778300+ entries in 0.436s

cads: we know she knows how
to cum
benkay: just about a
third of
the rentalstarter ipo.
benkay: btw
that mpex
trade, like 74 btc?
cads: The first volunteer is stoya
the porn star
cads: it
takes dedication
to do
that
cads: Unseen under
the
table
the photographer's lovely assistant is working away with
the apparently supernaturally effect hitachi vibrator.
mircea_popescu: but!
that said orgasm distraction is certanly a fun game.
mircea_popescu: i'd guess about 35% of adult females can actually orgasm in
the situation described.
cads: mircea_popescu:
the idea is
that an unpaid woman sits at a
table and opens up a famous literary work she chose, begins
to read a key passage, starts having and orgasm, continues
trying
to read, climaxes, and
then closes
the book and says "I'm ____ and
this has been moby dick"
cads: no, absolutely
the same stoya
cads: I'm questioning
the feminist merit if only because I still enjoyed
the work with a very male gaze :D
cads: "Hysterical Literature is a video art series by NYC-based photographer and filmmaker Clayton Cubitt. It explores feminism, mind/body dualism, distraction portraiture, and
the contrast between culture and sexuality. (It's also just really fun
to watch.) "
benkay: everything's part of
the point i suppose
benkay: of course
the woman's response is "i hate
the essay!"
benkay: thanks for
that cads. babe and i just watched stoya's. a+
cads: asciilifeform: you say
that we want
the 'opposite' of rsa (public decrypt, private encrypt), but...
this is just
the same as giving
the public
the private key and keeping
the public one secret.
cads: I know bitcoin's scheme allows us
to derive a public key from
the private one, and
that
this is actually not
typical.
cads: The only detail I am not sure is about
the private -> public derivability of
the keys.
cads: and G is decryption with
the corresponding private key (which is included on
the chip). It's a bit of an inversion of control of
the intention of public key systems but it works for our purpose.
cads: anyways - asciilifeform I understand
that. Ie, say we have
two functions F and G such
that G(F(x)) = x and F(x) is in some sense independent of x.
Then (F, G) is a basic kind of cryptosystem, where F is
the encryption function and G is
the decryption function. For us not
to be able
to derive F from G, G must be infeasible
to invert. I believe F can be encryption with a public key (which in
this case
the designer will keep public),
cads: I felt a bit
too vouyeristic while watching
to watch all of
them, but it was enjoyable
cads: I liked
the essays
too
cads: I
thought it was really cute
cads: like, actual passages of cool literature like clockwork orange, sitting fully dressed at a
table, while something undeniable is going on /under/
the
table
cads: typically
the decryption key allows us
to derive
the encryption key via number
theoretic properties
cads: is
this
to say
the encryption _key_, can not be derived from
the decryption key?
cads: asciilifeform: I'm confused as
to
the sense in which
the encryption algorithm cannot be derived from
the encryption algorithm
benkay: dang asciilifeform you're a
taskmaster
cads: asciilifeform: in
that case couldn't we say
the same of hashing? Although I admit. Putting
the decryptor somewhere in
the main flow of
the system has panache, and I wouldn't be surprised if a similar approach hashing is a lot less natural.
mircea_popescu: but if you "interwoven" on nyse
the sec will put your head on a pike on columbus ave.
Jere_Jones: And
they do get executed after
the order
that dropped
the price? Not interwoven?
benkay: is
there a ranking of purely crypto exchanges by vol?
mircea_popescu: stop losses are usually offered as a best-effort
thing, not as a guarantee
Jere_Jones: stop a loss if
the market is relatively shallow. Am I misunderstanding something?
Jere_Jones: How does an exchange
that implements stop losses prevent a large order from crashing
the market? If a large order comes in and wipes out
the orderbook past serveral stop losses,
those sells get executed after
the large order right?
They don't get interwoven with
the large order? Interwoven seems harder
to do and/or incorrect and/or unethical.
That means
that a stop loss can't actually
mircea_popescu: <asciilifeform> implication is
that
this achieved something more
than one can get by merely hashing & signing code. << fwiw i don't believe it does or could.
cads: ... assuming you have a scanning
tunneling electron microscope lying around.
cads: just burn some of
the
traces on
the bootstrap chip and suddenly it loads your unencrypted code just fine
cads: there's a million ways
to subvert either
cads: For you cannot re-encrypt
the code.
cads: But once doing
that, say you want
to alter
the code. You can't do
that.
cads: To do
that you read
the bootstrap key.
cads: You can decrypt
the existing operating system.
mircea_popescu: makes
this observation how
the only sort of people who seem
to
trive in his dystopia are bug-like
cads: so joseki is a
two part encryption decryption function E, D such
that in some sense "the encryption algorithm is not
the same as, and cannot be deduced from,
the decryption algorithm."
Mats_cd03: i watched
the aviator so yeah i can pretend like i know what youre
talking about
benkay: once upon a
time it smelled like blood and money.
ozbot: Exceptionalismul personal pe
Trilema - Un blog de Mircea Popescu.
Mats_cd03: Complicated
technical gibbering, mundane, cryptodongs, etc
cads: right
that would surely give
the game away for most
things
cads: wait how do we implement
the order relation on
the ciphertext version of
the data
ozbot: Paillier cryptosystem - Wikipedia,
the free encyclopedia
cads: right, I guess
to jump from homomorphic encryption
to obfuscated computation is a natural one.