log☇︎
1400+ entries in 0.398s
assbot: Searching pgp.mit.edu for key with fingerprint: 551516687E08CB0D60CA4A56D9AEA7019BAAD3FE. This may take a few moments.
phf: mircea_popescu: you know it was just b-a of the 1800s. << i think of b-a as more of a stonemasone guild, then a fraternity. maybe in a couple of hundred years when b-a has hereditary wot ratings and ceremonial pgp keys that are not otherwise used for anything. the way i read that joke is that one has the trappings and the other has a trowel that is used for its direct purpose.
assbot: Logged on 06-08-2015 22:09:02; mircea_popescu: http://log.bitcoin-assets.com/?date=06-08-2015#1228030 << to expound on this for the log readership : it is not trivial but definitely feasible to cause any running implementation of asymmetric cryptography to leak key bits if it is possible to direct encrypted matter at it in an automatic fashion and have live access to the results somehow. this theoretical fact is practically verified for pgp, and
asciilifeform: no screwing with pgp separately, no untarring, etc.
mircea_popescu: if you are going to put something, put pgp. not pki, and in no case http for a stateful machine.
asciilifeform: pgp is just another one of those ancient workhorses that begs for the glue factory, but there is NO ALTERNATIVE to it
assbot: Searching pgp.mit.edu for key with fingerprint: 4A0363951AFA090B6C221787E2F23DB84A63EC22. This may take a few moments.
asciilifeform: btw, for anyone else contemplating pgp, the retardation really flows from the protocol
mircea_popescu: asciilifeform making a key server for a basically defunct implementation of pgp not really much of a priority
assbot: Please To PGP (Guide for Linux, OS X, Windows) | Contravex: A blog by Pete Dushenski ... ( http://bit.ly/1OvuPYi )
brg444: followed pete's guide here: http://www.contravex.com/2014/09/23/please-to-pgp-guide-for-linux-os-x-windows/ so 4096 RSA it is I believe
assbot: MIT PGP Key Server ... ( http://bit.ly/1OvuGUt )
brg444: *from there https://pgp.mit.edu/
brg444: yea. looking into that now but tbf this is sorta new to me. using this stupid gui and it doesn't seem to want to connect to pgp.mit.edu for some obscure reason.
assbot: No valid OpenPGP data found on pgp.mit.edu.
assbot: Searching pgp.mit.edu for key with fingerprint: 4A0363951AFA090B6C221787E2F23DB84A63EC22. This may take a few moments.
assbot: Searching pgp.mit.edu for key with fingerprint: 16C81597E76E86E6C01EF037AA4B3330F162C410. This may take a few moments.
ascii_field: and what's it mean to 'support' pgp ?
mircea_popescu: so facebook supports non-rsa-only pgp ? heh mkay.
cazalla: punkman, ya think as much as a single person uses that facebook pgp?
pete_dushenski: ok : bitcoin, pgp, web, text, youtube.
mircea_popescu: not like pgp has these notions.
assbot: Logged on 20-09-2015 23:09:19; adlai: pgp is just silly
shinohai: http://log.bitcoin-assets.com/?date=20-09-2015#1280502 <<< This is the perfect place for someone that perceives pgp as "silly". ☝︎
adlai: pgp is just silly ☟︎
adlai: there's no pgp key block, it's quoted :P
assbot: Logged on 18-09-2015 22:15:20; punkman: mats: punkman: if it was not clear, i am handrolling the pgp packet parser in python (watta mouthful). and not having a good time of it. << I think you might have to come up << you should probably throw out a bunch of idiocies contained in the canonical rfc
punkman: mats: punkman: if it was not clear, i am handrolling the pgp packet parser in python (watta mouthful). and not having a good time of it. << I think you might have to come up << you should probably throw out a bunch of idiocies contained in the canonical rfc ☟︎
mats: punkman: if it was not clear, i am handrolling the pgp packet parser in python (watta mouthful). and not having a good time of it.
assbot: Logged on 16-09-2015 13:29:47; punkman: "very interested to see what details (if any) emerge from @cryptomeorg regarding its supposed key compromise." Answer: "Suspects: Truecrypt, SCS in DC, PGP flaw, all the other usuals."
punkman: mircea_popescu: I'm sure meta-JY doesn't even use PGP for windows
punkman: "very interested to see what details (if any) emerge from @cryptomeorg regarding its supposed key compromise." Answer: "Suspects: Truecrypt, SCS in DC, PGP flaw, all the other usuals." ☟︎
assbot: Logged on 15-09-2015 20:25:14; anton_osika: mircea_popescu: you wrote the contract - the "long party" is the payer of the invoice". Nowhere does it state that the "long party" will need a PGP signature for payment. This is solely interpretation - and you are NOT paying for a future delivery contract. Do you have any rationale for this?
