense independent of x. Then (F, G) is a basic kind of cryptosystem, where F is the encryption function and G is the decryption function. For us not to be able to derive F from G, G must be infeasible to invert. I believe F can be encryption with a public key (which in this case the designer will keep public),
asciilifeform: (somewhat less trivial if you want actual security, rather than a passing exam score, however)
asciilifeform: but the practical application of the known building blocks is quite trivial.
asciilifeform: i'll poke him when i visit him on tuesday.
mircea_popescu: so get him to come over!
cads: I felt a bit too vouyeristic while watching to watch all of them, but it was enjoyable
cads: I liked the essays too
cads: I thought it was really cute
cads: like, actual passages of cool literature like clockwork orange, sitting fully dressed at a table, while something undeniable is going on /under/ the table
asciilifeform: bureaucrats probably came in their pants, they hate the chore of key distribution, etc
asciilifeform: but one could conceive of F' being the key itself
asciilifeform: cads: with some 'hardness assumption' in the way of practically accomplishing this, yes.
cads: typically the decryption key allows us to derive the encryption key via number theoretic properties
asciilifeform: you have turds of a certain number-theoretical variety, that turn into plaintext when subjected to function F. F(turd) = plain. but you don't know F'(plain) = turd.
cads: is this to say the encryption _key_, can not be derived from the decryption key?
cads: asciilifeform: I'm confused as to the sense in which the encryption algorithm cannot be derived from the encryption algorithm
asciilifeform: not like this is hard or anything.
benkay: dang asciilifeform you're a taskmaster
asciilifeform: so you want something opposite to 'rsa'
asciilifeform: cads: idea probably was, you'd like to block-cipher the blob, but don't want to send a symmetric key (however contained) into the field.
cads: asciilifeform: in that case couldn't we say the same of hashing? Although I admit. Putting the decryptor somewhere in the main flow of the system has panache, and I wouldn't be surprised if a similar approach hashing is a lot less natural.
asciilifeform: we'll know when an american Mitrohin or Rezun lifts the specs.
Jere_Jones: That sounds less than pleasant.
mircea_popescu: but if you "interwoven" on nyse the sec will put your head on a pike on columbus ave.
Jere_Jones: Didn't think so. Thanks.
mircea_popescu: there's no such thing as "interwoven"
Jere_Jones: And they do get executed after the order that dropped the price? Not interwoven?
benkay: is there a ranking of purely crypto exchanges by vol?
mircea_popescu: stop losses are usually offered as a best-effort thing, not as a guarantee
Jere_Jones: stop a loss if the market is relatively shallow. Am I misunderstanding something?
Jere_Jones: How does an exchange that implements stop losses prevent a large order from crashing the market? If a large order comes in and wipes out the orderbook past serveral stop losses, those sells get executed after the large order right? They don't get interwoven with the large order? Interwoven seems harder to do and/or incorrect and/or unethical. That means that a stop loss can't actually
asciilifeform: cads: J. was devised for some unknown, godforsaken 1980s silicon. perhaps it sat the decryptor between the memory bus and cpu proper
mircea_popescu: <asciilifeform> implication is that this achieved something more than one can get by merely hashing & signing code. << fwiw i don't believe it does or could.
cads: ... assuming you have a scanning tunneling electron microscope lying around.
asciilifeform: even predominated. Actually, so far as he could judge, the majority of people in Airstrip One were small, dark, and ill-favoured. It was curious how that beetle-like type proliferated in the Ministries: little dumpy men, growing stout very early in life, with short legs, swift scuttling movements, and fat inscrutable faces with very small eyes. It was the type that seemed to flourish best under the dominion of
asciilifeform: "On the far side of the room, sitting at a table alone, a small, curiously beetle-like man was drinking a cup of coffee, his little eyes darting suspicious glances from side to side. How easy it was, thought Winston, if you did not look about you, to believe that the physical type set up by the Party as an ideal-tall muscular youths and deep-bosomed maidens, blond-haired, vital, sunburnt, carefree - existed and ☟︎
cads: just burn some of the traces on the bootstrap chip and suddenly it loads your unencrypted code just fine
cads: there's a million ways to subvert either
asciilifeform: implication is that this achieved something more than one can get by merely hashing & signing code.
cads: For you cannot re-encrypt the code.
cads: But once doing that, say you want to alter the code. You can't do that.
cads: To do that you read the bootstrap key.
cads: You can decrypt the existing operating system.
mircea_popescu: makes this observation how the only sort of people who seem to trive in his dystopia are bug-like
cads: so joseki is a two part encryption decryption function E, D such that in some sense "the encryption algorithm is not the same as, and cannot be deduced from, the decryption algorithm."
mircea_popescu: no, but he described the type.
asciilifeform: mr. o blamed the telegraph
mircea_popescu: then orwell's bugmen took over.
mircea_popescu: people were cool from circa 1600 to about ww1.
TestingUnoDosTre: lies. when was that?
Mats_cd03: i watched the aviator so yeah i can pretend like i know what youre talking about
asciilifeform: but if you want a better smell, you'll need a time machine.
asciilifeform: if you're exceptionally lucky, it smells like the hangar where howard hughes farted in '72.
benkay: once upon a time it smelled like blood and money.
mircea_popescu: i do not make the mistake of positing it's romanian!
ozbot: Exceptionalismul personal pe Trilema - Un blog de Mircea Popescu.
mircea_popescu: ;;google trilema exceptionalismul personal
asciilifeform: somebody ought to stoke one with this channel log.
Mats_cd03: Big words followed by math things
asciilifeform: something like that
asciilifeform: page was zapped some time ago.
asciilifeform: nsa cryptosystem, circa 1980s. implied to function on this principle.
Mats_cd03: Complicated technical gibbering, mundane, cryptodongs, etc
asciilifeform: wiki used to have a page on 'joseki' (not to be confused with the Go players' term)
cads: right that would surely give the game away for most things
asciilifeform: cads: not so simple. you can't have the machine actually branch in any obvious sense
cads: wait how do we implement the order relation on the ciphertext version of the data
asciilifeform: (verified to do what you intended it to.)
asciilifeform: because the result can never be verified.
asciilifeform: you are forever doomed to trust the mechanism whereby you generated the cryptoturd.
asciilifeform: unless you are carrying out the compilation with paper and pencil,
asciilifeform: one neglected aspect of homomorphic turdcraft (let's assume that it were possible and practical in some general-'enough' case! for the sake of argument) is:
ozbot: Paillier cryptosystem - Wikipedia, the free encyclopedia
cads: right, I guess to jump from homomorphic encryption to obfuscated computation is a natural one.
asciilifeform: cads: i reinvented the concept, as probably just about every maths student has, when first reading about Paillier's Addition and thinking 'what if you glue this to OISC - 'jump if zero' - machine.