asciilifeform: but also has effect of making dispensing with libc a reasonably easy proposition
asciilifeform: this is mainly to build later for microcontroller that just has uart, no file system
asciilifeform: i have 'p' structured such that all it wants i/o-wise is a 'getbyte' and 'putbyte' that operator can replace with whatever☟︎☟︎
asciilifeform: all it really wants libc for is memcpy() etc. and i/o. total of maybe 6 functions. they really ought to be a separate asm thing, linked optionally and separately.
asciilifeform: ( fwiw ada makes it reasonably possible to avoid needing ANY libc. but this is for laters. )
asciilifeform: but root is the same -- surplus people.
asciilifeform: for some reason modern-day lizards prefer that surplus people slowly goring themselves, rather than cleanly blowing one another with mortar and cannon
asciilifeform: dope ain't new. goring had his morphine and equally ineffectual cock
asciilifeform: 'Murray Edwards College combines real academic excellence with strong pastoral support, as well as being a place where you can feel at home.'
asciilifeform: 'Murray Edwards is a Cambridge College for women. With so much gender inequality still in the world there is a role for a College able to focus on outstanding young women, their learning and skills for life.'
asciilifeform: btw maybe 19 in 20, at this point, papers in 'crypto' are of this type. i.e. having exactly as much to do with genuine crypto as that caterpillar with the snake face has with actual snake.
asciilifeform: e.g., trump, with his 'encrypted chat' on ipnoje that leaks every fart
asciilifeform: keybasetronic 'crypto' is interesting parallel to, e.g., prb. in both cases the muppetmasters get to rejoice over 'user count' but weep when realizing that nobody of any import is in this count, and the net loot sums to 0
asciilifeform: so nao naturally they'd like to trick some idiot, somewhere, into using their pre-indexed fauxotp as an otp...
asciilifeform: the real usgtronic gem here is that there's massive existing investment in 'this is a transform of SOME dna sequence, SOMEWHERE, now tell me which' hardware☟︎
asciilifeform: but instead of cheap book, use expensive and usg-indexed dna collections, yes
asciilifeform: this is == to the 18th century 'book cipher'
asciilifeform: hort identification numbers of the DNA sequences in the database. It is crucial to store the unique secure key in a highly reliable carrier and transmit it through a special secure channel to guarantee the correctness of the secure key'
asciilifeform: 'The advantage of this method is that a binary random sequence of any length can be easily generated from public or private genetic databases. An unlimited number of distinct random sequences can be obtained by multiplexing, shifting or concatenating sequences from different DNA species. To solve the major drawback of the OTP cryptosystems, key storage and transmission, Borda et al. proposed communicating the secure key through the s
asciilifeform: ( summary : ustards are fixated on 'escrowable' ciphers, as they were called in 1990s, but today they do not use the word . i.e. schemes for getting your privkey to be something THEY can access on a whim )