asciilifeform vaguely recalls mircea_popescu once expressed interest in the notion of a multi-pgp'd blog
assbot: Cryptome PGP Keys Compromised, Revoked : netsec ... ( http://bit.ly/1OWktOe )
BingoBoingo: Also lol considering qntra DDoS https://www.reddit.com/r/netsec/comments/3l3tt5/cryptome_pgp_keys_compromised_revoked/
anton_osika: mircea_popescu: Thanks for the letter but I can obviously not open it. Would you mind encrypting it to me? https://pgp.mit.edu/pks/lookup?op=get&fingerprint=on&search=0x2CB59FFA3AB7A3EE
deedbot-: [Qntra] Cryptome PGP Keys Compromised, Revoked - http://qntra.net/2015/09/cryptome-pgp-keys-compromised-revoked/
ascii_field: PGP Desktop 9.6.3 for Windows. << WIN
anton_osika: mircea_popescu: you wrote the contract - the "long party" is the payer of the invoice". Nowhere does it state that the "long party" will need a PGP signature for payment. This is solely interpretation - and you are NOT paying for a future delivery contract. Do you have any rationale for this?
assbot: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Payment of future delivery c - Pastebin.com ... ( http://bit.ly/1KdK2Hg )
anton_osika: mircea_popescu: you wrote the contract - the "long party" is the payer of the invoice". Nowhere does it state that the "long party" will need a PGP signature for payment. This is solely interpretation - and you are NOT paying for a future delivery contract. Do you have any rationale for this? ☟︎
anton_osika: There is a Kraken PGP key here that a lot of people that hold their trust (even in forms of assets) dearly to it . Those people would forever lose some of the trust for you.
mircea_popescu: <mats> otherwise it'd be meatfacebook << lol. it's either pgp or meat, baby.
assbot: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Future Delivery Contract Fo - Pastebin.com ... ( http://bit.ly/1QiQ39M )
shinohai: When you PM'd me and said you had your "PGP keys unprobabilistically stolen" I was left scratching my head.
mircea_popescu: anton_osika i don't understand what you think pgp sigs have to do with phuctor ?
anton_osika: In some chain of events however unlikely any of you would lose your PGP identities.
nubbins`: or would you like for contracts signed with your pgp key to only be resolved via that same key?
assbot: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Future Delivery Contract Fo - Pastebin.com ... ( http://bit.ly/1QiQ39M )
mod6: just busted into your place? did they get a copy of your PGP key?
mod6: bring ur pgp key next time! :]
asciilifeform: analmaster: dig up your pgp key!
asciilifeform: shinohai: please consider using a civilized pgp key in the future
asciilifeform: BingoBoingo: what is the purpose of this? i mean, you can transmit a pgp sig and post the disk
ascii_field: surely mircea_popescu knows that usg (esp. .mil) makes heavy use of an internal tard pgp by microshit
BingoBoingo: <gabriel_laddel> trinque: I have a listing of programs associated with my PGP identity, you can make references to them, and people will be able to see them (or not) based on my trust relationship with them... << It is essential for WoT to exist that I can safely point at the enemy's words and bury them in sulfur
gabriel_laddel: trinque: I have a listing of programs associated with my PGP identity, you can make references to them, and people will be able to see them (or not) based on my trust relationship with them. Your "references" can be any arbitary computation, buut probably some standards will evolve (e.g., we don't check sexprs who pass some test of being a plist of the structure (:name ... :version ...)).
gabriel_laddel: trinque: PGP identity with a list of programs to run.
ascii_field: 1) did you ungzip it 2) did you verify my pgp sig
ascii_field: and make sure my pgp sig verifies.
pete_dushenski: mats: but how comes the pgp keyserver ? will it also be zany ?
ascii_field: find your pgp key
pete_dushenski: be a secret agent, use pgp (tm)
assbot: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Future Delivery Contract Fo - Pastebin.com ... ( http://bit.ly/1QiQ39M )
assbot: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Future Delivery Contract Fo - Pastebin.com ... ( http://bit.ly/1QiQ39M )
asciilifeform: The difference: it is legally binding under .EE law. Not like the loose PGP.'
asciilifeform: http://arstechnica.com/business/2015/08/im-now-an-estonian-e-resident-but-i-still-dont-know-what-to-do-with-it << a related lul from same fishwrap. mandatory non-pgp signatures in whole muppet country, aha.
pete_dushenski: http://log.bitcoin-assets.com/?date=03-09-2015#1261305 << figuring out rotor, hell even pgp, was markedly more challenging. i'd put 'nappy ☝︎
ascii_field: ^ from my reading, this had a very real chance of destroying the non-pgp contract as even a theatrical production
ascii_field: see the discussion of pgp key timestamps some months back
assbot: Searching pgp.mit.edu for key with fingerprint: D1702BB1EE057FAA3ED134AA922837F6B1FC09A3. This may take a few moments.
mats: the rfc defining pgp packets makes my brain hurt
asciilifeform: 'this program may be redistributed provided that 1) this notice and 2) the original copy of $program, with my pgp signature thereof - are included; and any changes you made to $program must be represented in the form of a vdiff patch signed with a pgp key registered in the Web of Trust.'
assbot: Searching pgp.mit.edu for key with fingerprint: 6310C4E0B0E97287A3CFEBAD8515F76EADCFD13C. This may take a few moments.
asciilifeform: https://pgp.mit.edu/pks/lookup?op=vindex&fingerprint=on&search=0xE4D2A44D1D8A78CC << our 'alice'.
asciilifeform: they perhaps were not quite good enough for pgp, but for this - perfect
punkman: "If you are part of the PGP strong set or your PGP key is on bitcoin-otc you now have a timestamp. Take your PGP fingerprint and convert that into a Bitcoin address and you'll find a 1 satoshi payment to it"
assbot: Improving the trustworthyness of PGP keys with Bitcoin ... ( http://bit.ly/1NHbJNh )
assbot: -----BEGIN PGP MESSAGE----- Version: GnuPG v1 hQEMA4iazE/I7/8TAQgAoUczBaxqX+ - Pastebin.com ... ( http://bit.ly/1PQ5V3p )
asciilifeform: 0FBEF185 does not appear to match any publicly-known pubkeys for pete@petertodd.org >>>>> https://pgp.mit.edu/pks/lookup?search=pete%40petertodd.org&op=index
asciilifeform: https://pgp.mit.edu/pks/lookup?search=john.dillon892%40googlemail.com&op=index << 'revoked' l0l
mircea_popescu: you can tell by all the breadcrumbs the use of pgp is so insecure it's outright spurious.
mircea_popescu: also hanbot has it : idempotence IS fundamental to bitcoin. but unlike shit like sybil attack, or pgp, which were scarcely used or thought about before we came around,
mike_c: sure, generally. but if you're building a pgp interface.. obviously assbot has done so
williamdunne: mircea_popescu: you probably own one of the most valuable pgp/email lists going..
asciilifeform: williamdunne: if you want to pgp, you're mostly stuck with shell call-outs to classical gpg.
mircea_popescu: hopefully we get a pgp implementation that's usable sometime this side of the decade.
asciilifeform: did early pgp just throw entirely unprocessed, raw sewage to generate the modulus ?!!
asciilifeform: https://pgp.mit.edu/pks/lookup?search=kfischer%40studio.sgi.com&op=index
mike_c: hand-coded PGP impelementation in PHP and javascript
mircea_popescu: should be fun once pgp is implemented properly as full rsa.
mircea_popescu: mike_c another premature thing is a pgp implementation that's proper.
punkman: more of them https://pgp.mit.edu/pks/lookup?search=wblevins@mail.orion.org
asciilifeform: https://pgp.mit.edu/pks/lookup?search=wblevins%40ix.netcom.com&op=index
assbot: Logged on 23-08-2015 00:42:58; mircea_popescu: incidentally asciilifeform and whoever else is privately thinking of reimplementing pgp : one thing i'd dearly love would be the ability to encrypt not to X, but to "l1".
assbot: Logged on 23-08-2015 21:42:47; mircea_popescu: point was agreed to before i think. which is how the discussion re what pgp implementation must be like got started.
asciilifeform: http://log.bitcoin-assets.com/?date=23-08-2015#1249705 << i find it interesting that there is ~exactly one~ actual, working implementation of pgp ☝︎
mircea_popescu: point was agreed to before i think. which is how the discussion re what pgp implementation must be like got started. ☟︎
mircea_popescu: incidentally asciilifeform and whoever else is privately thinking of reimplementing pgp : one thing i'd dearly love would be the ability to encrypt not to X, but to "l1". ☟︎